Here are some interesting updates about cybersecurity threats and new trends.
The UK Electoral Commission was heavily criticised when a cyberattack compromised the personal information of 40 million voters due to outdated security procedures. The Information Commissioner's Office (ICO) chastised the Commission for failing to install important security updates and maintain strong password standards, which made their systems susceptible. The breach, which began in August 2021, went undetected until October 2022, giving hackers extended access to crucial voter data. The UK government blamed the attack on Chinese hackers, which China has disputed. Despite the incident, no evidence suggested that the stolen data was misused or caused direct harm. The Electoral Commission has since made considerable security changes, including as infrastructure upgrading and multi-factor authentication. The ICO highlighted that basic security measures may have prevented the breach and encouraged firms to proactively secure their networks. The hack has prompted concerns about the integrity of the UK electoral system, although officials have stated that the mostly paper-based voting method reduces the danger of election tampering. The event has prompted calls for stronger cybersecurity measures and a rethinking of UK-China relations.
Source: The Guardian
Dallas County faced a large ransomware attack in October 2023, compromising the personal information of over 200,000 people. The county is currently contacting persons affected by mail. Names, addresses, Social Security numbers, and other sensitive information were among the data breaches. The county has not revealed the attackers' identities or ransom demands. Dallas County officials are collaborating with cybersecurity professionals and law enforcement to investigate the intrusion and avoid future attacks.
The breach has raised questions about the county's cybersecurity procedures and the privacy of individuals' personal information. County Judge Clay Jenkins emphasized the significance of upgrading security systems to prevent such attempts. The county is providing free credit monitoring services to those affected by the attack. This event is part of an increasing number of ransomware attacks on government agencies and vital infrastructure. The county is advising homeowners to remain watchful and keep an eye on their financial accounts for any strange activity.
Source: The Dallas Morning News
A security researcher from Truffle Security, Joe Leon, has revealed that deleted and private repository data on GitHub can still be accessed indefinitely. This includes data from deleted forks, deleted repositories, and private repositories, which GitHub confirmed as an intentional design feature. Leon demonstrated that by forking a repository, committing data, deleting the fork, and then accessing the deleted commit data through the original repository, sensitive information remains accessible. He introduced the term cross fork object reference (CFOR) to describe this vulnerability, where one repository fork can access sensitive data from another fork.
Leon warned that any public repository with at least one fork could have its contents exposed indefinitely, posing severe security risks to firms that use GitHub. He also discovered that private repositories can be exploited if they have a public version, resulting in the unintentional release of confidential material. GitHub users frequently fail to understand how repositories work, combining security risks. Leon highlighted that the only secure option to fix a leaked key on a public GitHub repository is through key rotation.
In response to the research, GitHub stated that this behavior is expected and recorded, and that they are committed to investigating reported security problems. This study builds on prior findings of GitHub vulnerabilities, such as a recent discovery by NYU researcher Justin Cappos and a supply chain attack campaign discovered by Checkmarx. Despite no reports of compromised deleted repositories, the possibility that threat actors will exploit these vulnerabilities remains a worry.
Source: TechTarget
Spotify is testing an emergency alerts system in Sweden, which will send out public statements about accidents, major events, and service disruptions. Technologist Chris Messina uncovered this capability through code references in the Spotify app. Although Spotify verified the test, the company could not explain why it was providing such a service, which is not required by law in Sweden. The company is presently investigating the potential of including an emergency alerts system in the app.
Messina said that this option could encourage users to enable app notifications, which are frequently turned off for non-essential apps. Spotify could present itself as a more necessary app by incorporating emergency notifications, akin to Meta's Safety Check function and Google's earthquake alerts for Android. In the United States, there has been discussion about forcing streaming apps to support emergency warnings, similar to traditional broadcasters. The app's code references include terms like "Emergency alerts in Sweden" and "Receive public emergency alerts".
Spotify's spokesman noted that the test is part of the company's ongoing efforts to improve customer experience and is currently limited to Sweden. The test's goal is to obtain information that could help design future user experiences.
Source: TechCrunch