Copy
~this week in security~
a cybersecurity newsletter by @zackwhittaker

volume 4, issue 20
View this email in your browser

~ ~

THIS WEEK, TL;DR

Irish health system struggling to recover from ransomware attack
Associated Press: Tough week for the Irish health authorities (HSE) as it continues to recover following a ransomware attack. It could be weeks before the public health service will return to normal, the AP reports. The Conti ransomware group is to blame, demanding $20 million in ransom, or face the hackers publishing private medical data online. Meanwhile the HSE got an injunction barring anyone from handling the data. As much as that court action stops anyone in Ireland from receiving or handling the data, that also effectively puts restrictions on press freedoms. The FBI only began warning this week that Conti was targeting healthcare facilities. But late in the week, the Conti group showed some mercy and provided the decryptor tool for free. But the Irish government said it had not paid the ransom.
More: BBC News | Irish Times | @PogoWasRight | @tjmcintyre
An FBI flash alert about Conti ransomware attacks on healthcare networks.
AXA hit by ransomware after announcing it would stop covering extortion fees
Cyberscoop: It's also been a bad week for cyber insurers. First, AXA's operations in Asia were hit by ransomware just days after the French insurer said it would no longer pay for extortion fees. Hard to see how this doesn't send a message, but Cyberscoop reported there was "no connection" between the move to deny ransom payouts to their customers and their own attack. Meanwhile, @Bloomberg ($) reported that another insurance giant CNA paid $40 million in extortion fees after its March cyberattack. Ransomware expert @BrettCallow said it "may be the biggest paid demand to date" that's publicly known.
More: Bloomberg ($) | The Verge

Censorship, surveillance and profits: A hard bargain for Apple in China
The New York Times ($): Very deep reporting on how Apple complied with a Chinese cybersecurity law that requires Chinese users' data to be stored in the country. Apple said it had "never compromised the security" of its customers, including its Chinese users, but the report details how Apple moved its Chinese users' iCloud encryption keys to China months after the law went into effect in 2017. It's a good read on how China can get access to its citizens' data, but also how the country has used the move to push for greater censorship. @matthew_d_green has a very good tweet thread on this, too.
More: BBC News | @doctorow tweets

Mandatory opt-out and data breach notification part of new privacy bill
The Verge: Sen. Amy Klobuchar has a new bill designed to protect people's data collected by the big tech companies, like Google, Facebook, and Twitter. The bill will require companies to rewrite their terms of service so they're simple and readable, and to notify users of a data breach within 72 hours of it happening — a similar provision taken from Europe's GDPR rules. The bill was first introduced after the Cambridge Analytica scandal, but stalled thanks to opposition at the time.
More: Ars Technica | Sen. Amy Klobuchar

Inside the post office's covert internet operations program
Yahoo News: The Post Office's Inspection Service, the enforcement arm for the Post Office, is using Clearview AI's facial recognition database to "to help identify unknown targets in an investigation or locate additional social media accounts for known individuals," per Yahoo News. It's one of several tools used by the Inspection Service, which has been under fire since earlier reporting by @janawinter showed it was surveilling Americans' social media posts. This is a wild read about iCOP, the program used by the service, which "found no credible threats, but compiled what it described as 'inflammatory' posts."
More: @hypervisible | @RachelBLevinson

Air India says February's data breach affected 4.5 million passengers
Reuters: Air India said a data breach in February involving SITA, which serves the Star Alliance of airlines including Singapore Airlines and Lufthansa. Air India was caught up in the breach too, affecting some 4.5 million customers. The breach involved personal data, like contact, passport, credit card details and ticket information between August 2011 and February 2021. (Yes, you read that right. That's a decade's worth of data.)
Background: TechCrunch
~ ~
SUPPORT THIS NEWSLETTER

Thank you to everyone who reads or subscribes to this newsletter! If you can, please spare $1/month (or more for perks!), to help cover the server and email costs. You can contribute to the Patreon, or send a one-time donation via PayPal or Venmo
~ ~

THE STUFF YOU MIGHT'VE MISSED

SolarWinds saw signs of hackers invading its network in January 2019
Cyberscoop: SolarWinds' CEO Sudhakar Ramakrishna said at the RSA Conference this year that it found evidence of reconnaissance as early as January 2019, months before it previously said it first spotted suspicious activity around September/October 2019 which led to its massive supply chain attack. More than a year later and details are still emerging. Ramakrishna also apologized for blaming an intern for using a weak password, which many capitalized on as related to the incident (it turns out it wasn't).

