Normal view

There are new articles available, click to refresh the page.
Yesterday — 17 May 2024Main stream

'He likes scaring people'

17 May 2024 at 15:00
These details emerged in 2010, when the Central Bureau of Investigation, India's equivalent of the FBI, was investigating the killings. The CBI charged Shah with kidnapping, extortion and murder. It alleged that the officers who killed Sheikh and his wife were working on Shah's orders... Today, Amit Shah isn't home minister for Gujarat, but all of India. From the heart of power in Delhi, he is in charge of domestic policy, commands the capital city's police force, and oversees the Indian state's intelligence apparatus. He is, simply put, the second-most powerful man in the country. How Modi's right-hand man, Amit Shah, runs India.
Before yesterdayMain stream

SideCopy APT Campaign Found Targeting Indian Universities

By: Alan J
15 May 2024 at 03:48

SideCopy APT Campaign Found Targeting Indian Universities

Cyble Research and Intelligence Labs (CRIL) researchers have uncovered a new SideCopy campaign. The threat actor group has previously been observed targeting South Asian nations with a particular focus on government and military targets in India and Afghanistan. Active since May 2023, the campaign targets university students through sophisticated infection chains involving malicious LNK files, HTAs, and loader DLLs disguised as legitimate documents. Ultimately, the campaign deploys malware payloads such as Reverse RAT and Action RAT, granting attackers extensive control over infected devices. The research explores the tactics employed by SideCopy, such as their recent focus on university students, and potential overlap in activities with the Transparent Tribe APT group.

Technical Analysis of the SideCopy Campaign Infection Chain

In early May, CRIL identified a malicious domain employed by the SideCopy group in their operations. The website was discovered hosting a ZIP archive file named "files.zip" that contained sub-directories labeled as "economy," "it," and "survey." The survey directory included files similar to those previously employed by SideCopy in their earlier campaigns. [caption id="attachment_68383" align="alignnone" width="1228"]SideCopy campaign Transparent Tribe Source: Cyble[/caption] The campaign likely employs spam emails to distribute the malicious ZIP archive hosted through the compromised website as the initial infection vector. These archives contain malicious LNK files disguised as legitimate documents, such as "IT Trends.docx.lnk." Upon execution, the LNK files trigger a series of commands that proceeds to download and execute a malicious HTA file. The downloaded HTA files contain embedded payloads within additional lure documents and DLL files. The lure documents are typically themed around current affairs or relevant academic topics to appear legitimate to the targeted demographic. [caption id="attachment_68384" align="alignnone" width="604"]SideCopy Campaign Infection Chain Source: Cyble Blog[/caption] [caption id="attachment_68385" align="alignnone" width="894"]SideCopy Campaign Infection Chain Antivirus bypass Source: Cyble Blog[/caption] The malware is crafted with the functionality to adopt to the presence of different antivirus software such as Avast, Kaspersky and Bitdefender, which further amplifies its ability to evade detection and ensure persistence by placing the LNK shortcut files in the startup folder. The attack process ultimately leads to the deployment of malicious payloads such as Reverse RAT and Action RAT on to the victim system, which then connect to a remote Command-and-Control (C&C) server to commence malicious activities.

Intersection with Transparent Tribe Activities

The research further suggests a potential overlap or collaboration between SideCopy and Transparent Tribe, another APT group known for targeting Indian military and academic institutions. This intersection hints at a possible collaborative efforts or shared objectives between the two groups with researchers previously noting that SideCopy may function as a sub-division of Transparent Tribe. SideCopy is also known to emulate tactics of the Sidewinder APT group in the distribute of malware files, such as the use of disguised LNK files to initiate a complex chain of infections. CRIL researchers have advised the use of strong email filtering systems, exercise of caution, the deployment of network-level monitoring and the disabling of scripting languages such as PowerShell, MSHTA, cmd.exe to prevent against this potential threat. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Ancient Polished Granite Chambers In India With No Explanation

By: hippybear
7 May 2024 at 10:09
BARABAR, THE ARCHAEOLOGICAL SITE OF THE FUTURE [2h] "2,300 years ago, in India, 5 chambers were carved inside enormous granite rocks. According to rudimentary inscriptions engraved at their entrances, they were purportedly offered by a king to serve as monsoon shelters against rain for a sect. WELCOME TO THE HEART OF ANCIENT INDIA, IN A FORGOTTEN CHAPTER OF ITS PAST... THAT COULD VERY WELL CHANGE HISTORY."

