Skip to main content

Cyber Pulse July 2023

 
https://stratus.campaign-image.in/images/133670000000226372_zc_v1_1688361430017_cyberpulse_june_2023_intro_banner_01.jpg
https://stratus.campaign-image.in/images/133670000000226372_zc_v1_1688361507886_content_list.jpg
 
https://stratus.campaign-image.in/images/133670000000226372_zc_v1_1688363407285_ceo_s_desk_banner.jpg

Dear Cyber Pulse Subscribers,

 

I hope this message finds you well and thriving in a digitally connected world. It gives me immense pleasure to address our esteemed community of cybersecurity enthusiasts, professionals, and novices alike.

 

In the ever-evolving landscape of cybersecurity, staying ahead of the curve is not just a necessity; it's a responsibility. Cyber threats have become increasingly sophisticated, leaving no room for complacency. It is our shared commitment to keep you informed, equipped, and empowered in the face of these challenges, which is why I am delighted to present the latest edition of Cyber Pulse.

 

This month, we delve deep into one of the most transformative technologies in the cybersecurity realm - Artificial Intelligence (AI). As the theme of this newsletter, "AI in Cybersecurity," suggests, we will explore the cutting-edge developments, promising trends, and potential implications of AI integration in safeguarding our digital and FinTech worlds.

 

AI has emerged as a game-changer in the fight against cyber threats. Its capacity to analyse vast amounts of data, identify patterns, and adapt in real-time has unlocked new horizons in threat detection, prevention, and response. From advanced anomaly detection to predictive threat intelligence, AI is revolutionising the way we secure our systems, networks, and sensitive information.

 

However, as we explore the potential of AI, we must also address the challenges it poses. Ethical considerations, potential biases in algorithms, and the critical need for human oversight are subjects that warrant our attention.

 

At ReBIT, we firmly believe that knowledge is the most potent defence in the cyber realm. Our mission is to equip you with the knowledge and expertise required to safeguard your digital assets and maintain the trust of your customers.

 

We invite you to dive into this month's edition and embark on a journey of discovery, innovation, and collaboration as we explore the boundless potential of AI in cybersecurity.

 

Stay vigilant, stay secure!
 
Sincerely,

 

Santhosh George

CEO, ReBIT

 

 
https://stratus.campaign-image.in/images/133670000000226372_zc_v1_1687152301122_banners_01.jpg
 
https://stratus.campaign-image.in/images/133670000000226372_zc_v1_1687870512613_recent_whatsapp_scams_and_how_to_stay_safe_in_india_banner.jpg

In the ever-evolving landscape of the digital world, the rapid advancement of technology has brought unprecedented opportunities and challenges. As the digitization of data continues to grow, so does the sophistication of cyber threats, leaving organisations and individuals vulnerable to potential cyberattacks. To counter these ever-escalating risks, the fusion of Artificial Intelligence (AI) and cybersecurity has emerged as a transformative solution.

 

AI in cybersecurity refers to the integration of machine learning algorithms, natural language processing, and other AI techniques to enhance the security infrastructure and protect against cyber threats. One of the most significant advantages of AI in cybersecurity lies in its capacity to process and interpret data at speeds that surpass human capabilities. Traditional cybersecurity tools and methods often struggle to keep pace with the rapidly evolving tactics of cybercriminals, making AI a game-changer.

 

In this article, we will delve into the various uses of AI in the realm of cybersecurity and examine the profound impacts it has on fortifying our digital defences. By harnessing the power of AI, organisations can augment their security measures, detect anomalies, and respond swiftly to threats, bolstering the resilience of our interconnected world against an ever-evolving landscape of cyber adversaries. However, alongside its transformative potential, we will also contemplate the ethical considerations and potential challenges that may arise with the integration of AI in the cybersecurity domain.

 

Let’s begin by navigating the ground-breaking uses and profound impacts of AI in cybersecurity and how this innovative synergy is shaping the future of digital security.

 

 

Uses of AI in Cybersecurity

 

1. Threat Detection and Anomaly Recognition: AI-powered cybersecurity systems can analyse network traffic, user behaviour, and system logs to identify abnormal patterns that may indicate a potential cyber threat. By recognising deviations from the norm, AI can raise red flags and prompt an immediate investigation and response.

