{"id":1228,"date":"2024-02-22T23:29:34","date_gmt":"2024-02-22T22:29:34","guid":{"rendered":"https:\/\/scpo-cybersecurityassociation.com\/?p=1228"},"modified":"2024-02-22T23:29:40","modified_gmt":"2024-02-22T22:29:40","slug":"cyber-newsletter-4-december-2023","status":"publish","type":"post","link":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/2024\/02\/22\/cyber-newsletter-4-december-2023\/","title":{"rendered":"Cyber Newsletter (#4) &#8211; December 2023"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"300\" src=\"https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2024\/02\/dec.png\" alt=\"\" class=\"wp-image-1229\" srcset=\"https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2024\/02\/dec.png 1000w, https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2024\/02\/dec-300x90.png 300w, https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2024\/02\/dec-768x230.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><\/h3>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Israel uses AI system &#8220;the Gospel&#8221; to generate bombing targets<\/strong><\/p>\n\n\n\n<p><em>Israel<\/em><\/p>\n\n\n\n<p>As part of their airstrike operations in Gaza,&nbsp;<a href=\"https:\/\/link.sbstck.com\/redirect\/6917f0a0-52b0-4118-aa52-63d6f0be9d7b?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" rel=\"noreferrer noopener\" target=\"_blank\">the Israel Defense Forces have been using a controversial AI-enabled decision support system named Habsora, or \u201cthe Gospel\u201d<\/a>. The Gospel assists the IDF\u2019s target division to rapidly generate targeting recommendations based on vast surveillance data sets, with human operators still retaining the ultimate decision to engage. The IDF seems to have resorted to the Gospel as a result of the depletion of viable targets during previous Gaza operations. With senior Hamas officials often retreating to tunnels at the onset of offensives, the Gospel enables the IDF to target a broader range of lesser-known \u201cjunior\u201d operatives. The IDF asserts that the Gospel enhances the accuracy of strikes, thereby minimizing civilian casualties. However, experts point out a lack of substantial evidence supporting these claims, warning against automation biases and violation of International Humanitarian Law, particularly concerning the principle of proportionality.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>AI Act: the European Union agreed on a pioneering approach to regulating artificial intelligence<\/strong><\/p>\n\n\n\n<p><em>EU<\/em><\/p>\n\n\n\n<p>After more than twenty four hours of debate,&nbsp;<a href=\"https:\/\/link.sbstck.com\/redirect\/163d2fe3-5357-41f4-8801-d284453b1a7b?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" rel=\"noreferrer noopener\" target=\"_blank\">the representatives of the European institutions agreed on a final version of the AI Act<\/a>. The Act presents a risk-based approach with four levels associated with different obligations. Systems deemed unacceptable such as social scoring or mass surveillance are banned in the EU and &#8220;high-risk&#8221; systems are subject to strict requirements. As regards the controversial subject of frontier AI models GPAI, the EU representatives agreed on only imposing obligations on high-impact GPAIs. The other models would be encouraged to adopt non-binding best practices. The AI Act is due to come into force in 2025 and will make it possible to impose financial penalties of up to seven percent of the company revenue. European citizens will also be able to take action against illegal uses.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>New York Times Files Landmark Lawsuit Against OpenAI and Microsoft Over AI Copyright Infringement<\/strong><\/p>\n\n\n\n<p><em>US<\/em><\/p>\n\n\n\n<p>On December 27, 2023,&nbsp;<a href=\"https:\/\/link.sbstck.com\/redirect\/74223991-637e-4d23-9679-1219769dface?