url
stringlengths 56
184
| text
stringlengths 63
57.2k
| score
int64 0
0
| reasoning
stringclasses 1
value | model_name
stringclasses 1
value |
---|---|---|---|---|
https://www.ilink-digital.com/insights/tag/cybersecurity-in-telecom/ |
Etiam magna arcu, ullamcorper ut pulvinar et, ornare sit amet ligula. Aliquam vitae bibendum lorem. Cras id dui lectus. Pellentesque nec felis tristique urna lacinia sollicitudin ac ac ex. Maecenas mattis faucibus condimentum. Curabitur imperdiet felis at est posuere bibendum. Sed quis nulla tellus.
ADDRESS
63739 street lorem ipsum City, Country
PHONE
+12 (0) 345 678 9
EMAIL
[email protected]
| 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.cybersecuritydive.com/news/veeam-exploit-critical-infrastructure/691390/ |
Dive Brief:
A critical infrastructure organization in the U.S. was attacked by the Cuba ransomware group via a months-old vulnerability in Veeam, according to BlackBerry research.
The prolific ransomware group “deployed a set of malicious tools that overlapped with previous campaigns associated with this attacker, as well as introducing new ones, including the first observed use of an exploit for the Veeam vulnerability CVE-2023-27532,” BlackBerry said in Thursday blog post.
The vulnerability, which affects Veeam Backup & Replication software, allows an attacker to potentially access credentials stored in the configuration file on victim devices.
Dive Insight:
The Cuba ransomware group, which has no known connection to the Republic of Cuba, had compromised more than 100 organizations globally and demanded more than $145 million in ransom by late 2022, according to a joint advisory issued by the FBI and the Cybersecurity and Infrastructure Security Agency.
The threat actor also attacked an IT integrator in Latin America in June, underscoring the threat actor’s persistent targeting of critical infrastructure organizations globally.
The financially-motivated group’s most recent campaign targeted organizations in the U.S., Mexico, Guatemala, Honduras, El Salvador, the Dominican Republic, Costa Rica, Panama, Colombia, Ecuador and Chile, according to BlackBerry.
“Our investigation indicates that the Cuba threat group continues to target entities in crucial sectors such as critical infrastructure,” BlackBerry said.
The ransomware group was first discovered in late 2019 and had received $60 million in ransom payments by late 2022, according to CISA.
| 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.nextgov.com/cybersecurity/2023/03/report-increased-remote-work-many-governments-also-raises-cyber-risks/383863/?oref=ng-next-story |
With governments around the world increasingly turning to a hybrid work environment, personnel are simultaneously becoming less prepared to deal with new cyber risks and vulnerabilities that threaten the virtual office, according to the findings of a government cybersecurity survey released by IT company Ivanti on Thursday.According to the report—which surveyed over 800 government employees in the U.S., Australia, France, Germany, Netherlands and United Kingdom —70% of respondents said that they worked virtually “at least some of the time,” with 8% of U.S. workers surveyed reporting that they were fully virtual and another 19% reporting that they were mostly virtual. Given the increase in virtual and hybrid work, government employees’ increasing reliance on out-of-office technologies presents new challenges when it comes to cyber resilience. “The proliferation of devices, users and locations adds complexity and new vulnerabilities for government security teams to tackle—while also combatting increasingly sophisticated threat actors,” the report said.The report warned that employee disengagement and a lack of personal accountability when it comes to securing devices “compromises government cybersecurity,” with 34% of government workers surveyed believing that “their actions don’t matter when it comes to security.” U.S. government workers were less likely than their counterparts in other countries to hold these views, according to the survey, with just 19% of U.S. respondents saying that their actions did not impact their organization’s ability to stay safe from cyberattacks. Comparatively, 53% of government employees surveyed in Germany held similar views, as well as 44% of government workers in France. Poor cyber hygiene practices were also identified in the report, particularly when it came to government workers being required to update their passwords on a consistent basis. 40% of global respondents said they used the same work password for over a year; in the U.S., 32% of surveyed employees said they used the same work login information for more than 365 days. The use of the same or similar passwords across both personal and work devices was also identified as a risk, with 34% of global respondents saying they used the same or variations of similar passwords across multiple systems. The survey also found a lack of disclosure regarding cyber threats, with 30% of total respondents reporting that they were the target of phishing, but that 36% “did not report a phishing email they received at work.” Approximately 5% of total respondents reported that they were the victim of a phishing attempt. And despite the belief that younger employees are more tech savvy than their older counterparts, the report found that Gen Z and Millennial government workers “are more than twice as likely to reuse passwords between home and use the same password across multiple devices and logins.” Srinivas Mukkamala, Ivanti’s chief product officer, warned that “we are in a state of urgency when it comes to securing critical infrastructure, along with public sector employees and the extremely sensitive data they have access to.” “Government leaders around the world have recognized this urgency and are taking steps to combat ransomware, misinformation and to protect their critical assets and infrastructure,” he added. “If we don't focus on cybersecurity as a team effort and provide proactive security measures that enable a better employee experience, security teams and governments will continue to face an uphill battle.”
| 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.itworldcanada.com/article/cyber-security-today-week-in-review-for-nov-6-2020/437982 | Welcome to Cyber Security Today. This is the Week In Review edition for Friday November 6th. I’m Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com. To hear the podcast click on the arrow below:\n\n\nWith me this week to analyze the top news story is Terry Cutler, CEO of Cyology Labs, a Montreal-based cybersecurity consulting service.\xc2\xa0We’ll talk in a few minutes, but first a look back at the week’s headlines:\nSmartphone users should be careful if they get a text message about an unexpected package delivery. A cybercriminal has recently been sending out messages primarily to Americans saying, \xe2\x80\x9cYour parcel has been sent out. Please check and accept it.\xe2\x80\x9d Click on the included link and you get hit with malware or a page where you are asked to fill in your phone’s password. Remember, think carefully before clicking on links in texts and emails from unknown senders.\nThe operator of the Maze ransomware web site says the gang is calling it quits. Maze pioneered the double-squeeze strategy of stealing data and threatening to publicly release it as well as encrypting data to blackmail victim organizations. But suddenly a press release on their site appeared in broken English saying the Maze Team Project is \xe2\x80\x9cofficially closed.\xe2\x80\x9d\nMeanwhile ransomware attacks continue. Among the latest victims are Montreal’s Jewish General Hospital. Saskatchewan Polytechnic, a college in Western Canada, is fighting a cyberattack that reportedly is ransomware. And toymaker Mattel revealed it was hit by ransomware in July.\nTerry and I will talk about ransomware in a few minutes.\nOrganizations running the Asterisk VoIP phone systems are being warned their Sangoma PBX management system is at risk of being hacked. There is a vulnerability allowing a group in the Middle East to resell access to the phone system to the highest bidders. Often the access is then used for phone fraud. IT administrators should make sure Sangoma has the latest security patches. Phone system administrators should watch company call patterns.\nSomeone is selling stolen databases from 17 companies with 34 million customer records on a hacker forum. They include names, email addresses, some scrambled passwords and other information. Victim companies are in sectors like finance, online groceries and schools in the United States, the United Kingdom and other countries. It appears all of the databases were stolen this year.\nFinally, Microsoft continues to urge IT administrators to install a security patch to Windows Server and all domain controllers. This fixes a big vulnerability in Active Directory’s Netlogon capability. In August Microsoft issued a patch to plug this hole, which could allow a hacker to steal the password to the domain controllers that verify users when they log in.\nFirst I want to chat about the Maze ransomware group and their apparent announcement that they’re closing. This is a group that was one of the first, if not the first, to increase the pressure on victim companies to pay up after encrypting their data. Organizations for a time were able to get around paying for the decryption keys by resorting to backups. So crook thought ‘As long as we’re in a company’s system, let’s also steal data and threaten to embarrass them by releasing it unless they pay.’ So companies face a dilemma: Pay to stop the release of data, or pay to get decryption keys. Either way it’s been a deadly weapon for those ransomware groups that have adopted this strategy.\nThen last weekend Maze says, ‘We going away for a while.’ Terry, what do you make of this?\n“It’s been really busy actually, because of ransomware.\xc2\xa0A lot of it’s been Ryuk, but we actually came across two Maze ransomwares and, it’s basically where they get hit with ransomware, but they’ve already stolen your data before infecting you. And then, they [the attackers] have a backup plan. It’s a double extortion, basically. If you’re able to recover your data, well, then it could still turn around and say, okay, well pay us or we’re going to leak your data.”\nThe maze ransomware group made an apparent announcement that they’re closing. What do you make of this?\n“In my personal opinion, I think that there’s too much heat on them individually because you know, these guys brought in billions of dollars for their for their network, right? And I think where the problem is going to happen is not going to be in the technology side. Yes, they can hide their tracks and such, but they’re going to make a lot of critical mistakes in the real world … It’s gonna be the carelessness, the parties, the yachts, the cars, the bling, and that’s where like the the revenue agencies are gonna look into this, maybe law enforcement piece it altogether, and that’s where they’re gonna get nabbed.”\nSome of these ransomware groups in the past couple of months have said, ‘Hey, listen, we’re noble, we’re not going to attack hospitals. And then hospitals are getting attacked. Is Maze getting worried that’s bad publicity? And that’s one of the reasons why, uh, police are particularly targeting them.\n“Well, I think what’s happening is they realize, you know, maybe they’re having a change of heart, we’ll say. A ‘Coming to Jesus’ moment …”\nWhen it comes to the data theft side of a ransomware attack should victim companies trust the gangs that promise that the data they’ve copied is going to be erased if they pay you?\n“It’s the hardest part, because again, you’re dealing with criminals. Nut what’s funny, though, is that when you’re communicating with these guys, they’re, they’re always talking about how they have a brand and reputation that may have to maintain, right? They want to have a positive image that if you pay us, we’re going to give you your keys and everything’s going to be fine. But again, you’re dealing with a cyber-criminal. So it’s a 50, 50 chance.”\nTo hear the full conversation, play the podcast.\n | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.lifars.com/2020/11/ny-metro-infragard-emergency-update-healthcare-cyber-attacks/ | About This EventThe Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation(FBI), and the Department of Health and Human Services (HHS) recently issued a joint advisory on ransomware activity targeting the Healthcare and Public Health Sector. This advisory describes the tactics, techniques, and procedures (TTPs) used by cyber criminals against targets in the Healthcare and Public Health Sector (HPH) to infect systems with ransomware, notably Ryuk. The ransomware activity targeting the Healthcare and Public Health Sector represents a severe threat. Please join this emergency update as subject matter experts address this serious threat and provide guidance on the following:Overview of the Ryuk attacks on the Healthcare systemDescription of TTPs (tactics, techniques, and procedures)Where and how can you find help if you are the victim of a ransomware attackProvider viewpoint & the clinical impact Speakers: Moderated by Jennifer Gold, Vice President and IT Sector Chief, NY Metro InfraGardOndrej Krehel, PhD, CISSP, EnCE, CEH, CEI, CEO and Founder, LIFARS Digital Forensics and Incident Response ExpertDr. Mark Jarrett, InfraGard National Healthcare and Public Health Sector Chief & NY Metro InfraGard Healthcare Sector Chief, Senior Vice President and Chief Quality Officer of Northwell Health, Deputy Chief Medical Officer of Northwell Health, & Professor, Medicine, Donald and Barbara Zucker School of Medicine at Hofstra/Northwell Please register for Emergency Update: Healthcare Cyber Attacks at: https://attendee.gotowebinar.com/register/3438310710138585359After registering, you will receive a confirmation email containing information about joining the webinar.Related Posts | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://cammsgroup.com/blog/securing-critical-infrastructure-from-cyber-threats-a-wake-up-call-for-utilities-companies/ | \n\t\t\t\t\t\t\tIn recent years we have seen businesses across the globe adopt digital operating models – and utilities companies are no exception. These national companies – that are keeping critical infrastructure afloat providing water, gas, electricity, and waste treatment services – are using a plethora of different systems, online platforms, and applications to run their businesses. These systems bring a wealth of benefits, they make it simple for customers to track their usage and bills online and arrange payments, they streamline operating models, and