❌

Reading view

There are new articles available, click to refresh the page.

China Hackers Using Brickstorm Backdoor to Target Government, IT Entities

china, flax typhoon,

Chinese-sponsored groups are using the popular Brickstorm backdoor to access and gain persistence in government and tech firm networks, part of the ongoing effort by the PRC to establish long-term footholds in agency and critical infrastructure IT environments, according to a report by U.S. and Canadian security offices.

The post China Hackers Using Brickstorm Backdoor to Target Government, IT Entities appeared first on Security Boulevard.

ν΄λΌμš°λ“œν”Œλ ˆμ–΄ κΈ°κ³ | AI μ‹œλŒ€, μ½˜ν…μΈ  ν†΅μ œκΆŒμ„ μœ„ν•œ β€˜ν—ˆκ°€ 기반 μΈν„°λ„·β€™μœΌλ‘œ μ „ν™˜ν•΄μ•Ό

κ³Όκ±° 검색 μ—”μ§„ 크둀링은 μ›ΉμœΌλ‘œ λ‹€μ‹œ νŠΈλž˜ν”½μ„ λŒλ €μ£ΌλŠ” 이둜운 κ΅¬μ‘°μ˜€μ§€λ§Œ, μ΄μ œλŠ” 상황이 λ‹€λ₯΄λ‹€. AI 기업듀은 μ›Ήμ—μ„œ μˆ˜μ§‘ν•œ μ½˜ν…μΈ λ₯Ό ν•™μŠ΅ λ°μ΄ν„°λ‘œ ν™œμš©ν•΄ μš”μ•½Β·μ‘λ‹΅Β·κ°œμš” ν˜•νƒœμ˜ νŒŒμƒ μ½˜ν…μΈ λ₯Ό μ œκ³΅ν•˜κ³ , μ‚¬μš©μžλŠ” 원본 μ‚¬μ΄νŠΈλ₯Ό λ°©λ¬Έν•˜μ§€ μ•Šκ³ λ„ ν•„μš”ν•œ 정보λ₯Ό μ–»κ²Œ λœλ‹€. μ΄λŠ” νŠΈλž˜ν”½κ³Ό κ΄‘κ³  μˆ˜μ΅μ„ κ°μ†Œμ‹œμΌœ μ½˜ν…μΈ  μ œμž‘μžμ˜ 수읡 ꡬ쑰λ₯Ό μœ„ν˜‘ν•  뿐 μ•„λ‹ˆλΌ, 지적 μž¬μ‚°κΆŒ λ³΄ν˜ΈΒ·λ°μ΄ν„° 좜처 ν™•λ³΄Β·μ½˜ν…μΈ  μ˜€λ‚¨μš© 문제λ₯Ό μ•ΌκΈ°ν•˜λŠ” ꡬ쑰적 λ³€ν™”λ‹€. μ½˜ν…μΈ  μ œμž‘μžκ°€ μžμ‹ μ˜ 데이터에 λŒ€ν•œ ν†΅μ œλ ₯을 μžƒκ²Œ λ˜λŠ” 것이닀.

더 큰 λ¬Έμ œλŠ” AI 기반 봇이 λ³΄μ•ˆ μœ„ν˜‘μœΌλ‘œ μ§„ν™”ν•˜κ³  μžˆλ‹€λŠ” 점이닀. 일뢀 μ•…μ„± 봇은 λ‹¨μˆœ 크둀링을 λ„˜μ–΄ μ›Ή 취약점을 μžλ™μœΌλ‘œ νƒμƒ‰ν•˜κ³ , 계정 νƒˆμ·¨, 사기성 결제 μ‹œλ„ λ“± λ‹€μ–‘ν•œ 곡격을 μˆ˜ν–‰ν•œλ‹€. 예λ₯Ό λ“€μ–΄, 기업이 μ¦μ‹œ 마감 ν›„ λ°œν‘œν•  μ˜ˆμ •μ΄μ—ˆλ˜ μ€‘μš” λΉ„κ³΅κ°œ 재무 정보가 μ•…μ„± 봇에 μ˜ν•΄ 유좜될 경우, μ΄λŠ” λΆˆλ²• 주식 κ±°λž˜μ™€ 규제 μœ„λ°˜μœΌλ‘œ 이어져 νšŒμ‚¬μ— 치λͺ…적인 κ²°κ³Όλ₯Ό μ΄ˆλž˜ν•  수 μžˆλ‹€.

