Customer portal
Articles Tagged with

SOS Intelligence

"MSSP
Opinion, OSINT

OSINT and Ethics: Navigating the Challenges of Responsible Intelligence Gathering

Open Source Intelligence (OSINT) has become an invaluable tool across cybersecurity, business intelligence, and law enforcement. By leveraging publicly available information from sources like social media, websites, and public records, OSINT enables organisations to monitor emerging threats, analyse competitor activity, and gain insights without resorting to intrusive or covert methods. With the rapid growth of digital information, OSINT offers unprecedented access to data that can inform decision-making and risk assessments.

However, this access to information comes with significant ethical and legal challenges, particularly concerning privacy and data handling. Unlike traditional intelligence methods, OSINT relies on openly available data, which can blur the lines of ethical responsibility. Practitioners must consider whether the information they gather could infringe upon individuals’ privacy, especially when it involves personal data or data that, while accessible, may not be ethically sound to exploit. Additionally, OSINT activities often cross international borders, complicating compliance with different countries’ data protection regulations, such as the General Data Protection Regulation (GDPR) in the EU.

The goal of this discussion is to provide guidance on how to conduct OSINT responsibly. By adhering to ethical principles and respecting legal frameworks, OSINT professionals can ensure their intelligence-gathering activities remain respectful of privacy while effectively supporting organisational objectives. Responsible OSINT practices not only help to mitigate legal risks but also uphold the trustworthiness and integrity of the profession in an era where data accessibility is at an all-time high.

What is OSINT and Why Are Ethics Important?

OSINT  is the process of collecting and analysing information from publicly accessible sources, including social media, news sites, forums, and online databases. OSINT allows organisations to gather actionable insights without the need for invasive methods, drawing on the vast and diverse information available on the internet. It has become an essential tool for sectors like cybersecurity, business intelligence, and governmental operations, enabling organisations to gain valuable information about potential threats, market conditions, and broader geopolitical developments.

For cybersecurity, OSINT aids in monitoring for potential data leaks, phishing threats, or signals of a planned attack, enhancing an organisation’s preparedness and defence capabilities. In the business world, OSINT enables companies to stay informed about competitor moves, market trends, and customer sentiment, giving them an edge in a highly competitive landscape. Meanwhile, governmental bodies leverage OSINT to support law enforcement and intelligence operations, tracking issues like disinformation campaigns or border security threats.

However, as powerful as OSINT is, it raises important ethical questions. Given its reliance on publicly accessible data, OSINT operates in a grey area where information, while legally available, may still be ethically sensitive. For instance, gathering personal information from social media could potentially breach an individual’s privacy, even if the content is technically public. Additionally, different jurisdictions have varying regulations on data use, such as the General Data Protection Regulation (GDPR) in the EU, which aims to protect individuals’ privacy rights. These complexities make it critical for OSINT practitioners to conduct intelligence gathering responsibly, balancing their goals with a commitment to ethical standards.

The importance of ethics in OSINT cannot be overstated. Ethical considerations ensure that intelligence practices respect privacy and remain compliant with legal frameworks. By maintaining responsible OSINT practices, organisations not only mitigate potential legal risks but also build trust and credibility, reinforcing the responsible use of publicly available data in a way that benefits both their objectives and the public at large.

Key Ethical Challenges in OSINT

OSINT operates within an ethical landscape shaped by the ease of access to publicly available information, presenting unique challenges for responsible practice. These challenges include balancing privacy with public access, ensuring accuracy, and navigating issues of consent and transparency.

One of the core ethical tensions in OSINT is the balance between privacy and public access. While the data collected in OSINT activities is publicly accessible, individuals may not be aware that their information could be repurposed for intelligence gathering. Just because data is available online does not automatically justify its unrestricted use. This tension raises important ethical questions about respecting individuals’ privacy while still leveraging OSINT’s benefits. Practitioners must assess each case individually, considering the context of the data and its potential impact on individuals’ privacy before using it.

Another ethical challenge is the responsibility to ensure accuracy and verification. OSINT can often include information from varied sources, some of which may be incomplete, biased, or outdated. The ethical obligation to verify information is crucial to avoid the risk of spreading misinformation, which can lead to serious consequences for individuals or organisations implicated by unverified intelligence. OSINT practitioners are ethically bound to rigorously check and corroborate sources before sharing information or using it in decision-making.

Lastly, the issues of consent and transparency are complex in the digital age. Although information may be publicly available, that does not imply individuals have consented to its use for intelligence purposes. The assumption that public access equates to ethical use oversimplifies the reality of digital consent. People may share information without intending for it to be monitored or analysed by third parties. Transparency in OSINT practices—clearly communicating how and why data is gathered and handled—helps address these complexities, fostering ethical integrity.

Legal Implications of OSINT

OSINT  can offer invaluable insights, yet it must operate within complex legal frameworks to ensure compliance and protect individual rights. Key considerations include adherence to data protection laws, managing cross-border legal challenges, and balancing security needs with privacy rights.

managed service provider (MSP) CTS has suffered a significant cyberattack as a result of CitrixBleed

One of the primary legal obligations for OSINT practitioners is adhering to data protection laws like the General Data Protection Regulation (GDPR) in the EU and the California Consumer Privacy Act (CCPA) in the US. These regulations set strict guidelines on the collection, processing, and retention of personal data, designed to protect individual privacy rights. OSINT activities that involve personal information must follow these laws closely to avoid legal repercussions and potential fines. GDPR, for instance, mandates data minimisation and purpose limitation, meaning that personal data collected should be directly relevant and necessary for the purpose it was obtained.

Cross-border legal issues further complicate OSINT practices, as data gathered may span multiple jurisdictions, each with its own data protection laws. Some countries have strict rules about how personal data can be used, even if it is publicly accessible. This can create legal ambiguity for OSINT practitioners, who must navigate a patchwork of global regulations. Ensuring compliance requires a comprehensive understanding of both local and international data protection requirements.

Finally, OSINT practitioners must balance the need for security with respect for privacy, especially in sensitive areas like crime prevention or investigative journalism. While gathering intelligence is critical for identifying and mitigating risks, it is essential to respect individual privacy rights and limit data collection to what is ethically and legally appropriate. This balance is vital in preserving public trust and ensuring that OSINT activities contribute positively to security without infringing on personal freedoms.

Best Practices for Ethical and Responsible OSINT

Effective and ethical OSINT requires a well-defined approach that prioritises respect for privacy and accountability. Adopting best practices, including establishing a clear ethical framework, maintaining operational security (OPSEC), and ensuring transparency, helps to safeguard both the integrity of intelligence activities and the privacy rights of individuals.

A clear ethical framework is essential for guiding OSINT activities. Organisations should establish detailed guidelines that define when, how, and why information is collected. This framework should outline permissible sources, data retention policies, and limitations on personal data usage. By setting clear boundaries and ethical principles, practitioners can avoid unnecessary data collection and mitigate risks related to privacy infringements or misuse. Having a structured ethical policy also provides a standardised approach, ensuring consistency and compliance across all OSINT activities.

Operational Security (OPSEC) is another critical aspect, as it helps protect both the organisation conducting OSINT and the individuals involved. Practitioners should use secure methods for gathering, storing, and sharing information to prevent sensitive data from being exposed or misused. This includes anonymising searches where appropriate, securely storing information, and protecting the identities of individuals involved in sensitive intelligence work. Effective OPSEC safeguards ensure that OSINT activities do not unintentionally compromise the security of individuals or the organisation itself.

Transparency and accountability are essential in maintaining ethical OSINT practices. Keeping a thorough record of OSINT activities, including sources, decision-making processes, and any limitations placed on data usage, supports accountability and aids in addressing any ethical concerns that may arise. Documenting activities and decisions also provides a reference for evaluating practices against legal or regulatory requirements, fostering a culture of transparency.

Managing Privacy Concerns in OSINT Work

Privacy is a primary concern in OSINT, as intelligence activities often involve handling sensitive and personal information. Best practices, including data minimisation, anonymisation, and responsible data retention, help mitigate privacy risks while maintaining effective intelligence gathering.

