Suspected spies for China

Apr 24 2024

.bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
.bh__table_cell { padding: 5px; background-color: #FFFFFF; }
.bh__table_cell p { color: #2D2D2D; font-family: ‘Helvetica’,Arial,sans-serif !important; overflow-wrap: break-word; }
.bh__table_header { padding: 5px; background-color:#F1F1F1; }
.bh__table_header p { color: #2A2A2A; font-family:’Trebuchet MS’,’Lucida Grande’,Tahoma,sans-serif !important; overflow-wrap: break-word; }

Gone Phishing Banner

Welcome to Gone Phishing, your daily cybersecurity newsletter that casts a wide net when it comes to catching phish ๐ŸŽฃ

ย Todayโ€™s hottest cybersecurity news stories:

  • ๐Ÿ‘จ๐Ÿปโ€โœˆ๏ธ Germans issue arrest warrants for three suspected spies for China ๐Ÿ•ต

  • ๐Ÿง Examining the true cost of cybercrime for modern businesses ๐Ÿ’ธ

  • ๐Ÿš Apache Cordova app Harness hit w/ dependency confusion attack ๐Ÿ˜ต

A game of Chinese whispers ๐Ÿ’€

๐Ÿšจ Arrest Warrants Issued Against 3 German Citizens Suspected of Spying for China ๐Ÿ•ต๏ธโ€โ™‚๏ธ

๐Ÿ” German authorities have taken decisive action against suspected espionage activities linked to China, announcing arrest warrants for three individuals, identified as Herwig F., Ina F., and Thomas R., by the Office of the Federal Prosecutor (Generalbundesanwalt).

๐Ÿ”’ The defendants are accused of collaborating with a Chinese secret service since an unspecified date before June 2022, with Thomas R. allegedly acting as an agent for China's Ministry of State Security (MSS), focusing on acquiring information about innovative German technologies with potential military applications.

๐Ÿ“ก Additionally, the involvement of Herwig F. and Ina F., a married couple running a business in Dรผsseldorf, has come to light. They are accused of facilitating connections within the German scientific and research community, including negotiating research projects beneficial to China's maritime combat capabilities.

๐Ÿ’ผ The trio's activities culminated in the purchase and export of a specialised laser from Germany to China, in violation of E.U. dual-use regulations, further exacerbating the severity of the allegations.

๐Ÿ›‘ These developments coincide with the arrest of Jian G., another individual apprehended for espionage-related charges, highlighting a broader pattern of espionage activities involving Chinese intelligence agencies and individuals operating within European nations.

๐Ÿ‘ฅ Meanwhile, in the U.K., Christopher Berry and Christopher Cash face charges for passing sensitive information to China, underscoring the global scope of efforts to combat espionage threats and uphold national security interests.

๐Ÿ—ฃ๏ธ Responding to the allegations, a spokesperson for the Chinese Embassy dismissed the accusations as "malicious slander" and called for an end to what they perceive as anti-China political manoeuvres.

๐ŸŒ As geopolitical tensions persist, nations remain vigilant against espionage threats, emphasising the importance of robust counterintelligence measures and international cooperation to safeguard sensitive information and national security interests.

Cyber this or that but it all adds up ๐Ÿ˜ฌ

๐Ÿšจ The True Financial Impact of Cyber Attacks: Unveiling Hidden Costs ๐Ÿ’ฐ

๐Ÿ” Cybersecurity breaches pose significant financial threats to individuals and businesses, with the global cost of cybercrime projected to soar to $10.5 trillion annually by 2025, a substantial increase from $3 trillion in 2015, as reported by Cybersecurity Ventures.

๐Ÿ“ˆ This alarming surge underscores cybercriminals' escalating sophistication in executing successful cyberattacks over the years, necessitating a deeper understanding of the comprehensive financial implications of such breaches.

๐Ÿ’ธ Revenue Loss: Businesses, especially those in vital sectors like finance and healthcare, face substantial revenue losses due to operational disruptions caused by cyberattacks. Extended downtime leads to missed sales opportunities, tarnished reputations, and diminished customer trust, exacerbating financial losses.

๐Ÿค Strained Relationships: Cyberattacks strain relationships with customers and suppliers, triggering logistical challenges and eroding trust. Loss of customer trust can result in customer defections, while potential clients may be deterred by security concerns, further impacting revenue streams.