 

2. Real-time Incident Response: AI-driven security systems enable swift and automated responses to cyber incidents. These systems can autonomously neutralise threats, thereby reducing the response time and minimising the impact of attacks.

 

3. Predictive Cybersecurity: By leveraging historical data and employing machine learning algorithms, AI can predict potential vulnerabilities and cyber threats. This foresight empowers organisations to proactively fortify their defences, thwarting potential attacks before they materialise.

 

4. User Authentication and Access Control: AI can strengthen user authentication processes by analysing user behaviour, device patterns, and contextual information, making it harder for unauthorised users to gain access.

 

5. User Behaviour Analysis: By detecting patterns, AI may assist in the analysis of user behaviour. It can aid in the detection of malicious user behaviour and generate real-time alerts by analysing patterns.

 

6. Malware Detection and Removal: AI algorithms can rapidly identify new and unknown malware strains based on their behavioural characteristics, helping to ensure timely containment and eradication.

 

7. Phishing and Social Engineering Detection: According to a report from the FBI’s Internet Crime Complaint Centre (IC3), it received 800,944 reports of phishing, with losses exceeding $10.3 billion in 2022. AI can recognise and analyse suspicious email content and sender behaviours to identify phishing attempts, thereby safeguarding users from falling victim to social engineering attacks.

 

The Impact of AI in Cybersecurity

 

The integration of AI in cybersecurity has yielded far-reaching impacts, both in fortifying digital defences and shaping the cybersecurity landscape.

 

1. Enhanced Efficiency and Accuracy: AI-powered cybersecurity systems can process and analyse vast amounts of data with unparalleled speed and precision. This efficiency reduces the workload of cybersecurity professionals, allowing them to focus on strategic decision-making and threat hunting.

 

2. Proactive Defence: With predictive capabilities, AI enables organisations to adopt a proactive approach to cybersecurity. By anticipating threats and vulnerabilities, businesses can stay one step ahead of potential attackers, mitigating risks effectively.

 

3. Reduced Response Time: Automated incident response powered by AI ensures that cyber threats are neutralized swiftly, reducing the window of opportunity for attackers to exploit vulnerabilities.

 

4. Adaptability to New Threats: Traditional security measures often struggle to keep pace with emerging threats. However, AI's learning capabilities enable it to adapt and evolve alongside new attack techniques, providing a robust defence against the latest threats.

 

5. Data Privacy and Compliance: AI can assist organisations in identifying and rectifying vulnerabilities in their data handling processes, thus bolstering data privacy and compliance with regulations such as GDPR.

 

 

Ethical Considerations and Challenges

 

Despite its remarkable potential, the integration of AI in cybersecurity comes with its share of ethical considerations and challenges. As AI systems become more autonomous, concerns about unintended consequences, biases in algorithms, and potential misuse of AI-powered tools arise.

 

1. Generative AI for Phishing Emails: Generative AI can generate customised text or emails as per the user’s request. These can be used for the creation of customised phishing emails that can be targeted at a specific person or organisation. Because the emails appear so authentic, individuals are falling victim to phishing attacks.

 

2. Neural Fuzzing: Fuzzing is the process of testing a significant amount of data in software to identify its flaws. Neural fuzzing is like the process of fuzzing to find bugs. However, neural fuzzing makes use of neural networks to produce the data with less human involvement. With the rise of AI and related infrastructure, hackers can use neural networks to find vulnerabilities in software.

 

3. Biasness in AI: AI can be biased for various reasons, one of which is training datasets that contain biased data on a certain event. Due to bias, it might give false positive alarms that would cause the system to break down and result in financial loss.

 

Striking the right balance between automation and human oversight becomes imperative to ensure the responsible and ethical use of AI in cybersecurity. Moreover, the rapidly evolving nature of AI-driven cyber threats demands continuous research and development to stay ahead of cyber adversaries. Organisations must invest in ongoing training and education for cybersecurity professionals to fully harness AI's potential.

 

AI in cybersecurity represents a remarkable technological advancement that has revolutionised the way we defend against cyber threats. Its ability to process vast amounts of data, detect anomalies, and predict potential attacks equips organisations with powerful tools to safeguard their digital assets. However, as we embrace this transformative synergy, it is crucial to remain vigilant about potential challenges and ethical implications. With responsible implementation and a human-AI collaborative.
 