make it easy to structure processes and collect & share data across the organisation. But this reliance on digital infrastructure has also increased the scope for cyber-attacks and provided new entry points.Recent warnings from credit rating agency Moody’s have shed light on the elevated risk that utilities companies face from cyber attackers targeting their operations. Moody\xe2\x80\x99s stated that \xe2\x80\x9cCritical infrastructure sectors like electric, water and other utilities have the highest risk exposure\xe2\x80\x9d due to a \xe2\x80\x9cgrowing reliance on digitisation\xe2\x80\x9d. They highlight that it \xe2\x80\x9cdoesn\xe2\x80\x99t necessarily mean they lack strong cyber defenses. However, a successful attack on their assets and services can have significant consequences\xe2\x80\x9d for both homes and businesses.The utilities sector is becoming increasingly digitised through the introduction of smart meters, online portals and third-party software applications – broadening the attack surface for cyber criminals as they seek to infiltrate systems, compromise data, and disrupt supplies. It\xe2\x80\x99s not just customer data that hackers are looking to steal and exploit, they are also looking to target insecure operational technology to interrupt supply – causing widespread disruption like power cuts and contaminated drinking water.Cyber Attacks on Water Companies are Hitting the HeadlinesThe report from Moody’s has sent a clear message, cyber-attacks on water companies have been prevalent and nobody is immune. Recent attacks have hit well known players who likely already have a strong cyber security posture. Recently Southern Water – who supply over 4 million customers in the UK – stated that Black Basta ransomware group claimed to have accessed their systems and posted a \xe2\x80\x9climited amount\xe2\x80\x9d of their data on the dark web. In addition, Staffordshire Water issued an apology after hackers stole personal data relating to their customers – Moody\xe2\x80\x99s estimate that the costs related to the hack – including potential civil claims – could reach \xc2\xa310m. In Ireland, 180 people were left without water when hackers targeted a water pumping system by taking control of a poorly protected industrial control system.Over in the US they are facing similar problems.\xc2\xa0 In 2023 hackers attacked Aliquippa\xe2\x80\x99s municipal water system and managed to shut down a pump on a supply line serving over 6k customers. News also leaked of a cyber security incident at Veolia North America who supply water to the city of Rahway in New Jersey. Moody’s pointed out that the use of artificial intelligence (AI) could further accelerate this worrying trend of cyber-attacks on utilities providers.However, Moody\xe2\x80\x99s cautioned although cyber-attacks like data breaches have a significant impact on data privacy & reputation, \xe2\x80\x9cThe greater risk for the sector, and society, is if malicious third parties are able to access operational technology systems to impair drinking water or wastewater treatment facilities.\xe2\x80\x9d These systems often rely on older Operational Technology (OT) and control gear which was created prior to the internet that has often been retrofitted for remote access. This makes them easier to hack as this older equipment lacks modern cyber security protocols. If supplies of drinking water are contaminated or stopped all together this can cause a significant impact to the health of the population and can cause threat-to-life – creating maximum disruption & impact from these malicious attacks.How are regulators addressing the cyber-threats facing utilities companies?Recognising the criticality of the situation, water suppliers, government bodies, and regulators have acknowledged the need to strengthen cyber defences. Ofwat who regulate the water sector in the UK, is assessing plans to raise bills from 2025 to 2030 to cover additional costs – enabling water companies to deliver a better service for customers and improve the environment – and part of this will likely include cybersecurity investments. This direction comes at a time, when the water industry is facing additional scrutiny for various issues, including sewage dumping and executive pay.In the aftermath of the cyber-attacks on the water sector, the Environmental Protection Agency (EPA) is advocating for water companies to voluntarily integrate fundamental cyber measures into their planning and operational processes. The EPA water Sector Cyber Security brief suggests a number of controls that water companies can implement to protect themselves from ransomware attacks.Recent regulatory changes have introduced new cyber regulations for organisations providing Critical National Infrastructure (CNI), these include the Telecoms Security Act introduced in 2021, DORA the Digital Operational Resilience Act that will impact financial services organisations and their Information & Communication Technology (ICT) service providers, and the eagerly anticipated NIS 2 directive.It is essential for water companies and others in the utilities sector to recognise these vulnerabilities highlighted by regulators and take proactive steps to protect their operations and customer data.What can utilities companies do to bolster cyber security measures?There are a number of steps utilities companies can take to get visibility of cyber security threats, strengthen IT infrastructure, and reduce the impact when incidents occur.Of course, there are technical provisions companies can take like installing security updates & patches, limiting access to unknown devices and IP addresses, and restricting data sharing between devices to reduce the attack surface. But companies also need to identify cyber threats upfront and implement controls to mitigate them. They must implement strict cyber security policies and training, manage compliance to data privacy regulations, implement processes to resolve cyber incidents quickly, and ensure all software, hardware, and licences are up to date and have the correct security measures.To help take control of their cyber security risks and protect their IT infrastructure utilities firms should implement strict governance procedures, introduce a best-practice cyber risk management programme, apply strict compliance procedures to ensure alignment with data privacy laws, and implement robust business continuity plans.The latest GRC technology solutions can formalise these procedures. The software allows firms to manage all aspects of IT risk & compliance in one centralised platform and offers the following capabilities:Risk Management \xe2\x80\x93 Teams can create a cyber risk register to capture digital risks, create customised online risk assessment forms, and set controls & perform control testing.Compliance\xc2\xa0\xe2\x80\x93 Organisations can create a compliance obligations library to manage data privacy and cyber-related regulatory requirements. They can Implement strict governance procedures & policy management workflows, manage regulatory change, and access out-of-the-box frameworks to align processes with data privacy requirements like GDPR, ISO 27001 and the NIS directive.Third-Party Risk management \xe2\x80\x93 Firms can create an online vendor library, making it easier to manage and track vendor relationships & understand the risks they pose. They can roll out vendor risk assessments, streamline the vendor benchmarking process, and implement automated monitoring of key metrics like SLAs, KPIs, and industry benchmark standards.Asset Management \xe2\x80\x93 Online asset management registers enable teams to track the age and usage of hardware, software licenses, and physical assets \xe2\x80\x93 ensuring all equipment & licences are up to date and fit for the job. Teams can get a comprehensive view of out-of-date equipment & licences – simplifying budget planning.Policy Management \xe2\x80\x93 All IT policies and procedures can be managed consistently and stored in a central online repository with workflows to flag expiry dates and automate signoffs, approval processes, and attestations.Strategic Planning \xe2\x80\x93 Create an IT strategy, break down top-line goals into smaller tasks, projects and actions that can be allocated out across the organisation for completion. As tasks are fulfilled, progress is indicated \xe2\x80\x93 making it easy to see how the strategy is progressing at all levels of the business.Audits\xc2\xa0\xe2\x80\x93 Firms in the utilities sector are subject to a wide variety of audits, inspections, and checks. Using GRC software, organisations can schedule and manage cyber audits and formalise the results and required actions \xe2\x80\x93 providing a complete history of all audits and their findings and outstanding actions.BCM & Operational resilience \xe2\x80\x93 Software can support the creation of BCM plans, business impact assessments, and business process modelling \xe2\x80\x93 making it easy to understand the impact of an incident in terms of cost, downtime, and man hours lost and BCM plans can be triggered based on incidents logged.Utilities Firms Must Act Now to Secure Their IT InfrastructureThe recent warnings from Moody’s and the escalating cyber threats to utility companies highlights the urgency of prioritising cybersecurity. As the sector faces the need for massive cybersecurity investments – safeguarding critical infrastructure is paramount.At Camms, we understand the importance of managing cyber risks effectively and ensuring data privacy compliance. Our expertise in IT Governance, Risk, and Compliance (GRC) enables us to offer tailored solutions to address the specific challenges faced by the water & utilities sectors.By collaborating with Camms, utilities companies can stay ahead of emerging threats and ensure the security of their critical infrastructure. We can support those in the utilities sector to manage and mitigate cyber risk while ensuring compliance with data privacy regulations. Reach out to us for a demo today.\t\t\t\t\t\t | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.darkreading.com/cyberattacks-data-breaches/billington-cybersecurity-to-host-1st-state-and-local-cyber-summit-in-wake-of-serious-cyber-attacks-on-state-and-local-governments | PRESS RELEASEWASHINGTON--(BUSINESS WIRE)--The inaugural Billington State and Local CyberSecurity Summit will be held on March 19-20, 2024 at the National Press Club in Washington, DC as well as virtually. The two-day summit will convene the senior-most cyber leaders who will discuss cybersecurity issues and solutions for government entities at the state and local level.“Keeping our nation safe from cyber criminals also means keeping state and local governments safe from these bad actors,” explained Thomas K. Billington, CEO and Founder, Billington CyberSecurity, a leading cyber education company for executives founded in 2010. “With the increased attacks on our infrastructure, this new conference explores ways to protect our localities as well as the cyber issues they grapple with on a daily basis.”State and local governments and the critical infrastructure they support are facing significant cyber-attacks. In the last year, the state of Illinois, the city of Dallas, and the Los Angeles Unified School District have experienced cyber-attacks that impacted their day-to-day operations over multiple weeks. Yet these same governments are often massively under-resourced to protect themselves.Government officials, tech leaders, and academia will be participating in Billington’s two-day summit and sharing ways to enhance the cybersecurity of the states, counties, cities, and municipalities that comprise the U.S. and the critical infrastructure sectors. More than 30 cyber leaders will be speaking, including:Vitaliy Panych, CISO, State of CaliforniaNancy Rainosek, State Chief Information Security Officer, Texas Department of Information ResourcesColin Ahern, Chief Cyber Officer, State of New YorkChris DeRusha, Federal CISO, OMB (invited pending agency approval)Katie Savage, Secretary, CIO, Maryland Department of ITSteven Hernandez, CISO, Department of EducationWilliam Zielinksi, CIO, City of DallasBess Mitchell, Chief, Grant Operations, DHSNishant Shah, Senior Advisor for Responsible AI, State of MarylandJosiah Raiche, Director of Artificial Intelligence, State of VermontThe summit takes place at the National Press Club at 529 14th St NW, Washington, DC. To accommodate attendees from various states, the summit will also be offered virtually. Credentialed working media are invited to cover in person or online. All sessions are open to the press except the workshops that precede the event on March 19 and the roundtables at lunch on March 20. Press interested in covering and other attendees should register at: https://whova.com/portal/registration/ssle_202403/. Tickets range in price depending on type of business.Attendees can receive continuing education credit from CompTIA and (ISC)2. Presented by a variety of sponsors, led by: CISCO, Amazon Web Services, NightDragon, Carahsoft Technology Corp., Anomali, CompTIA, Presidio, and Sailpoint. | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://adamlevin.com/2018/03/16/cyberattack-on-saudi-facility-may-indicate-an-alarming-new-threat/ |
The New York Times reported this week on a hacking attempt at a petrochemical plant in Saudi Arabia last August that sought to physically sabotage the facilities and trigger an explosion. This represents a potentially alarming new trend in cyber attacks where the goal isn’t to steal information or gain control of a system, but rather to cause actual damage to people and property.
Utilizing hacking as a means of industrial sabotage isn’t necessarily new; the Stuxnet virus was deployed to specifically target Iran’s then-operational nuclear plants in order to destabilize its centrifuges. Neither is it unheard of to have cyberattacks cause potential physical harm; the plague of ransomware in the last couple of years spread to several hospitals and effectively shut their systems down, causing obvious potential risks for patients. That being the case, it can be argued that the goal of these hacks was disruption rather than out and out destruction.
The attack in Saudi Arabia apparently failed as a result of a bug in the hacker’s code which shut down the plant’s production systems. It’s likely that the hackers in question have had the time to correct their code and potentially target other similar plants and systems.
The potential for catastrophic consequences of this method of cyberattack should ideally present a wake-up call for governments and businesses alike to take the time to secure their infrastructures and use best practices for cyber hygiene.
More information can be found here.
