{"id":1144,"date":"2023-10-15T16:28:54","date_gmt":"2023-10-15T14:28:54","guid":{"rendered":"https:\/\/scpo-cybersecurityassociation.com\/?p=1144"},"modified":"2023-11-12T16:45:48","modified_gmt":"2023-11-12T15:45:48","slug":"september-2023-cyber-newsletter","status":"publish","type":"post","link":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/2023\/10\/15\/september-2023-cyber-newsletter\/","title":{"rendered":"Cyber Newsletter (#1) &#8211; September 2023"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"307\" src=\"https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2023\/10\/Copie-de-newsletter-banners-3-1024x307.png\" alt=\"\" class=\"wp-image-1145\" srcset=\"https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2023\/10\/Copie-de-newsletter-banners-3-1024x307.png 1024w, https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2023\/10\/Copie-de-newsletter-banners-3-300x90.png 300w, https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2023\/10\/Copie-de-newsletter-banners-3-768x230.png 768w, https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2023\/10\/Copie-de-newsletter-banners-3-1536x461.png 1536w, https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2023\/10\/Copie-de-newsletter-banners-3.png 2000w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>CISA:\u00a0<a href=\"https:\/\/www.cisa.gov\/news-events\/news\/cisa-releases-hardware-bill-materials-framework-hbom-supply-chain-risk-management-scrm\">Hardware Bill of Materials (HBOM)<\/a><\/strong><br><em>United States of America<\/em><\/p>\n\n\n\n<p class=\"has-text-align-left\">The US Cybersecurity and Infrastructure Security Agency (CISA) has released the &#8220;Hardware Bill of Materials&#8221; (HBOM) framework to reduce supply chain risks for physical products. HBOM complements the &#8220;Software Bill of Materials&#8221; (SBOM) and requires hardware vendors to provide detailed information about product components. It aims to enhance supply chain transparency so&nbsp;<em>\u201cstakeholders can identify and address potential risks within the supply chain, ensuring that the digital landscape remains robust and secure against emerging threats and challenges\u201d.<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>BlackTech APT Poses Threats to Japanese and US Overseas Subsidiary Companies<\/strong><br><em>Japan &amp; United States of America<\/em><\/p>\n\n\n\n<p>On the 27th of September, the Japanese and the US security agencies (<strong><a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa23-270a\">CISA<\/a>,&nbsp;<a href=\"https:\/\/www.nsa.gov\/Press-Room\/Press-Releases-Statements\/Press-Release-View\/Article\/3539209\/us-and-japanese-agencies-issue-advisory-about-china-linked-actors-hiding-in-rou\/\">NSA<\/a>,&nbsp;<a href=\"https:\/\/www.npa.go.jp\/bureau\/cyber\/koho\/caution\/caution20230927.html\">NPA<\/a><\/strong>) jointly warned about the activities of the BlackTech APT group,<em>&nbsp;\u201ca multinational threat linked to the People\u2019s Republic of China (PRC)&#8221;<\/em>. According to advisories, the threat actor has been hacking the overseas subsidiaries of US and Japanese companies and later infiltrating their corporate headquarters. BlackTech (also known as Palmerworm, Temp. Overboard, Circuit Panda, and Radio Panda) gained initial access through internet-facing routers, mostly Cisco routers. To maintain access, they patch router firmware with a modified version containing an SSH backdoor, using custom TCP or UDP packets to enable or disable the backdoor.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Encryption: UK Government\u2019s Clash with Meta over the Balance between Privacy and Security<\/strong><br><em>United Kingdom&nbsp;<\/em><\/p>\n\n\n\n<p>The&nbsp;<a href=\"https:\/\/www.politico.eu\/article\/meta-encryption-uk-fight\/\">UK government has escalated its conflict with Meta<\/a>&nbsp;over the implementation of end-to-end encryption on Facebook and Instagram. On Wednesday 20 September, the home Secretary Suella Braverman launched a campaign, expressing concerns that encryption would hinder law enforcement efforts to combat online child sexual abuse. Meta, aiming to complete the encryption rollout by year-end, claims it will continue monitoring its platforms for child abuse content using various controls. The campaign is part of an ongoing battle between tech companies and the UK government, primarily focused on the controversial<a href=\"https:\/\/www.gov.uk\/guidance\/a-guide-to-the-online-safety-bill\">&nbsp;Online Safety Bill<\/a>, that will grant regulatory powers to Ofcom (UK communications regulator) to compel tech companies to monitor messenger apps for illegal content.