Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

Cybersecurity Snapshot: Critical Infrastructure Orgs Must Beware of China-backed Volt Typhoon, Cyber Agencies Warn

Critical Infrastructure Orgs Must Beware of China-backed Volt Typhoon

The Volt Typhoon hacking gang is stealthily breaching critical infrastructure IT environments so it can strike on behalf of the Chinese government, cyber agencies say. Plus, ransomware gangs netted $1 billion-plus in 2023. In addition, new group tasked with addressing the quantum computing threat draws big tech names. And enterprises go full steam ahead with generative AI, despite challenges managing its risks. And much more!

Dive into six things that are top of mind for the week ending February 9.

1 - Alert: China-backed Volt Typhoon positioning itself to strike U.S. critical infrastructure

IT and operational technology security teams, listen up. 

Volt Typhoon, a Chinese government-sponsored hacker group, could, at a moment’s notice, severely disrupt U.S. critical infrastructure operations, potentially harming Americans and hobbling military capabilities.

So said cybersecurity agencies from the U.S., U.K., Canada, Australia and New Zealand this week via the joint advisory “PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure.

The agencies believe that Volt Typhoon hackers, using stealthy “living off the land” techniques, are “pre-positioning” themselves in IT networks in order to move laterally to OT systems, and sow chaos if and when geopolitical or military conflicts erupt with the People's Republic of China (PRC).

Specifically, Volt Typhoon has compromised the IT environments of multiple critical infrastructure organizations, mostly in the communications, energy, transportation and water sectors, including an alarming breach that lasted a whopping five years, the agencies said.

“The PRC cyber threat is not theoretical,” Jen Easterly, Director of the U.S. Cybersecurity and Infrastructure Security Agency (CISA) said in a statement. “And what we’ve found to date is likely the tip of the iceberg.”

Thus, IT and OT security teams at critical infrastructure organizations should urgently apply the advisory’s mitigations and use its guidance to hunt for malicious activity. In addition, they should incorporate the recommendations in the joint guide “Identifying and Mitigating Living Off the Land Techniques,” also released this week.

The advisory echoes comments made last week by FBI Director Chris Wray at a congressional hearing, after the U.S. government announced it had disrupted a botnet that Volt Typhoon was using to breach critical infrastructure systems.

Speaking to the Associated Press, Tenable Chairman and CEO Amit Yoran called Wray’s warning “an urgent call to action.” 

“Continuing to turn a blind eye to the risk sitting inside our critical infrastructure is the definition of negligence,” Yoran added.

For more information about OT security, check out these Tenable resources:

VIDEOS

Ransomware in OT Systems

The Business Risk From a Ransomware Attack on OT Systems

2 - Report: Ransomware payments top $1 billion in 2023

After dropping in 2022, ransomware bounties unfortunately rebounded in a big way last year, crossing the $1 billion threshold.

That’s according to data from blockchain analysis firm Chainalysis, which attributed the bounceback to various factors, including:

“Last year’s developments highlight the evolving nature of this cyber threat and its increasing impact on global institutions and security at large,” reads the Chainalysis report “Ransomware Payments Exceed $1 Billion in 2023, Hitting Record High After 2022 Decline.

Ransomware payments top $1 billion in 2023

The dip in 2022 was “an anomaly, not a trend,” which Chainalysis attributes to one-time factors such as many ransomware gangs’ decision to shift their activities to the Russia-Ukraine war; and the FBI’s timely provision of decryption keys to Hive ransomware victims.

The $1.1 billion extorted from ransomware victims is the highest annual total since Chainalysis started tracking this statistic in 2019.

“Although 2022 saw a decline in ransomware payment volume, the overall trend line from 2019 to 2023 indicates that ransomware is an escalating problem,” the report reads.

For more information about ransomware trends and prevention, check out:

VIDEOS

Tenable CEO Amit Yoran discusses Las Vegas ransomware attacks with CNN (CNN)

2024 Ransomware Trends and Predictions (SANS Institute)

3 - Linux Foundation, tech giants team up to fight quantum computing threat

The urgency to prepare for future attacks that’ll use ultra powerful quantum computers continues to intensify.

This week, the Linux Foundation launched the Post-Quantum Cryptographic Alliance (PQCA), a group tasked with tackling the cryptographic security threats from quantum computers.

Expected to be available by 2030, quantum computers will be able to decrypt data protected with today’s public-key cryptographic algorithms. Consequently, it’s critical to develop quantum-resistant encryption algorithms in order to prevent a global data-theft disaster.

Linux Foundation, tech giants team up to fight quantum computing threat

 

The PQCA, whose members include Amazon, Cisco, Google, IBM, Nvidia and the University of Waterloo, “will help accelerate the development and adoption of post-quantum cryptography in open source and beyond,” Jim Zenlin, the Linux Foundation’s Executive Director, said a statement.