| 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.connectwise.com/blog/cybersecurity/monthly-threat-brief-december-2023 | \r\n Welcome to the latest edition of the monthly threat brief published by the ConnectWise Cyber Research Unit™ (CRU).\nIn this threat brief, we will provide raw data statistics, intel on specific threats, and a list of new detection signatures added to the ConnectWise SIEM™ throughout the month of December. For a more detailed explanation of the overall trends and analysis of these numbers, check out our annual and quarterly threat reports. For comparison, November’s threat brief can be found here.\nDecember 2023 stats\nIOCs\nThe CRU collects indicators of compromise (IOCs) from public open-source intelligence (OSINT) sources and any cybersecurity incident escalated by the ConnectWise security operations center (SOC). These IOCs are used for automated threat hunting and data enrichment to assist SOC analysts. Below is a summary of the IOCs collected. We intend to launch streaming threat feeds based on this data in 2024.\n\nFigure 1: Summary of IOCs collected in December 2023\nTTPs\nThe CRU collects tactics, techniques, and procedures (TTPs) from all incidents escalated by the ConnectWise SOC. This information helps us keep tabs on how threat actor behavior changes.\nBelow are the top 10 MITRE ATT&CK® techniques for November—provided for comparison—and December 2023.\n\nFigure 2: Top 10 MITRE ATT&CK techniques observed in November 2023\n\nFigure 3: Top 10 MITRE ATT&CK techniques observed in December 2023\nLatest threats\nEach month, we highlight threats that we have seen targeting our MSP partners and their clients. This month, the ConnectWise SOC saw multiple incidents of GhostPulse and GootLoader—both are loaders used during initial access to download additional malware.\nGhostPulse\nGhostPulse, also known as HijackLoader, IDAT Loader, and Shadowladder, is a loader first observed in July 2023. It uses stealth techniques such as DLL Search Order Hijacking (T1574.001) and Process Doppelgänging (T1055.013).\nGhostPulse frequently comes packaged as an installer with legitimate software. For example, this month, we have seen malicious installers for Notion, WebEx, and Zoom. Threat actors use SEO poisoning and malvertising to trick users into downloading the malicious version of common software. The installers will install the legitimate software they advertise, while GhostPulse installs in the background and then loads additional malware such as a remote admin tool or ransomware.\nWe saw an increase in malvertising and malicious installers of legitimate software in 2023 as a common method for initial access. When installing free software from the internet, it is important to know where your download is coming from and only download software directly from the vendor.\nMITRE ATT&CK techniques\n\nIOCs\n\nGootLoader\nGootLoader is a first-stage loader that has been around since 2020, typically paired with the banking trojan GootKit. Like GhostPulse, GootLoader primarily uses SEO poisoning (T1608.006) to trick their victims into downloading malicious files.\nThe GootLoader campaigns we have observed specifically target law firms and impersonate legal documents such as contracts, subpoenas, or other legal forms. You can find the file names in IOCs below. GootLoader payloads are typically hosted on compromised WordPress sites. SEO poisoning is a common technique, and we strongly recommend not downloading any files from unknown sources.\nMITRE ATT&CK techniques\n\nIOC\n\nNew ConnectWise SIEM signatures\nSeveral new ConnectWise SIEM detection signatures were added in December 2023. These include:\n\n[CRU][Windows] Executable launched from Perflogs directory\n\nTechnique detected: [T1204] User Execution\nDescription: The C:\\PerfLogs directory is a hidden directory that’s, predictably, used to store logs that Windows collects about performance data viewable using the performance monitor. Malicious actors have been known to use this directory to store malicious artifacts. There should not be any executables running from this directory.\n\n[CRU][Windows] Explicit DLL download using curl\n\nTechnique detected: [T1105] Ingress Tool Transfer\nDescription: Curl is a utility for transferring data over network protocols. It is commonly used by malicious actors because a version of it is shipped natively with Windows, and it’s used commonly enough to potentially blend in with normal activity.\nThis event notification attempts to alert on curl being used to download a DLL file. This event notification will not trigger if the DLL file is masquerading as another file type or does not have a DLL file extension. Investigate the source of the curl process creation and the activities following the downloading of the DLL.\n\n[CRU][O365] New Inbox Rule Created with Suspicious Name\n\nTechnique detected: [T1137.005] Office Application Startup: Outlook Rules\nDescription: In many Business Email Compromises (BEC) email forwarding rules will be created so that users are unaware of how their account is being used maliciously. Frequently these rules will be named with single characters. This event notification attempts to trigger on this suspicious behavior. Search for additional activity from the ClientIP creating the rule and follow the SessionID through other records via AppAccessContext.AADSessionId, SessionId, and DeviceProperties.SessionId fields.\n\n[CRU][Windows] Invoke-Sharefinder Usage\n\nTechnique detected: \nDescription: This alert triggers when activity is related to the Invoke-Sharefinder command from the PowerView toolkit. Invoke-Sharefinder is a function of PowerView that allows someone to discover and enumerate domain shares. Examine the Powershell block text for information related to the toolkit to validate this activity.\n\n[CRU][Windows] MSDTC Service DLL Hijack - Suspicious DLL Creation\n\nTechnique detected: [T1574.001] Hijack Execution Flow: DLL Search Order Hijacking\nDescription: The Microsoft Distributed Transaction Coordinator (MSDTC) service manages transactions with databases. It is open to DLL hijacking by searching for an oci.dll file that’s not included by default in the system32 directory. Attackers have been observed placing malicious oci.dll files in system32 in order to hijack this service for persistence. Review the process and user creating this file.\n\n[CRU][Windows] MSDTC Service DLL Hijack - Suspicious Registry Manipulation\n\nTechnique detected: [T1574.001] Hijack Execution Flow: DLL Search Order Hijacking\nDescription: The Microsoft Distributed Transaction Coordinator (MSDTC) service manages transactions with databases. It is open to DLL hijacking by searching for an oci.dll file that’s not included by default in the system32 directory. Attackers have been observed changing the default search path for this DLL by manipulating related registry values in order to execute malicious files. Review the process and user manipulating the registry and files in the path set for the registry value.\n\n[CRU][Windows] LOLBin Microsoft.NodejsTools.PressAnyKey.exe Usage\n\nTechnique detected: [T1218] System Binary Proxy Execution\nDescription: This event notification detects Microsoft.NodejsTools.PressAnyKey.exe usage. While this is a legitimate binary that is part of the Node.JS Visual Studio toolkit, it can be used as a LOLBin to execute arbitrary binaries. The PressAnyKey binary will require at least three arguments, the first two of which can be any value and the third passed directly to ProcessStartInfo and executed. It’s important that any child processes launched are investigated for malicious intent.\r\n | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.darkreading.com/cyberattacks-data-breaches/gao-pentagon-s-new-weapons-systems-vulnerable-to-cyber-attacks | With the US Defense Department preparing to buy and develop $1.66 trillion in new weapons over the next several years, a report finds that these next-generation systems are vulnerable to any number of cyber attacks.The US Government Accountability Office report, "Weapon Systems Cybersecurity: DOD Just Beginning to Grapple with Scale of Vulnerabilities," finds that as the Defense Department modernizes its arsenal, and weapons become more computerized and connected to the Internet, the odds of a cyber attack are increasing.While this trend has been obvious for some time, the Pentagon is only to coming to grips with these security issues now.(Source: iStock)\r\nThe October 9 report finds: "Automation and connectivity are fundamental enablers of DOD’s modern military capabilities. However, they make weapon systems more vulnerable to cyber attacks. Although GAO and others have warned of cyber risks for decades, until recently, DOD did not prioritize weapon systems cybersecurity. Finally, DOD is still determining how best to address weapon systems cybersecurity."Congress asked the GAO to review the security of these new weapons systems as the Pentagon prepared to go on its trillion-dollar spending spree.As part of its research, the GAO studied reviewed reports on software, networking, IT and other technology issues dating back to 1991, as well as assessments written on cybersecurity and weapons that were tested between 2012 and 2017.The report does not detail specific vulnerabilities within different systems, but it notes that the National Security Agency and the US Computer Emergency Readiness Team (CERT) have warned that attackers and nation-states have been attempting to probe systems for flaws and security holes in order to conduct reconnaissance, espionage or to disable or damage these weapons systems.However, when conducting its testing, the GAO found it relatively easy to hack into these systems or bypass security features. Testers were able to take over systems using simple tools and techniques, and remain inside these systems for long periods of time.As an example, the report finds that it took a two-person team about an hour to crack into one system, and only a full 24 hours to complete take control. Another system had about 20 vulnerabilities, but only one had been fixed after officials were alerted."For example, one test report indicated that only 1 of 20 cyber vulnerabilities identified in a previous assessment had been corrected. The test team exploited the same vulnerabilities to gain control of the system," the GAO found.More disturbingly, Pentagon officials would sometimes dismiss these security concerns or claim that the tests were unrealistic."Using relatively simple tools and techniques, testers were able to take control of systems and largely operate undetected, due in part to basic issues such as poor password management and unencrypted communications," according to a summary of the report. "In addition, vulnerabilities that DOD is aware of likely represent a fraction of total vulnerabilities due to testing limitations. For example, not all programs have been tested and tests do not reflect the full range of threats."Before the report's publication this week, the GAO notes the Defense Department has started to take steps to improve security around these systems, and that Congress has also urged the military to take better cybersecurity steps.(Source: GAO)\r\nHowever, the Pentagon faces challenges ranging from staffing to sharing information about vulnerabilities within the various sections that make up the Defense Department."DOD faces barriers that could limit the effectiveness of these steps, such as cybersecurity workforce challenges and difficulties sharing information and lessons about vulnerabilities. To address these challenges and improve the state of weapon systems cybersecurity, it is essential that DOD sustain its momentum in developing and implementing key initiatives," the report finds.Related posts:— Scott Ferguson is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR. | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.govinfosecurity.com/use-cyber-power-in-conflict-a-19840 | \n \n Cyberwarfare / Nation-State Attacks\n ,\n Fraud Management & Cybercrime\n ,\n Video\n \n The Use of Cyber Power in Conflict\n Miriam Howe of BAE Systems Discusses Cyber Power in a Military Context\n \n Tony Morbin (@tonymorbin) •\n August 31, 2022 \n\n \n\n\n\n\n \n \n \n \n \r\n\r\nMiriam Howe, lead cyber consultant, BAE Systems\r\n\r\nCyberspace is a battlefield with no physical or geographic boundaries. During wartime, targets on land, sea, air and space are vulnerable to cyberthreats and opportunities, and nations face many uncertainties about when and how to respond to attacks, says BAE Systems\' Miriam Howe.See Also: New OnDemand | Securing the Cloud: Mitigating Vulnerabilities for Government\r\nMost cyber activity goes on below the threshold for war, with legal, political and diplomatic considerations as part of any decision about how to respond, but there\'s little evidence to show that cyberattacks are escalating into kinetic action, Howe says.\r\n\r\nIn this video interview with Information Security Media Group, Howe discusses:\r\n\r\n\r\nThe threshold for offensive cyber activity to provoke a physical response;\r\n\r\nWhy public attribution can affect an attacker;\r\n\r\nHow the military strategy of multi-domain integration applies to cyber power.\r\n\r\n\r\n Howe leads international cyber capacity-building projects at BAE Systems, working with other nations that are building their sovereign cyber capabilities as well as supporting the U.K. government\'s cyber capabilities program. She previously worked for the National Policing Improvement Agency, Vega Consulting Solutions and BT.\n \n | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://cybersixgill.com/news/articles/state-of-the-cybercrime-underground-2023 | International sanctions prompt Russian cybercriminals to find new ways to cope amidst growing financial pressuresOn a Friday night in January 2022, Russian authorities swooped down on members of REvil, a ransomware gang blamed by the U.S. for more than $200 million of extortion payments as well as the Colonial Pipeline and JBS attacks. The FSB, Russia’s internal intelligence agency, arrested a dozen individuals and confiscated luxury cars, computers, cryptocurrency, and millions in rubles, dollars, and euros. At the time, these actions suggested Moscow was willing to honor American requests to suppress Russia’s highly active cybercriminal enterprises. A month later, all cooperation vanished. Russia invaded Ukraine, the West coalesced around the Ukrainians, and the Russian government seemingly gave the okay for threat actors to go after whatever targets they pleased, as long as they were outside of Russia’s borders. The fallout from the continued Russian-Ukraine conflict has affected cybersecurity throughout Europe, as detailed in our newest report, State of the Cybercrime Underground, 2023 EMEA Edition. The report is based on voluminous data-gathering throughout 2022 of cybercriminal activities on the deep, dark, and clear web. Financial incentive for cybercrimeAs state-funded agencies employ cyber warfare as part of the Russian military effort, cybercriminal and hacktivists groups have ramped up their attacks on non-Russian targets of all sorts. Civilian cybercriminals are partly motivated by nationalism, but financial incentives also play a significant role. As international sanctions have taken their toll on the Russian economy, individual threat actors have sought alternative methods of maintaining their livelihoods. The country’s large and skilled IT sector and others may be replacing lost income through financially motivated crime. These methods include:Ransomware attacks targeting critical infrastructure, government entities, and businessesCryptocurrency-related schemes, such as cryptojacking and dark web transactions, along with various money laundering activities, allowing them to liquidate their non-sanctionable profits without being detectedCompromised payment cards to make purchases from sellers who no longer accept Russia-issued cardsAttacks on critical infrastructure and other vulnerabilitiesAs to be expected, the Russian side has unleashed a broad cyber attack campaign on Europe’s critical infrastructure, including energy, telecommunications, transportation, and healthcare. They have also targeted political entities, government agencies, and operational technology sectors. Russia has leveraged cyber operations to support their military objectives, conduct espionage, and cause harm throughout the region.Other trends discussed in the report include the following:Sophisticated threat actors are increasingly utilizing zero-day exploits, outsourcing expertise through the “as-a-service” business model, and seeking to compromise supply chain targets, gaining access to organizations through trusted third-party vendors.Ransomware and attacks against availability were prevalent, with Distributed Denial of Service (DDoS) attacks increasing due to ongoing geopolitical conflict.Phishing remained Europe’s most common vector for initial access compromise. Generative AI served as a new means of social engineering personalization in emails, making them highly convincing as threat actors exploited financial services, healthcare, and government sectors.New technologies such as artificial intelligence (AI) and the Internet of Things (IoT) are likely to emerge as a popular target of exploitation. Attacks targeting AI and machine learning models are expected to proliferate as organizations rush to join the generative AI tech race. Cloud service providers (CSPs), managed services providers (MSPs), and IT services organizations have become prime targets for state-backed groups, allowing them to get ready access to hundreds of victims at once.A shift in credit-card fraudOur research from 2022, highlighted in the report, showed that credit card fraud had dropped precipitously over the past several years. Unfortunately, we’re now seeing a shift, with this type of cybercriminal activity once again on the rise. We’ll look more closely at this trend and potential underlying causes in our next State of the Underground report, looking at important trends and developments in 2023.Keeping the chaos from reaching your organizationWith the Russia-Ukraine conflict having no end in sight and cybercriminals finding new ways of exploiting a wide range of targets, organizations must equip themselves with robust, automated defense tools and have a strategic view of global dangers. This is true for corporations and managed security service providers (MSSPs).Cybersixgill maintains its robust monitoring of such dangers, informed as we are by collecting 10 million items daily from the deep, dark, and clear web. Download your copy of our latest State of the Cybercrime Underground 2023 to better understand the threats posed to Europe and elsewhere so you can prepare accordingly. | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.information-age.com/democratising-technology-cyber-security-13860/ | \n\n\t\t\n\t\tDemocratising technology for cyber security — sounds like a nice idea. And, it’s entirely necessary.\n\t\t \t\n\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n‘I don’t like those odds’\nIt is approximately 400 times more expensive to defend against a cyber attack than it is to carry one out, which is why companies are facing a daily onslaught, whether it’s in the form of phishing or DDoS attacks.\nCyber security is expensive, really expensive and only the biggest companies to date have been able to furnish themselves with the technology they need to defend successfully against an attack. But, even these aren’t bullet proof and when it comes to the SMEs; there are horror stories of cyber attacks simply wiping them out.