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" rel=\"noreferrer noopener\" target=\"_blank\">The New York Times filed a lawsuit<\/a>&nbsp;accusing OpenAI and Microsoft of using the Times&#8217;s copyrighted content to train their large language models without permission. The Times alleges that OpenAI and Microsoft used millions of their articles to train their chatbots, which are now used to generate text, translate languages, and answer questions. The Times is seeking damages and an injunction to prevent OpenAI and Microsoft from using its copyrighted content. This lawsuit raises important questions about the use of copyrighted material in the development of artificial intelligence and could have significant implications for the future of the news industry.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<figure class=\"wp-block-image aligncenter is-resized\"><a href=\"https:\/\/link.sbstck.com\/redirect\/70dfa7a2-d5e6-47bf-a6ac-7e6ebac666e2?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" src=\"https:\/\/ci3.googleusercontent.com\/meips\/ADKq_NaEYCQAXWMV93xcux8ko_wUw_nUWyvBnbS40V22pMCfo7lbSegqcJadMnSNKb-DXlZX5bEMw2HIgrdBsGQIvrADjFqKCbf5TEHV2kqBGzIkZz37Iakc1OeZPig1Am5KvKAYGGk7ad64zZX5ImuqqA-cO9U4GxeCv8NyWnfw-VQ52MVSqznW2Vprhj0vEief6YiB9S8zxjnqz4vikODBYAWDd234G-XTi2pxxOOXXFCSgifY7xfQibiIrv76MrvNutoQMaLe0DX2JkcNlLBzpP4myAXH-IwYs7d1TWUBhiTMuifyAIz3P-RHTQ=s0-d-e1-ft#https:\/\/substackcdn.com\/image\/fetch\/w_1400,c_limit,f_auto,q_auto:good,fl_progressive:steep\/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffae3ef7c-9aa0-4787-9794-417c3f4f678c_700x525.jpeg\" alt=\"\" style=\"width:431px;height:auto\"\/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>The European Union initiates a &#8220;formal investigation&#8221; against social network X<\/strong><\/p>\n\n\n\n<p><em>EU<\/em><\/p>\n\n\n\n<p>The&nbsp;<a href=\"https:\/\/link.sbstck.com\/redirect\/6a6ea451-519d-4343-b7e6-441ae5dea493?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" rel=\"noreferrer noopener\" target=\"_blank\">European Commission initiated a &#8220;formal investigation&#8221; against X<\/a>&nbsp;for alleged breaches of the DSA, the first since the regulation has come into force. Investigations will focus particularly on &#8220;the dissemination and amplification of illegal content and disinformation in the EU&#8221;, explained Thierry Breton. Since its acquisition by Elon Musk, the platform has relaxed its rules on disinformation and reduced its moderation teams. This procedure will enable the Commission to take binding measures against X, with penalties of up to 6% of the group&#8217;s worldwide revenue or, in the most serious cases, a ban on the platform on European soil.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>The European institutions finalise an agreement on the \u201cCyber Resilience Act\u201d&nbsp;<\/strong><\/p>\n\n\n\n<p><em>EU<\/em><\/p>\n\n\n\n<p>European Union policy makers reached a&nbsp;<a href=\"https:\/\/link.sbstck.com\/redirect\/d8d97eaa-4271-42f1-bad4-737ab16abaa3?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" rel=\"noreferrer noopener\" target=\"_blank\">political agreement on the \u201cCyber Resilience Act\u201d (CRA)<\/a>&nbsp;on November 30th. The primary objective of the CRA is to establish security requirements for a wide array of connected devices, ranging from intelligent toys to industrial machinery. Manufacturers of these connected devices will be prohibited from marketing their products if they are aware of significant vulnerabilities. Furthermore, they are obligated to report security incidents and actively exploited vulnerabilities to the authorities. Notifications must be sent simultaneously to the competent CSIRT and to ENISA through a unified platform. However, information shared with ENISA may be subject to restrictions for security reasons.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>EU&nbsp;cybersecurity&nbsp;about to be considerably enhanced thanks to the \u201cEU Cyber Solidarity Act\u201d<\/strong><\/p>\n\n\n\n<p><em>EU<\/em><\/p>\n\n\n\n<p>On December 20th, the&nbsp;<a href=\"https:\/\/link.sbstck.com\/redirect\/7f1ee625-d189-4fe7-be59-a598217ce1fb?