Data minimisation and anonymisation are essential principles in responsible OSINT. Practitioners should collect only the information necessary to meet the intelligence objectives, avoiding extraneous data that could infringe upon privacy rights. By focusing on essential data and anonymising any personal information wherever possible, OSINT professionals reduce the risk of unnecessary privacy breaches and align their activities with data protection regulations.

Handling sensitive information securely is also crucial throughout the OSINT lifecycle. This includes implementing secure storage solutions, restricting access to authorised personnel, and using encryption when storing or sharing sensitive data. Practitioners should establish protocols to handle particularly sensitive information carefully, ensuring it is protected against unauthorised access or leaks that could harm individuals or compromise organisational integrity.

Data retention and disposal are equally important for privacy management. Setting clear guidelines on how long data will be retained, with periodic reviews, ensures that information is only kept as long as it is useful and relevant. When data is no longer needed, secure deletion and disposal processes should be followed to prevent the potential misuse of archived information. These practices help maintain the privacy of individuals and uphold ethical standards in OSINT.

Adapting to Emerging OSINT Technologies and Ethical Considerations

As new technologies emerge, the OSINT community must continuously evolve its ethical practices to address potential privacy and security concerns. Staying informed about advances in OSINT tools and techniques, particularly in AI, is essential for maintaining responsible intelligence practices.

Ongoing education is crucial for understanding how new tools may impact ethical practices in OSINT. Technologies such as AI for data analysis can increase efficiency and reveal deeper insights, but they also pose unique ethical questions, including potential biases in data interpretation and the risk of excessive data collection. Practitioners should stay informed of new developments and continuously assess the ethical implications of their tools.

Regularly reviewing and updating ethical guidelines ensures they remain relevant as technology and privacy norms change. Guidelines must be adaptable, reflecting current technologies and emerging privacy concerns, such as the increased collection and processing of personal data. Regular updates also help organisations align with evolving data protection laws, maintaining compliance and ethical standards.

The role of AI in OSINT, in particular, demands a high level of transparency, fairness, and accountability. As AI tools become more common in OSINT, practitioners must address ethical challenges related to potential biases, data accuracy, and automated decision-making. Using AI responsibly in OSINT involves transparent methods and a commitment to fairness, ensuring that AI-based insights are accurate and do not unintentionally harm individuals or communities. By proactively addressing these ethical considerations, OSINT professionals can adapt effectively to the changing technological landscape.

Conclusion

The practice of ethical and responsible OSINT is essential to maintaining credibility and trust in the field. By prioritising privacy, accuracy, and transparency, organisations can ensure that OSINT serves its purpose effectively while respecting individual rights and adhering to legal standards. These principles are especially critical as OSINT continues to expand in scope and as technological advancements push the boundaries of data collection and analysis.

A commitment to ongoing ethical review is vital, as societal standards and privacy laws evolve in response to new challenges. Organisations that regularly assess and adapt their ethical frameworks can stay ahead of emerging issues, ensuring that their intelligence practices remain responsible and compliant. This proactive approach not only protects individuals’ privacy but also reinforces the organisation’s reputation as a trusted, responsible entity in the intelligence community.

Industry collaboration is key to promoting best practices in OSINT. By working together, organisations, professionals, and regulators can develop and share guidelines that uphold ethical standards across the field. Collaborative efforts to create clear, adaptable practices and to address emerging ethical questions will support a sustainable and responsible future for OSINT. As the landscape of open-source intelligence grows more complex, this shared commitment to ethics will be essential for building a secure and trustworthy intelligence ecosystem that benefits all stakeholders.

CCTV Photo by Tobias Tullius on Unsplash

"Case
Case Study, Opinion, OSINT

Case Study: OSINT and Ethics – Balancing Information and Responsibility

Introduction

In an era where information is accessible at unprecedented levels, Open-Source Intelligence (OSINT) has emerged as a critical tool for both private and public sectors. OSINT encompasses the collection and analysis of publicly available information to support decision-making, threat assessment, and strategic planning. Yet, with great accessibility comes great responsibility. The ethical dimensions of OSINT, particularly in relation to privacy and data security, have raised challenging questions about where to draw boundaries. This case study explores how ethical frameworks guide OSINT practices and examines a real-life scenario that highlights the critical need for ethical boundaries in OSINT activities.

Ethical Considerations in OSINT

OSINT allows practitioners to investigate and gather detailed information from publicly accessible sources, but ethical considerations must always be at the forefront. Just because information is accessible does not mean it is ethical—or even legal—to use it indiscriminately.

Key ethical considerations in OSINT include:

  1. Privacy – OSINT practitioners must be mindful of personal privacy, balancing legitimate investigation needs with individuals’ right to privacy.
  2. Proportionality – Information gathered should align with the goals of the investigation, avoiding excessive or unnecessary data collection.
  3. Legality – Laws governing data protection, like the UK’s Data Protection Act, set boundaries that practitioners must observe. Failing to follow these laws can lead to penalties and reputational damage.
  4. Purpose Limitation – OSINT should be applied within clear parameters, ensuring that data is only used for its stated purpose and minimising the risk of misuse.

Case Example: Cambridge Analytica and Data Ethics in OSINT

The Cambridge Analytica scandal, one of the most well-known examples of data misuse, highlights the ethical risks inherent in OSINT when privacy and transparency are overlooked. In 2014, the political consulting firm gained access to data from up to 87 million Facebook users worldwide. The data was acquired through an app developed by a researcher who paid users to take a personality quiz. While participants willingly shared their information, they were unaware that their friends’ data would also be collected without explicit consent.

The Mechanism of Data Collection

The researcher’s app, called “thisisyourdigitallife,” collected data on users who took the quiz, but due to Facebook’s then-lax privacy policies, it also gained access to extensive information about the friends of these users. This included demographic details, Facebook likes, and social networks, allowing Cambridge Analytica to build detailed psychological profiles on millions of individuals. Although Facebook’s terms of service permitted this type of data gathering at the time, most users were unaware of the extent of data being shared or how it would be used.

This example reveals a loophole where technically “public” or “shared” data was collected in ways that stretched ethical norms. Cambridge Analytica justified its actions by citing the “public” nature of social media interactions, yet the approach lacked transparency and infringed upon users’ reasonable expectations of privacy.

Ethical Violations in Data Exploitation

Cambridge Analytica’s use of OSINT, while technically permissible under Facebook’s policy, sparked intense criticism due to several ethical failings:

  1. Lack of Informed Consent – Although individuals had agreed to the terms of the app, they had not been clearly informed of how their data—and, crucially, the data of their friends—would be utilised. This lack of informed consent created a situation where users unknowingly became part of a sophisticated data-mining operation.
  2. Manipulative Intent – Cambridge Analytica used the data to tailor political messaging to influence voters’ behaviour in the 2016 U.S. presidential election and the UK’s Brexit referendum. This manipulation raised ethical concerns about OSINT’s role in influencing democratic processes, as voters received highly targeted messages based on detailed psychological insights.
  3. Privacy Invasion Beyond Initial Scope – The extensive profiling exceeded the expectations users would typically have when engaging with social media. Cambridge Analytica essentially crossed a line from open-source intelligence gathering into invasive surveillance, blurring boundaries between voluntary data sharing and unwarranted data exploitation.

Legal and Reputational Fallout

The fallout from the Cambridge Analytica scandal was swift and severe. Facebook faced a $5 billion fine from the Federal Trade Commission (FTC) for failing to protect user data and was compelled to implement new data protection measures. Cambridge Analytica itself faced international scrutiny, ultimately filing for bankruptcy amidst ongoing investigations. Beyond legal repercussions, the incident led to a wave of distrust in social media platforms and increased public demand for transparency in data practices.

Legal firms need cyber threat intelligence

This case serves as a crucial reminder that ethical OSINT is not just about adhering to legal guidelines; it also requires transparency and accountability. For OSINT practitioners, the scandal emphasises the need to handle personal data with respect for privacy and clear communication about how information will be used.