\nIt’s clear there is a need to democratise technology for cyber security — so that organisations can rely on computing power rather than consulting power — the latter being the far more costly option.\nCyber security consulting\nThe majority of cyber security today has been delivered using the power of consultants, which makes things terribly expensive and shrouds the whole area in mystery; rather than empowering people to take charge of their own cyber security.\nThe vendor is crucial to this new, democratic era of cyber security. They need to build solutions that target real problems, not niche or edge problems which often we see a lot of hype and marketing noise around.\nThat\xe2\x80\x99s why they hold a core tenant of democratising cyber security to be \xe2\x80\x9cuseful innovation\xe2\x80\x9d, this means building solutions that people need in a way that delivers the most value as quickly as possible.\nFor Red Sift this meant starting with a focus on email security. Given it’s the backbone of businesses everywhere it’s still one of the main entry points for cyber attacks to businesses, so helping people to secure their email is bound to have the largest impact.\n\nTech Nation\xe2\x80\x99s cyber security cohort: Red Sift\xe2\x80\x99s company profile\nEstimates suggest that it’s 400 times cheaper to launch a cyber attack than it is to defend against one. Red Sift wants to change this by democratising the technology essential for cyber security\nDemocratising technology for cyber security\nThe whole idea of democratising technology for cyber security is borne out of the needs of the customer.\n“For smaller companies, they can’t afford the consultancy-led approach to deploying cyber security solutions, because cyber security specialists are very hard to find and very rare,” explains Rahul Powar, founder and CEO of Red Sift.\nThis is an issue that relates to the security talent gap, where it is estimated that three million cyber security jobs are out there globally that are unfilled. The real challenge for smaller organisations then, is what do you do if you can\xe2\x80\x99t get access to these cyber security specialists? AI can help.\nThe power of AI in cyber security\nAI can help organisations, with limited budgets and resources, drive effective cyber security.\nAI technologies are getting to the level of sophistication required for this. And, properly implemented they can do quite a lot of what a cyber security professional would otherwise do manually, automatically.\n\nAI in cyber security: predicting and quantifying the threat\nJonathan Pope, CEO and co-founder at UK cyber security company, Corax, explains how AI in cyber security can predict and quantify the threat. Read here\nWhat about the larger organisations?\nIn the large organisations, “we see that the cyber-services led approach tends to favour forensic style investigations and other things that happen after the fact, simply because the data rate or the line rate of whether it’s email traffic or network traffic is generally too hard for people to look at on an event-by-event basis,” explains Powar.\n“For our larger customers, the fact that we are deploying things like anti-phishing solutions in line with the messages automatically means that you have less escalation and less manual remediation that has to be done — which most security operations centres really struggle with given the volume of data compared to the number of people they have.”\nIn these cases, AI can be a real differentiator. The technology starts to alleviate the need for some of these professionals inside security operations for the larger organisations. And for the smaller ones, it allows them to have an automated security operation to some extent.\n\nCyber security best practice: Definition, diversity, training, responsibility and technology\nAs part of Information Age’s Cyber Security Month, we look at cyber security best practice – everything from defining it to the importance of training. Read here\nNo silver bullet\nHowever, AI does not represent a silver bullet — one of the dangers in cyber security is believing in this. “Anyone purporting to supply one is doing the industry as a whole, a disservice,” claims Powar.\nAny solution that is out in the market needs to sit and operate within a much more complex ecosystem: things like appropriate process, customer and employee education, good cyber hygiene, the right remediation flows, the right escalation flows et cetera. All of these factors are critical when deploying any ‘machine-learning based solution’ that aims to solve an organisation’s cyber security problem.\nInstead of replacing, AI-based cyber security solutions should assist and reduce the cognitive load of the employee or customer. \xe2\x80\x9cTechnology should augment appropriately trained staff members,” says Powar.\n\n Accessible technology\nHow do you make technologies accessible, in terms of price, and deployment and operational complexity?\nOne of the challenges for a lot of cyber security solutions is they are typically meant to be deployed and operated by experienced cyber security professionals, which is not something that most businesses have access to unless they are past a certain level of size and complexity.\nThe onus is on the vendors, such as ourselves, if they want to further this democratisation idea, to make their solutions easily understandable. There’s no reason in my mind why a cyber security solution shouldn’t be as easy to deploy and operate as an email account.\n— Powar\n\nCyber security is relevant for everyone and understandably, many businesses having to deal with it are just not that sophisticated. There is an emerging market for businesses that are trying to create more accessible cyber security solutions for a larger portion of the market than has typically been considered.\nBig changes on the horizon\nAccording to Powar, there are going to be two big changes in the cyber security landscape.\nOne of those, from a technology perspective, is going to be around security by design.”Fundamentally, many of the challenges that we face from a cyber security perspective are because the protocols and the technologies that we use and rely on are typically not designed with security as a core requirement,” he explains. “Whether we look at the web the way it was ten years ago, or email the way it is today, we can see that those technologies were not built with security as a primary requirement.”\nThis is changing. And there are now lots of new standards emerging to effectively try and patch security into these protocols. Moving forward, these will have a much more resilient infrastructure by design.\n“One can’t imagine using the web today if they hadn’t put SSL in,” continues Powar. “You need those basic pieces of infrastructure built into the standards that allow people to rely on the technology irrespective of which vendor they’re using for any specific solution. So we’re seeing a lot more activity around the standards and regulatory bodies, basically trying to go in and make sure that they are good, robust standards that make the internet as a whole a safer place for people to do business on.”\nThe second change Powar predicts is the democratisation of AI technologies, “which means you’re not looking at very large security operations centres at the biggest companies as the only way for organisations to actually run cyber security as part of their day-to-day business,” he says.\nThe industry is expecting the rise of automation in cyber security, whether that’s through AI or through other complementary technologies where the security operations centre is more of an automated factory of activity.\nRed Sift is part of Tech Nation Cyber\xc2\xa0\xe2\x80\x94 the UK\xe2\x80\x99s first national scaleup programme for the cyber security sector. It is aimed at ambitious tech companies ready for growth.\n\t\n\n\t\n\n\t\n | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.cloudsek.com/tag/cyber-attacks-against-governments | Join 10,000+ subscribersKeep up with the latest news about strains of Malware, Phishing Lures, Indicators of Compromise, and Data Leaks. | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.crn.com/news/security/10-cybersecurity-companies-making-moves-july-2023?page=11 |
10 Cybersecurity Companies Making Moves: July 2023
We’re taking a look at some of the cybersecurity companies that launched new products and partner programs, unveiled acquisitions or made key executive hires in July.
Hot Market, Big Moves
Since hackers don’t take summers off, neither can the cybersecurity companies developing technology to defeat them. (Or at least make their lives harder.) July was a busy month on both the attacker side of the equation—including with a growing list of victims facing extortion demands over the MOVEit cyberattacks—as well as on the defender side, with numerous security vendors making notable moves. The major announcements in July included product launches from top cybersecurity companies such as Palo Alto Networks, Fortinet and Netskope.
Other big moves last month included another cybersecurity startup acquisition for Cisco Systems, as the company looks to continue building out its Security Cloud platform, along with executive hires and new channel partner program launches by several companies.
[Related: Palo Alto Networks CEO Nikesh Arora On Why ‘The Current Paradigm Is Broken’ In Cybersecurity]
Meanwhile, one of the most consequential moves for the cybersecurity world in July came outside the industry, with the U.S. Securities and Exchange Commission adopting a pair of much-awaited cyber incident disclosure regulations.
The first new SEC rule requires publicly traded companies to disclose cyberattacks in an 8-K filing within four business days of determining an incident is “material” for its shareholders. With the second new SEC rule, public companies must annually disclose information on their management and strategy around cybersecurity risk. Notably, this rule includes a new obligation to describe the role of its board in overseeing cybersecurity threats.
While certain industries are already subject to strict government cyber requirements, the SEC’s oversight of all publicly traded companies makes the new rules the “most widespread regulation” for cybersecurity to date in the U.S., PricewaterhouseCoopers partner Joe Nocera told CRN.
The new regulations are likely to bring significant implications to the cybersecurity industry, as the rules provide another powerful incentive for companies to take security more seriously, Tenable CEO Amit Yoran said in an interview with CRN. “It gets people’s attention—it gets the CEO’s attention, the CFO’s attention, the general counsel’s attention, the board’s attention,” Yoran said.
“When there’s [regulatory] filings involved—and it impacts investors and their engagement with the SEC—then corporate leadership just pays that much more attention. And that means they ask questions about it,” he said. “And when they ask questions about it, they just start pulling on a thread of yarn that causes action.”
While some companies already engage in this way with cybersecurity, “I’d say it is not pervasive,” Yoran said. “Not every CEO, not every audit and risk committee, not every board of directors pays the kind of attention to cybersecurity that they should. But having this connective tissue to public filings and 8-Ks and disclosures will necessitate better engagement between security professionals and corporate leadership. So I think it’s hugely impactful.”
As for the cybersecurity industry’s own moves in July, a number of the them revolved around areas of growing interest to corporate leaders and regulators alike, such as data security, incident response and software supply chain security.
What follows are the key details on 10 cybersecurity companies that made big moves in July 2023.
Netskope
In July, Netskope announced a set of new AI/ML capabilities—available across the products that make up its SASE platform—focused around offering improved data protection and threat detection. The new SkopeAI capabilities include “deep” contextual awareness for improved DLP (data loss prevention) across both structured and unstructured data, along with ML-powered data classification and “train your own classifiers” technology to enable the automatic identification and categorization of new data. In addition, SkopeAI provides AI-based threat protection that can rapidly detect and defend against a variety of threats—including AI-generated threats, polymorphic malware, phishing domains and zero-day attacks, according to Netskope. Key uses for the SkopeAI technology include protecting against malicious uses of generative AI apps such as ChatGPT, the company said.
Also in July, Netskope unveiled a new MSP program that serves as an “extension” of the company’s Evolve Partner Program, and offers a new “as-a-service business model framework,” the vendor said in a news release. Netskope co-founder and CEO Sanjay Beri (pictured) said in a recent interview with CRN that the company is “amping up our enablement” of partners.
Darktrace
Darktrace in July unveiled a new product, Heal, that leverages AI to assist with cyber incident response. The product “completes Darktrace’s Cyber AI Loop” by adding a recovery offering to its portfolio that already includes tools for threat prevention, detection and response, the company said.
Darktrace Heal includes capabilities to simulate real-world cyber incidents within customer environments, allowing security teams to better prepare for complex attacks and practice their responses, according to the company. The product also enables the creation of custom incident response plans based on an unfolding attack, utilizing details of the environment and attack as well as insight from prior simulations. Darktrace said.
Forcepoint
Forcepoint and its private equity owner, Francisco Partners, unveiled a deal to sell its government and critical infrastructure business to TPG in a move to position the business as a “leader” in zero trust security. Financial terms of the deal were not disclosed, but multiple reports pegged the acquisition price at $2.45 billion.
The acquisition will separate Forcepoint’s government and critical infrastructure business from its commercial business, the company said. Forcepoint’s commercial business is focused on offering a “data-first” SASE platform, which aims to provide “better control over how people get to business applications and use sensitive data” than competing SASE offerings, the company has said. The Forcepoint commercial business will remain under the ownership of Francisco Partners.
Cybersixgill
Threat intelligence data firm Cybersixgill in July unveiled the launch of its global MSSP program, which provides MSSPs with expert assistance as well as advanced tools to accelerate their use of threat intelligence. Cybersixgill said that key capabilities include a multitenant, SaaS-based investigative portal with “Google-like” search and filtering capabilities. Other capabilities include “prioritized” alerts that are customizable and simplified case management. About one-third of Cybersixgill’s current customers are MSSPs, and the company understands that MSSPs face “growing pressure from their customers to deliver superior, proactive security to protect them from cyberattacks,” said Eric Krauss, vice president of worldwide channels for Cybersixgill, in a news release.
Cisco Systems
Cisco announced in July it plans to add another startup’s technology to its security portfolio with its agreement to acquire identity threat detection and response startup Oort. Once combined, Oort’s identity-centric technology will enhance user context telemetry for Cisco’s Security Cloud platform, Cisco said. The companies did not disclose the terms of the deal.
The tech giant has been a strategic investor in Oort since 2022. Oort was founded by Cisco alumni Matt Caulfield, an entrepreneur and former Cisco engineer for 10 years who has a background in cloud, networking and data.
Oort’s identity-centric technology will be incorporated into the Cisco Security Cloud platform, including within Cisco’s Duo identity access management technology and extended detection and response portfolios, according to Raj Chopra, senior vice president and chief product officer for Cisco Security.
Cisco has unveiled agreements to acquire four security-related startups in 2023 so far, with Oort joining a list that includes Lightspin, Valtix and Armorblox.
Palo Alto Networks
In late July, Palo Alto Networks unveiled the introduction of a CI/CD Security module to its Prisma Cloud CNAPP (cloud native application protection platform). The new capability—based on technology from the acquisition of Cider Security in late 2022—will provide partners and customers with “integrated software delivery pipeline security,” the cybersecurity giant said in a news release.
One key benefit of the CI/CD Security module is that it offers unified visibility “across the engineering ecosystem,” including code repositories and contributors as well as any technologies and pipelines that are utilized, the company said in a blog post. The visibility is available through the newly added Application Security dashboard in Prisma Cloud.
Other benefits include enhanced protection against the 10 biggest CI/CD risks—as determined by the Open Worldwide Application Security Project—as well as posture management capabilities for delivery pipelines and attack path analysis, Palo Alto Networks said. Attack path analysis is available through the new Prisma Cloud Application Graph and enables improved understanding and analysis of the environment as well as “relationships between all artifacts from code to deployment,” the company said in the post.
Island
Island, a startup that offers a security-focused web browser for businesses, said in July it has hired cybersecurity industry veteran Steve Tchejeyan (pictured) to serve as its president. Tchejeyan had most recently been CRO at Forescout Technologies. Earlier in his career, he worked in sales leadership and executive roles at security vendors including Symantec, Blue Coat Systems and Intel Security.
The appointment followed Island’s hire earlier this year of another executive from Forescout, Keith Weatherford, as its vice president of worldwide channel sales.
Island, which was founded by two ex-Symantec executives, has raised more than $250 million in funding and has been valued at $1.3 billion by its investors.
Imperva
Imperva said in July it has reached an agreement to be acquired by defense and aerospace company Thales for $3.6 billion. The application and data security vendor is being sold by its private equity owner, Thoma Bravo.
In a news release, Thales said that it will add about $500 million in revenue and “significantly expand its data and application security offering” with the addition of Imperva. The acquisition is expected to close “by the beginning of 2024,” Thales said.
A longtime player in application security categories such as web application firewall and DDoS protection, Imperva has expanded in recent years into emerging segments of the market, such as API security, while also bringing a growing focus on other related categories such as data security.
Fortinet
In July, Fortinet said it is “deepening its commitment to data center security” with the introduction of two new FortiGate NGFW (next-generation firewall) devices. The new firewalls include the FortiGate 3200F, which is “purpose-built” for hyperscale data center facilities with a massive 380 Gbps of throughput as well as 400GE interfaces that are aimed at management of high-traffic volumes, according to Fortinet. The second new firewall, the FortiGate 900G, provides 20 Gbps of throughput and offers a “compact form factor for the enterprise,” the company said.