References:

 

 

 
https://stratus.campaign-image.in/images/133670000000226372_zc_v1_1687152331070_banners_03.jpg
 

Governance

CM of Assam inaugurated two cybercrime police stations to tackle crime

Himanta Biswa Sarma, Chief Minister of Assam, inaugurated two Cyber Crime Police Stations including one for CID Head Quarter with Statewide jurisdiction and another for Guwahati City Commissionerate with Guwahati City jurisdiction.

Read more

 

Report every cybercrime, we won't pass judgement: Bengaluru Police Commissioner

Bengaluru police commissioner, B Dayanada, said that 1,500 cybercrimes are reported in India every day on average, but the actual number was far higher because many cases go unreported.

Read more

 

Cyber Crime Wing in Chennai issued a warning to India Post Payments Bank customers about phishing URLs

The police have advised account users not to link by SMS with the statement "Dear customer, your India Post Payments Bank account has been blocked. Please update your PAN number." and to not post any PAN or Aadhaar information on the link.

Read more

 

Mumbai Police sets up 13 cyber cells, cops to recieve special training to handle online crimes

Mumbai Police Commissioner Vivek Phansalkar on Friday inaugurated 13 cyber cells – one for each of the 13 police zones. The department is also training every constable and officer of Mumbai Police on the 101s of cybercrime, cyber security, and cyber investigation.

Read more

 

Parliamentary Panel recommends steps to tackle cyber/white collar crimes

The Standing Committee on Finance made the recommendations after having discussions with industry biggies, banking officials, Reserve Bank of India (RBI), National Payments Corporation of India (NPCI), CERT-In, and big firms such as Google, Apple, and Flipkart.

Read more

 

CISA shares free tools to help secure data in the cloud

CISA has just released a factsheet that gives you free tools and tips on how to protect your digital assets after moving to the cloud from your on-premises environment. It's a great resource for network defense, incident response, and cybersecurity pros who want to reduce the risk of data theft, exposure, data encryption, and blackmail.

Read more
 

 


 

 

 

Cyber Crime

 

Emails from an undisclosed US FCEB agency have been compromised by Chinese hackers

An undisclosed US Federal Civilian Executive Branch (FCEB) organization detected malicious email activity. Microsoft researchers who investigated the suspicious activity found that the agency was the subject of a cyberespionage campaign that targeted twenty-four different companies and was carried out by threat actors with ties to China.

Read more

 

Authorities warn that a threat organization is testing more sophisticated DDoS hacks

U.S. authorities are alerting businesses about potential new dangers including distributed denial of service assaults, which have been connected to the disruption of critical Microsoft services such as Azure and OneDrive by suspected Russia-affiliated hacktivists weeks ago.

Read more

 

Emails from US agencies stolen in a Microsoft breach

Microsoft has reported that it has been hacked by an "espionage-minded threat actor based in China" who stole emails belonging to over 20 U.S. organizations.

Read more

 

715 cyber fraud complaints filed so far in Bhopal; ₹3.41 crores extorted

715 people in Bhopal have been cheated by cross-border cyber criminals and have lost ₹3.41 crore so far this year, as per the information provided by the Bhopal District Cyber Crime Cell. The cyber criminals involved in fraudulently opening bank accounts are now asking people to provide their mobile number which has been obtained through false documents.

Read more

 

UK regulator urges banks to crack down on AI-driven fraud

The UK Financial Services Authority has warned financial institutions that it will monitor closely the implementation of measures to reduce the increasing prevalence of AI-driven fraud.

Read more

 

 

 

 

 

 

 

 

 

How cyber police reclaimed money lost in a deepfake fraud

The incident, which occurred last week, attracted widespread attention after the scammer reportedly used a WhatsApp profile created under the complainant's friend's name to request payment. By utilizing sophisticated phishing tactics, the spoof caller was able to replicate the original voice and picture of the complainant's friend and persuade the complainant to send the requested funds.

 

 


 

Cyber Security

QuickBlox Framework security flaws exposes millions of users sensitive data

According to recent reports by Team82 and CheckPoint Research (CPR), QuickBlox SDK and API, which are used to build chat and video applications, have been found to be vulnerable. Researchers can now take control of multiple user accounts in hundreds of apps that use QuickBlox framework to build their applications.