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" rel=\"noreferrer noopener\" target=\"_blank\">EU Member States reached a consensus on the \u201cCyber Solidarity Act\u201d<\/a>&nbsp;to enhance the EU&#8217;s collective&nbsp;cybersecurity&nbsp;capabilities. The act introduces a \u201cEuropean cyber shield\u201d, through national and cross-border security operations centers (SOCs) responsible for detecting and sharing warnings on cyber threats. The draft proposes a system for cyber emergencies, a&nbsp;cybersecurity&nbsp;reserve and financial aid to assist member states during significant&nbsp;cybersecurity&nbsp;incidents. Council amendments refined terminology, highlighted the voluntary nature of member state participation and strengthened the role of ENISA. With a budget of \u20ac1.1 billion, largely funded by the EU through the \u201cDigital Europe program\u201d, the legislation aims to bolster the EU&#8217;s overall cyber resilience. The act will now enter negotiations with the European Parliament.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<figure class=\"wp-block-image aligncenter is-resized\"><a href=\"https:\/\/link.sbstck.com\/redirect\/ca82443e-122d-4adc-b931-f477875268d3?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" src=\"https:\/\/ci3.googleusercontent.com\/meips\/ADKq_Nb_66LMUwzq6F1LhXvP7Glxr1vYYUZQvEFgTakPnKaZwQLTmH0Jyq_uneh7B-lo1guYXAfJYfOgbpvP-iI9iCkDbdvooJeDHRjL7pJ0yuU-jsjMxttkkKwv8dskpKUJBjGYmHYP3e87-oZ7S3ML6NpGLNZZrvgBWDwfL6jYgfMJum_stOhmhsPgoSRBjX5UbiwU61FZ0m57lCWMveffsrAG2yM3td0ggRxTWezLrFWimUy5IXHMrQ0RCrH39wVmZLXsxx4ubaZxS1bXXn6x5QXdciHR6sJH-Mc0QA0KOeiiB_8BzBEfogy3O5Ss=s0-d-e1-ft#https:\/\/substackcdn.com\/image\/fetch\/w_2912,c_limit,f_auto,q_auto:good,fl_progressive:steep\/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4cbb0cec-9fbf-4969-b455-dc85dbe2e640_2121x1414.jpeg\" alt=\"\" style=\"width:639px;height:auto\"\/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Alliance in fighting against North Korea cybercrime\u00a0<\/strong><\/p>\n\n\n\n<p><em>US, Japan &amp; South Korea&nbsp;<\/em><\/p>\n\n\n\n<p><a href=\"https:\/\/link.sbstck.com\/redirect\/dad3432f-241f-4cba-9ba3-44e188520b28?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" rel=\"noreferrer noopener\" target=\"_blank\">Japan, the United States, and South Korea have joined forces to combat North Korean cybercriminal activities<\/a>, targeting funding streams for the country&#8217;s alleged &#8220;illegal&#8221; nuclear and ballistic missile programs. According to a recent report by Insikt, North Korean agents successfully stole $1.7 billion in cryptocurrencies in 2022, equivalent to 5% of the nation&#8217;s economy or 45% of its military budget. Noteworthy attacks include a $600 million heist from the Ronin network and the exploitation of Cloudzy&#8217;s infrastructure for ransomware and data theft. The collaboration aims to tackle the growing threat posed by North Korean hackers, who benefit from the regime&#8217;s strategic investment in information technology and the cultivation of skilled experts.&nbsp;<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Kaspersky Reveals In-Depth Analysis of iPhone Attack: Operation Triangulation<\/strong><\/p>\n\n\n\n<p><em>Russia<\/em><\/p>\n\n\n\n<p>On December 27th, during a conference,&nbsp;<a href=\"https:\/\/link.sbstck.com\/redirect\/08877b38-e6f5-42f8-8e89-9ac9560b2193?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" rel=\"noreferrer noopener\" target=\"_blank\">Kaspersky&#8217;s researchers revealed intricate details about the sophisticated iPhone attack known as \u201cOperation Triangulation\u201d<\/a>. Initially detected in July 2023 within the company&#8217;s network, the Russian FSB promptly accused Apple and the NSA of involvement. This latest report delves deeper into the highly advanced chain of exploits, exposing the attack&#8217;s use of multiple vulnerabilities to compromise iPhones. This chain of exploits includes the manipulation of a rare hardware feature: the attackers exploited certain hardware registers in the iPhone&#8217;s GPU coprocessor, tapping into a concealed functionality likely designed for testing or debugging. This discovery raises concerns about relying on hardware secrecy for security and underscores the heightened sophistication of attacks orchestrated by well-funded adversaries.