Lessons Learned for OSINT Practitioners

The Cambridge Analytica case underscores several key takeaways for responsible OSINT:

  • Prioritise User Awareness: Users should be aware of data collection practices. In cases where OSINT gathers data from social platforms, practitioners must ensure they respect users’ privacy boundaries.
  • Minimise Data Collection: Only gather information that is necessary and relevant. Over-collection, even if permissible, may cross ethical lines, especially when dealing with sensitive data.
  • Safeguard Democratic Integrity: OSINT practitioners should be cautious in using personal insights to influence decision-making, particularly in contexts where it may affect democratic processes or individual autonomy.

By examining Cambridge Analytica’s missteps, OSINT practitioners can better understand the consequences of unrestrained data collection and the need for ethical frameworks. A commitment to ethical OSINT practices not only protects individual privacy but also strengthens public trust in the field.

Implementing Ethical OSINT Practices

Organisations using OSINT should consider developing and enforcing a clear ethical framework, including:

  • Transparent Data Use: Always inform individuals if their data is being collected and explain its intended purpose.
  • Clear Consent Mechanisms: Consent should be obtained whenever feasible, even if data is publicly available.
  • OPSEC (Operational Security): Safeguard the methods and tools used in OSINT to prevent exploitation or misuse of information.
  • Regular Ethical Audits: Conduct periodic audits of OSINT practices to ensure they meet both legal and ethical standards.

Conclusion

The Cambridge Analytica case offers a cautionary tale for the OSINT community, reminding practitioners that while the accessibility of information can be a powerful tool, it must be wielded responsibly. Ethical OSINT practices not only protect individuals but also uphold the reputation of organisations that rely on this intelligence. As OSINT continues to evolve, so too must our ethical frameworks, ensuring that we balance innovation with integrity.

Photos by Dayne Topkin Mario Mesaglio on Unsplash

"SOS
CVE Top 10

The SOS Intelligence CVE Chatter Weekly Top Ten – 11 November 2024

 

This weekly blog post is from via our unique intelligence collection pipelines. We are your eyes and ears online, including the Dark Web.

There are thousands of vulnerability discussions each week. SOS Intelligence gathers a list of the most discussed Common Vulnerabilities and Exposures (CVE) online for the previous week.

We make every effort to ensure the accuracy of the data presented. As this is an automated process some errors may creep in.

If you are feeling generous please do make us aware of anything you spot, feel free to follow us on Twitter @sosintel and DM us. Thank you!

 


 

1.  CVE-2024-21762

A out-of-bounds write in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, 6.4.0 through 6.4.14, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7 allows attacker to execute unauthorized code or commands via specifically crafted requests

https://nvd.nist.gov/vuln/detail/CVE-2024-21762

 


 

2. CVE-2024-24919

Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.

https://nvd.nist.gov/vuln/detail/CVE-2024-24919

 


 

3. CVE-2018-17144

Bitcoin Core 0.14.x before 0.14.3, 0.15.x before 0.15.2, and 0.16.x before 0.16.3 and Bitcoin Knots 0.14.x through 0.16.x before 0.16.3 allow a remote denial of service (application crash) exploitable by miners via duplicate input. An attacker can make bitcoind or Bitcoin-Qt crash.

https://nvd.nist.gov/vuln/detail/CVE-2018-17144

 


 

4. CVE-2024-10687

The Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal, Social Share Buttons plugin for WordPress is vulnerable to time-based SQL Injection via the $collectedIds parameter in all versions up to, and including, 24.0.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

https://nvd.nist.gov/vuln/detail/CVE-2024-10687

 


 

5. CVE-2024-37383

Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 allows XSS via SVG animate attributes.

https://nvd.nist.gov/vuln/detail/CVE-2024-37383

 


 

6. CVE-2024-3273

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. Affected is an unknown function of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument system leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259284. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.

https://nvd.nist.gov/vuln/detail/CVE-2024-3273

 


 

7. CVE-2024-21060

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Data Dictionary). Supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

https://nvd.nist.gov/vuln/detail/CVE-2024-21060

 


 

8. CVE-2024-23113

A use of externally-controlled format string in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, FortiPAM versions 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiSwitchManager versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.3 allows attacker to execute unauthorized code or commands via specially crafted packets.

https://nvd.nist.gov/vuln/detail/CVE-2024-23113

 


 

9. CVE-2024-4947

Type Confusion in V8 in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

https://nvd.nist.gov/vuln/detail/CVE-2024-4947

 


 

10. CVE-2023-1314

A vulnerability has been discovered in cloudflared’s installer (<= 2023.3.0) for Windows 32-bits devices that allows a local attacker with no administrative permissions to escalate their privileges on the affected device. This vulnerability exists because the MSI installer used by cloudflared relied on a world-writable directory. An attacker with local access to the device (without Administrator rights) can use symbolic links to trick the MSI installer into deleting files in locations that the attacker would otherwise have no access to. By creating a symlink from the world-writable directory to the target file, the attacker can manipulate the MSI installer's repair functionality to delete the target file during the repair process. Exploitation of this vulnerability could allow an attacker to delete important system files or replace them with malicious files, potentially leading to the affected device being compromised. The cloudflared client itself is not affected by this vulnerability, only the installer for 32-bit Windows devices.

https://nvd.nist.gov/vuln/detail/CVE-2023-1314

 


"OSINT
Opinion, OSINT, Tips

OSINT Terminology Basics

To kick off our OSINT series, here’s a guide to key terms in open-source intelligence, organised into categories. These will lay the foundation for understanding OSINT’s role in gathering insights:

Types of Intelligence

  • Open-Source Intelligence (OSINT): Intelligence gathered from publicly accessible sources, including online and offline materials. OSINT is essential in cybersecurity, threat intelligence, and digital investigations.
  • SOCMINT (Social Media Intelligence): Intelligence derived from social media, analysing public posts, trends, and interactions. SOCMINT provides real-time insights but requires careful handling of privacy and ethical considerations.
  • HUMINT (Human Intelligence): Information collected through direct human interaction, such as interviews, surveys, or conversations. HUMINT is often used alongside OSINT to validate findings.
  • TECHINT (Technical Intelligence): Intelligence from analysing technical data, like system specifications, software tools, and network structures. It’s valuable for understanding technical aspects of targets or threats.

Layers of the Internet

  • Surface Web: The portion of the internet accessible through standard search engines (e.g., Google), including publicly available websites, blogs, and social media—about 5-10% of online content.
  • Deep Web: Content not indexed by search engines, such as academic databases, private files, and subscription-based resources. Unlike the Dark Web, it’s mostly used for legitimate purposes.
  • Dark Web: A hidden layer of the internet accessible only through specialised software (e.g., Tor). Known for its anonymity, it hosts both legal and illegal activities.

Data and Information Gathering Techniques

  • Footprinting: The initial OSINT phase, where information is gathered to understand a target’s structure, such as network details, employee information, and online presence.
  • Data Scraping: Extracting large volumes of data from websites or online sources for analysis and intelligence purposes.
  • Social Engineering: Manipulating individuals to divulge confidential information by exploiting psychological tactics rather than technical hacking.

Technical Aspects and Tools

  • Metadata: Data that provides information about other data. In OSINT, metadata can reveal details such as the author of a document, creation date, and location.
  • Geolocation: Determining a device or individual’s physical location based on data such as IP addresses, GPS, or social media posts.
  • API (Application Programming Interface): A set of rules enabling different software to communicate. APIs are often used in OSINT to retrieve data from various platforms.
  • Encryption: The method of encoding information to prevent unauthorised access. It’s a crucial tool for protecting sensitive data in OSINT operations.

