Aaron Leyland, a mobile device security expert and contributor to Security Weekly News, shares insights on pressing cybersecurity topics. He discusses the potential ban of TP-Link routers due to security concerns and delves into the world of online piracy, highlighting recent takedowns. Leyland also warns about phishing risks through calendar invites, unpacks the alarming rise of spyware like Pegasus, and reflects on surveillance practices impacting privacy—a compelling blend of current threats and tech nostalgia.
The U.S. government's investigation into TP-Link routers highlights national security concerns over their widespread use in sensitive environments.
Recent phishing attacks exploiting Google Calendar invites illustrate the evolving tactics malicious actors use to compromise personal data.
Deep dives
Concerns Over TP-Link Router Security
The U.S. government is considering banning TP-Link routers due to potential national security risks associated with these commonly used devices. TP-Link holds around 65% of the market share for small office and home office networks in the U.S., and their routers are often sold below manufacturing cost, leading to investigations into unfair business practices. The company has been subpoenaed by multiple government departments, including Justice and Defense, raising alarms about the routers being deployed in sensitive sectors such as military and law enforcement. The concerns intensified after reports indicated that a botnet called Quad7, primarily composed of compromised TP-Link devices, was involved in cyberattacks, suggesting a critical need for scrutiny regarding their use in secure environments.
Crackdown on Online Streaming Piracy
The Alliance for Creativity and Entertainment (ACE) has successfully taken down a significant illegal live sports streaming site that had garnered 821 million visits in the past year. This site, which allowed users to stream a wide variety of sporting events illegally, was based in Vietnam and resulted in the surrender of 138 domains linked to piracy. The awareness of such sites' existence leads to increased risks, not only due to their illegality but also because users often face malware threats while accessing such content. This crackdown highlights the ongoing efforts to combat piracy in an era where digital streaming has become a massive industry.
Phishing via Calendar Invites
Phishing attacks are evolving, with malicious actors now exploiting Google Calendar invites to steal personal data. Users receive seemingly ordinary invites that, when clicked, can either redirect them to malicious links or prompt them to download suspicious attachments, both of which aim to scrape sensitive information from their devices. Such attacks often spoof legitimate sender addresses, making it difficult for users to discern the risk unless they are vigilant. There is a push for users to enable known sender options to mitigate these threats, indicating the importance of heightened awareness during the holiday season when phishing attacks tend to spike.
CISA's New Cloud Security Directive
CISA has issued a binding operational directive mandating federal agencies to adopt secure cloud practices for Microsoft 365 and similar environments. This includes identifying specific cloud tenants, employing assessment tools, and aligning with secure configuration standards to safeguard data against breaches. The directive stems from concerns over recent incidents involving misconfigured cloud settings and exploited vulnerabilities. CISA plans to extend similar recommendations for other cloud-based platforms, emphasizing the urgent need for enhanced security measures to protect against persistent cyber threats.