Read more

 

Neo-Net runs Android malware campaign targeting banks worldwide

A Mexican threat actor operating under the online name Neo_Net is responsible for an Android malware campaign that targets banks around the world. While the threat actor uses relatively primitive tools, experts suggest that the campaign's success is due to its ability to customise the attack infrastructure to target specific targets.

Read more

 

DMARC is Becoming Mandatory for PCI DSS Compliance

PCI Data Security Standards (PCI DSS) is a set of mandatory requirements imposed on organizations that collect, process, and transmit cardholder data. Companies that accept payments through Visa, MasterCard, American Express, Discover, and JCB must adhere to PCI compliance rules.

Read more
 

 


 

Cyber Attack

 

Clop ransomware group attacks multiple BSFI organisations

Clop ransomware group released confidential data of Kotak Mahindra Life Insurance on the dark web. The files include client details, RINOs, SAP login details, PhonePe records, and financial partner and customer data such as Capital Small Finance Bank, Hero FinCorp, Ummeed Housing Finance, and others.

Read more

 

 


 

Ransomware

 

Play Ransomware attacking private and public organizations across industries

The frequency and magnitude of ransomware assaults are both rising quickly. More than 200K+ new ransomware strains are discovered and reported every day, which means 140 new strains are created every minute and do substantial harm to both individuals and businesses.

 

 


 

Malware

 

Teen among suspects arrested in Android banking malware scheme

The malware scam started when victims clicked on ads on social media for cleaning services, pet grooming services, and selling seafood and grocery items. Singapore arrests 13 people suspected of running banking malware scams.

 

 


 

 

Data Breach

 

Microsoft bug allowed hackers to breach over two dozen organizations via forged Azure AD tokens

According to a statement from Microsoft, a validation error in the source code made it possible for a malicious actor (Storm-0558) to use an MSA consumer signing key to forge Azure AD tokens and breach two dozen organizations.

Read more

 

IBM reported its average cost of data breach rose to $4.45 million

IBM found that its data breach costs rose to $4.45 million per incident in 2023. Customer and employee personal identifiable information was the most breached type of data in 2023 and was involved in 52% of all breaches reported.

 

 
https://stratus.campaign-image.in/images/133670000000226372_zc_v1_1687152367832_banners_04.jpg
 

The Cyber Strike is a section dedicated to providing you with a summary of the most significant cyber-attacks that occurred over the past month. With the increasing prevalence of technology in our daily lives, cyber-attacks have become a constant threat to business and individuals alike.

 

It is important to stay informed about the latest cyber threats and attacks to protect ourselves and our organizations from potential harm.

 

Let’s dive in and explore the most significant cyber-attacks of the month.

 

 

New ransomware strain exposes victims’ host information via ransom note

 

 

 

Entities Affected: Microsoft Windows

Overview: Cyble Research and Intelligence Labs (CRIL) came across a new ransomware strain named “Underground Team Ransomware,” The name of this malware is derived from its distinctive ransom note. The ransom note of the Underground Team ransomware introduces novel elements that distinguish it from typical ransom notes. In addition to guaranteeing a fair and confidential deal within a short timeframe, the group offers more than just a decryptor. It promises to provide insights into network vulnerabilities and recommendations for information security. Furthermore, qualified data recovery assistance will be extended to the victims if required.

Recommended Action:

 

  • Conduct regular backups of critical data
  • Turn on automatic software updates on all devices
  • Install reputable antivirus and internet security software on all connected devices
  • Immediately detach infected devices from the network
  • Be cautious when opening email attachments or clicking on links
  • Check the system logs for any suspicious events or unauthorised access

 

 

Read more

 


 

 

 

WormGPT, the new AI tool, allows cybercriminals to launch sophisticated cyber attacks

 

 

 

Entities Affected: Generic

Overview: Recently, security researchers were able to obtain the "WormGPT" program through a well-known online community that is frequently linked to crimes. In contrast to GPT models, this program advertises itself as being created particularly for malevolent purposes. The GPTJ language model, which was created in 2021, is the foundation of the AI module known as WormGPT. It boasts a variety of features, including the ability to format code and support for an infinite number of characters in conversation.