Cybersecurity and Threat Analysis

  • Threat Intelligence: Information about threats and threat actors, helping organisations prepare for potential cyberattacks.
  • Attribution: Identifying the source of a cyberattack or malicious activity, often using OSINT techniques to trace back to the origin.
  • Vulnerability Assessment: Evaluating a system for security weaknesses that could be exploited by threat actors, with OSINT uncovering publicly available information about potential vulnerabilities.
  • Digital Footprint: The trail of data left behind while using the internet, including sites visited, emails sent, and online information submitted.

Also, don’t miss this post on the basics of OSINT.

Photos by Thomas Jensen Stellan Johansson Gregoire Jeanneau on Unsplash

"SOS
Opinion, OSINT, Tips

What is OSINT? Building Blocks for Cyber Intelligence

In today’s digital landscape, Open Source Intelligence (OSINT) has become a foundational element for organisations seeking to make informed, proactive decisions. OSINT involves gathering and analysing publicly accessible information to derive actionable insights, making it a unique form of intelligence distinct from classified or internal sources. Unlike traditional intelligence methods, OSINT draws from readily available data, ranging from social media posts to industry reports, which can be ethically accessed without breaching privacy or security.

OSINT is particularly valuable in fields like cybersecurity, business intelligence, and investigations, where it aids in uncovering security threats, understanding market dynamics, and detecting fraudulent activities. This blog post explores the building blocks of OSINT, covering its importance, common applications, and essential steps for establishing an OSINT strategy. Whether you’re aiming to safeguard your business, monitor competitors, or protect your brand, OSINT provides the tools to navigate today’s complex digital environment with confidence.

Overview of OSINT

What is OSINT?

Open Source Intelligence (OSINT) refers to the process of collecting, analysing, and interpreting data from publicly available sources. Unlike classified or restricted intelligence, OSINT uses information that is accessible to anyone, without requiring special permissions or technical interventions. OSINT sources are vast and varied, ranging from social media platforms, news articles, and public records to academic publications, blogs, and governmental websites.

OSINT is sometimes misunderstood as a lesser or lower-value form of intelligence, yet its importance in today’s digital landscape cannot be overstated. What sets OSINT apart is the fact that it can produce highly actionable insights without requiring direct access to an organisation’s internal data or network. This makes it both valuable and accessible, allowing analysts to monitor, investigate, and forecast trends that can impact cybersecurity, business decisions, and other key areas.

To understand OSINT’s position within the broader intelligence spectrum, it helps to consider some related forms of intelligence. Human Intelligence (HUMINT), for example, refers to information gathered through interpersonal contact, such as interviews or undercover operations. Signals Intelligence (SIGINT) involves data captured from intercepted communications or electronic signals, typically through advanced surveillance techniques. In contrast, OSINT operates in a more transparent and often ethical framework, sourcing information that is freely available or within legal rights to access. This distinction is particularly important in today’s environment, where privacy laws and regulations strictly govern data collection.

Importance of OSINT in Cybersecurity and Business

OSINT has proven to be indispensable for organisations and individuals working across various fields. Here’s how OSINT stands out in three critical areas:

  1. Cybersecurity
    In cybersecurity, OSINT plays a vital role in helping analysts detect threats, assess risks, and proactively defend against potential attacks. By analysing open sources, cybersecurity professionals can monitor forums, websites, and social media for indicators of cyber threats. For instance, OSINT can identify when sensitive information about an organisation—such as an upcoming product launch or potential security vulnerability—has been publicly disclosed, giving cybersecurity teams time to address potential weaknesses.
    Additionally, OSINT enables threat intelligence teams to track activities in hacker forums, the Dark Web, and other platforms where cybercriminals discuss tactics, exploits, and targets. This enables a better understanding of threat actors, their methods, and their motivations, equipping security teams with insights that can guide response strategies. Many OSINT tools help detect phishing campaigns, exposed databases, or mentions of compromised assets, allowing cybersecurity teams to act pre-emptively to secure their networks.
  2. Business Intelligence
    OSINT’s capabilities extend beyond cybersecurity into business intelligence (BI), where it is a valuable resource for market research, competitive analysis, and trend monitoring. For example, a company looking to expand into a new market can leverage OSINT to assess competitor strategies, identify emerging trends, and understand consumer sentiment. The data collected might include competitor financial reports, social media mentions, customer reviews, and even demographic information from public records.
    OSINT also allows businesses to track shifts in regulatory policies, economic changes, and geopolitical events that could affect their operations. This type of external intelligence can help organisations adapt to market conditions, making OSINT an indispensable component of informed business strategy. Moreover, OSINT in BI can improve decision-making processes, equipping leaders with real-time insights that guide everything from product development to pricing adjustments.
  3. Investigations
    Another powerful application of OSINT is within investigations, where it supports both law enforcement and private organisations in uncovering fraud, verifying identities, and tracking illicit activities. OSINT tools can pull information from court records, social media, business filings, and other open sources to create a comprehensive profile of individuals or organisations under investigation.
    OSINT is particularly useful for detecting and preventing fraud, as it allows investigators to verify information against multiple data points. For example, inconsistencies between an individual’s social media presence and official records can flag potential fraudulent activity. In financial investigations, OSINT can help identify suspicious connections or patterns, supporting anti-money laundering efforts, forensic accounting, and other areas where cross-verifying public information is essential.

Ethical and Legal Considerations

One of OSINT’s defining features is that it operates within a largely ethical and legal framework. However, even though OSINT does not require the permissions or secrecy associated with other intelligence disciplines, it is crucial to adhere to data privacy regulations, particularly in countries with stringent data protection laws like the United Kingdom under GDPR. Ethical OSINT practices respect data privacy and focus on information that is intended for public view or has been legally obtained through open channels.

Practitioners should be mindful of the potential for unintended harm if OSINT is misused or mishandled. This could include exposing sensitive data that, while publicly accessible, might still be considered private or proprietary. Responsible OSINT practice emphasises transparency, accountability, and a commitment to ethical guidelines that safeguard individual rights and organisational integrity.

Why OSINT is Essential for Modern Intelligence Gathering

The growing reliance on digital information, combined with the complex landscape of cyber threats, makes OSINT essential for intelligence gathering today. From multinational corporations to individual cybersecurity researchers, organisations and individuals are increasingly using OSINT to gain insights that were once difficult or costly to obtain. Whether monitoring real-time cyber threats, assessing competitors, or supporting investigations, OSINT serves as a powerful tool for navigating an interconnected, information-rich world.

Through OSINT, organisations can not only enhance their intelligence capabilities but also adopt a proactive stance, making well-informed decisions that protect their interests and mitigate risks. In this sense, OSINT is not just a supplement to other forms of intelligence but a cornerstone of modern cyber and business intelligence strategies.

Common Applications of OSINT

Security Threat Analysis

One of OSINT’s most critical applications is in security threat analysis, where it helps organisations identify potential vulnerabilities, monitor emerging threats, and respond proactively to protect systems and data. Through OSINT, security teams can gather and analyse data from various open sources, including social media platforms, Dark Web forums, and industry reports, to assess potential threats to their organisation.

For example, companies might monitor hacker forums or Dark Web marketplaces where cybercriminals discuss stolen credentials or upcoming attacks. This allows security analysts to stay ahead of possible risks by identifying any mentions of their organisation or industry. Additionally, OSINT tools can track discussions about newly discovered software vulnerabilities, giving IT teams an opportunity to patch systems before those vulnerabilities are exploited in attacks. This preemptive insight is particularly valuable in today’s threat landscape, where new cyber threats emerge daily, and being reactive is often too late.

pwn Report tool SOS Intelligence

Through a structured OSINT approach to security threat analysis, organisations can track digital risk indicators, such as mentions of their IP addresses, confidential data leaks, or specific attack patterns associated with ransomware or phishing campaigns. This allows for a comprehensive understanding of the threat environment, which is essential to a proactive security posture.

Competitor Research

In business, competitor research is essential for making informed strategic decisions, and OSINT offers companies a powerful tool for understanding competitor behaviour, market trends, and customer preferences. With access to publicly available data, organisations can gain insights into competitors’ strategies without direct interaction or risk of breach. OSINT enables companies to evaluate competitors’ online presence, pricing strategies, product launches, and customer sentiment.

