The UK government controversially gave a green light to Huawei get involved with the building of the UK’s 5G networks, although the Chinese tech giant role will be limited to non-sensitive areas of the network, such as providing antennas. This decision made by Theresa May came days after US intelligence announced Huawei was Chinese state funded, and amidst reports historical backdoors in Huawei products, stoking up the Huawei political and security row even further this month, and has resulted in the UK Defence Secretary, Gavin Williamson, being sacked.
- Defence Secretary Gavin Williamson sacked over Huawei leak
- Daily Telegraph publishes details of a meeting about using the Chinese telecoms firm to help build the UK’s 5G network
- Huawei row: Inquiry to be held into National Security Council leak
- Is Huawei a Threat to UK National Security?
- What’s the greater risk to UK 5G, Huawei backdoors or DDoS?
- Backdoors found in Huawei-supplied Vodafone equipment between 2011 and 2012
- Microsoft researchers find NSA-style backdoor in Huawei laptops
- 5G cyber-attack: What would be the effect on the UK?
- Huawei: Why UK is at odds with its cyber-allies
- NCSC: Huawei threat to national security
A survey by the NCSC concluded most UK users are still using weak passwords. Released just before CyberUK 2019 conference in Glasgow, which I was unable attend due work commitments, said the most common password on breached accounts was”123456″, used by 23.2 million accounts worldwide. Next on the list was “123456789” and “qwerty”, “password” and “1111111”. Liverpool was the most common Premier League Football team used as a password, with Blink 182 the most common music act. The NCSC also published a separate analysis of the 100,000 most commonly re-occurring passwords that have been accessed by third parties in global cyber breaches. So password still remains the biggest Achilles’ heel with our security.
The UK hacktivist threat came back to the fore this month, after the Anonymous Group took revenge on the UK government for arresting WikiLeaks founder Julian Assange, by attacking Yorkshire Councils. I am not sure what Yorkshire link with Assange actually is, but the website for Barnsley Council was taken down by a DDoS attack, a tweet from the group CyberGhost404 linked to the crashed Barnsley Council website and said “Free Assange or chaos is coming for you!”. A tweet from an account called ‘Anonymous Espana’ with an image, suggested they had access to Bedale Council’s confidential files, and were threatening to leak them.
Microsoft Outlook.com, Hotmail and MSN users are reported as having their accounts compromised. TechCrunch revealed the breach was caused due to the hackers getting hold of a customer support tech’s login credentials. Over two million WiFi passwords were found exposed on an open database by the developer of WiFi Finder. The WiFi Finder App helps to find and log into hotspots. Two in every three hotel websites leak guest booking details and personal data according to a report. Over 1,500 hotels in 54 countries failed to protect user information.
Finally, but not lest, a great report by Recorded Future on the raise of the dark web business of credential stuffing, titled “The Economy of Credential Stuffing Attacks“. The report explains how low-level criminals use automated ‘checkers’ tools to validate compromised credentials, before selling them on.
I am aware of school children getting sucked into this illicit world, typically starts with them seeking to take over better online game accounts after their own account is compromised, they quickly end up with more money than they can spend. Aside from keeping an eye on what your children are up to online as a parent, it goes to underline the importance of using unique complex passwords with every web account (use a password manager or vault to help you – see password security section on the Security Expert website). And always use Multi-Factor Authentication where available, and if you suspect or have are informed your account ‘may’ have compromised, change your password straight away.
- How Business can address the Security Concerns of Online Shoppers
- Third Party Security Risks to Consider and Manage
- Huawei to be given limited access to UK 5G Network
- The NCSC launches Cyber Security tool for UK Businesses and Authorities
- German Drug Manufacturer Beyer hit by Malware Attack originating from China
- Aebi Schmidt latest Manufacturer dealing with Ransomware Cyberattack
- 540M Facebook Member Records exposed by an Unsecure AWS S3 Bucket
- Microsoft will drop Password Expiration Policies in Windows 10 and in Windows Server
- ‘Assange Supporters’ Claim to Hack Yorkshire Councils
- Hackers beat University Cyber-Defences in Two Hours
- App leaves over 2 Million WiFi Network Passwords Exposed on Open Database
- Two in Three Hotel Websites Leak Guest Booking Details and Allow Access to Personal Data
- Yahoo to pay £90M in latest settlement of Massive Breach
- Hackers nab emails and more in Microsoft Outlook, Hotmail, and MSN Compromise
- 4 in 5 IT Chiefs are delaying Security Patches to avoid Business Disruption
- A Public Database Exposed the Medical Records of 150,000 Rehab Patients
- Amnesty Intl. says Cyberattack on Hong Kong office appears linked to known APT group
- Cyber-Attacks ‘Damage’ National Infrastructure
- Microsoft Patches 75 Vulnerabilities, including 14 Critical for Windows, IE\Edge, Chakra and Adobe Flash
- Adobe Releases fixes 21 Vulnerabilities in Acrobat and Acrobat Reader
- Machines running popular AV software go unresponsive after Microsoft Windows update
- Apache Tomcat Vulnerability Results in Remote Code Execution
- Adobe’s Patch Tuesday includes Security Updates for Flash Player and AIR
- Attackers Exploit WordPress Zero Day following Disclosure
- WinRAR Exploit used by MuddyWater APT phishing gang
- ISC Patches Three Vulnerabilities in BIND
- Flawed P2P technology Threatens Millions of IoT Devices
- The Economy of Credential Stuffing Attacks
- ShadowHammer code Found in several Video Games
- Researchers uncover new ‘TajMahal’ APT framework, plus a new Gaza Cybergang malware campaign
- Baldr Stealer Malware Active in the Wild With ongoing Updates
- TA505 Targets Financial and Retail using ‘Undetectable’ Methods
- Lazarus Targets Mac Users With Malware
- Attackers Deploy New ICS Attack Framework “TRITON” and Cause Operational Disruption to Critical Infrastructure
- Hiscox Cyber Readiness Report 2019: UK Businesses Report Leap in Cyber Attacks
- NCSC UK Cyber Survey: Most Users still use weak Passwords
*** This is a Security Bloggers Network syndicated blog from IT Security Expert Blog authored by SecurityExpert. Read the original post at: http://feedproxy.google.com/~r/securityexpert/~3/YEQrxN0EMB4/cyber-security-roundup-for-april-2019.html