These highly polished, very specifically designed spaces are mostly a mystery. [Wikipedia] The inscriptions that "donate" them to a religious sect for shelter are likely centuries after the chambers' creations. The documentary feels like it gets quite divergent only it comes back and ties things together, a couple of times. There are mysteries in the world we have no explanation for.

2024 Is The Year of Elections… And Disinformation

By: Editorial
27 April 2024 at 09:27

Elections

By Roman Faithfull, Cyber Intelligence Lead, Cyjax 2024 will see more elections than any other year in history: the UK, the US, Russia, India, Taiwan and more. According to AP, at least 40 countries will go to the polls this year, and some of these contests will have ramifications way beyond their national borders. This will also make 2024 a year of misinformation, as groups both within and outside these countries look to exert their influence on the democratic process. As the US presidential election draws near, specialists caution that a combination of factors domestically and internationally, across conventional and digital media platforms, and amidst a backdrop of increasing authoritarianism, profound mistrust, and political and social turbulence, heightens the severity of the threats posed by propaganda, disinformation, and conspiracy theories. There are two terms that are frequently conflated. Disinformation is deliberately false content crafted to inflict harm, whereas misinformation is inaccurate or deceptive content shared by individuals who genuinely believe it to be true. It can be difficult to establish if people are acting in good faith or not, so the terms are often used interchangeably—and misinformation often starts out as carefully crafted disinformation. The overall outlook appears bleak, with governments already experiencing the effects of misinformation. The groundwork has been laid, evidenced by past initiatives that aimed to influence elections in favor of certain parties. In 2022, the BBC launched an investigative project, creating fake accounts to follow the spread of misinformation on platforms such as Facebook, Twitter, and TikTok, and its potential political impact. Despite attempts by social media platforms to tackle this problem, it was found that false information, particularly from far-right viewpoints, remains prevalent. Today, just two years on, the techniques and tools to manipulate information are even more advanced.

The Deceptive Side of Tech

AI is dominating every discussion of technology right now, as its uses are explored for good and ill. Spreading fake news and disinformation is one of those uses. In its 2024 Global Risks report, the World Economic Forum noted that the increasing worry regarding misinformation and disinformation primarily stems from the fear that AI, wielded by malicious individuals, could flood worldwide information networks with deceptive stories. And last year, the UK’s Cyber Security Center released a report exploring the potential for nations like China and Russia to employ AI for voter manipulation and meddling in electoral processes. Deepfakes have grabbed a lot of attention, but could they disrupt future elections? It’s not a future problem—we’re already here. Deepfake audio recordings mimicking Keir Starmer, the leader of the Labour Party, and Sadiq Khan, the mayor of London, have surfaced online. The latter of these was designed to inflame tensions ahead of a day of protest in London. One of those responsible for sharing the clip apologized but added that they believed the mayor held beliefs similar to the fake audio. Even when proven false, deepfakes can remain effective in getting their message across. Many would argue that the responsibility now falls on governments to implement measures ensuring the integrity of elections. It's a cat and mouse game—and unfortunately, the cat is not exactly known for its swiftness. There are myriad ways to exploit technology for electoral manipulation, and stopping all of it could simply be impossible. Regulation is out-of-date (the Computer Misuse Act was passed in 1990, though it has been updated a few times) and the wheels of government turn slowly. Creating and passing new laws is a long process involving consultation, amendment processes, and more. But is it solely the responsibility of governments, or do others need to step up?.

Is There a Solution?

Combating technology with technology is essential, there is simply too much misinformation out there for people to sift through. Some of the biggest tech companies are taking steps: Two weeks ago, a coalition of 20 tech firms including Microsoft, Meta, Google, Amazon, IBM, Adobe and chip designer Arm announced a collective pledge to tackle AI-generated disinformation during this year's elections, with a focus on combating deepfakes. Is this reassuring? It’s good to know that big tech firms have this problem on their radar, but tough to know how effective their efforts can be. Right now, they are just agreeing on technical standards and detection mechanisms—starting the work of detecting deepfakes is some way away. Also, while deepfakes are perhaps uniquely disturbing, they are just one method among many, they represent just a fraction of effective disinformation strategies. Sophistication is not always needed for fake news to spread—rumors can be spread on social media or apps like Telegraph, real photos can be put into new contexts and spread disinformation without clever editing, and even video game footage has been used to make claims about ongoing wars.

Fighting Misinformation During Election

Fighting against misinformation is extremely difficult, but it is possible. And the coalition of 20 big tech firms has the right idea—collaboration is vital.