For instance, companies often use OSINT to monitor social media channels and online reviews to see how customers perceive competing products or services. This real-time feedback can reveal strengths and weaknesses in competitors’ offerings, providing valuable input for refining a company’s own products or services. In addition, OSINT enables companies to track news reports, public filings, and press releases to assess financial performance, expansion plans, and marketing strategies.

By employing OSINT for competitor analysis, companies can identify shifts in the market and emerging trends, which can be instrumental in maintaining a competitive edge. Additionally, competitor research through OSINT can support decisions regarding entry into new markets, launching new products, or adjusting pricing structures based on competitor activity.

Fraud Detection and Prevention

Another major application of OSINT is in fraud detection and prevention, where it plays a crucial role in helping organisations identify and mitigate fraudulent activities. From banking and finance to e-commerce and insurance, OSINT enables companies to verify identities, cross-check claims, and detect suspicious behaviour by collecting and analysing open-source information.

For instance, insurance companies often rely on OSINT to detect fraud by verifying information on social media platforms. If someone has filed an injury claim, for example, OSINT tools can help investigators verify whether the claimant’s online activity aligns with the claim. This helps to validate legitimate claims and identify potentially fraudulent ones, saving companies from substantial financial losses.

In the finance sector, OSINT can also be used to monitor and analyse customer transactions to identify anomalies or patterns that could suggest money laundering or other illicit activities. OSINT enables financial institutions to cross-reference public records, watchlists, and other data sources to assess the risk profile of new clients, thereby helping to ensure compliance with regulations and prevent financial crime.

Brand Protection

OSINT is increasingly being used to protect brands and maintain the integrity of corporate identities. Brand protection involves monitoring digital platforms, social media, and other online channels for threats to a company’s reputation or intellectual property. With the rise of impersonation scams, fake accounts, and counterfeit products, brand protection has become a priority for companies in a variety of industries.

One common example of OSINT in brand protection is the monitoring of social media and e-commerce sites to detect fake accounts or fraudulent listings. Cybercriminals often impersonate reputable brands to deceive customers or distribute counterfeit products. By using OSINT to detect these threats early, companies can take swift action to report or remove harmful content and protect their brand image.

Another important aspect of brand protection is monitoring for data leaks or unauthorised disclosures of proprietary information. For example, a company may use OSINT tools to scan code repositories, file-sharing platforms, and paste sites for any mentions of their proprietary data or internal documents. Early detection of these issues through OSINT allows companies to quickly mitigate potential damage to their reputation or intellectual property.

Incident Response and Investigations

In both corporate and law enforcement settings, OSINT is a valuable tool for incident response and investigations. When a security incident occurs, OSINT can provide critical context and support in understanding the scope and impact of the event. For example, if a company experiences a data breach, OSINT can be used to investigate whether any leaked information has surfaced on public sites, hacker forums, or the Dark Web.

Beyond corporate incident response, OSINT is widely used in law enforcement and investigative work to gather information on suspects, verify alibis, and track connections between individuals or entities. By leveraging OSINT sources, investigators can identify public records, social media profiles, business filings, and more, which can help corroborate or refute information during an investigation.

In the context of financial crime, OSINT can assist in tracking suspicious financial flows and identifying links between suspected individuals and entities. This use of OSINT enables investigators to uncover patterns and piece together evidence that can support legal proceedings.

Getting Started with an OSINT Strategy

Establishing Clear Research Goals

The first step in developing an effective OSINT strategy is defining your research goals. OSINT can provide a wealth of information, but without clear objectives, the sheer volume of available data can lead to overwhelm and a lack of focus. A strong OSINT strategy begins with identifying specific goals and determining what you aim to accomplish. Are you looking to understand competitor activity, identify potential security threats, monitor brand reputation, or verify information in an investigation?

Once you’ve defined your primary goals, consider breaking them down into smaller, manageable objectives. For example, if your overarching goal is to monitor potential security threats, a series of actionable objectives might include tracking mentions of your company on Dark Web forums, identifying new vulnerabilities in software you use, or monitoring social media for phishing attempts. Establishing these objectives will help you determine which sources and types of information are most relevant, making it easier to focus your OSINT efforts and avoid information overload.

Selecting the Right Tools

With the rise of OSINT’s importance, a variety of tools have emerged to support data collection, monitoring, and analysis. Choosing the right tools depends on your goals and the type of information you need to gather. OSINT tools can range from social media monitoring software, like Hootsuite or TweetDeck, to more specialised threat intelligence platforms, such as Maltego or SpiderFoot, which enable deeper exploration of relationships between data points.

OSINT TOOLS

It’s also useful to incorporate tools for monitoring the Dark Web if your objectives include threat detection or fraud prevention. Dark Web monitoring tools, such as DarkOwl or Cybersixgill, can help detect mentions of your company, products, or key personnel in hidden or criminal forums. Additionally, URL scanning and domain monitoring tools like VirusTotal and DomainTools can support OSINT efforts by flagging suspicious domains or phishing attempts.

While tools are an essential component of any OSINT strategy, relying solely on them without an understanding of the data landscape can result in gaps in your intelligence. A well-rounded strategy should include a mix of automated tools and manual analysis, allowing analysts to validate data and adapt to emerging trends in real time.

Implementing Security Precautions

OSINT requires collecting information from a range of public sources, and while it doesn’t involve accessing private or classified information, it’s essential to follow basic security precautions to protect your systems and data. Many OSINT activities can involve exploring forums, hacker marketplaces, and even the Dark Web, where malicious actors might try to track who is gathering information about them. Therefore, using a virtual private network (VPN) and employing isolated environments, such as virtual machines, can help safeguard your network while conducting OSINT research.

Additionally, securing the OSINT tools themselves is critical. Many OSINT platforms have extensive permissions to scan web pages, search domains, and monitor social channels. Ensure that each tool in your OSINT toolkit adheres to strict data security practices, including encryption, access control, and regular software updates. Avoid using personal accounts for OSINT purposes and consider creating separate, dedicated profiles or aliases for research.

When collecting sensitive or potentially high-risk data, it’s also essential to maintain a secure repository with limited access. This will protect against accidental exposure and ensure that any sensitive findings remain contained within your organisation. Security isn’t only about the tools you use, but also about your processes and vigilance in protecting your digital footprint during OSINT activities.

Documenting Findings and Maintaining Data Integrity

An often-overlooked element of an OSINT strategy is documentation. Keeping accurate, detailed records of your research process, findings, and sources is essential for transparency and accountability, as well as for future reference. Clear documentation helps ensure that findings can be traced back to their sources, which is crucial in cases where findings may need to be verified or presented as evidence.

Organising findings consistently from the outset can streamline OSINT operations and prevent information from becoming lost or misinterpreted. Documentation should include details like the date, time, and location of data collection, specific URLs, and any relevant metadata. Using structured formats like spreadsheets or dedicated OSINT software with documentation features can make this process easier.

It’s also essential to maintain data integrity by verifying information from multiple sources. OSINT often involves cross-referencing and validating findings to ensure accuracy. By triangulating data from several open sources, analysts can reduce the risk of basing insights on incorrect or outdated information. This is particularly important for cybersecurity or investigative OSINT, where the consequences of acting on inaccurate information can be significant.

Following Data Ethics and Compliance Guidelines

An essential component of any OSINT strategy is a strong commitment to data ethics. While OSINT relies on publicly available information, the act of gathering, storing, and analysing this data must comply with data protection regulations and ethical guidelines. In the UK and Europe, the General Data Protection Regulation (GDPR) sets out strict requirements regarding data collection and privacy. Ensuring compliance with GDPR or other regional regulations is crucial to prevent legal liabilities.

Ethical OSINT practice means respecting individual privacy and avoiding unauthorised intrusion. Organisations should set boundaries around the type of information collected, especially when it involves sensitive or potentially intrusive data. For example, while gathering social media data for sentiment analysis is a legitimate OSINT activity, monitoring private individuals without their knowledge or consent could cross ethical lines, even if the information is technically public.