Uptycs
In July, Uptycs hired veteran cybersecurity leader Kevin Paige (pictured) as its CISO and vice president of product strategy. Paige had most recently been the CISO at supply chain management firm Flexport, and earlier in his career held security leadership positions at tech companies including Salesforce and MuleSoft. Prior to the hire, Paige had been a “three-time Uptycs customer,” the vendor said in a news release. Uptycs—which says it offers the “first” platform that unifies CNAPP (cloud native application protection platform) and XDR (extended detection and response) capabilities—is “extraordinary in its ability to help security teams leverage their security data,” Paige said in a news release.
| 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.itworldcanada.com/article/cyber-security-today-week-in-review-for-march-4-2022/474907 | Welcome to Cyber Security Today. This is the Week in Review edition for the week ending March 4th, 2022. I\xe2\x80\x99m Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com.\n\n\nIn a few minutes I\xe2\x80\x99ll be joined by David Shipley, CEO of Beauceron Security. But first a look at some of the headlines from the past seven days:\nUkraine is not only dominating political news, but the cyber new as well because of cyberattacks. There was a massive attack on Ukrainian universities that coincided with Russia\xe2\x80\x99s invasion, says WordFence, which sells security solutions to protect WordPress. The attack resulted in at least 30 compromised Ukrainian university websites. Microsoft said several hours before the invasion it detected a new round of offensive and destructive cyberattacks against Ukraine\xe2\x80\x99s digital infrastructure. ESET found two pieces of wiper malware sent to computers in Ukraine.\nOn the other hand after the Conti ransomware group announced support for Russia, a Ukrainian researcher struck back. They broke into the Conti\xe2\x80\x99s files and leaked messages between gang members, as well as the source for their ransomware and their operational administrative panels.\nDavid and I will talk about cyberwar and the possibility it will hit other countries.\nMeanwhile Eugene Kapsersky, the head of the Russian-based cybersecurity provider that bears his name, is being criticized for the way he urged negotiations to resolve what he called \xe2\x80\x9cthe current situation.\xe2\x80\x9d Should he \xe2\x80\x93 could he — have used the word \xe2\x80\x9cinvasion?\xe2\x80\x9d Was he afraid Vladimir Putin would have slapped his company? David and I will talk about this as well.\nWe\xe2\x80\x99ll also take a look at how a failure to patch Microsoft Exchange vulnerabilities led to two ransomware groups hacking a Canadian healthcare provider last year.\nThere were big data breaches revealed in the past seven days: Tire maker Bridgestone had to send some workers home and disconnect some of its IT systems from the internet due to what was called a potential IT incident. Toyota was forced to shut production at 14 plants in Japan after a cyberattack on a parts supplier. International insurance broker Aon said a cyber incident impacted what it called \xe2\x80\x9ca limited number of systems.\xe2\x80\x9d Video surveillance systems maker Axis Communications admitted someone was able to use social engineering to get around multifactor authentication login protection and hack into the company. And the Lapsus$ hacking gang stole proprietary product data from graphics card maker Nvidia and is reportedly demanding the company take power restrictions off some of its processors or it will leak the data.\n(The following transcript has been edited for clarity. To hear the full conversation play the podcast, which was recorded on Thursday, March 3rd)\nHoward: Let’s start today with Ukraine. It wasn’t unexpected that Russia or Russian-based or sympathetic threat actors might engage in cyberwar. Experts say Russia briefly knocked out power in Ukraine in 2015 and 2016, it’s of course well known that it launched cyber espionage attacks against the U.S. for years and is accused of interfering in the 16 U.S. Presidential election through hacks and misinformation. So to no one’s surprise cyber attacks are increasing in Ukraine. There were crippling attacks just before Russian troops invaded last month. Researchers at Microsoft and ESET found a new data wiping malware in some systems in Ukraine. Microsoft calls it FoxBlade, ESET calls it HermeticWiper. David, what are your thoughts?\nDavid Shipley: It was entirely expected that we would see an amp up in the days prior to the increased incursion into Ukraine. The Russians had used denial of service attacks against government websites, banking and others. They of course continue to use disinformation and social media to try and amplify their narrative around their twisted logic for the invasion. And then, of course, HermeticWiper is the exact same playbook that we saw with NotPetya, which tries to look like ransomware but what it actually does is destroy the master boot record on Windows devices rendering them inoperable.\nSo far, according to Microsoft and others, several hundred computer systems in government, IT companies and the financial sector have been infected. It did include a worm component but it looks like that did not catch as on as much as what we saw with NotPetya — thankfully — but this is part of the tools of the trade. One of the things that that I’ve been surprised at is that we haven’t seen broader use of cyber as a weapon against telecommunications networks and news networks. They did not go down in the early days of this invasion, and there is some speculation that Russia’s military communications infrastructure is so poor that they’ve actually been trying to use the mobile infrastructure the mobile data and cellular infrastructure in Ukraine to help co-ordinate their attack. That\xe2\x80\x99s prompting Ukrainian telecommunications providers to block Russian phone numbers. So it’s been interesting. It’s not been as severe as we were expecting, and that highlights what some experts believe: cyber is best used in the period before actual armed conflict, and that once armed conflict starts its relative utility declines dramatically after that.\nHoward: New York Times reporter David Sanger wrote a book about nation states\xe2\x80\x99 use of cyber a couple of years ago and he titled it, \xe2\x80\x98The Perfect Weapon,\xe2\x80\x99 and that’s his thesis: that that cyber really is for nations a perfect weapon. In the book he details a long history of cyberattacks. Perhaps listeners might be most familiar with the Stuxnet worm that broke nuclear centrifuges in Iran and has been attributed to Israel and the United States teaming up.\nDavid: The challenge with these government-developed hacking tools is what happens when they go off-script. We saw that with Stuxnet \xe2\x80\x93 there were infections that happened outside of Iran. That’s how we started to learn about Stuxnet. And we’ve seen lots of uses of destructive malware by countries. North Korea used destructive malware in several attacks in the 2010s against South Korea in order to cripple their TV stations and banking as a retaliation. So you know there’s a long history. Microsoft president Brad Smith has pointed out that these cyber weapons are big concerns when it comes to things like the Geneva Conventions and if they take out a hospital if that’s a violation of the laws of armed conflict.\nHoward: The thing is while an attacker may try to tailor a cyber weapon against a particular company or against a particular country or company, this is computing mistakes happen. And the obvious example is the NotPetya wiperware in 2017 that was aimed again at Ukraine. The vehicle was compromised Ukrainian tax software and while the attack may have been intended only to compromise computers in Ukraine, it spread around the world because computers are interconnected. That kind of unintentional spread of cyber warfare may happen as a result of the current Russia-Ukraine war.\nDavid: And that’s probably the most likely cyber risk that we face in the Western world outside of Europe: the unintentional spread. I do not believe at this time that the Russian government is honestly considering massive DDoS attacks against Canadian or American banking firms or attacks against critical infrastructure because the Americans have already come out and said they\xe2\x80\x99ll treat cyber as potentially worthy of a response kinetically — that is with actual physical violence. And Putin kind of skipped cyber on his threats to the West as things escalated in Ukraine by jumping right to \xe2\x80\x98Remember we have nuclear weapons\xe2\x80\x99 and escalating the posture of his security forces.\nWhat’s interesting is WannaCry was built on hacking tools that the Americans lost and that’s what brought down hundreds of hospitals in the United Kingdom. So one of the big concerns, if we get through this current crisis in Europe in this new cold war, is what are the rules going to be when countries develop or find vulnerabilities in key software and try and weaponize that? What are the consequences on countries when that goes sideways?\nHoward: There are cyber experts who worry that Russia or Russian-backed cyber groups are going to start attacking critical infrastructure in countries that support sanctions against Russia. One argument is that as this war goes on the risk of that increases as the Russian people start to feel the impact of sanctions.\nDavid: I think it’s likely that any kind of attacks will be through proxy groups like cybercriminal gangs that have been operating within impunity in Russia for years. It gives the Russian government plausible deniability \xe2\x80\x93 \xe2\x80\x98Hey, it’s not us. It’s these criminal gangs. By the way, we were co-operating with you in January. We were arresting the gangs. But now you’ve been hostile to us. You’ve put these evil sanctions on us and we’re not going to go after these folks.\xe2\x80\x99 Maybe they were so co-operative before the invasion was to show \xe2\x80\x98If you’re nice to us we can continue to rein these groups in. If you’re not nice to us we’re going to let them loose.\xe2\x80\x99 Given the currency crunch that’s going to happen over the next couple weeks in Russia, being able to leverage ransomware attacks to hit organizations and generate funding could significantly help. This is North Korea’s playbook. All of their ransomware attacks and all of their attacks on cryptocurrency exchange has been a need for U.S. dollars to fund its missile program. Russia will face the same pressures. This is why cryptocurrency exchanges — which have had a very bad start to this year where several hundred million dollars in assets were stolen from them –are going to be under incredible pressure as well from these criminal groups.\nHoward: You mentioned earlier the international rules of the road on cyber attacks. The United Nations just started a three-year discussion about cybercrime, what countries can do and whether there can be an international treaty. One wonders whether this international tension between Russia and many other countries is going to spill over on the U.N. negotiations and whether Russia will be more obstinate in those discussions or more compromising.\nDavid: I expect Russia’s willingness to play on the international laws-based order is going to be pretty low considering their invasion and then the subsequent consequences which they appear to be surprised at. We have the Budapest Convention on international legal co-operation. About 40 countries around the world signed on to it. It\xe2\x80\x99s a good start, and we’ve certainly seen benefits from police co-operation. Prior to the invasion of Ukraine the co-operation between their police service, the FBI and other global services was putting a real dent in some of the affiliates and the cybercrime gangs operating in eastern Europe. Meaningful International approach is going to be even harder to actually muster because they [Russia] is going to have to set down these amazing capabilities that they’ve been investing in and I don’t think they’re gonna blink on that I don’t think the Americans would even blink either.\nHoward: And then there’s the other side of this conflict: The Conti ransomware gang endorsed the Russian attack and for that it may have been dealt a crippling blow. Because someone retaliated by hacking the gang and releasing some of its internal messages and the source code for its ransomware. Has the gang been hurt?\nDavid: The gang has been devastated. Does that mean that they can’t come back? No. These cats are the cockroaches of the cyber world. They just keep on coming and re-brand themselves. But it has been an absolute treasure trove for threat intelligence, for law enforcement. We don’t know what’s been sent to law enforcement separate from what we’ve seen posted publicly from the Conti hack. I’ve certainly enjoyed the leaked conversation. some of the highlights for me are some of the bitcoin addresses that have been published. Some research seems to show that Conti may have made as much as $2.7 billion worth of crypto since 2017, which is stunning. The other thing that was a really juicy tidbit in their chat — and again, I don’t know if this is true — they mention they have a friendly journalist who is willing to work with them to add extra pressure on a target for a five per cent cut of the ransomware.\nOne other thing from the chats I thought was really interesting was something you and I have talked about in the past, which is the role of cyber insurance. The Conti chats confirm they look for potential victims with cyber insurance and they prioritize their targets by who had a good cyber insurance policy.\nHoward: There’s another angle to this war: It may impact the ability of countries to make semiconductors.\nDavid: Ukraine produces up to 50 per cent of the neon gas the world requires for the lasers that do all the microchip etching that we rely on. Apparently the gas that they produce is a byproduct of Russian steel production. So this whole global integrated supply chain nightmare just keeps finding new ways to scare us.\nHoward: Before moving past Ukraine I also want to talk about Eugene Kaspersky. On Monday he tweeted this: \xe2\x80\x9cWe welcome the start of negotiations to resolve the current situation in you in Ukraine. And hope that they will lead to a cessation of hostilities and a compromise we believe that peaceful dialogue is the only possible instrument for resolving conflicts war isn’t good for anyone and he and he also said like the rest of the world. We’re in shock regarding the recent events. He also said, \xe2\x80\x9cLike the rest of the world we’re in shock regarding the recent events. The main thing that we can do in this situation is provide uninterrupted functioning of our products,\xe2\x80\x9d meaning Kaspersky products and services. Critics quickly complained that he didn’t use the word Invasion. He called it a \xe2\x80\x9csituation.\xe2\x80\x9d Should he have used that word? Or did he go as far as he could under the circumstances?\nDavid: I think Eugene is damned if he does damned if he doesn’t in this situation. Kaspersky\xe2\x80\x99s had a rough decade when it comes to folks’ perceptions of Russia and U.S. government suspicions around its relationship with Kaspersky. In some cases saying nothing might be your best strategy. I don’t know what the PR advice was to get in the middle of this. But if you are going to talk publicly about it, it\xe2\x80\x99s probably good to be honest — it’s an invasion. It’s an illegal invasion. He probably didn’t say it because he wants to protect his company and his staff members who are in Russia. I get it totally, understand that. But if you can’t call it like it is you just lose credibility all over the place. I don’t think he could have gone as far as that under the circumstances because he likely is very much worried that his company and his team members might suffer consequences. If that’s the case, the tweet should have been, \xe2\x80\x98This is a situation we can’t comment on.\xe2\x80\x99 Or just say nothing.\n…\nHoward: Let’s move on to the Sophos report on the hacking of a Canadian Healthcare care provider last year. Two ransomware groups separately broke into the company by exploiting the ProxyShell vulnerabilities in Microsoft Exchange Server. The first group broke in in August, 2021. The thing is several months before Microsoft had issued patches on this to close those vulnerabilities. Isn’t this another example of a failure to patch biting a company?\nDavid: Absolutely. We saw this absolute barrage of attacks against the 400,000 internet-facing Microsoft Exchange servers [when news of an exploit was revealed.] And you know, healthcare iin Canada is ridiculously under-resourced. Governments and healthcare authorities want to spend on frontline healthcare workers and services. But IT is the force multiplier for healthcare. It’s 90 per cent of [a provider\xe2\x80\x99s] ability and their efficiency. So we’ve under-resourced in this area. This is yet another Canadian healthcare story … What’s really interesting is the behaviour of the two gangs. One, called Karma apparently has some kind of scruples. They realize it’s a healthcare organization. So they don’t ransom it. They don’t encrypt the files. They don’t cripple the digital imaging. They only steal the highly sensitive information patient information and attempt to do extortion. And then rolls in Conti and it’s like, \xe2\x80\x98We\xe2\x80\x99re gonna encrypt everything.\xe2\x80\x99 I think this is one of the first times I’ve seen a multi-party attack inside a single organization.\nHoward: And it wasn’t just the lack of patching. Failure to adequately protect the employees\xe2\x80\x99 login credentials allowed both attackers to compromise accounts and elevate privileges so they could worm further into the company.\nDavid: It’s interesting. The security advice is always pretty typical — multifactor authentication, antivirus, all these different security controls that are perfectly fine in a traditional corporate environment. But when you look at healthcare you get into some really interesting ethical and technological and business process challenges. If adding MFA slows down the nurses at nursing stations when they do shift changes or to log into things, all of a sudden critical minutes or information is unavailable when a patient really needs it. There’s these really interesting unique pressures on healthcare where just throwing security solutions isn’t always the right answer. In fact, there was an interesting study in the United States that showed after a ransomware attack against a U.S. hospital when they put the security they actually slowed down response times for heart attacks inside the hospital. So hospitals are in a tough bind: They have to step up IT security but they have to find ways of minimizing impacts on healthcare delivery.