AI λ΄‡μ˜ 양적 확산은 이제 λ¬΄μ‹œν•˜κΈ° μ–΄λ €μš΄ μˆ˜μ€€μ΄λ‹€. 인터넷 ν˜„ν™© λͺ¨λ‹ˆν„°λ§ ν”Œλž«νΌ ν΄λΌμš°λ“œ λ ˆμ΄λ”μ˜ 데이터에 λ”°λ₯΄λ©΄, 특히 λ©”νƒ€μ˜ AI 봇 β€˜λ©”νƒ€-μ΅μŠ€ν„°λ„ μ—μ΄μ „νŠΈ(Meta-External Agent)β€™λŠ” 1λ…„ μƒˆ μš”μ²­λŸ‰μ΄ 843%λΌλŠ” 폭발적인 증가세λ₯Ό λ³΄μ˜€λ‹€. μ˜€ν”ˆAI의 GPT봇(GPTBot) μ—­μ‹œ 147% μ¦κ°€ν•˜λ©° 기쑴의 IP μ°¨λ‹¨μ΄λ‚˜ λ‹¨μˆœ 레이트 λ¦¬λ―ΈνŒ…λ§ŒμœΌλ‘œλŠ” 이듀을 ν†΅μ œν•˜κΈ° μ–΄λ €μ›Œμ‘Œλ‹€λŠ” 것을 λ°˜μ¦ν•œλ‹€. λ”λΆˆμ–΄, AIκ°€ β€˜CAPTCHA(μΊ‘μ°¨)’λ₯Ό ν•™μŠ΅ν•΄ μš°νšŒν•˜λŠ” 사둀도 늘고 μžˆλ‹€.

μ΄λŸ¬ν•œ λ³€ν™” μ†μ—μ„œ κΈ°μ—…κ³Ό νΌλΈ”λ¦¬μ…”λŠ” μ•…μ˜μ μΈ AI 봇을 μ°¨λ‹¨ν•˜κ³  μ½˜ν…μΈ  μŠ€ν¬λž˜ν•‘μ„ μ œμ–΄ν•  수 μžˆλŠ” 효과적인 방법을 μ°Ύμ•„μ•Ό ν•œλ‹€. AIκ°€ λ§Œλ“€μ–΄λ‚΄λŠ” μƒˆλ‘œμš΄ λΉ„μ¦ˆλ‹ˆμŠ€ 기회λ₯Ό μ°¨λ‹¨ν•˜μ§€ μ•ŠμœΌλ©΄μ„œλ„, 쑰직의 λ°μ΄ν„°Β·λ³΄μ•ˆΒ·λΈŒλžœλ“œλ₯Ό λ³΄ν˜Έν•˜λ €λ©΄ 기쑴보닀 훨씬 μ •κ΅ν•œ 접근이 ν•„μš”ν•˜λ‹€.

λ”°λΌμ„œ AI 봇 μœ„ν˜‘μ— λŒ€μ‘ν•˜κ³  μ½˜ν…μΈ  ν†΅μ œκΆŒμ„ 되찾기 μœ„ν•΄μ„œλŠ” λ‹€μŒκ³Ό 같은 닀쀑 계측 λ³΄μ•ˆ μ „λž΅κ΅¬μΆ•μ΄ μš”κ΅¬λœλ‹€:

첫째, 기초 단계인 정적 μ œμ–΄(Layer 1)λ‹€. μ΄λŠ” λŒ€κ·œλͺ¨ 봇 곡격을 견디고, AI 기반 봇이 κΈ°μ‘΄ 방어선을 μ‰½κ²Œ μš°νšŒν•˜μ§€ λͺ»ν•˜λ„둝 ν•˜λŠ” 좜발점이 λœλ‹€. CAPTCHAλ₯Ό μ‚¬μš©ν•˜μ§€ μ•ŠλŠ” 인증 방식, 닀쀑 인증(MFA), 레이트 λ¦¬λ―ΈνŒ…κ³Ό 같은 μš”μ†Œλ“€μ€ μ‹€μ œ μ‚¬μš©μžμ˜ κ²½ν—˜μ„ μ €ν•΄ν•˜μ§€ μ•ŠμœΌλ©΄μ„œλ„ μžλ™ν™”λœ μ‹œλ„λ₯Ό 효과적으둜 μ°¨λ‹¨ν•œλ‹€. λ˜ν•œ μ•…μ„± 봇을 정상 νŽ˜μ΄μ§€ λŒ€μ‹  λŒ€μ²΄ μ½˜ν…μΈ λ‘œ μœ λ„ν•΄ λ¦¬μ†ŒμŠ€λ₯Ό μ†ŒλΉ„μ‹œν‚€λŠ” 기법도 정적 μ œμ–΄μ˜ μΌν™˜μœΌλ‘œ ν™œμš©λ  수 μžˆλ‹€.