Establishing a code of conduct or policy for OSINT activities helps guide analysts in making ethical decisions. This includes setting clear boundaries on what sources can be used, documenting consent where required, and conducting regular audits to ensure that OSINT practices align with ethical standards and legal obligations.

Conclusion

In today’s digital-first landscape, OSINT has become a cornerstone of effective cyber intelligence, empowering organisations to make informed decisions, stay ahead of emerging threats, and uncover critical insights across sectors. By understanding OSINT’s definition, recognising its broad applications, and adopting a structured approach to its use, organisations can significantly enhance their security posture, competitive edge, and investigative capabilities.

Implementing an OSINT strategy requires thoughtful planning, from setting clear research goals to employing the right tools and taking essential security precautions. Equally important is a commitment to ethical practices and thorough documentation to ensure that the insights gained are accurate, compliant, and actionable.

As the volume of publicly available information continues to grow, organisations that leverage OSINT effectively will be better positioned to protect their assets, anticipate risks, and harness data-driven insights. A well-implemented OSINT strategy is not just a tool for today but an investment in resilience and preparedness for the future.

Photos by Paul Green Sam Clarke on Unsplash

"Open
Opinion, OSINT, Tips

OSINT Infographic – tips for successful online research

Open source intelligence (OSINT) is the collection and analysis of data gathered from open sources (overt sources and publicly available information) to produce actionable intelligence. Over the course of November we have a wealth of information and content for you on this very important subject…

Starting with this infographic showing tips for successful online research:

The infographic is also available as a PDF download here.

What other posts have we written that you will find useful?

Why cybersecurity matters for everyone – Cybersecurity Awareness Month

Creating a cybersecurity culture in your SME

10 Cybersecurity Best Practices Every SME Should Implement

Top 5 Cyber Threats Every SME Should Be Aware Of

Inside a Cyber Attack – Key Phases and Business Impact

Cybersecurity 101: What Every SME Needs to Know

Photo by Clemens van Lay on Unsplash

"SOS
CVE Top 10

The SOS Intelligence CVE Chatter Weekly Top Ten – 04 November 2024

 

This weekly blog post is from via our unique intelligence collection pipelines. We are your eyes and ears online, including the Dark Web.

There are thousands of vulnerability discussions each week. SOS Intelligence gathers a list of the most discussed Common Vulnerabilities and Exposures (CVE) online for the previous week.

We make every effort to ensure the accuracy of the data presented. As this is an automated process some errors may creep in.

If you are feeling generous please do make us aware of anything you spot, feel free to follow us on Twitter @sosintel and DM us. Thank you!

 


 

1.  CVE-2024-9680

An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, Firefox ESR < 115.16.1, Thunderbird < 131.0.1, Thunderbird < 128.3.1, and Thunderbird < 115.16.0.

https://nvd.nist.gov/vuln/detail/CVE-2024-9680

 


 

2. CVE-2018-17144

Bitcoin Core 0.14.x before 0.14.3, 0.15.x before 0.15.2, and 0.16.x before 0.16.3 and Bitcoin Knots 0.14.x through 0.16.x before 0.16.3 allow a remote denial of service (application crash) exploitable by miners via duplicate input. An attacker can make bitcoind or Bitcoin-Qt crash.

https://nvd.nist.gov/vuln/detail/CVE-2018-17144

 


 

3. CVE-2024-5630

The Insert or Embed Articulate Content into WordPress plugin before 4.3000000024 does not prevent authors from uploading arbitrary files to the site, which may allow them to upload PHP shells on affected sites.

https://nvd.nist.gov/vuln/detail/CVE-2024-5630

 


 

4. CVE-2024-23113

A use of externally-controlled format string in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, FortiPAM versions 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiSwitchManager versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.3 allows attacker to execute unauthorized code or commands via specially crafted packets.

https://nvd.nist.gov/vuln/detail/CVE-2024-23113

 


 

5. CVE-2024-9264

The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana’s $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.

https://nvd.nist.gov/vuln/detail/CVE-2024-9264

 


 

6. CVE-2024-45409

The Ruby SAML library is for implementing the client side of a SAML authorization. Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response. An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within the vulnerable system. This vulnerability is fixed in 1.17.0 and 1.12.3.

https://nvd.nist.gov/vuln/detail/CVE-2024-45409

 


 

7. CVE-2021-21974

OpenSLP as used in ESXi (7.0 before ESXi70U1c-17325551, 6.7 before ESXi670-202102401-SG, 6.5 before ESXi650-202102101-SG) has a heap-overflow vulnerability. A malicious actor residing within the same network segment as ESXi who has access to port 427 may be able to trigger the heap-overflow issue in OpenSLP service resulting in remote code execution.

https://nvd.nist.gov/vuln/detail/CVE-2021-21974

 


 

8. CVE-2024-21060

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Data Dictionary). Supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

https://nvd.nist.gov/vuln/detail/CVE-2024-21060

 


 

9. CVE-2023-21716

Microsoft Word Remote Code Execution Vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2023-21716

 


 

10. CVE-2024-21302

Summary:
Microsoft was notified that an elevation of privilege vulnerability exists in Windows based systems supporting Virtualization Based Security (VBS), including a subset of Azure Virtual Machine SKUS. This vulnerability enables an attacker with administrator privileges to replace current versions of Windows system files with outdated versions. By exploiting this vulnerability, an attacker could reintroduce previously mitigated vulnerabilities, circumvent some features of VBS, and exfiltrate data protected by VBS.
Microsoft is developing a security update to mitigate this threat, but it is not yet available. Guidance to help customers reduce the risks associated with this vulnerability and to protect their systems until the mitigation is available in a Windows security update is provided in the Recommended Actions section of this CVE.
This CVE will be updated when the mitigation is available in a Windows security update. We highly encourage customers to subscribe to Security Update Guide notifications to receive an alert when this update occurs.
Update: August 13, 2024
Microsoft has released the August 2024 security updates that include an opt-in revocation policy mitigation to address this vulnerability. Customers running affected versions of Windows are encouraged to review KB5042562: Guidance for blocking rollback of virtualization-based security related updates to assess if this opt-in policy meets the needs of their environment before implementing this mitigation. There are risks associated with this mitigation that should be understood prior to applying it to your systems. Detailed information about these risks is also available in KB5042562.
Details:
A security researcher informed Microsoft of an elevation of privilege vulnerability in Windows 10, Windows 11, Windows Server 2016, and higher based systems including Azure Virtual Machines (VM) that support VBS. For more information on Windows versions and VM SKUs supporting VBS, reference: Virtualization-based Security (VBS) | Microsoft Learn.
The vulnerability enables an attacker with administrator privileges on the target system to replace current Windows system files with outdated versions. Successful exploitation provides an attacker with the ability to reintroduce previously mitigated vulnerabilities, circumvent VBS security features, and exfiltrate data protected by VBS.
Microsoft is developing a security… See more at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21302

https://nvd.nist.gov/vuln/detail/CVE-2024-21302

 


"SOS
CVE Top 10

The SOS Intelligence CVE Chatter Weekly Top Ten – 28 October 2024

 

This weekly blog post is from via our unique intelligence collection pipelines. We are your eyes and ears online, including the Dark Web.

There are thousands of vulnerability discussions each week. SOS Intelligence gathers a list of the most discussed Common Vulnerabilities and Exposures (CVE) online for the previous week.

We make every effort to ensure the accuracy of the data presented. As this is an automated process some errors may creep in.

If you are feeling generous please do make us aware of anything you spot, feel free to follow us on Twitter @sosintel and DM us. Thank you!

