13-06-202115-06-2021

Security daily (14-06-2021)

Approaches to meeting Australian Government gateway requirements on AWS

Australian Commonwealth Government agencies are subject to specific requirements set by the Protective Security Policy Framework (PSPF) for securing connectivity between systems that are running sensitive workloads, and for accessing less trusted environments, such as the internet. These agencies have often met the requirements by using some form of approved gateway solution that provides network-based […] (AWS Security Blog)

Announcing the AWS Security and Privacy Knowledge Hub for Australia and New Zealand

Cloud technology provides organizations across Australia and New Zealand with the flexibility to adapt quickly and scale their digital presences up or down in response to consumer demand. In 2021 and beyond, we expect to see cloud adoption continue to accelerate as organizations of all sizes realize the agility, operational, and financial benefits of moving […] (AWS Security Blog)

IRS, GAO at odds over cybersecurity requirements on tax preparers

The Internal Revenue Service hasn’t put in place a structure to issue cybersecurity dictates to paid tax preparers because it doesn’t believe it has the authority to do so — but the Government Accountability Office begs to differ. The government watchdog recommended the IRS establish a security structure in a 2019 report, but the agency contended Congress would need to take action to give the IRS more power. As of January of this year, the IRS still believes it needs statutory authority, the GAO said in a report released Monday. The GAO’s suggestion is that IRS should create a governance structure or steering committee to “to coordinate all aspects of IRS’s efforts to protect taxpayer information while at third-party providers.” Hackers have targeted tax preparation companies for years in identity theft and tax return theft schemes, as the IRS itself has repeatedly warned. In one recent case, a U.S. court […] The post IRS, GAO at odds over cybersecurity requirements on tax preparers appeared first on CyberScoop. (CyberScoop)

Veteran Justice official who oversaw cybercrime cases to step down

The Justice Department official who leads the division that prosecutes state-linked and criminal hackers is resigning by the end of June, a department spokesman said Monday. John Demers will step down after more than three years as assistant attorney general for national security, during which time the department brought multiple charges against alleged Russian and Chinese spies for hacking. Mark Lesko, the acting U.S. attorney for the Eastern District of New York, will likely serve as Demers’ temporary replacement, department spokesman Marc Raimondi said. Demers’ departure, which the New York Times first reported on, has been expected for months. The White House said last month it would nominate Matt Olsen, a security executive at Uber, to replace Demers. The assistant attorney general for national security is one of the most important cybersecurity-related perches in the U.S. government as the incumbent can wield the full force of the Justice Department to […] The post Veteran Justice official who oversaw cybercrime cases to step down appeared first on CyberScoop. (CyberScoop)

Former NSA contractor Reality Winner is released from prison for good behavior

Reality Winner, a former NSA-contractor found guilty of leaking classified government material, has been released early for good behavior, according to her lawyer. Winner accepted a guilty plea agreement in 2018 for leaking classified information about the Russian government’s attempt to interfere with U.S. elections to The Intercept. “Winner is released a bit early for good behavior and will be finished with the reentry process and onto supervised release in November,” her lawyer Alison Grinter said in an email. Winner was originally sentenced to more than five years in prison, the longest term ever imposed by a court for a case involving leaking. Winner and her lawyer have petitioned the Department of Justice to commute the sentence and unsuccessfully requested a pardon from former President Donald Trump. Grinter says that there has been no decision made on the commutation or pardon. “The fight continues and I’ll still be taking meetings […] The post Former NSA contractor Reality Winner is released from prison for good behavior appeared first on CyberScoop. (CyberScoop)

Biden, Putin conduct diplomatic dance over hypothetical hacker exchange

A discussion over an exchange of accused hackers from Russia and the U.S. could be on the agenda this week when President Joe Biden meets with his Russian counterpart on the shores of Lake Geneva in Switzerland. Vladimir Putin, in an interview with Russian state media Sunday, said his government would consider the possibility of extraditing accused hackers from Russia to America under the condition that the U.S. would do the same. During a news conference at a Group of Seven (G7) summit, Biden said he would be “open” to the idea of holding accused hackers in the U.S. accountable for violating the law. The two world leaders are scheduled to meet on Wednesday amid a spate of high profile ransomware attacks in which alleged Russian-based hacking gangs disrupted operations at Colonial Pipeline, a U.S. fuel carrier, and the meat processing firm JBS. “If there’s crimes committed against Russia that, […] The post Biden, Putin conduct diplomatic dance over hypothetical hacker exchange appeared first on CyberScoop. (CyberScoop)

Volkswagen, Audi Disclose Data Breach Impacting Over 3.3 Million Customers, Interested Buyers

(News ≈ Packet Storm)

WhatsApp Boss Decries Attacks On Encryption As Orwellian

(News ≈ Packet Storm)

Irish Police To Be Given Powers Over Passwords

(News ≈ Packet Storm)

Russia Told To Tackle Cyber Criminals Operating From Within

(News ≈ Packet Storm)

Google Workspace Now Offers Client-side Encryption For Drive and Docs

Google on Monday announced that it's rolling out client-side encryption to Google Workspace (formerly G Suite), thereby giving its enterprise customers direct control of encryption keys and the identity service they choose to access those keys. "With client-side encryption, customer data is indecipherable to Google, while users can continue to take advantage of Google's native web-based (The Hacker News)

NoxPlayer Supply-Chain Attack is Likely the Work of Gelsemium Hackers

A new cyber espionage group named Gelsemium has been linked to a supply chain attack targeting the NoxPlayer Android emulator that was disclosed earlier this year. The findings come from a systematic analysis of multiple campaigns undertaken by the APT crew, with evidence of the earliest attack dating back all the way to 2014 under the codename Operation TooHash based on malware payloads (The Hacker News)

Cybersecurity Executive Order 2021: What It Means for Cloud and SaaS Security

In response to malicious actors targeting US federal IT systems and their supply chain, the President released the "Executive Order on Improving the Nation’s Cybersecurity (Executive Order)." Although directed at Federal departments and agencies, the Executive Order will likely have a ripple effect through the Federal technology supply stream. Private companies and enterprises will look to the (The Hacker News)

Utilities ‘Concerningly’ at Risk from Active Exploits

Utilities’ vulnerability to application exploits goes from bad to worse in just weeks.   (Threatpost)

Microsoft Teams: Very Bad Tabs Could Have Led to BEC

Attackers could have used the bug to get read/write privileges for a victim user’s email, Teams chats, OneDrive, Sharepoint and loads of other services. (Threatpost)

Moobot Milks Tenda Router Bugs for Propagation

An analysis of the campaign revealed Cyberium, an active Mirai-variant malware hosting site. (Threatpost)

13-06-202115-06-2021

/security-daily/ 15-06-2021 23:44:22