Infosec Round-Up Aug 13th

Play Video

Apple Privacy, Crypto Hack & Crytek Ransomware

This is the Hut Six InfoSec Round-Up, where we look at some of the most pressing matters, latest trends, and industry news from across the world of information security.

Apple Responds to Criticism

Following backlash regarding the announcement that Apple will be scanning US users iPhones for child sexual abuse material (CSAM), Apple has pledged to not “expand” the system for any reason.

The plans announced mean that the technology company will cross-reference iPhone content against a database of known CSAM hashes. A move which privacy advocates have criticised, citing its possible misuse as, amongst other things, a spying tool to be abused by authoritarian governments.

Despite this, Apple noted that it “will not accede to any government's request to expand" the system, and that the anti-CSAM tool would not allow the company to see or scan a user’s photo album, only checking photos that are shared via iCloud.

Welcomed, and even applauded by some, the UK’s Health Secretary Sajid Javid praised the decision, calling for others, especially Facebook, who recently announced a move in the opposite direction, to follow suit.

Attempting to quell fears, Apple has stated: “The likelihood that the system would incorrectly flag any given account is less than one in one trillion per year.”

Crypto Hacker Return Funds

The hacker behind one of the biggest cryptocurrency thefts in history has returned over half of the $611 million worth of assets stolen earlier this week.

The theft was confirmed by Chinese blockchain company Poly Network on the 10th of August, stating that hackers had exploited a ‘contract calls’ vulnerability which allowed them to make off with thousands of digital tokens, including Ether, Binance, and USDC.

With the threat actor starting to return funds within hours of the attack being publicly acknowledged, in a peculiar Q&A published via Twitter, they claim to have been motivated by exposing security flaws and not by money.

Despite this, millions of dollars’ worth of crypto remains in the hacker’s accounts, with some sceptical parties suggesting that this explanation may only be a post-hoc reaction to fears their identity may be uncovered.

Tom Robinson, co-founder of Elliptic, a blockchain analytics company, speculated, “I wonder whether this hacker stole the funds, realised how much publicity and attention they were getting, realised wherever they moved the funds they would be watched, and decided to give it back”.

Game Developer Ransomware Attack

German game developer and publisher Crytek has publicly confirmed a significant ransomware attack on its systems which occurred in October of last year.

Conducted by the Egregor ransomware syndicate, systems were not only encrypted, but files containing the personal information of customers was also stolen; information which was subsequently leaked via the gang’s darknet website.

Having informed affected individuals only this month, the communication sought to minimise the potential impact of the leak, suggesting the gang’s website was “difficult to identify” and that cyber criminals would likely be discouraged by the “huge risk” of malware possibly embedded within the documents.

With Egregor responsible for attacks on other developers, including Ubisoft, the ransomware-as-a-service syndicate has been operational since late 2020, and has claimed an estimate 200 victims since its launch.

In the announcement, Crytek noted on the incident, “We took immediate action to prevent the encryption of our systems, further secure our environment, and initiate an internal and external investigation into the incident.”

Thank you for reading this edition of Infosec Round-Up. Please be sure to subscribe to the Hut Six YouTube Channel to keep up to date with the latest news and see all our latest information security videos.

Security Awareness for your Organisation

Enjoyed our blog? Learn more about how Hut Six can help improve you security awareness with training and simulated phishing. Start a free trial now, or book a meeting with one of our experts.

Featured

The importance of an email security policy

Why Organisations Need an Email Security Policy

An email security policy is a document describing how an organisation's email system should, and most importantly, should not be used.

Preventing Human Error in Information Security

Human Error in Information Security

When Human Error is found in information security, it is often avoidable errors that allow much larger consequential problems to arise.

Security Awareness - Return on Investment

Investing in Information Security Awareness Training

Investing in Information Security Awareness Training - educating people against cyber threats should be considered essential for any organisation operating in 2021

Microsoft Teams Security

How Secure is Microsoft Teams?

How Secure is Microsoft Teams? Information Security blog by Information Security Awareness solution provider Hut Six Security

Enterprise Data Regulation

Best Ways To Ensure Enterprise Data Regulation

Best Ways To Ensure Enterprise Data Regulation guest blog by technivorz.com and information security awareness solution Hut Six Security.

Disaster Recovery Plan

Writing a Disaster Recovery Plan

Writing a Disaster Recovery Plan: information security planning blog by information security awareness solution provider Hut Six Security.

Security Program Policies for 2021

What Policies Do I Need for a Security Program?

Security program policies blog by information security awareness training provider Hut Six Security.

Security Awareness Training for Cyber Essentials

Preparing for Cyber Essentials with Information Security Awareness Training

Security awareness training for Cyber Essentials blog by information security awareness training provider Hut Six Security.

Security Awareness in 2021 - what has changed?

Information Security Awareness Training in 2021

Information Security Awareness Training in 2021 blog by information security awareness training platform Hut Six Security

Virtual Privacy Networks for Businesses

The Five Best VPNs for Work

What are the best VPNs for work? - VPN review blog by security awareness training provider Hut Six Security.

Speak to us about your Cyber Awareness