 


 

1.  CVE-2018-17144

Bitcoin Core 0.14.x before 0.14.3, 0.15.x before 0.15.2, and 0.16.x before 0.16.3 and Bitcoin Knots 0.14.x through 0.16.x before 0.16.3 allow a remote denial of service (application crash) exploitable by miners via duplicate input. An attacker can make bitcoind or Bitcoin-Qt crash.

https://nvd.nist.gov/vuln/detail/CVE-2018-17144

 


 

2. CVE-2022-22965

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.

https://nvd.nist.gov/vuln/detail/CVE-2022-22965

 


 

3. CVE-2018-2628

Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

https://nvd.nist.gov/vuln/detail/CVE-2018-2628

 


 

4. CVE-2021-42278

Active Directory Domain Services Elevation of Privilege Vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2021-42278

 


 

5. CVE-2024-23113

A use of externally-controlled format string in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, FortiPAM versions 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiSwitchManager versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.3 allows attacker to execute unauthorized code or commands via specially crafted packets.

https://nvd.nist.gov/vuln/detail/CVE-2024-23113

 


 

6. CVE-2024-38125

Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2024-38125

 


 

7. CVE-2022-22947

In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured. A remote attacker could make a maliciously crafted request that could allow arbitrary remote execution on the remote host.

https://nvd.nist.gov/vuln/detail/CVE-2022-22947

 


 

8. CVE-2024-38199

Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2024-38199

 


 

9. CVE-2024-38140

Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2024-38140

 


 

10. CVE-2024-7262

Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.16412 (exclusive) on Windows allows an attacker to load an arbitrary Windows library.
The vulnerability was found weaponized as a single-click exploit in the form of a deceptive spreadsheet document

https://nvd.nist.gov/vuln/detail/CVE-2024-7262

 


"SOS
Opinion, SME Cybersecurity, Tips

Proactive Digital Risk Monitoring: Stay Ahead of Emerging Threats

In today’s hyperconnected digital landscape, businesses and individuals are facing an unprecedented level of cyber threats. From data breaches to ransomware attacks, cybercriminals are constantly evolving their tactics, targeting vulnerabilities, and exploiting weak spots in both personal and organisational security. As the threat landscape becomes more complex, it is no longer sufficient to simply react to attacks after they occur. Instead, proactive digital risk monitoring has become essential for staying ahead of emerging threats and safeguarding valuable assets.

This blog explores the importance of proactive digital risk monitoring, the key components of an effective monitoring strategy, and how businesses and individuals can benefit from taking a proactive approach to their digital security.

Top 5 Cyber Threats Every SME Should Be Aware Of

The Growing Importance of Digital Risk

Digital risk refers to the potential for cyber threats to compromise the security, privacy, and operational integrity of businesses and individuals. This encompasses a broad range of risks, including data breaches, identity theft, cyberattacks, financial fraud, and reputational damage. As digital transformation continues to reshape industries and personal lives, the attack surface for cybercriminals expands, creating more opportunities for exploitation.

Traditional security measures, such as firewalls, antivirus software, and encryption, provide important layers of defence. However, they are often reactive, meaning they address threats only after they have already occurred. In contrast, digital risk monitoring is a proactive approach that involves continuously scanning and assessing digital environments for potential risks. By identifying threats before they have a chance to cause harm, organisations and individuals can stay one step ahead of attackers and avoid costly disruptions.

Why Proactive Digital Risk Monitoring Matters

The rapid evolution of cyber threats means that waiting for an attack to happen before responding is no longer a viable strategy. Cybercriminals are increasingly sophisticated, employing tactics such as phishing, social engineering, ransomware, and malware to bypass traditional defences. Furthermore, threats can emerge from a wide range of sources, including insider attacks, third-party vulnerabilities, and new zero-day exploits.

Proactive digital risk monitoring helps mitigate these risks by continuously monitoring for signs of suspicious activity, vulnerabilities, and emerging attack vectors. This allows businesses and individuals to detect threats early and take swift action to prevent damage.

For individuals, the consequences of a cyberattack can be devastating, with personal data, financial information, and even social media accounts becoming prime targets for exploitation. Proactive monitoring tools offer early warnings about potential security breaches, allowing individuals to protect their personal information before it’s too late. These tools can also help users monitor personal devices for malware or unauthorised access, ensuring that cybercriminals are detected before they can steal data or cause disruptions.

For businesses, the stakes are even higher. A single data breach can result in significant financial losses, damage to brand reputation, and legal penalties under data protection laws such as the General Data Protection Regulation (GDPR) or the Data Protection Act. Proactive digital risk monitoring not only helps businesses reduce the likelihood of such breaches but also enables them to fulfil their compliance obligations by showing they took preemptive measures to protect sensitive data. In highly regulated industries like healthcare and finance, such an approach is essential.

Core Components of Digital Risk Monitoring

Digital risk monitoring involves a combination of tools, technologies, and processes designed to provide a comprehensive overview of potential threats. Here are some of the key components:

1. Threat Intelligence

Threat intelligence involves gathering and analysing data about potential and current threats, helping organisations and individuals stay informed about the tactics, techniques, and procedures used by cybercriminals. This information is collected from various sources, including open-source intelligence (OSINT), proprietary databases, and the dark web.

The insights gained from threat intelligence enable more informed decision-making, helping to prioritise risks and allocate resources to address the most pressing threats. By monitoring real-time intelligence, organisations can identify emerging vulnerabilities and take preemptive measures to close security gaps before they are exploited.

Threat intelligence is especially valuable for spotting trends in cybercrime. As attacks such as ransomware continue to rise, having real-time data about threat actors’ methodologies can be the difference between successfully defending against an attack or becoming a victim. The ability to track ransomware groups, phishing campaigns, or distributed denial-of-service (DDoS) activities empowers security teams to preemptively bolster defences where needed.

2. Dark Web Monitoring

The dark web is a hidden part of the internet where cybercriminals trade stolen data, malware, and hacking tools. Monitoring this space is critical for detecting potential data breaches or threats before they escalate. Dark web monitoring tools scan underground marketplaces, forums, and chat rooms for signs that sensitive information, such as usernames, passwords, or personal data, has been compromised.

By identifying these early warning signs, businesses can take swift action to secure accounts, notify affected individuals, and prevent further damage. Similarly, individuals can benefit from dark web monitoring by receiving alerts if their personal information is being traded or misused. Being aware that stolen credentials are being sold allows individuals to change passwords or enable multi-factor authentication (MFA) before any unauthorised access occurs.

SOS Intelligence Ransomware Statistics October 23

For organisations, dark web monitoring has become a key aspect of supply chain security as well. Compromised data related to third-party vendors or partners can be an early indicator of broader cybersecurity risks. Monitoring this space ensures that businesses can track the spread of any exposed credentials or intellectual property, giving them a head start on responding to potential supply chain breaches.

3. Vulnerability Scanning

Vulnerability scanning tools are designed to automatically assess systems, networks, and applications for security weaknesses that could be exploited by attackers. These tools identify unpatched software, misconfigurations, and other vulnerabilities that cybercriminals could use to gain unauthorised access to sensitive data.

Regular vulnerability scanning is essential for maintaining a strong security posture. It ensures that potential entry points for attackers are identified and addressed in a timely manner, reducing the risk of exploitation. In today’s environment, where remote workforces rely on cloud services and various digital platforms, the need for regular scanning is even greater, as businesses must secure a rapidly expanding range of access points.

For individuals, using vulnerability scanning tools on personal devices and home networks can help secure devices such as routers, IoT devices, and computers. With many individuals now using personal devices for work, ensuring these devices are free from vulnerabilities is crucial for both personal and professional security.

4. Brand Monitoring

Cybercriminals often impersonate legitimate companies in phishing attacks or fraudulent schemes. Brand monitoring tools help organisations track how their brand is being used online and detect instances of impersonation, domain squatting, or other unauthorised uses of their identity.

By proactively monitoring brand mentions on social media platforms, domain registrations, and other online sources, organisations can detect and respond to brand abuse before it damages their reputation or puts their customers at risk. For example, phishing emails often use look-alike domains to trick recipients into thinking the message is from a legitimate source. Detecting these fraudulent domains early allows businesses to take them down before any major damage is done.