λ‘˜μ§Έ, 동적 μ œμ–΄(Layer 2)λŠ” 예츑적 λ°©μ–΄ λŠ₯λ ₯을 λ”ν•œλ‹€. 정적 μ œμ–΄ μœ„μ— λ”ν•΄μ§€λŠ” 동적 μ œμ–΄λŠ” λ³€ν™”ν•˜λŠ” AI λ΄‡μ˜ μ›€μ§μž„μ„ 쑰기에 κ°μ§€ν•˜κ³  λŒ€μ‘ν•˜λŠ” 역할을 ν•œλ‹€. μ‹€μ‹œκ°„ μœ„ν˜‘ μΈν…”λ¦¬μ „μŠ€ 뢄석을 톡해 μƒˆλ‘œμš΄ 곡격 νŒ¨ν„΄μ΄ λ„λ‹¬ν•˜κΈ° 전에 차단할 수 있고, μƒμ„Έν•œ νŠΈλž˜ν”½ λ‘œκ·ΈλŠ” μ‚¬λžŒμ΄ 보기 μ–΄λ €μš΄ 행동 νŒ¨ν„΄μ˜ 차이λ₯Ό μ‹λ³„ν•˜λŠ” 데 도움을 μ€€λ‹€. λ¨Έμ‹ λŸ¬λ‹(ML) 기반 행동 뢄석은 정상 μ‚¬μš©μžμ™€ 비정상적 νŠΈλž˜ν”½μ˜ 간극을 μžλ™μœΌλ‘œ νŒŒμ•…ν•΄ 이상 μ§•ν›„λ₯Ό μ‹λ³„ν•œλ‹€. μ΄λŸ¬ν•œ 동적 μ œμ–΄λŠ” AI 봇이 μ‹œμ‹œκ°κ° νŒ¨ν„΄μ„ λ°”κΎΈλ©° λ“±μž₯ν•˜λŠ” ν™˜κ²½μ—μ„œ ν•„μˆ˜μ μ΄λ‹€.

μ…‹μ§Έ, κ°€μž₯ μ€‘μš”ν•œ μ„ΈλΆ„ν™”λœ κ±°λ²„λ„ŒμŠ€(Layer 3)λ‹€. μ΄λŠ” 무쑰건적인 차단 μ „λž΅μ—μ„œ λ²—μ–΄λ‚˜, μ–΄λ–€ 봇이 μ–΄λ–€ λͺ©μ μ„ κ°€μ§€κ³  μ–΄λ–€ νŽ˜μ΄μ§€μ— μ ‘κ·Όν•  수 μžˆλŠ”μ§€λ₯Ό 쑰직이 직접 κ²°μ •ν•˜λŠ” 체계λ₯Ό μ˜λ―Έν•œλ‹€. 이λ₯Ό μœ„ν•΄ 쑰직은 λ¨Όμ € AI 감사(AI Auditing) κΈ°λŠ₯을 톡해 μ–΄λ–€ AI 봇이 μ‚¬μ΄νŠΈμ— μ ‘κ·Όν•˜κ³  μžˆλŠ”μ§€ 투λͺ…ν•˜κ²Œ νŒŒμ•…ν•΄μ•Ό ν•œλ‹€. 봇이 μ ‘κ·Ό λͺ©μ κ³Ό μ†Œμ† μ„œλΉ„μŠ€λ₯Ό μ•”ν˜Έν™” μ„œλͺ…μœΌλ‘œ 증λͺ…ν•˜λ„λ‘ μš”κ΅¬ν•¨μœΌλ‘œμ¨, λ΄‡μ˜ 신뒰성을 ν™•λ³΄ν•˜κ³  정식 ν¬λ‘€λŸ¬μ™€ 비정상적인 접근을 ꡬ뢄할 수 μžˆλ‹€. 더 λ‚˜μ•„κ°€, νŽ˜μ΄μ§€ λ‹¨μœ„λ‘œ μ ‘κ·Ό κΆŒν•œμ„ μ‘°μ •ν•΄ κ΄‘κ³  기반 수읡 νŽ˜μ΄μ§€λŠ” μ°¨λ‹¨ν•˜κ³  개발자 λ¬Έμ„œλ‚˜ 곡곡성 μžˆλŠ” μžλ£ŒλŠ” ν—ˆμš©ν•˜λŠ” λ“± μ½˜ν…μΈ  성격에 따라 μ „λž΅μ  선택을 ν•  수 μžˆλ‹€. 특히, 크둀링당 결제(pay-per-crawl) λͺ¨λΈμ„ μ μš©ν•˜λ©΄ AI 기업이 데이터λ₯Ό ν•™μŠ΅μ— ν™œμš©ν•  λ•Œ ν•©λ‹Ήν•œ λΉ„μš©μ„ μ§€λΆˆν•˜λ„λ‘ ν•  수 μžˆμ–΄ μ½˜ν…μΈ  μ œμž‘μžμ—κ²Œ μƒˆλ‘œμš΄ 수읡 λͺ¨λΈμ„ 열어쀄 수 μžˆλ‹€.

