Welcome to our Weekly Cyber News Roundup!

This could be your go-to source for the freshest and most crucial updates in the cybersecurity world. We'll be bringing you the latest trends, insights, and expert analyses to keep you in the loop. Stay tuned for a deep dive into the ever-changing world of cyber resilience.

Let's get started! 🌐🔒

1. Newly discovered OAuth vulnerability risks 100M users across major extensions 


A recently identified security vulnerability affecting the OAuth protocol puts users of major extensions like Grammarly, Vidio, and Bukalapak at risk of authentication token theft.  

OAuth, a protocol dating back to 2006, enables secure, password-free login through social media platforms like Facebook, Twitter, and Google. This specific flaw is concerning given that the collective user base of the impacted vendors surpasses 100 million. However, it is reassuring that these vendors responded promptly to resolve the issue. 

The crux of the problem lies in the lack of token validation. Applications that utilise OAuth for user authentication must ensure that the received authentication tokens are genuine, and not from rogue vendors. Failure to validate these tokens opens the door for cybercriminals to set up malicious websites. These criminals can then substitute their own Facebook or Google tokens to seize control of users' accounts on vulnerable platforms. 

This threat is even more ominous when the targeted website has a solid reputation, as it becomes easier for attackers to ensnare multiple victims and engage in large-scale account hijacking. As proof of concept, researchers set up a mock website, acquired an OAuth token via Facebook, and switched it with a vulnerable application’s token, successfully commandeering the account. 

Given the scale of the issue, the urgency for developers to implement token validation mechanisms for OAuth cannot be overstated. Without proper validation, countless applications remain exposed to large-scale account takeovers. 

2. ALPHV/BlackCat Ransomware Group Targets LBA Hospitality, Threatens to Leak 200GB of Sensitive Data 


The ALPHV/BlackCat ransomware group announced that it successfully infiltrated the servers of LBA Hospitality, one of the largest hospitality management organizations in the U.S., and extracted approximately 200GB of sensitive data. Based in Alabama, LBA Hospitality manages close to a hundred hotels, affiliated with prominent brands such as Marriott, Hilton, Holiday Inn, and Best Western. Cyber security analysts confirmed that the group has listed LBA Hospitality on its data leak website. 

The ransomware group issued a three-day ultimatum to LBA Hospitality for ransom payment, threatening to publicize the stolen data otherwise. The message from ALPHV/BlackCat tauntingly read, "You have 3 days to decide this pity mistake made by your IT department." The pilfered data allegedly contains employees' personal information, including social security numbers, driver's license IDs, financial reports, and more. Additionally, client data encompassing social security numbers, financial details, and credit card information has apparently been compromised. 

The cybercriminal group had previously claimed responsibility for a significant breach on MGM Resorts International, affecting 31 of the company's properties and its mobile app. At the time of writing LBA Hospitality has remained tight-lipped about whether it plans to comply with the ransom demands or if the claims made by ALPHV/BlackCat are accurate.  

3. Global cyber security workforce gap widens to 4 million despite sector growth, new study reveals 


The ISC2 2023 Cyber security Workforce Study has unveiled that the global cyber security skills gap has increased by 12.6% to four million.  

In spite of the cyber security sector growing by 8.7% since last year, 92% of professionals highlighted skill shortages within their organizations. The shortfall is further exacerbated by economic uncertainties, leading 47% of surveyed firms to reduce cyber-related budgets, affecting staffing and training programs. 

The survey highlighted the rise of insider threats, with 52% reporting an increase in such incidents, linking it to the economic climate. Those in organizations that have experienced redundancies are three times more likely to encounter insider threats. 

The study also identifies a significant knowledge gap when it comes to AI, with 47% admitting to having minimal understanding of the technology, even though AI is listed as one of the biggest forthcoming challenges for cyber security. 