\nHoward: One problem in this attack was there was no malware protection on servers. Usually — hopefully — there’s malware protection on desktops. But there was no malware protection on the servers that could have helped block this attack. Is that what you’re finding when you talk to to other organizations?\nDavid: Yes. I’m not surprised about that, particularly in health care. They often do the bare minimum. They don’t have the teams or the budget to get the more advanced tooling that we see in finance or telecom. And even if they did have malware protection on the servers do they have the right alerting to have people act on it? Do they have the network visibility to see lateral movement? Most of them don’t even come close some of those capabilities require. You to have a security operations center. But small and mid-size hospitals and even some hospital networks in Canada don’t have any of those things in place. That speaks to just how under-invested they are in IT.\nHoward: Before I leave this I want to come sort of in a way full circle back to Ukraine because I was listening to a webinar yesterday by the SANS Institute on quick ways to prevent cyber attacks from nation-states. And the number one way was patching. Patch strategically but patch fast. There\xe2\x80\x99s a link to that story here.\nThe final story I want to touch on is the alleged attempt to extort money from graphics card maker Nvidia. It was hit by the Lapsus$ gang that apparently stole some source code. Nvidia has crippled the processing power of some of its lower-end graphics cards so they can’t be used for cryptomining. The hackers are reportedly threatening to release the stolen confidential code from Nvidia unless those restrictions are dropped.\nDavid: This is a fascinating case because reportedly Nvidia tried to hack back. They got into the gang\xe2\x80\x99s system and encrypted the data that was stolen. Unfortunately for Nvidia, it appears that the Lapsus$ gang follows cybersecurity best practices and they have really good backups. It also highlights the pressure that Nvidia and others are are feeling when it comes to cryptomining. There are a lot of gamers out there who are pretty frustrated that they haven’t been able to buy the latest and greatest video cards because this stuff just gets get scooped up for these massive cryptomining farms. Nvidia was trying to strike a balance and keep its customer base happy, and then walked into a rather interesting attack.\nHoward: It’s also another example of how stealing sensitive corporate data — and in this case source code for the software that runs products — can be used by a hacker in an attempt to extort money.\nDavid: In some ways the cybercriminal market for personally identifiable information usernames and passwords and that sort of stuff is at rock bottom because there\xe2\x80\x99s so much stolen information like that out there already. Personal health information still has a high cachet, but corporate information and sensitive information are key [for crooks]. Look at the damage that was done to Sony by the Lazarus group in North Korea when they grabbed all their emails and slowly leaked them, embarrassing the company. Companies don’t realize now that that sensitive data is not only PII. It’s your business secrets.\n | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.lifars.com/tag/state-sponsored-cyber-attack/ | Overwhelmed with watching the world’s best push the limits of humanity and represent the pride of their respective countries, it’s... | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://cybersecuritysummit.com/2014/07/emerging-threats/ | We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL cookies. | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.accenture.com/id-en/about/newsroom/company-news-release-global-cyber-intrusion |
„Na první pohled se zdá, že bankovní sektor je zdravý, protože velké banky vykazují vysoké příjmy a zisky,“ říká Michael Abbott, který v Accenture globálně vede skupinu pro bankovní sektor. „Při bližším pohledu však zjistíme, že kombinace nízkých úrokových sazeb, tlak na snižování poplatků v důsledku rostoucí konkurence a nediferencované nabídky produktů pomalu snižují podíl bank na hrubém domácím produktu. A na mnoha trzích odtékají příjmy z bankovnictví a platebního styku od zavedených subjektů k těm novým. Aby tradiční banky znovu nastartovaly růst, musí prijít s novým způsobem, jak vytvářet a poskytovat atraktivní produkty zaměřené na to, co zákazníci chtějí. To bude vyžadovat přehodnocení jejich vertikálně integrovaných obchodních modelů.“
Zpráva konstatuje, že v letech 2018 až 2020 si hráči, kteří působí pouze v digitálním prostředí, vedli výrazně lépe než tradiční banky. Ale ti, kteří přijali inovativní nelineární obchodní modely, dosáhli 76% průměrné míry zhodnocení investice příjmů (CAGR), zatímco digitální hráči, kteří pouze napodobují tradiční vertikálně integrované modely, dosáhli pouze 44% průměrné míry zhodnocení. I na těch nejlépe prosperujících vyspělých trzích zvyšovaly tradiční banky příjmy průměrným tempem, které bylo nižší než 2 % ročně – i když z mnohem většího základu.
Zpráva také popisuje, jakým způsobem mohou tradiční banky využít své silné stránky – sílu rozvahy, odborné znalosti v oblasti řízení rizik a informovanost a přehled v oblasti regulací – ke zvýšení flexibility obchodního modelu a odlišení se od konkurence. Konkrétně by měly zvážit přijetí jednoho nebo kombinace následujících modelů:
Prodávat pouze produkty, které banka vytváří, a mít pod kontrolou všechny úrovně hodnotového řetězce, od vývoje až po distribuci, přičemž klíčovým faktorem hodnoty je možnost konsolidace prostřednictvím fúzí a akvizic a získávání podílu na trhu.Vybudovat distribuční ekosystém, který bude distribuovat bankovní a finanční produkty jiných společností, a vytvořit trh pro distribuci nebankovních produktů.Usilovat o škálování dodáváním technologií nebo obchodních procesů jiným společnostem.Vytvářet nové nabídky vytvářením nebo spojováním roztříštěných produktů a služeb, které mohou být distribuovány bankou nebo třetími stranami.
„Být digitální již není způsob, jak se odlišit,“ říká Pavel Klíma, Accenture Managing Director v oblasti finančních služeb. „Aby tradiční banky dosáhly růstu, měly by se stát nejen nejlepší digitální verzí sebe samých, ale také se naučit provozovat více obchodních modelů současně. To vyžaduje změnu pohledu a zvážení takových adaptivních modelů, které do popředí staví inovace produktů, účel a udržitelnost. Banky si mohou vybrat, zda budou pokračovat v inovacích svým současným tempem, nebo zda v transformaci obchodních modelů zvolí přístup lídrů či tzv. „fast-followers“. Nemohou si však dovolit stagnovat.“
Celou zprávu naleznete zde.
| 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.helpnetsecurity.com/2013/07/24/introduction-to-cyber-warfare/ | \n Authors: Paulo Shakarian, Jana Shakarian, Andrew Ruef\nPages: 336\nPublisher: Syngress\nISBN: 0124078141\n\nIntroduction\nIf you’re looking to learn about cyber warfare, but don’t know where to start, you might prefer picking up a book instead of searching for information dispersed on the Internet. Read on to see if this is the right one for you.\nAbout the authors\nPaulo Shakarian, Ph.D. is a Major in the U.S. Army and an Assistant Professor of Computer Science at West Point, teaching classes on computer science and information technology. \nJana Shakarian is a Research Fellow at the West Point Network Science Center conducting sociological research in support of various DoD-sponsored projects. \nAndrew Ruef is a Senior Systems Engineer at the firm Trail of Bits (New York, NY) where he conducts information security analysis. \nInside the book\nOnly a person wholly out of the news loop could fail to notice that the topics of cyber espionage, sabotage and cyber conflict have almost moved in the daily conversation. The recent PRISM scandal is only the last of a rather long string of news unearthing this new reality.\nIn a short introduction, the authors have managed to effectively describe a number of occurrences that present different facets of cyber warfare. As the book continues, the authors’ military background becomes even more obvious, as they present case studies (“past battles”) and show us things that can be learned from them.\nNaturally, they started with a chapter defining the idea of cyber war, and the issues of attribution, deception, and intelligence. \nThe first part of the book deals with cyber attacks: Russian hackers’ packet flooding of Estonian computer systems in 2007; the 2008 Russian cyber campaign against Georgia, and how the attack was coordinated with that of conventional, real-world army forces; the Israel-Hezbollah “July War” of 2006, cyber attacks against media and dissidents, and non-state sponsored attacks such as the ones perpetrated by Anonymous and affiliated groups.\nThe second one addresses cyber espionage and exploitation, especially the various aspects of Chinese cyber strategy, the various spying tools / malware such as Duqu and Flame that is considered to have been developed by hackers working for a nation-state, espionage via social networking, and information theft during real-world conflicts.\nFinally, the third one deals with cyber sabotage – attacks against critical national infrastructure and industrial facilities.\nThe too-short conclusion gives a few theories about the future of cyber warfare, and the book ends with a two extremely comprehensive timelines of Anonymous and LulzSec attacks (date, scope, reasons).\nFinal thoughts\nThis book will give you a good base on the topic of cyber warfare and its different aspects. Despite its length, it tackles many incidents, so the authors have understandably not gone extremely in-depth. If you are interested in knowing more about each of the touched upon issues and incidents, they have provided many, many references and have offered a number of additional sources.\nThe military-style approach to the subject turned out to be perfect – the book is a balanced blend of history and technical details that makes it very easy to read. The only thing that I wished for while reading it was that some of the authors were foreigners (i.e. non-US citizens), so that I could enjoy their takes on the subject.\n\n\n \n \n \n \n\n \n \n | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.msspalert.com/news/hackers-attack-defense-contractor-cpi | U.S. defense contractor CPI suffered a ransomware attack in January 2020, paid hackers a $500,000 extortion fee, and is still recovering from the attack as of March 5, TechCrunch reports.CPI, short for Communications & Power Industries, employs roughly 1,800 people and generated sales of roughly $504 million in fiscal 2019, the company's website says. The company, based in Palo Alto, California, develops devices that generate, amplify, transmit and receive microwave signals for commercial and military applications.CPI has hired a third-party forensic investigation firm to investigate the attack -- which apparently involved a phishing incident, TechCrunch says.Cyber crime victims have paid more than $140 million to ransomware attackers since 2014, a recent study by the Federal Bureau of Investigation (FBI) found.At this point, the average ransomware demand is about $84,000 with one-third of victims paying the ransom, security specialist Emsisoft says. | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.msspalert.com/news/hackers-attack-defense-contractor-cpi | U.S. defense contractor CPI suffered a ransomware attack in January 2020, paid hackers a $500,000 extortion fee, and is still recovering from the attack as of March 5, TechCrunch reports.CPI, short for Communications & Power Industries, employs roughly 1,800 people and generated sales of roughly $504 million in fiscal 2019, the company's website says. The company, based in Palo Alto, California, develops devices that generate, amplify, transmit and receive microwave signals for commercial and military applications.CPI has hired a third-party forensic investigation firm to investigate the attack -- which apparently involved a phishing incident, TechCrunch says.Cyber crime victims have paid more than $140 million to ransomware attackers since 2014, a recent study by the Federal Bureau of Investigation (FBI) found.At this point, the average ransomware demand is about $84,000 with one-third of victims paying the ransom, security specialist Emsisoft says. | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.darkreading.com/cyberattacks-data-breaches/new-threats-old-threats-everywhere-a-threat | In 1918, magician Harry Houdini made an elephant vanish in front of an astounded live audience at the New York Hippodrome. In 1904, British magician and inventor Nevil Maskelyne became the first hacker after disrupting Guglielmo Marconi's demonstration of wireless technology in hopes of making Marconi's proofs of "secure and private communication" seem imprudent.What do these famous illusionists have to do with the cyber threat landscape a century later? Well, cybercriminals like to make themselves vanish. Modern illusion techniques are about obfuscation and evasion, and bad actors are switching tactics at an alarming rate today in an attempt to evade security and law enforcement. Their digital footprints are, like Houdini’s elephant, ephemeral.A good cybersecurity strategy needs to do the opposite of a magician: make cyber threats visible and prevent critical network resources from vanishing. Knowledge of the latest threats provides the power to defeat them. Here are some of the key findings from Fortinet's Threat Landscape Report recent report for the first quarter of 2018.CryptojackingWe covered the explosion of cryptojacking (aka cryptomining) attacks across the threat landscape in our last report. In this type of attack, malware hijacks the victim's computer to mine cryptocurrency. Things have gotten even more jacked up from there. The prevalence of cryptomining malware has more than doubled quarter over quarter, from 13% to 28%. This malware is also evolving, making it more difficult to prevent and detect.Cryptojacking was especially prevalent in the Middle East, Latin America, and Africa last quarter. Cryptomining malware is also showing incredible diversity for such a relatively new threat. Cybercriminals are creating stealthier fileless malware to inject infected code into browsers with less detection. Miners are also targeting multiple operating systems and a variety of cryptocurrencies, including Bitcoin and Monero. They are also fine-tuning and adopting delivery and propagation techniques from other threats based on what was successful or unsuccessful in order to improve future success rates.In short, criminals follow the money and are quick to leverage new opportunities to achieve that goal. They've clearly discovered that hijacking systems for mining cryptocurrencies is a profitable venture, so we can expect continued investment and innovation in this business model.BotnetsWhereas exploit and malware trends usually show the pre-compromise side of attacks, botnets give a post-compromise view. Once infected, systems often communicate with remote malicious hosts, and detecting such traffic in a corporate environment indicates something went wrong. That makes this data set valuable from a "learning from our mistakes" perspective.We found that while 58% of botnet infections only last one day, and about 5% last more than a week. Measuring how long botnet infections persist based on the number of consecutive days in which continued communications are detected reveals that cyber hygiene involves more than just patching. It's also about cleanup. Forty-two percent of organizations did not clean up infections for one to nine or more days, while 6% took more than a week.We've all learned by now that infections will inevitably occur at some point, even in the most hardened networks. But detecting and remediating those infections quickly to eradicate threats from the environment — and to prevent reinfection — is the sign of successful cybersecurity programs.Gone but Not ForgottenThe Andromeda botnet, also known as Win32/Gamarue, is an HTTP-based modular botnet that's been infecting computers since it appeared in 2011. Andromeda continues to show up prominently across our sensors, despite a major law enforcement takedown operation in the fourth quarter of last year. It remains among the top three botnets for the first quarter of 2018 in both volume and prevalence. At first glance, this seems to suggest the takedown operation targeted at Andromeda wasn't very successful. However, further analysis reveals it reflects lax security hygiene.We compared organizations that are still infected with the Andromeda botnet, which is no longer circulating in the wild, to see if they were suffering from other threats as well. They were. Firms exhibiting Andromeda infections in the first quarter had nearly three times the number of active botnets in their environment. It's likely, then, that Andromeda infections can be used as a proxy for poor security hygiene and/or sluggish incident response practices.Destructive and Designer AttacksThe impact of destructive malware remains high, particularly as criminals combine it with designer attacks. For these more-targeted attacks, criminals conduct significant reconnaissance on an organization before launching an attack, which helps them to increase their success rates. Afterward, once they permeate the network, attackers move laterally across the network before triggering the most destructive part of their planned attack. The Olympic Destroyer malware and the more recent SamSam ransomware are examples of cybercriminals combining a designer attack with a destructive payload for maximum impact.This combination of design specification and destructive tendencies exemplified by the malware events are worrying. As strange as it sounds, the stealthy command-and-control objectives of most malware over the last decade have caused many firms to let their guard down. Detection and response became the key challenge. With worms and destructive malware back in the forefront, it's time to get that guard back up.Keep Your Eyes OpenFrom cryptojacking to botnets to malware, cybercriminals keep evolving their attack methods to increase their success rates. But forewarned is forearmed. While Houdini taught us not to believe everything we see, the data from this report tells us that the more we can see, the more easily we can defeat it. The data reminds us not to be lulled into complacency by what's gone before or to forget about the basics, such as good cyber hygiene. In this dynamically changing environment, IT security teams stand a much better chance of defeating the latest cyber schemes when they know what to look for.Related Content: | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.avanan.com/resources/white-papers/1h-cyber-attack-report |
The Avanan solution allows us to have a comprehensive email security solution that integrates seamlessly with our Office 365 environment while "staying enough out of the way" as to not hinder productivity.