Specifically, the PQCA will:

In addition, several PQCA members are co-authors of the first four algorithms selected by the U.S. National Institute of Standards and Technology’s (NIST) “Post-Quantum Standardization Project.

Back in September, MITRE launched a similar industry group called the “Post-Quantum Cryptography Coalition,” to which IBM and the University of Waterloo also belong.

To get more details, check out:

For more information about the quantum computing threat:

VIDEOS

Post-Quantum Cryptography: the Good, the Bad, and the Powerful (NIST)

Quantum Computers, explained (Cleo Abram)

Michio Kaku: Quantum computing is the next revolution (Big Think)

4 - Google: Weak credentials are top vector for cloud compromises

It’s the passwords, stupid.

A whopping 51% of compromises suffered by Google Cloud customers in 2023 were caused by credential issues, namely the use of weak passwords or of no passwords at all. That’s a key insight from the “H1 2024 Threat Horizons Report,” published this week by Google's Cybersecurity Action Team.

Weak credentials are top vector for cloud compromises

(Source: Google Cybersecurity Action Team’s “H1 2024 Threat Horizons Report,” February 2024)

So what was the top motivation driving these hackers? Most were looking to use the cloud environment’s processing power for their cryptomining activities.

Weak credentials are top vector for cloud compromises2

(Source: Google Cybersecurity Action Team’s “H1 2024 Threat Horizons Report,” February 2024)

“Credential abuse resulting in cryptomining remains a persistent issue, with threat actors continuing to exploit weak or nonexistent passwords to gain unauthorized access to cloud instances, while some threat actors are shifting to broader threat objectives,” the report reads.

For more information about cloud security in general, and about identity and access management in the cloud specifically:

5 - Enterprises lack generative AI controls, plow ahead anyway

And a recent survey shows that enterprises continue adopting generative AI due to its transformative potential, while admitting their ability to manage its risk and governance are shaky.

In its “State of Generative AI in the Enterprise” report, Deloitte polled about 2,800 high-level executives from 16 countries and found the following regarding their generative AI risk-management capabilities:

  • Only 25% say their organizations are either “highly” or “very highly” ready to deal with generative AI governance and risk issues
  • Governance concerns cited include: lack of confidence in results; intellectual property issues; data misuse; regulatory compliance; lack of transparency
  • Only 47% say their organizations are doing enough to educate staff on generative AI’s capabilities, benefits and value

 

Enterprises lack generative AI controls, plow ahead anyway

 

Simultaneously, respondents see a tremendous potential in generative AI, with 79% expecting it to unleash “substantial organizational transformation” in less than three years.

“Business leaders are under an immense amount of pressure to act, while ensuring appropriate governance and risk mitigation guardrails are in place,” Deloitte Global CEO Joe Ucuzoglu said in a statement.

For more information about how to use AI securely and responsibly:

6 - U.K. bank: More people fell for romance scams in 2023

And with Valentine’s Day approaching, here’s a reminder: Cybercriminals are always hunting for lonely hearts online that they can steal money from.

The number of people scammed by cyber fraudsters pretending to be love interests rose 22% last year, according to Lloyds Bank. However, there was a silver lining: victims’ average monetary loss dropped 16% compared with 2022.

More people fell for romance scams in 2023

Other findings include:

  • Men were slightly more likely to fall for these scams
  • Women’s losses on average were much higher (76%) than men’s
  • People between 55 and 64 were more likely to get scammed but those between 65 and 74 lost the most money on average

Those figures are based on the U.K. bank’s analysis of romance scams reported by its customers during 2023.

“Social media and online dating apps are rife with fake profiles, and it can be hard to tell who is genuine,” Liz Ziegler, Fraud Prevention Director at Lloyds Bank, said in a statement.

So how can you spot a romance scammer? Lloyds Bank recommends being wary of any stranger that contacts you out of the blue online, especially if the person:

  • looks like a professional model in their profile photos
  • always has a litany of excuses for not meeting you in person
  • asks you for personal or financial details
  • requests that you send them money

Related Articles

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try Tenable Lumin

Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.

Buy Tenable Lumin

Contact a Sales Representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.

Try Tenable Nessus Professional Free

FREE FOR 7 DAYS

Tenable Nessus is the most comprehensive vulnerability scanner on the market today.

NEW - Tenable Nessus Expert
Now Available

Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.

Fill out the form below to continue with a Nessus Pro Trial.

Buy Tenable Nessus Professional

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Select Your License

Buy a multi-year license and save.

Add Support and Training

Try Tenable Nessus Expert Free

FREE FOR 7 DAYS

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Tenable Nessus Expert

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Select Your License

Buy a multi-year license and save more.

Add Support and Training