4. Manchester airport website hit by Cyberattack; Russian group UserSec claims responsibility 


Russian hacking group UserSec claimed responsibility for taking down Manchester Airport's website on October 30. Despite the cyberattack, airport operations and flights remained unaffected, and no passenger disruptions were reported.  

UserSec had announced that they were targeting UK airports in a series of attacks, naming Manchester as their initial focus. They claimed via a Telegram post that the website would remain down until 5:30 pm Manchester time (8:30 pm Moscow time). However, the site was restored by 4:15 pm UK time. Manchester Airport has not confirmed the origin of the attack, but the National Cyber Security Centre (NCSCC) is investigating the incident. 

Earlier this year, UserSec and another group called Anonymous Russia claimed responsibility for similar attacks on UK airports, including London City and Birmingham, whose websites were taken offline on July 19. 

5. Solarwinds and its CISO charged with fraud and internal control failures

 

The U.S. Securities and Exchange Commission (SEC) has charged SolarWinds and its Chief Information Security Officer (CISO), Timothy Brown, with fraud and internal control failures. The charges relate to allegedly misleading investors about the company's cyber security measures ahead of the Sunburst cyberattack in December 2020.  

According to the SEC, SolarWinds and Brown overlooked numerous red flags and painted an overly rosy picture of the company's cyber health, in direct contrast to internal assessments. The complaint alleges that the company violated antifraud provisions of the Securities Act of 1933 and the Securities Exchange Act of 1934, as well as reporting and internal controls provisions. The SEC is seeking various penalties, including barring Brown from serving as an officer or director. In response, SolarWinds CEO Sudhakar Ramakrishna dismissed the charges as "misguided and improper."  

This legal action could have significant ramifications for CISOs across the U.S. and the world, as the SEC and similar authorities increase their scrutiny of executive roles in cyber security. 

If you're concerned about any of the threats mentioned in this bulletin or need guidance on the necessary steps to safeguard your organization from significant risks, please don't hesitate to reach out. We're here to help you understand your options and protect your organization effectively.

Get in touch with us today to explore the best ways to secure your business.

Column Header Text Column Header Text Column Header Text

Their work should have not stopped there because achieving compliance is an occasional result that doesn't ensure a continual protection.

Their work should have not stopped there because achieving compliance is an occasional result that doesn't ensure a continual protection.

  • Their work should have not stopped there because achieving
  • Their work should have not stopped there because achieving
  • Their work should have not stopped there because achieving
  • Their work should have not stopped there because achieving

Their work should have not stopped there because achieving compliance is an occasional result that doesn't ensure a continual protection.

Their work should have not stopped there because achieving compliance is an occasional result that doesn't ensure a continual protection.

Their work should have not stopped there because achieving compliance is an occasional result that doesn't ensure a continual protection.

Performing a review of the media inventories at least annually

Performing a review of the media inventories at least annually

Performing a review of the media inventories at least annually

Row Header Text

Lorem ipsum dolor sit

Lorem ipsum dolor sit

23

Row Header Text

Lorem ipsum dolor sit

Lorem ipsum dolor sit

23

Row Header Text

Lorem ipsum dolor sit

Lorem ipsum dolor sit

23

Row Header Text

Lorem ipsum dolor sit

Lorem ipsum dolor sit

23

Row Header Text

Lorem ipsum dolor sit

Lorem ipsum dolor sit

23

Row Header Text

Lorem ipsum dolor sit

Lorem ipsum dolor sit

23

Row Header Text

Lorem ipsum dolor sit

Lorem ipsum dolor sit

23

Row Header Text

Lorem ipsum dolor sit

Lorem ipsum dolor sit

23

Discover More

Advantio_Blog_DNS_Diagram_V1 Image caption goes here. This is HTML text.

Matthew Olney

Written by

Matthew is Integrity360’s Content Marketing Specialist and has worked in cyber security for over 6 years being nominated for a national cyber writing award in 2019. He turns complicated cyber security into simpler language designed to help everyone get to grips with this vitally important topic.

Schedule a call with an expert