๐Ÿš” Regulatory Fines: Non-compliance with data protection regulations, such as GDPR and CCPA, can result in hefty fines post-breach. Additionally, cyber incidents may prompt insurers to hike premiums, compounding financial burdens for affected businesses.

๐Ÿ” Root Causes of Vulnerabilities: Cybersecurity vulnerabilities stem not only from technological gaps but also from human errors. Stanford University's study reveals that 88% of breaches are due to employee mistakes, emphasising the critical need for comprehensive security measures encompassing both technological defences and employee training.

๐Ÿ”’ Multi-Pronged Defence: Organisations must adopt a multi-layered cybersecurity approach, incorporating advanced technology, employee training, regular audits, and proactive threat detection to mitigate risks effectively. Investment in national cybersecurity infrastructure is also vital to combat the evolving cyber threat landscape.

๐Ÿ‘ฅ Individual Responsibility: Individuals play a pivotal role in cybersecurity defence. By acquiring and updating cybersecurity skills, staying informed about potential threats, and practising safe online behaviours, individuals contribute to collective cybersecurity resilience.

๐Ÿ’ก In the battle against cyber threats, collaboration between organisations, governments, and individuals is essential. By implementing robust cybersecurity measures and fostering a culture of cyber awareness, we can collectively safeguard digital assets and mitigate the financial impact of cyberattacks.

Cordova is confused! It hurt itself in its confusion ๐ŸŽฎ๐Ÿฃ๐Ÿ‘พ

๐Ÿšจ Apache Cordova App Harness Targeted in Dependency Confusion Attack ๐Ÿ’ฅ

๐Ÿ›ก๏ธ Researchers have unearthed a critical dependency confusion vulnerability impacting the archived Apache project, Cordova App Harness.

๐Ÿ”— The dependency confusion vulnerability arises from package managers' tendency to prioritise public repositories over private registries, enabling threat actors to publish malicious packages with identical names to public repositories. As a result, package managers inadvertently download fraudulent packages instead of intended private ones, potentially impacting downstream customers.

๐Ÿ“Š Prevalence of Vulnerabilities: A May 2023 analysis by Orca revealed that nearly 49% of organisations are susceptible to dependency confusion attacks, underscoring the widespread nature of this threat.

๐Ÿ”’ The Cordova App Harness Project: Despite being discontinued by the Apache Software Foundation in April 2019, the Cordova App Harness project remained vulnerable. Security firm Legit Security identified the project's reference to an internal dependency without a relative file path, leaving it susceptible to supply chain attacks.

โš ๏ธ Supply Chain Attack Scenario: Legit Security demonstrated the risk by uploading a malicious version of the package to npm under the same name but with a higher version number. This attracted over 100 downloads, highlighting the potential severity of the vulnerability.

๐Ÿ’ก Mitigation Measures: The Apache security team took ownership of the vulnerable package to address the issue. Organisations are advised to create public packages as placeholders to mitigate dependency confusion attacks.

๐Ÿ” Securing the Software Development Factory: This discovery emphasises the importance of assessing third-party projects and dependencies, particularly archived open-source projects, which may harbour overlooked vulnerabilities. Proactive measures, such as regular updates and security patches, are essential to safeguard against potential risks.

๐Ÿšจย To fortify defences against supply chain attacks and mitigate the risks posed by dependency confusion vulnerabilities, organisations must prioritise thorough security assessments and proactive risk management strategies across their software development lifecycle.

๐Ÿ—ž๏ธ Extra, Extra! Read all about it!

Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!

  • ๐Ÿ›ก๏ธ Tl;dr sec: Join 30,000+ security professionals getting the best tools, blog posts, talks, and resources right in their inbox for free every Thursday ๐Ÿ“…

  • ๐Ÿ’ตย Crypto Pragmatist: Crypto made simple. Actionable alpha in 5 minutes, 3x a week. Join 47,000+ investors and insiders, for ๐Ÿ†“

  • ๐Ÿ“ˆย Bitcoin Breakdown: The best in Bitcoin, carefully curated by an alien from the future ๐Ÿ‘พ

Let us know what you think!

So long and thanks for reading all the phish!

Recent articles