ꢁ극적으둜 μ΄λŸ¬ν•œ 닀쀑 계측 μ „λž΅μ€ 인터넷이 AIλ₯Ό μ€‘μ‹¬μœΌλ‘œ μž¬νŽΈλ˜λŠ” 흐름 μ†μ—μ„œ μ½˜ν…μΈ  μ œμž‘μžμ™€ 기업이 λ‹€μ‹œ ν†΅μ œκΆŒμ„ ν™•λ³΄ν•˜λŠ” 과정이닀. λ‹¨μˆœνžˆ μœ ν•΄ν•œ 봇을 λ§‰λŠ” 것에 κ·ΈμΉ˜μ§€ μ•Šκ³ , μ–΄λ–€ 주체가 μ–΄λ–€ λ°©μ‹μœΌλ‘œ μ½˜ν…μΈ λ₯Ό ν™œμš©ν•  수 μžˆλŠ”μ§€ 선택할 수 μžˆλŠ” κΆŒν•œμ„ λ˜μ°ΎλŠ” λ°©ν–₯으둜 λ‚˜μ•„κ°€μ•Ό ν•œλ‹€. 이λ₯Ό 톡해 쑰직은 AIκ°€ λ§Œλ“€μ–΄λ‚΄λŠ” μœ„ν˜‘μœΌλ‘œλΆ€ν„° 슀슀둜λ₯Ό λ³΄ν˜Έν•˜λŠ” λ™μ‹œμ—, μƒˆλ‘œμš΄ 인터넷 μ‹œλŒ€κ°€ μ œκ³΅ν•˜λŠ” 기회λ₯Ό 보닀 κ³΅μ •ν•˜κ³  μ•ˆμ •μ μœΌλ‘œ ν™œμš©ν•  수 μžˆμ„ 것이닀.

*ν•„μž 쑰원균 ν΄λΌμš°λ“œν”Œλ ˆμ–΄(Cloudflare) ν•œκ΅­ 지사μž₯은 ν•œκ΅­ λ‚΄ ν΄λΌμš°λ“œν”Œλ ˆμ–΄μ˜ μž…μ§€ 강화와 λΈŒλžœλ“œ 인지도 μ œκ³ μ— μ£Όλ ₯ν•˜κ³  있으며, μ„ΈμΌμ¦ˆ 및 채널 νŒŒνŠΈλ„ˆλ₯Ό ν†΅ν•œ 고객 접점 μ΅œμ ν™”μ—λ„ μ§‘μ€‘ν•˜κ³  μžˆλ‹€. 원균 지사μž₯은 25λ…„ 이상 리더십 κ²½ν—˜μ„ λ³΄μœ ν•œ λ² ν…Œλž‘μœΌλ‘œ, ν΄λΌμš°λ“œν”Œλ ˆμ–΄ ν•©λ₯˜ μ „ F5, 포티넷, μ‹œμŠ€μ½” 등을 ν¬ν•¨ν•œ μ£Όμš” κΈ€λ‘œλ²Œ ν…Œν¬ κΈ°μ—…μ—μ„œ κ·Όλ¬΄ν•œ λ°” μžˆλ‹€.
dl-ciokorea@foundryco.com

Dangerous RCE Flaw in React, Next.js Threatens Cloud Environments, Apps

Google, Wiz, Cnapp, Exabeam, CNAPP, cloud threat, detections, threats, CNAP, severless architecture, itte Broadcom report cloud security threat

Security and developer teams are scrambling to address a highly critical security flaw in frameworks tied to the popular React JavaScript library. Not only is the vulnerability, which also is in the Next.js framework, easy to exploit, but React is widely used, including in 39% of cloud environments.

The post Dangerous RCE Flaw in React, Next.js Threatens Cloud Environments, Apps appeared first on Security Boulevard.