Brand monitoring also helps businesses keep track of customer sentiment and potential security-related complaints. If customers are publicly mentioning phishing attacks that appear to come from a legitimate brand, the company can act swiftly to alert customers and work with platforms to block or remove the fraudulent content.

5. Incident Response

Even with proactive monitoring in place, incidents can still occur. That’s why having a well-defined incident response plan is critical. Digital risk monitoring tools often include incident response features that guide organisations and individuals through the steps needed to contain and mitigate the damage of a cyber incident.

Spot the Scam: Recognising Phishing and Social Engineering Tactics

Effective incident response requires rapid detection, investigation, and remediation of the threat. The faster an organisation or individual can respond to a threat, the less damage it is likely to cause. Digital risk monitoring tools often provide real-time alerts and actionable insights to help guide response efforts, making it easier to isolate compromised systems, remove malicious software, or notify affected parties.

Incident response also relies on strong communication protocols, ensuring that all stakeholders are informed of the situation and can respond accordingly. For businesses, this includes IT staff, legal teams, public relations teams, and any regulatory bodies that may need to be notified.

Benefits of Proactive Digital Risk Monitoring

Adopting a proactive digital risk monitoring strategy offers numerous benefits to both organisations and individuals. Let’s explore some of the most significant advantages:

1. Early Detection of Threats

One of the primary benefits of digital risk monitoring is the ability to detect and address threats early, before they can cause significant harm. By continuously monitoring for suspicious activity, organisations and individuals can respond quickly and mitigate the risk of data breaches, financial loss, and reputational damage.

2. Strengthened Security Posture

Regular vulnerability scanning and real-time threat intelligence help improve overall security posture. Proactive monitoring ensures that weaknesses are identified and addressed as soon as they emerge, reducing the risk of cyberattacks and improving resilience to potential threats.

3. Cost Savings

Responding to a cyberattack can be costly, especially if it involves legal fees, fines, and remediation efforts. Proactive digital risk monitoring can help reduce these costs by preventing attacks before they occur, minimising the need for expensive incident response measures and lowering the risk of fines associated with data breaches.

4. Enhanced Compliance

Many industries are subject to regulations that require organisations to monitor for potential threats and report breaches. Proactive digital risk monitoring helps organisations meet these compliance requirements by providing the tools necessary to detect and address risks in real time.

5. Peace of Mind

For individuals, proactive digital risk monitoring provides peace of mind. Knowing that their personal data, financial information, and online accounts are being monitored allows individuals to take quick action if a threat is detected, reducing the risk of identity theft or fraud.

Implementing a Proactive Digital Risk Monitoring Strategy

Implementing an effective digital risk monitoring strategy requires a combination of the right tools, processes, and expertise. Organisations should start by assessing their risk landscape and identifying the most critical assets they need to protect. From there, they can deploy the appropriate monitoring tools, such as threat intelligence platforms, vulnerability scanners, and dark web monitoring solutions.

For individuals, using personal security tools, such as password managers, dark web monitoring services, and antivirus software, can help secure personal information and detect potential threats.

Conclusion

In a world where cyber threats are constantly evolving, taking a reactive approach to digital security is no longer enough. Proactive digital risk monitoring offers individuals and organisations the ability to stay ahead of emerging threats, protect valuable assets, and avoid costly disruptions. By adopting a proactive strategy that includes threat intelligence, vulnerability scanning, dark web monitoring, and incident response, businesses and individuals can significantly reduce their risk exposure and safeguard their digital environments.

What we can do to help

At SOS Intelligence, we specialise in providing advanced cyber threat intelligence and digital risk monitoring solutions. We are trusted by many organisations and businesses who recognise the essential service we provide.

Our platform is designed to help businesses and organisations identify, analyse, and mitigate potential cyber threats before they cause harm. Using a combination of AI-driven tools and expert analysis, we monitor the deep and dark web, criminal forums, and other online sources to detect potential risks such as data breaches, leaked credentials, or emerging malware threats.

Our digital risk monitoring services give organisations real-time visibility into their cyber exposure, allowing them to proactively address vulnerabilities and stay ahead of adversaries. We provide actionable intelligence that helps to protect sensitive data, intellectual property, and brand reputation. Whether it’s identifying potential phishing attacks or discovering compromised accounts, our tools ensure that organisations can act swiftly to mitigate risks.

We also offer bespoke solutions tailored to specific business needs, enabling our clients to safeguard their digital assets effectively. With SOS Intelligence, you gain the confidence of knowing that your organisation is continuously protected in an ever-evolving digital landscape.

What now? May we suggest scheduling a demo here? So many of our customers say they wish they found us earlier. We look forward to meeting you.

Photo by 🔮🌊💜✨ on Unsplash

"SOS
CVE Top 10

The SOS Intelligence CVE Chatter Weekly Top Ten – 21 October 2024

 

This weekly blog post is from via our unique intelligence collection pipelines. We are your eyes and ears online, including the Dark Web.

There are thousands of vulnerability discussions each week. SOS Intelligence gathers a list of the most discussed Common Vulnerabilities and Exposures (CVE) online for the previous week.

We make every effort to ensure the accuracy of the data presented. As this is an automated process some errors may creep in.

If you are feeling generous please do make us aware of anything you spot, feel free to follow us on Twitter @sosintel and DM us. Thank you!

 


 

1.  CVE-2018-17144

Bitcoin Core 0.14.x before 0.14.3, 0.15.x before 0.15.2, and 0.16.x before 0.16.3 and Bitcoin Knots 0.14.x through 0.16.x before 0.16.3 allow a remote denial of service (application crash) exploitable by miners via duplicate input. An attacker can make bitcoind or Bitcoin-Qt crash.

https://nvd.nist.gov/vuln/detail/CVE-2018-17144

 


 

2. CVE-2021-42278

Active Directory Domain Services Elevation of Privilege Vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2021-42278

 


 

3. CVE-2018-2628

Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

https://nvd.nist.gov/vuln/detail/CVE-2018-2628

 


 

4. CVE-2022-22965

A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.

https://nvd.nist.gov/vuln/detail/CVE-2022-22965

 


 

5. CVE-2024-21060

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Data Dictionary). Supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

https://nvd.nist.gov/vuln/detail/CVE-2024-21060

 


 

6. CVE-2024-47176

CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.

https://nvd.nist.gov/vuln/detail/CVE-2024-47176

 


 

7. CVE-2024-9680

An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, Firefox ESR < 115.16.1, Thunderbird < 131.0.1, Thunderbird < 128.3.1, and Thunderbird < 115.16.0.

https://nvd.nist.gov/vuln/detail/CVE-2024-9680

 


 

8. CVE-2024-23113

A use of externally-controlled format string in Fortinet FortiOS versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13, FortiProxy versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14, FortiPAM versions 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiSwitchManager versions 7.2.0 through 7.2.3, 7.0.0 through 7.0.3 allows attacker to execute unauthorized code or commands via specially crafted packets.

https://nvd.nist.gov/vuln/detail/CVE-2024-23113

 


 

9. CVE-2024-45409

The Ruby SAML library is for implementing the client side of a SAML authorization. Ruby-SAML in <= 12.2 and 1.13.0 <= 1.16.0 does not properly verify the signature of the SAML Response. An unauthenticated attacker with access to any signed saml document (by the IdP) can thus forge a SAML Response/Assertion with arbitrary contents. This would allow the attacker to log in as arbitrary user within the vulnerable system. This vulnerability is fixed in 1.17.0 and 1.12.3.

https://nvd.nist.gov/vuln/detail/CVE-2024-45409

 


 

10. CVE-2023-21716

Microsoft Word Remote Code Execution Vulnerability

https://nvd.nist.gov/vuln/detail/CVE-2023-21716

 


1 2 3 22 23
Privacy Settings
We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
Youtube
Consent to display content from - Youtube
Vimeo
Consent to display content from - Vimeo
Google Maps
Consent to display content from - Google
Spotify
Consent to display content from - Spotify
Sound Cloud
Consent to display content from - Sound