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<figure class=\"wp-block-image aligncenter is-resized\"><a href=\"https:\/\/link.sbstck.com\/redirect\/36a2936d-e135-42ae-845b-204a46c3bd28?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" src=\"https:\/\/ci3.googleusercontent.com\/meips\/ADKq_Na7-2zf3UiyPxBAfca0BuhEd9r6Yscy4TiHAinn57HSN-ICe4khcW0pMY6MB0ggYTWPTSDF6NR7SNfeZg2QNwWVPiP1QCJZvVkQkvnqe4k-q969n5SxQHT1EAdsvd3rY1qdKLPFTqJ7eOoNy-je5IPv_iB2bpTHs3Bv5GI4yulQMojpN-78RKQ856KgJldPRj8vcPj0fPhpq6w14-dMFR3Ms-Lzty2HDEXSERwiEIktdV9ZbvBoiM04hcLe5I30N1bgcbtF2bfzVk2HCeNgG96L2eety19h4pkiSLiuQsp4aws=s0-d-e1-ft#https:\/\/images.unsplash.com\/photo-1623068285726-21b0fcabe7f8?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxMHx8bG90dGVyeXxlbnwwfHx8fDE3MDQ3NjE1MTl8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080\" alt=\"text\" style=\"width:590px;height:auto\" title=\"text\"\/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>The Ohio Lottery targeted by complex ransomware attack\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/strong><\/p>\n\n\n\n<p><em>US&nbsp;<\/em><\/p>\n\n\n\n<p>On December 27th, the Ohio state lottery was the target of a complex cyberattack by a seemingly new ransomware group named DragonForce. They&nbsp;<a href=\"https:\/\/link.sbstck.com\/redirect\/6e565055-3a65-44e9-aeee-c1999a2a0491?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" rel=\"noreferrer noopener\" target=\"_blank\">claimed the theft of over 600 Gb of data<\/a>, including more than 3 million records of employees and players, with names, addresses, social security numbers and other sensitive pieces of information. They are currently threatening to make the data public if the Ohio Lottery does not pay the demanded ransom. This is the latest move from what has become one of the most active ransomware gangs this year, and it has further consolidated the notion that no organization or body is free of&nbsp;cybersecurity&nbsp;threats posed by ransomware attacks.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Huawei\u2019s ambitions for the semiconductor market<\/strong><\/p>\n\n\n\n<p><em>China&nbsp;<\/em><\/p>\n\n\n\n<p>Despite heavy US sanctions against China, Huawei has revealed&nbsp;<a href=\"https:\/\/link.sbstck.com\/redirect\/df06f9dd-85d7-486b-a6cc-0c1222ac8dc6?j=eyJ1IjoiMzJjNTR2In0.eS00jYnWXomdZefjwDo6ch7fO49QEZh1ljn0k9Diw0o\" rel=\"noreferrer noopener\" target=\"_blank\">major innovations for its semiconductor industry<\/a>. The company recently unveiled a new computer equipped with a 5 nm chip, a technical achievement that few companies have achieved to date. The company&#8217;s ability to innovate against a backdrop of regional and global crises and tensions remains undiminished. However, U.S. sanctions have had, and will continue to have, an impact on the company, which finds itself unable to export its products to numerous trading partners.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Check out what happened in the cyberspace during the month of December!<\/p>\n","protected":false},"author":7,"featured_media":801,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-1228","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles"],"_links":{"self":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/1228","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/comments?post=1228"}],"version-history":[{"count":3,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/1228\/revisions"}],"predecessor-version":[{"id":1232,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/1228\/revisions\/1232"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/media\/801"}],"wp:attachment":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/media?parent=1228"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/categories?post=1228"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/tags?post=1228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}