ShadyPanda’s Years-Long Browser Hack Infected 4.3 Million Users

workforce, systems, security, security, spyware

A threat group dubbed ShadyPanda exploited traditional extension processes in browser marketplaces by uploading legitimate extensions and then quietly weaponization them with malicious updates, infecting 4.3 million Chrome and Edge users with RCE malware and spyware.

The post ShadyPanda’s Years-Long Browser Hack Infected 4.3 Million Users appeared first on Security Boulevard.

Cybersecurity Coalition to Government: Shutdown is Over, Get to Work

budget open source supply chain cybersecurity ransomware White House Cyber Ops

The Cybersecurity Coalition, an industry group of almost a dozen vendors, is urging the Trump Administration and Congress now that the government shutdown is over to take a number of steps to strengthen the country's cybersecurity posture as China, Russia, and other foreign adversaries accelerate their attacks.

The post Cybersecurity Coalition to Government: Shutdown is Over, Get to Work appeared first on Security Boulevard.

FBI: Account Takeover Scammers Stole $262 Million this Year

hacker, scam, Email, fraud, scam fraud

The FBI says that account takeover scams this year have resulted in 5,100-plus complaints in the U.S. and $262 million in money stolen, and Bitdefender says the combination of the growing number of ATO incidents and risky consumer behavior is creating an increasingly dangerous environment that will let such fraud expand.

The post FBI: Account Takeover Scammers Stole $262 Million this Year appeared first on Security Boulevard.

NDSS 2025 – VoiceRadar: Voice Deepfake Detection Using Micro-Frequency And Compositional Analysis

Session 4B: Audio Security

Authors, Creators & Presenters:

PAPER
VoiceRadar: Voice Deepfake Detection using Micro-Frequency And Compositional Analysis
Recent advancements in synthetic speech generation, including text-to-speech (TTS) and voice conversion (VC) models, allow the generation of convincing synthetic voices, often referred to as audio deepfakes. These deepfakes pose a growing threat as adversaries can use them to impersonate individuals, particularly prominent figures, on social media or bypass voice authentication systems, thus having a broad societal impact. The inability of state-of-the-art verification systems to detect voice deepfakes effectively is alarming. We propose a novel audio deepfake detection method, VoiceRadar, that augments machine learning with physical models to approximate frequency dynamics and oscillations in audio samples. This significantly enhances detection capabilities. VoiceRadar leverages two main physical models: (i) the Doppler effect to understand frequency changes in audio samples and (ii) drumhead vibrations to decompose complex audio signals into component frequencies. VoiceRadar identifies subtle variations, or micro-frequencies, in the audio signals by applying these models. These micro-frequencies are aggregated to compute the observed frequency, capturing the unique signature of the audio. This observed frequency is integrated into the machine learning algorithm's loss function, enabling the algorithm to recognize distinct patterns that differentiate human-produced audio from AI-generated audio. We constructed a new diverse dataset to comprehensively evaluate VoiceRadar, featuring samples from leading TTS and VC models. Our results demonstrate that VoiceRadar outperforms existing methods in accurately identifying AI-generated audio samples, showcasing its potential as a robust tool for audio deepfake detection.

ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.

Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel.

Permalink

The post NDSS 2025 – VoiceRadar: Voice Deepfake Detection Using Micro-Frequency And Compositional Analysis appeared first on Security Boulevard.

Russian-Backed Threat Group Uses SocGholish to Target U.S. Company

russian, Russia Microsoft phishing AWS Ukraine

The Russian state-sponsored group behind the RomCom malware family used the SocGholish loader for the first time to launch an attack on a U.S.-based civil engineering firm, continuing its targeting of organizations that offer support to Ukraine in its ongoing war with its larger neighbor.

The post Russian-Backed Threat Group Uses SocGholish to Target U.S. Company appeared first on Security Boulevard.

NDSS 2025 – Machine Learning-Based loT Device Identification Models For Security Applications

Session4A: IoT Security

Authors, Creators & Presenters: Eman Maali (Imperial College London), Omar Alrawi (Georgia Institute of Technology), Julie McCann (Imperial College London)

PAPER
Evaluating Machine Learning-Based IoT Device Identification Models for Security Applications

With the proliferation of IoT devices, network device identification is essential for effective network management and security. Many exhibit performance degradation despite the potential of machine learning-based IoT device identification solutions. Degradation arises from the assumption of static IoT environments that do not account for the diversity of real-world IoT networks, as devices operate in various modes and evolve over time. In this paper, we evaluate current IoT device identification solutions using curated datasets and representative features across different settings. We consider key factors that affect real-world device identification, including modes of operation, spatio-temporal variations, and traffic sampling, and organise them into a set of attributes by which we can evaluate current solutions. We then use machine learning explainability techniques to pinpoint the key causes of performance degradation. This evaluation uncovers empirical evidence of what continuously identifies devices, provides valuable insights, and practical recommendations for network operators to improve their IoT device identification in operational deployments

ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.


Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel.

Permalink

The post NDSS 2025 – Machine Learning-Based loT Device Identification Models For Security Applications appeared first on Security Boulevard.

NDSS 2025 – Hidden And Lost Control: On Security Design Risks In loT User-Facing Matter Controller

Session4A: IoT Security

Authors, Creators & Presenters: Haoqiang Wang, Yiwei Fang (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences; Indiana University Bloomington), Yichen Liu (Indiana University Bloomington), Ze Jin (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences; Indiana University Bloomington), Emma Delph (Indiana University Bloomington), Xiaojiang Du (Stevens Institute of Technology), Qixu Liu (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences), Luyi Xing (Indiana University Bloomington)


PAPER

Hidden and Lost Control: on Security Design Risks in IoT User-Facing Matter Controller

Matter is emerging as an IoT industry--unifying standard, aiming to enhance the interoperability among diverse smart home products, enabling them to work securely and seamlessly together. With many popular IoT vendors increasingly supporting Matter in consumer IoT products, we perform a systematic study to investigate how and whether vendors can integrate Matter securely into IoT systems and how well Matter as a standard supports vendors' secure integration. By analyzing Matter development model in the wild, we reveal a new kind of design flaw in user-facing Matter control capabilities and interfaces, called UMCCI flaws, which are exploitable vulnerabilities in the design space and seriously jeopardize necessary control and surveillance capabilities of Matter-enabled devices for IoT users. Therefore we built an automatic tool called UMCCI Checker, enhanced by the large-language model in UI analysis, which enables automatically detecting UMCCI flaws without relying on real IoT devices. Our tool assisted us with studying and performing proof-of-concept attacks on 11 real Matter devices of 8 popular vendors to confirm that the UMCCI flaws are practical and common. We reported UMCCI flaws to related vendors, which have been acknowledged by CSA, Apple, Tuya, Aqara, etc. To help CSA and vendors better understand and avoid security flaws in developing and integrating IoT standards like Matter, we identify two categories of root causes and propose immediate fix recommendations.

ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.

Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel.

Permalink

The post NDSS 2025 – Hidden And Lost Control: On Security Design Risks In loT User-Facing Matter Controller appeared first on Security Boulevard.

The Latest Shai-Hulud Malware is Faster and More Dangerous

supply chains, audits, configuration drift, security, supply, chain, Blue Yonder, secure, Checkmarx Abnormal Security cyberattack supply chain cybersecurity

A new iteration of the Shai-Hulud malware that ran through npm repositories in September is faster, more dangerous, and more destructive, creating huge numbers of malicious repositories, compromised scripts, and GitHub users attacked, creating one of the most significant supply chain attacks this year.

The post The Latest Shai-Hulud Malware is Faster and More Dangerous appeared first on Security Boulevard.

NDSS 2025 – EAGLEYE: Exposing Hidden Web Interfaces In loT Devices Via Routing Analysis

Session4A: IoT Security

Authors, Creators & Presenters: Hangtian Liu (Information Engineering University), Lei Zheng (Institute for Network Sciences and Cyberspace (INSC), Tsinghua University), Shuitao Gan (Laboratory for Advanced Computing and Intelligence Engineering), Chao Zhang (Institute for Network Sciences and Cyberspace (INSC), Tsinghua University), Zicong Gao (Information Engineering University), Hongqi Zhang (Henan Key Laboratory of Information Security), Yishun Zeng (Institute for Network Sciences and Cyberspace (INSC), Tsinghua University), Zhiyuan Jiang (National University of Defense Technology), Jiahai Yang (Institute for Network Sciences and Cyberspace (INSC), Tsinghua University)