— Infrastructure and Operations Analyst in Manufacturing
| 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://netdiligence.com/newsletters/cyber-risk-news-vol-258-july-19-2023/ | We bring to your attention a sampling of recent media stories involving cyber risk & privacy liability. Among the stories we\xe2\x80\x99re highlighting this month: Australian Government Says Its Data Was Stolen in Law Firm Ransomware Attack, Capita Faces Class Action Lawsuit After Data Breach, Atomic Wallet Heist: Hackers Utilize THORchain to Mask $35 Million Stolen Funds, and more.\nRansomware Corner\nOnix Group Sued for Failing to Prevent Ransomware Attack and 320K-Record Data Breach\nOnix Group, a Pennsylvania-based real estate development firm and provider of business management and consulting services, is being sued for failing to prevent a ransomware attack in which the hackers stole the protected health information of 320,000 individuals. Click to read entire article.\nHarvard Pilgrim Health Care Ransomware Attack Hits 2.5 Million People\nHarvard Pilgrim Health Care (HPHC) has disclosed that a ransomware attack it suffered in April 2023 impacted 2,550,922 people, with the threat actors also stealing their sensitive data from compromised systems. Click to read entire article.\nBlackCat Claims They Hacked Reddit and Will Leak the Data\nOperators broke into Reddit on February 5, 2023, and took 80 gigabytes (zipped) of data. Reddit was emailed twice by operators, once on April 13 and again on June 16. Click to read entire article.\nTechnology\nMicrosoft Confirms Recent Service Outages Were DDoS Attacks, Offers Protection Tips\nBeginning in early June 2023, Microsoft identified surges in traffic against some services that temporarily impacted availability. Microsoft promptly opened an investigation and subsequently began tracking ongoing DDoS activity by the threat actor that Microsoft tracks as Storm-1359. Click to read entire article.\nRetail\nDon Roberto Settles Data Breach Lawsuit\nDon Roberto Jewelers, a 90-store chain based in San Clemente, Calif., has agreed to a $4 million settlement, following a 2021 data breach, which exposed the personal information of some 185,000 customers. Click to read entire article.\nSnack Food\nSnack Food Company Mondelez Warns Employees of Data Theft\nMondelez, the U.S. manufacturer of Oreo cookies and Milka chocolate, has warned employees that their personal data has been compromised through a breach at the law firm Bryan Cave, which provides legal services to Mondelez and other Fortune 500 companies. Click to read entire article.\nFinancial Services\nFirstBank Puerto Rico Announces Data Breach After Cyberattack at MIAC\nOn June 8, 2023, Mortgage Industry Advisory Corporation (\xe2\x80\x9cMIAC\xe2\x80\x9d) filed a notice of data breach on behalf of FirstBank Puerto Rico after MIAC determined that a cyberattack targeting the company\xe2\x80\x99s IT network resulted in FirstBank customer data being leaked. Click to read entire article.\nUmpqua Bank Said It\xe2\x80\x99s Part of Data Hack, No Proof Yet of Breach\nUmpqua Bank is alerting its customers about a data breach. It said it involves the same hack that pulled data from Oregon’s Department of Transportation driver’s license database this month. The State of Oregon said 3.5-million Oregonians’ personal data could be hacked in a data breach of the state’s transportation department. The United States Department of Homeland Security is investigating the MOVEit hack as a Russian cyberattack. Click to read entire article.\nBackground Check\nCreative Services Data Breach $1.2M Class Action Settlement\nCreative Services Inc. (CSI) agreed to pay $1.2 million to resolve claims it failed to prevent a 2021 data breach that compromised sensitive employee and consumer information. Click to read entire article.\nHealthcare\n4 Health Systems Facing Lawsuits for Data Breaches\nSeveral hospitals and health systems across the U.S. are facing lawsuits regarding data breach incidents that involved patients’ protected health information. Click to read entire article.\nApria Healthcare Hit with Class Action Over Data Breach Affecting 1.8M People\nThe 45-page lawsuit says that Apria, a provider of home medical equipment and services for sleep apnea, wound care and diabetes, announced in May 2023 that unauthorized third parties had accessed its network at various times between April 5 and May 7, 2019, and again between August 27 and October 10, 2021. Click to read entire article.\nLegal Investigation Looks into PharMerica Data Breach: Was Your Info Exposed?\nThe pharmacy services provider recently announced that an unauthorized third party had gained access to its computer systems and obtained patients\xe2\x80\x99 highly sensitive data \xe2\x80\x93 including their names, dates of birth, Social Security numbers, medication lists and health insurance information. Click to read entire article.\n16,000 Vermont Health Insurance Customers Affected by Data Theft, More Than Previously Known\nThe cyberattack mostly impacted members of Vermont Blue Advantage, but other insurance plan holders were also affected. Click to read entire article.\nPublic Entity\nThe Washington Department of Licensing Agreed to Pay $3.6 Million to Resolve Claims That It Failed to Prevent a 2022 Data Breach\nPlaintiffs in the data breach class action lawsuit claim that the Washington Department of Licensing could have prevented the security incident through reasonable cybersecurity measures but failed to do so out of negligence. The 2022 data breach compromised sensitive information such as licensing information, Social Security numbers, birth dates and ID numbers. Click to read entire article.\nThousands May Have Had Personal Info Exposed in January Cyberattack, DMPS says\nNearly 6,700 people may have had their personal information exposed in a January cyberattack against Des Moines Public Schools, the district said. Click to read entire article.\nGOHSEP Announces Additional Safety Steps to Protect Against MOVEit Cyber Breach\nThe Governor\xe2\x80\x99s Office of Homeland Security and Emergency Preparedness (GOHSEP) announced that additional information has been added to the website nextsteps.la.gov to help Louisianans better protect themselves against identity theft in light of a recent MOVEit cybersecurity breach in Louisiana as well as several other states and countries. Click to read entire article.\nHigher Ed\nUTMC Involved in Fortra Data Breach\nThe U.S. Department of Health and Human Services recently announced the discovery of a data breach involving cybersecurity company Fortra, which may have affected more than four million people worldwide. This attack specifically targeted medical data, including data at the University of Toledo Medical Center. Click to read entire article.\nUSG Says Data May Have Been Exposed in Breach\nThe University System of Georgia said cybercriminals likely had access to data stored in software that is used across the system, including at the University of Georgia. The breach is related to the MOVEit Secure File Transfer and Automation software, which USG and UGA use to store and transfer sensitive data, according to a statement from USG. The software\xe2\x80\x99s creator, Progress Software, identified a defect in the program that may have exposed data. Click to read entire article.\nCrypto\nAtomic Wallet Heist: Hackers Utilize THORchain to Mask $35 Million Stolen Funds\nIn a shocking revelation, blockchain detective MistTrack has unveiled the masterminds behind the audacious $35 million theft from Atomic Wallet. The perpetrators, exhibiting unparalleled expertise in the field, cunningly employed the cross-chain liquidity protocol THORChain to obfuscate their illicit activities and launder the stolen funds. Click to read entire article.\nAfrica\nData Breach: Banks, Telcoms, Oil Firms To Lose 2% Revenue, Says FG\nThe Nigeria Data Protection Commission (NDPC) has disclosed that henceforth commercial banks, telecommunications companies, and other organizations will now lose two percent of their annual revenue to the federal government for any breach of their customers\xe2\x80\x99 data, thegazellenews.com reports. Click to read entire article.\nAsia Pacific\nAustralian Government Says Its Data Was Stolen in Law Firm Ransomware Attack\nThe Office of the Australian Information Commissioner (OAIC) says some of its files were stolen in a ransomware attack on law firm HWL Ebsworth. Click to read entire article.\nMedibank\xe2\x80\x99s Staff Details Stolen After Property Manager Faces Cyber Breach\nAustralia’s largest private health insurer Medibank Private said a file containing names and contact details of staff members had been compromised after its property manager faced a cybersecurity breach. Click to read entire article. \nJapan\xe2\x80\x99s Largest Port Stops Operations After Ransomware Attack\nThe Port of Nagoya, the largest and busiest port in Japan, has been targeted in a ransomware attack that currently impacts the operation of container terminals. The port accounts for roughly 10% of Japan’s total trade volume. It operates 21 piers and 290 berths. It handles over two million containers and cargo tonnage of 165 million every year. Click to read entire article.\nEU/UK\nEuropean Investment Bank Attacked, Hackers Claiming to \xe2\x80\x9cImpose Sanctions on EU\xe2\x80\x9d\nThe pro-Russian Killnet hackers group claimed on their Telegram to have targeted the inter-network infrastructure of the EIB. Click to read entire article.\nCapita Faces Class Action Lawsuit After Data Breach\nBarings Law has launched a lawsuit against Capita. Click to read entire article.\nPro-Russia Hacker Group Claims Major DDoS Attack on the Port of Rotterdam\nThe Port of Rotterdam, the largest seaport in Europe, reportedly suffered a major cyber attack that knocked off its official website for hours. Click to read entire article.\nHackers Warn University of Manchester Students of Imminent Data Leak\nThe ransomware operation behind a cyberattack on the University of Manchester has begun to email students, warning that their data will soon be leaked after an extortion demand was not paid. The threat actors claim to have stolen 7 TB of data from the University of Manchester during a June 6th cyberattack in an email sent to students and shared with BleepingComputer. Click to read entire article.\n | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.darkreading.com/cyberattacks-data-breaches/hacker-known-as-vigilance-charged-for-cyberattacks-on-minnesota-state-government-databases | PRESS RELEASEUnited States Attorney Gregory G. Brooker today announced a five-count indictment charging CAMERON THOMAS CROWLEY, a/k/a “Vigilance,” 19, with intentional access to a protected computer, intentional damage to a protected computer, and aggravated identity theft. CROWLEY made his initial appearance earlier this afternoon before United States Magistrate Judge Becky R. Thorson in Saint Paul, Minnesota. CROWLEY will remain in federal custody pending his detention hearing.According to the indictment, between May 28, 2017 and June 17, 2017, CROWLEY intentionally gained unauthorized access to protected computer servers owned by the State of Minnesota and other entities. CROWLEY also caused the transmission of programs, code, and commands to the protected computer servers, causing damages and a loss to the State of Minnesota of more than $5,000. The indictment also charges CROWLEY with one count of aggravated identity theft.This case is the result of an investigation conducted by the FBI and the Minnesota Bureau of Criminal Apprehension. Assistant U.S. Attorney Katharine T. Buzicky is prosecuting the case.Defendant Information: CAMERON THOMAS CROWLEY, a/k/a “Vigilance,” 19Lino Lakes, Minn.Charges:Intentional access to a protected computer, 3 countsIntentional damage to a protected computer, 1 countAggravated identity theft, 1 count | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.metacompliance.com/de/blog/category/cyber-security-awareness/page/14 |
MetaBlog zum Bewusstsein für Cybersicherheit
Es war ein arbeitsreiches Jahr 2018 hier bei MetaCompliance, in dem wir mehrere neue Gesichter in unser Team aufgenommen haben. Aufgrund des anhaltenden Wachstums wurden im gesamten Unternehmen in verschiedenen Abteilungen zusätzliche Mitarbeiter benötigt, um unser Ziel zu erreichen, unseren weltweiten Vertrieb und unsere Marktpräsenz auszubauen.