Be proactive

A lie can travel halfway around the world while the truth is putting on its shoes, said… someone (it’s a quote attributed to many different people). By the time we react to disinformation, it’s already out there and debunking efforts are not always effective. As Brandolini’s Law states, the amount of energy needed to refute bullshit is an order of magnitude bigger than that needed to produce it. And often, when people read both the misinformation and the debunking, they only remember the lies. Warning people about what to look for in misinformation can help. Where did it originate? If it claims to be from an authoritative source, can you find the original? Is there a source at all?

Inoculate

Sander van der Linden, a professor of psychology and an expert on misinformation, recommends a similar approach to vaccinations—a weak dose of fake news to head off the incoming virus. By getting people to think about misinformation and evaluate it, and teaching people the tactics behind its creation, they can better deal with fake news stories they later encounter. Could we create a vaccine program for fake news? Perhaps, but it requires a big effort and a lot of collaboration between different groups.

Monitor

It’s not only governments and public figures that are attacked by fake news, corporations and businesses can find themselves the target or unwitting bystanders. Telecom companies have been the subject of 5G conspiracy theories, and pharmaceutical companies accused of being part of, rather than helping solve, the pandemic. But the problem can get weirder. A pizza restaurant in Washington DC and a furniture retailer have both had to react to being accused of child trafficking thanks to bizarre rumors circulating online. What are people saying about your business? Can you react before things get out of hand? Misinformation works for a number of reasons—people want to know “the story behind the story”, and it gives people a feeling of control when they have access to “facts” others do not—which is why misinformation spreads so fast during a pandemic that took away that feeling of control from so many of us. Those spreading misinformation know how to tap into these fears. In cybersecurity terms, they know the vulnerabilities and how to exploit them. We can’t distribute software patches to stop these attacks, but we can make them less effective by understanding them. Disclaimer: The views and opinions expressed in this guest post are solely those of the author(s) and do not necessarily reflect the official policy or position of The Cyber Express. Any content provided by the author is of their opinion and is not intended to malign any religion, ethnic group, club, organization, company, individual, or anyone or anything. 

Benjamin Ambrose Appointed as Chief Information Security Officer at NPCI

Benjamin Ambrose

In a strategic move aimed at fortifying cybersecurity measures in India's burgeoning digital payments landscape, Benjamin Ambrose assumes the role of Chief Information Security Officer (CISO) at the National Payments Corporation of India (NPCI). With a wealth of experience garnered from esteemed positions at AWS and Citi, Ambrose brings a seasoned perspective to NPCI's cybersecurity endeavors. As the backbone of India's retail payments and settlement systems, NPCI stands as a pivotal initiative borne out of collaboration between the Reserve Bank of India (RBI) and the Indian Banks Association (IBA). Established in accordance with the Payment and Settlement Systems Act, 2007, NPCI plays a pivotal role in facilitating secure and efficient digital transactions across the nation.

Benjamin Ambrose's Impeccable Credentials

Benjamin Ambrose's illustrious career trajectory highlights his proficiency in information and cyber security domains. With over two decades of hands-on experience, including a tenure as Senior Security Consultant at AWS, Ambrose possesses a comprehensive understanding of cloud security, digitalization initiatives, audit management, regulatory compliance, and governance. In his new role at NPCI, Ambrose is poised to spearhead efforts to enhance the organization's cybersecurity infrastructure. His mandate encompasses ensuring the safety and integrity of NPCI's operations in the digital world, a mission critical to maintaining trust and confidence in India's burgeoning digital payments ecosystem. Ambrose's appointment underlines NPCI's unwavering commitment to staying ahead of emerging cyber threats and fostering innovation in the realm of digital payments.

A Visionary Leader with a Passion for Sports

Beyond his professional accomplishments, Ambrose is known for his passion for sports. Actively participating in and spectating various disciplines such as badminton, cricket, and chess, Ambrose brings a well-rounded perspective to his leadership role at NPCI. His ability to navigate challenges with strategic acumen and resilience mirrors the tenacity and discipline cultivated through his sporting endeavors. As NPCI embarks on its journey to fortify its cybersecurity posture under Ambrose's stewardship, stakeholders can expect a concerted focus on innovation, collaboration, and proactive risk management. Ambrose's track record of leading highly talented teams and his profound understanding of the financial industry position him as a formidable force in driving NPCI's cybersecurity agenda forward. With Benjamin Ambrose at the helm, NPCI is poised to navigate the complex cybersecurity landscape with confidence and resilience. His appointment marks a significant milestone in NPCI's evolution as a trusted guardian of India's digital payments ecosystem, reaffirming the organization's commitment to safeguarding the interests of stakeholders and fostering sustainable growth in the digital era. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.
❌
❌