PAPER

EAGLEYE: Exposing Hidden Web Interfaces in IoT Devices via Routing Analysis [https://www.ndss-symposium.org/wp-con...](https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqbEEzMmJxSkNwUUhDUkMteHZraTQ1blZ5Sk0zUXxBQ3Jtc0tuZldzQXZxQXJaOGt0VDU2RGNPdGVSbnMzcWxiTVZ1UmJsTzcyaUlCTFdvbmhoWnZRdWQ0UlJiUEs4ekR1UXNCNF9KQmp4UGxKOG5kMHdBdHBiaWh6ckxFaGphY0JVRDZDQ21jUWcyREx2Qy1XVTJqWQ&q=https%3A%2F%2Fwww.ndss-symposium.org%2Fwp-content%2Fuploads%2F2025-399-paper.pdf&v=qXDD2iiIeCg) Hidden web interfaces, i.e., undisclosed access channels in IoT devices, introduce great security risks and have resulted in severe attacks in recent years. However, the definition of such threats is vague, and few solutions are able to discover them. Due to their hidden nature, traditional bug detection solutions (e.g., taint analysis, fuzzing) are hard to detect them. In this paper, we present a novel solution EAGLEYE to automatically expose hidden web interfaces in IoT devices. By analyzing input requests to public interfaces, we first identify routing tokens within the requests, i.e., those values (e.g., actions or file names) that are referenced and used as index by the firmware code (routing mechanism) to find associated handler functions. Then, we utilize modern large language models to analyze the contexts of such routing tokens and deduce their common pattern, and then infer other candidate values (e.g., other actions or file names) of these tokens. Lastly, we perform a hidden-interface directed black-box fuzzing, which mutates the routing tokens in input requests with these candidate values as the high-quality dictionary. We have implemented a prototype of EAGLEYE and evaluated it on 13 different commercial IoT devices. EAGLEYE successfully found 79 hidden interfaces, 25X more than the state-of-the-art (SOTA) solution IoTScope. Among them, we further discovered 29 unknown vulnerabilities including backdoor, XSS (cross-site scripting), command injection, and information leakage, and have received 7 CVEs.

ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.

Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel.

Permalink

The post NDSS 2025 – EAGLEYE: Exposing Hidden Web Interfaces In loT Devices Via Routing Analysis appeared first on Security Boulevard.

Attackers are Using Fake Windows Updates in ClickFix Scams

Lumma, infostealer RATs Reliaquest

Huntress threat researchers are tracking a ClickFix campaign that includes a variant of the scheme in which the malicious code is hidden in the fake image of a Windows Update and, if inadvertently downloaded by victims, will deploy the info-stealing malware LummaC2 and Rhadamanthys.

The post Attackers are Using Fake Windows Updates in ClickFix Scams appeared first on Security Boulevard.

NDSS 2025 – Deanonymizing Device Identities Via Side-Channel Attacks In Exclusive-Use IoTs

Session4A: IoT Security

Authors, Creators & Presenters: Christopher Ellis (The Ohio State University), Yue Zhang (Drexel University), Mohit Kumar Jangid (The Ohio State University), Shixuan Zhao (The Ohio State University), Zhiqiang Lin (The Ohio State University)

PAPER

Deanonymizing Device Identities via Side-channel Attacks in Exclusive-use IoTs & Mitigation Wireless technologies like Bluetooth Low Energy (BLE) and Wi-Fi are essential to the Internet of Things (IoT), facilitating seamless device communication without physical connections. However, this convenience comes at a cost--exposed data exchanges that are susceptible to observation by attackers, leading to serious security and privacy threats such as device tracking. Although protocol designers have traditionally relied on strategies like address and identity randomization as a countermeasure, our research reveals that these attacks remain a significant threat due to a historically overlooked, fundamental flaw in exclusive-use wireless communication. We define exclusive-use as a scenario where devices are designed to provide functionality solely to an associated or paired device. The unique communication patterns inherent in these relationships create an observable boolean side-channel that attackers can exploit to discover whether two devices "trust" each other. This information leak allows for the deanonymization of devices, enabling tracking even in the presence of modern countermeasures. We introduce our tracking attacks as IDBleed and demonstrate that BLE and Wi-Fi protocols that support confidentiality, integrity, and authentication remain vulnerable to deanonymization due to this fundamental flaw in exclusive-use communication patterns. Finally, we propose and quantitatively evaluate a generalized, privacy-preserving mitigation we call Anonymization Layer to find a negligible 2% approximate overhead in performance and power consumption on tested smartphones and PCs.

ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.


Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel.

Permalink

The post NDSS 2025 – Deanonymizing Device Identities Via Side-Channel Attacks In Exclusive-Use IoTs appeared first on Security Boulevard.

Hack of SitusAMC Puts Data of Financial Services Firms at Risk

stolen, credentials, file data, anomaly detection, data exfiltration, threat, inside-out, breach, security strategy, data breaches, data search, Exabeam, data, data breaches, clinical trials, breach, breaches, data, residency, sovereignty, data, breaches, data breaches, NetApp data broker FTC location data

SitusAMC, a services provider with clients like JP MorganChase and Citi, said its systems were hacked and the data of clients and their customers possibly compromised, sending banks and other firms scrambling. The data breach illustrates the growth in the number of such attacks on third-party providers in the financial services sector.