Only one NYC mayor candidate is promising to ban facial recognition
Motherboard: More and more cities are banning facial recognition, from Portland, Oregon, to Oakland, San Francisco and Boston. But New York has fallen behind. With a new mayor set to be elected later this year, it turns out just one of those candidates would ban facial recognition across the city.
Tweet from NYC mayoral candidate Dianne Morales who said she would ban facial recognition in the city if elected.
Cyber insurance premiums rise as ransomware, hacks continue, GAO finds
Cyberscoop: Back to ransomware for a minute. Turns out that the growing number of cybersecurity incidents is causing many insurers to raise their rates. That's according to the GAO, the government watchdog's office, which found premiums went up by between 10% and 30% in late 2020. In the end, it's the smaller businesses that suffer the most. "Small businesses may purchase cyber insurance less often if they perceive their risks to be minimal or policies too costly," per the GAO's report.

White House to nominate national security veteran for DOJ post
Wall Street Journal ($): Matt Olsen, the Uber executive who took over from former chief security officer Joe Sullivan after he was charged with concealing a massive hack of 57 million drivers and passengers, is going back to public service. Olsen has been nominated to head up the Justice Department's National Security Division, which would see him oversee national security cases, including terrorism and counterintelligence threats. Oh, and cyber, which is to be expected.
~ ~

OTHER NEWSY NUGGETS

Amazon gave the FBI the shopping list of an anti-fascist activist
@iblametom with the scoop: Amazon gave the shopping list of an antifa activist to the feds in 2019, but the court case was recently unsealed — though no charges have been brought. "After getting her Facebook data, they discovered messages from earlier in 2017 referencing unspecified online orders. So they went to Amazon and asked for records associated with her Gmail account." It's a rare look at what Amazon turns over, despite what the company releases in terms of numbers in its incredibly vague and obfuscative biannual transparency report.

Google Threat Analysis Group lead explains "in the wild" exploitation
There's been, understandably, a lot of confusion about how and when companies, like Google and Apple (especially), reveal details of bugs that are considered to be exploited "in the wild." Apple says it only rarely and gives very little information, and Google has caused confusion itself by often not explaining precisely what it means. @ShaneHuntley explained more in this tweet thread this week in response to @dangoodin001, which is worth the read.
Google's Shane Huntley explains more in this tweet thread what "in the wild" means.
Stalkers using surveillance software on partners are exposing their own data
ESET researchers say a number of stalkerware apps that domestic abusers use to spy on their partners without their consent, are full of bugs and security issues that are further exposing their victims, including allowing outsiders to "intercept text messages, call logs, contact lists, keystrokes, browsing histories, recorded phone calls, pictures and screenshots." It's a similar situation to when KidsGuard exposed its stalkerware victims, along with other stalkerware apps that had similar security issues, like mSpy, Mobistealth and Flexispy. A world without stalkerware is a better world for all.

So long (and good riddance) Internet Explorer
Internet Explorer is on its way out, finally, after more than 25 years in service... and 25 years of security bugs. @lilyhnewman wrote its swan song and why it will won't be missed. Plus, it still has a year to cause is remaining users security headaches.
~ ~

THE HAPPY CORNER

Alright, onto the good stuff. @thepacketrat offers us a look at how a threat researcher works at home. (The full version is here.)
An animated GIF of a cat on @thepacketrat's shoulder.
Also, @TonyaJoRiley has bonus pet content in her tweets this week, as she departs Washington Post for Cyberscoop. This thread is well worth the time. (Also below is my personal favorite from the thread, thanks @nohackme.)
Click through for a video of a cat chattering.
If you want to nominate some good news from the week, feel free to reach out.
~ ~

CYBER CATS & FRIENDS

Meet Copper, who features this week, seen here wanting to jump up and help with his human's homework. What a good boy. A big thank you to Ben T. for the submission!
Keep sending in your cyber cats (and their friends). You can always drop them here.
~ ~

SUGGESTION BOX

That's all for now. Hope you enjoyed this week's newsletter. As always, the suggestion box is always open for feedback. See you next week!