&nbsp;<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Apple Urgent Security Updates to Address Zero-day Vulnerabilities Exploited by Pegasus Spyware<\/strong><br><em>Worldwide&nbsp;<\/em><\/p>\n\n\n\n<p>On Thursday 7 September,&nbsp;<a href=\"https:\/\/thehackernews.com\/2023\/09\/apple-rushes-to-patch-zero-day-flaws.html\">Apple urgently released security updates<\/a>&nbsp;for iOS, iPadOS, macOS, and watchOS to address two zero-day vulnerabilities exploited by the NSO Group&#8217;s Pegasus spyware. The flaws identified by Citizen Lab are CVE-2023-41061 (a validation issue in Wallet allowing arbitrary code execution) and CVE-2023-41064 (a buffer overflow issue in the Image I\/O component resulting in arbitrary code execution). These vulnerabilities were used in a zero-click iMessage exploit chain named BLASTPASS to deploy Pegasus on fully-patched iPhones. The exploit involved PassKit attachments with malicious images, bypassing Apple&#8217;s BlastDoor sandbox framework. The discovery coincides with reports of the Chinese government banning the use of iPhones and foreign-branded devices for work, citing cybersecurity concerns.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Cybersecurity: a new step into the Palestine-Israeli conflict<\/strong><br><em>Israel &#8211; Palestine<\/em><\/p>\n\n\n\n<p>Cybersecurity has tremendously changed the way we approach new conflits and the recent attack on Israeli targets by Hamas has proved it to be right. Along with the physical attacks,&nbsp;<a href=\"https:\/\/www.washingtonpost.com\/technology\/2023\/10\/09\/cyber-attacks-gaza-hamas\/\" target=\"_blank\" rel=\"noreferrer noopener\">cyber attacks were also utilized<\/a>&nbsp;in a way to distract the opponent from Sunday to Monday. Various groups launched denial-of-service attacks (DDos) at government and private websites but the most effective of them was the one against the website of the Jerusalem Post, an major source in reporting the conflict.&nbsp; Those attacks were claimed by Anonymous Sudan (linked to KillNet, a russian nationalist hacking group) but AnonGhost (pro-palestininan hacker) has also claimed the attacks on an app used to warn residents of incoming rocket strikes. Earlier this year, the group Storm-1133 (Gaza Strip Group) had also made suspicious moves targeting energy, defense and telecommunications companies which are more proof of preparation.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Pro-Palestine hackers target India&nbsp;<\/strong><br><em>India&nbsp;<\/em><\/p>\n\n\n\n<p>As the conflict grows in the region, other nations have been affected as well. As a matter of fact, Palestine supporters have been&nbsp;<a href=\"https:\/\/timesofindia.indiatimes.com\/india\/pro-palestine-hackers-target-india-pro-india-groups-strike-back\/articleshow\/104297059.cms?from=mdr\" target=\"_blank\" rel=\"noreferrer noopener\">attempting cyber attacks on Indian government websites<\/a>&nbsp;in an actio&nbsp;to condemn any country siding with Israel. Most of the attacks were in the shape of denial-of-service and were fended off during 48 hours. In retaliation, cyber groups with links to India have targeted the Hamas website as well as the Palestinian National Bank and the National Telecommunications Company. These hackers have been working with groups such as the ThreatSec which is pro-israeli.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Check out what happened in the cyberspace during the month of September! <\/p>\n","protected":false},"author":7,"featured_media":801,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-1144","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles"],"_links":{"self":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/1144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/comments?post=1144"}],"version-history":[{"count":12,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/1144\/revisions"}],"predecessor-version":[{"id":1167,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/1144\/revisions\/1167"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/media\/801"}],"wp:attachment":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/media?parent=1144"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/categories?post=1144"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/tags?post=1144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}