The post Hack of SitusAMC Puts Data of Financial Services Firms at Risk appeared first on Security Boulevard.

NDSS 2025 – Towards Understanding Unsafe Video Generation

SESSION
Session 3D: AI Safety

-----------

-----------

Authors, Creators & Presenters: Yan Pang (University of Virginia), Aiping Xiong (Penn State University), Yang Zhang (CISPA Helmholtz Center for Information Security), Tianhao Wang (University of Virginia)

-----------

PAPER
Towards Understanding Unsafe Video Generation
Video generation models (VGMs) have demonstrated the capability to synthesize high-quality output. It is important to understand their potential to produce unsafe content, such as violent or terrifying videos. In this work, we provide a comprehensive understanding of unsafe video generation.

First, to confirm the possibility that these models could indeed generate unsafe videos, we choose unsafe content generation prompts collected from 4chan and Lexica, and three open-source SOTA VGMs to generate unsafe videos. After filtering out duplicates and poorly generated content, we created an initial set of 2112 unsafe videos from an original pool of 5607 videos. Through clustering and thematic coding analysis of these generated videos, we identify 5 unsafe video categories: Distorted/Weird, Terrifying, Pornographic, Violent/Bloody, and Political. With IRB approval, we then recruit online participants to help label the generated videos. Based on the annotations submitted by 403 participants, we identified 937 unsafe videos from the initial video set. With the labeled information and the corresponding prompts, we created the first dataset of unsafe videos generated by VGMs. We then study possible defense mechanisms to prevent the generation of unsafe videos. Existing defense methods in image generation focus on filtering either input prompt or output results. We propose a new approach called sysname, which works within the model's internal sampling process. sysname can achieve 0.90 defense accuracy while reducing time and computing resources by 10 times when sampling a large number of unsafe prompts. Our experiment includes three open-source SOTA video diffusion models, each achieving accuracy rates of 0.99, 0.92, and 0.91, respectively. Additionally, our method was tested with adversarial prompts and on image-to-video diffusion models, and achieved nearly 1.0 accuracy on both settings. Our method also shows its interoperability by improving the performance of other defenses when combined with them.

-----------

ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.

-----------

Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel.

Permalink

The post NDSS 2025 – Towards Understanding Unsafe Video Generation appeared first on Security Boulevard.

NDSS 2025 – GAP-Diff: Protecting JPEG-Compressed Images From Diffusion-Based Facial Customization

SESSION
Session 3D: AI Safety

-----------

-----------

Authors, Creators & Presenters: Haotian Zhu (Nanjing University of Science and Technology), Shuchao Pang (Nanjing University of Science and Technology), Zhigang Lu (Western Sydney University), Yongbin Zhou (Nanjing University of Science and Technology), Minhui Xue (CSIRO's Data61)

-----------

PAPER
GAP-Diff: Protecting JPEG-Compressed Images From Diffusion-Based Facial Customization
Text-to-image diffusion model's fine-tuning technology allows people to easily generate a large number of customized photos using limited identity images. Although this technology is easy to use, its misuse could lead to violations of personal portraits and privacy, with false information and harmful content potentially causing further harm to individuals. Several methods have been proposed to protect faces from customization via adding protective noise to user images by disrupting the fine-tuned models.
Unfortunately, simple pre-processing techniques like JPEG compression, a normal pre-processing operation performed by modern social networks, can easily erase the protective effects of existing methods. To counter JPEG compression and other potential pre-processing, we propose GAP-Diff, a framework of Generating data with Adversarial Perturbations for text-to-image Diffusion models using unsupervised learning-based optimization, including three functional modules. Specifically, our framework learns robust representations against JPEG compression by backpropagating gradient information through a pre-processing simulation module while learning adversarial characteristics for disrupting fine-tuned text-to-image diffusion models. Furthermore, we achieve an adversarial mapping from clean images to protected images by designing adversarial losses against these fine-tuning methods and JPEG compression, with stronger protective noises within milliseconds. Facial benchmark experiments, compared to state-of-the-art protective methods, demonstrate that GAP-Diff significantly enhances the resistance of protective noise to JPEG compression, thereby better safeguarding user privacy and copyrights in the digital world.

ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.

Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations' YouTube Channel.

Permalink

The post NDSS 2025 – GAP-Diff: Protecting JPEG-Compressed Images From Diffusion-Based Facial Customization appeared first on Security Boulevard.

❌