Recommended Action:

 

  • Conduct extensive, regularly updated training programs aimed at countering BEC attacks
  • Enforce enhanced email verification mechanism

Read more

 


 

 

njRAT malware is spreading via Trojanized TeamViewer installer

 

 

 

Entities Affected: Windows, TeamViewer

Overview: Malicious actors are taking advantage of popular applications like TeamViewer to distribute malware, particularly the njRAT Trojan. This Trojan, which targets organisations in the Middle East, can perform various malicious activities, such as keylogging and data theft. It uses deceptive installation methods, achieves persistence on the infected system, and establishes communication with a Command-and-Control server for data exfiltration. These attacks highlight the ongoing threat posed by malware distribution through trusted applications.

Recommended Action:

 

  • Download tools and applications only from the official websites
  • Enable automatic software updates
  • Use reputable antivirus and Internet security software
  • Exercise caution with links and email attachments
  • Regular training and awareness programs can help employees identify and mitigate potential threats

 

Read more

 


 

 

Microsoft Word vulnerabilities were used to deploy LokiBot malware

 

 

 

Entities Affected: Microsoft Windows

Overview: Cybersecurity researchers report that malicious actors are utilising Microsoft Word documents to take advantage of known vulnerabilities and distribute LokiBot malware. These attackers are utilising advanced techniques, such as exploiting two distinct vulnerabilities, employing evasion tactics, and executing VBA scripts, to gain control of compromised systems and acquire confidential information. LokiBot is a long-standing and ever-evolving Trojan with sophisticated features, including keystroke logging and crypto wallet theft.

Recommended Action:

 

  • Exercise caution with Office documents and unknown files
  • Be vigilant against suspicious links
  • Avoid opening attachments from untrusted sources
  • Keep software and systems up to date
  • Implement robust security measures
  • Educate employees on cybersecurity best practices
  • Implement a strong incident response plan

 

Read more

 

 


 

 

BlackCat ransomware group exploits WinSCP search ads to distribute Cobalt Strike

 

 

 

Entities Affected: Microsoft Windows, WinSCP

Overview: A sophisticated malvertising operation was started by the BlackCat ransomware organization, also known as ALPHV, employing fake WinSCP-like websites. System administrators and IT specialists are the target audience for these bogus pages that disseminate harmful software instead of trustworthy software. Researchers have recognised the group's usage of SpyBoy Terminator, a pricey program that turns off antivirus and security protections, and have discovered their manipulation of search results.

Recommended Action:

 

  • Educate employees about phishing attacks
  • Implement monitoring and logging to collect and analyse logs from network devices and systems
  • Establish a baseline of normal network traffic to identify and flag abnormal or unauthorised access attempts
  • Create a comprehensive incident response plan that outlines the steps to be taken in the event of a security breach
  • Establish clear communication channels to inform employees, customers, and relevant regulatory bodies about any security incidents or breaches
  • Consider partnering with a reputable cybersecurity firm to enhance your organisation's security posture 

 

Read more

 

 

 

 

 
https://stratus.campaign-image.in/images/133670000000226372_zc_v1_1687152379902_banners_06.jpg
 
https://stratus.campaign-image.in/images/133670000000226372_zc_v1_1688363453113_whatsapp_hacking___v2.jpg
 
https://stratus.campaign-image.in/images/133670000000226372_zc_v1_1688363431459_cp_chatur_chitra_june_2023.jpg
 
https://stratus.campaign-image.in/images/133670000000226372_2_1686724460516_zc-noimage.png
 
https://stratus.campaign-image.in/images/133670000000226372_5_1686724464505_zc-noimage.png
 
https://stratus.campaign-image.in/images/133670000000226372_4_1686724463125_zc-noimage.png
 

ReBIT is an ambitious, employee-first organisation that believes in empowering our employees to grow alongside the organization's goals and perform to their full potential. We are fascinated by technology, and we admire our employees. We house exceptional talent that contributes to ReBIT's mission.

 

We’re looking for candidates who have a zeal for technology and innovation. Check out our careers page for opportunities to work with us!

 

 

We'd love to hear from you!

Share your thoughts with us at communications@rebit.org.in or leave us a feedback by clicking on the button below.

 

502, Building No 1, Mindspace Juinagar, Nerul,Navi Mumbai – 400706

Twitter
LinkedIn

You are receiving this email as you signed up for our newsletter.

Want to change how you receive these emails?

You can Unsubscribe here.