Mehr erfahren "
James MacKay
April 12, 2018
| 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.hackread.com/it-security-firm-qualys-extorted-clop-gang-data-breach/ | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
|
https://www.cybersecurityintelligence.com/blog/cyber-crime-in-2025-5817.html |
Cyber crime costs include damage and destruction of data, stolen money, lost productivity, theft of intellectual property, theft of personal and financial data, embezzlement, fraud, post-attack disruption to the normal course of business, forensic investigation, restoration and deletion of hacked data and systems, and reputational harm. A 2020 World Economic Forum Report say’s that cyber attacks on infrastructure were probably the fifth highest risk to business.The US government says that many of the recent cyber attacks against America have been sourced to operations in Russia and that Russia has responsibility for the ransomware attacks that are carried out from its territory and by one authoritative estimate, the worldwide cost of cyber crime is expected to reach $10.5 trillion dollars by 2025. These numbers are alarming, and for us to better understand the tremendous impact that cyber attacks might have on companies and individuals, it is important to look back and consider some of the biggest cyber attacks in history: Melissa Virus: One of the earliest and biggest cyber threats was started by the Melissa Virus. In1999, the Melissa Virus was unleashed by a rogue programmer by sending users a file to be opened by Microsoft Word. The virus caused severe destruction to hundreds of companies, including Microsoft. NASA Cyber Attack: In 1999, a 15 year old schoolboy was able to hack and shutdown NASA’s computers for 21 days. Around 1.7M software were downloaded during the attack, which cost the space giant around $41,000 in repairs. Estonia Cyber Attack: In April 2007, Estonia witnessed what is thought to be the first cyber attack on an entire country, during which about 58 Estonian websites went offline, including websites of governments, banks and media outlets. Attack on Sony’s PlayStation Network: A cyber attack on Sony’s PlayStation Network in April 2011 claimed the personal information of 77 million users. Adobe Cyber Attack: The cyber attack which was first thought to have breached the data of 2.9 million users soon went on to compromise the personal data of up to 38 million users. Adobe claims that only the passwords and credit card information of the first 2.9 milion were compromised, whereas the remaining 35.1 million users only suffered the loss of their passwords and IDs. Attack on Yahoo: In 2014,Yahoo witnessed one of the biggest cyber attacks of the year when 500 million accounts were compromised. However, it is reported that basic information and passwords were stolen, whereas bank information was not. Ukraine’s Power Grid Attack: In what was the first cyber attack on a power grid, the attack left around half of the homes in the Ivano-Frankivsk region in Ukraine without power in 2015 for about a few hours. WannaCry Ransomware Attack: One of the biggest ransomware of all time took place in 2017, when around 200,000 computers were affected in more than 150 countries. This outbreak had a massive impact across several industries and had a global cost of about £6 billion.Cyber Attack on Marriott Hotels: A cyber attack was lurking in the shadows for quite a while when Marriott acquired the Starwood Hotels group, and it did not come into light until 2018 . However, by then the attacker continued to have access to personal information of guests.More than 339 milion guests have had their data compromised. This had led the UK’s data privacy watchdog to fine the Marriott Hotels £18.4 million. The biggest password leak yet: It was reported earlier this June that a compilation of about 8.4 billion passwords were leaked. This by far is the biggest password leak and is referred to as #RockYou2021 in reference to the 2009 data breach of RockYou site that compromised around 32 million accounts. Cyber Attacks Last Month - July 2021A data leak impacted Northern Ireland's COVIDCert online vaccination certification service, causing their Department of Health to temporarily suspend the portal.Estonia stated a Tallinn-based hacker downloaded 286,000 ID photos from government database, exposing a vulnerability in a platform managed by their Information System Authority (RIA).A widespread APT operation was discovered against users in Southeast Asia, believed to be spearheaded by Chinese entities. Researchers found a total of 100 victims in Myanmar and 1,400 in the Philippines, including many government entities.The Japan 2020 Olympics was subject to data breach exposing the personal credentials of volunteers and ticket holders. The information included usernames, passwords, addresses, and bank account numbers.The United States, the European Union, NATO and other world powers released joint statements condemning the Chinese government for a series of malicious cyber activities. They attributed responsibility to China for the Microsoft Exchange hack from early 2021 and the compromise of more than 100,000 servers worldwide.In short, the more we move towards digitalisation and technology, the more vulnerable we become to cyber threats.Technology is a double-edged sword, while it is a great asset and can provide us with new advanced methods of security, there are still those who misuse it and can pose a threat to our privacy. It is imperative for governments and businesses to invest in upgrading their cyber security and online privacy combat cyber attacks. WEF: CSIS: Cyber Security Ventures: Guardian: Al Bawaba: You Might Also Read:Minimising The Impact Of Ransomware:
Directory of Suppliers
DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.
As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.
MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.
Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.
Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.
Belgian consulting firm providing services in the security and compliance of information systems and IT service management.
Intrinsic-ID's authentication technology creates unique IDs and keys to authenticate chips, data, devices and systems.
Ambersail provide Penetration Testing and Cyber Security Compliance services.
Praetorian is an offensive cybersecurity company whose mission is to prevent breaches before they occur.
ClickDatos specializes in consulting, auditing, data protection training, accredited by ISO/IEC 27001 certification.
Hypori is a virtual smartphone solution that makes truly secure BYOD a reality for organizations in healthcare, finance, government, and beyond.
Mvine's primary business is authoring and selling Cyber-Secure Platforms for Collaboration Portals and for Identity Management as well as delivering cloud support services.
Search vacancies from top cyber security jobs worldwide on CyberSecurity Professionals. View IT security jobs or upload your CV to be seen by recruiters from industry leading firms.
National Health Care Anti-Fraud Association is the leading national organization focused exclusively on the fight against health care fraud.
Blackbird.AI provides an intelligence and early-warning system to help users detect disinformation and take action against threats.
SHIELD are the world’s leading cybersecurity company specializing in cyber fraud and identity solutions.
Prosperoware develop software for cybersecurity, privacy, and regulatory compliance for content systems, and financial matter management.
ZARIOT's mission is to restore order to what is becoming connected chaos in IoT by bringing unrivalled security, control and quality of service.
CodeHunter is a malware hunting SaaS platform designed to detect all variations of malware, known and unknown, without the need for source code or signatures.
Drumz plc is an investment company whose investing policy is to invest principally but not exclusively in the technology sector within Europe.
Pulsant is the UK’s premier digital edge infrastructure company providing next-generation cloud, colocation and connectivity services.
| 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.industrialcybersecuritypulse.com/networks/industrial-cybersecurity-market-to-reach-43-billion-by-2032/ | According to a Future Market Insights study,- ESOMAR-certified market research and consulting firm- the Industrial Cybersecurity Market is anticipated to record a CAGR of 7.7% during the forecast period ranging from 2022-2032. The global industrial cybersecurity market is forecasted to be valued at $20.7 billion in 2022 and is projected to reach $43.5 billion by 2032. The industrial cybersecurity market is anticipated to embark on a positive expansion trajectory, due to the increasing adoption of emerging technologies such as 5G networks, big data, and artificial intelligence (AI) across industries. The demand for cybersecurity solutions across industries is predicted to increase as the demand for advanced solutions such as firewalls, antivirus, and intrusion detection systems (IDS) grows. During the anticipated period, the demand for industrial cybersecurity solutions in the Asia Pacific is expected to increase at the fastest rate. Major firms in China, India, Taiwan, Japan, Australia, South Korea, and other ASEAN nations are concentrating their efforts on cloud-based security applications. In the manufacturing industry, these countries have a large number of small and medium companies (SMEs) and start-ups. Additionally, increased internet penetration in various regions of the globe is anticipated to contribute to the growth of the industrial cybersecurity market share. Not just this, but the increased adoption of Internet of Things (IoT) solutions in industrial control systems and cloud security applications is driving the industrial cybersecurity market size. \xe2\x80\x9cIn the years ahead, rising acceptance of cloud security solutions and IoT in industrial cybersecurity systems are anticipated to drive market expansion. As vast volumes of data and information are generated across sectors daily, one of the developing market trends is integrating industrial cybersecurity solutions with modern cloud services.\xe2\x80\x9d said a market analyst at Future Market Insights. Four key takeaways from industrial cybersecurity report The software is anticipated to hold the most market share. DDoS, firewall, SCADA encryption, virtualization security, antivirus/malware, backup & recovery, and other software solutions are all seeing increased demand. Cloud application security is expected to increase at the fastest rate. This is mostly due to the heavy manufacturing industry’s increased usage of cloud technologies. The discrete end-user industry is expected to dominate the market. The demand for IoT-enabled devices, 5G networks, and industry 4.0 solutions are driving the increase. North America and Europe are expected to have a significant market share. The rise in investment for the expansion of secure IT infrastructure across the automotive industry is largely responsible for regional growth. Increased spending on infrastructure as a service (IaaS) Shortly, spending on infrastructure as a service (IaaS) and cloud computing tools is expected to rise. These investments will help to foster a variety of growth prospects and demand for industrial cybersecurity in industrial applications. The major industrial cybersecurity companies include the domination by Schneider Electric SE, Rockwell Automation Inc., CyberArk Software Ltd, ABB Ltd., and Bayshore Networks Inc. These companies are focused on adopting new organic and inorganic plans to increase their industrial cybersecurity market stronghold and attract more customers. Furthermore, the top players are concentrating on finishing pending investments and business initiatives to reclaim their market position. Other key developments in the global market have been highlighted below: IBM Corporation released the Secure Access Service Edge (SASE) solution in August 2022, to assist enterprises in implementing cloud-delivered security closer to users and devices accessing corporate resources. SASE is a cloud-based solution that combines software-defined networking and network security technologies. Honeywell International Inc. and Acalvio Technologies (US) teamed together in January 2022 to launch HTDP, a platform designed to identify known and new cyberattacks in commercial buildings’ OT environments. To thwart attackers, the sophisticated active defensive system employs autonomous deception methods and provides high-fidelity threat detection. To meet the growing need for improved OT cybersecurity solutions from the energy, process, and hybrid industries, ABB Ltd. (Switzerland) teamed with Nozomi Networks (US), a leading provider of OT and IoT security and visibility solutions, in March 2022. Nozomi Networks’ sophisticated solutions for operational robustness and real-time network visibility were integrated into ABB’s global automation and digitalization customers as a result of this acquisition. – Future Market Insights is a CFE Media and Technology content partner. Edited by Chris Vavra, web content manager, Control Engineering, CFE Media and Technology, [email protected]. Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process. | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.darkreading.com/cyberattacks-data-breaches/china-based-cyber-espionage-campaign-targets-satellite-telecom-defense-firms | An advanced persistent threat group that is believed to be operating out of China is conducting a wide-ranging cyber espionage campaign targeting satellite, telecommunications, and defense organizations mostly in Southeast Asia and the United States.Security vendor Symantec, which uncovered the campaign, says what's most worrying about the activity of the so-called Thrip group is its apparent interest in the operational networks of some of its victims. That suggests the attack group's motives may extend beyond spying to actual service disruption as well, the security vendor says."Thrip focused on systems that had software designed for the command and control of satellites," says Jon DiMaggio, senior threat intelligence analyst at Symantec. Thrip also targeted a company in the geospatial imagery business."Putting the two together makes a nice target package for an attacker that is interested in the information traversing through these satellites and the technology needed to make use of that data," DiMaggio notes. While Thrip might have been primarily interested in data theft with these two targets, the group certainly had the access to disrupt services. "The fact that an attacker could obtain that level of access should be very alarming and not taken lightly."This is not the first time that security experts have warned about the potential for attackers to exploit vulnerabilities in satellite systems and equipment to disrupt critical services.Four years ago, a security researcher at IOActive reported finding several critical flaws in firmware of widely used land-based satellite equipment that he warned could be used to disrupt communication services to airplanes, ships, industrial facilities and elsewhere. The same researcher is now scheduled to demonstrate at Black Hat USA 2018 how attackers can actually exploit such flaws to hijack communication links to airplanes, ships, and other facilities.DiMaggio says Symantec has been unable so far to determine the exact infection vector that Thrip has been using in its current campaign. So it is unclear if the group might have targeted or exploited any of the vulnerabilities that IOActive has previously highlighted.Symantec has been tracking Thrip since 2013 and believes the latest campaign began sometime in 2017. The security vendor stumbled upon the activity when it observed someone using Microsoft's PsExec tool to move laterally on the network of a large telecom operator in Southeast Asia. Symantec's investigation of the activity led to the discovery of a malicious tool previously associated with Thrip called Rikamanu being used in the attack. Symantec subsequently discovered three computers based in China being used in the Thrip attacks.Its latest targets have including communications firms, geospatial imaging companies, and organizations in the defense sectors in the US and Southeast Asia.Initially, Thrip relied heavily on custom-developed malware tools for its campaigns. But over the years Thrip has evolved to using a mix of legitimate software and system admin tools as well, Symantec says.In the current campaign, for instance, Thrip has been using PsExec, a Microsoft tool for executing processes on other systems, for lateral movement on victim networks. Similarly, it has been using WinSCP, an open source FTP client to exfiltrate data, and also LogMeIn to apparently try and gain remote access to systems in target networks. Another tool that Thrip has been using in its current campaign is Mimikatz — software that can be used to escalate privileges, export security certificates and recover Windows passwords.Thrip's tactic of using legitimate tools is a living-off-the-land approach that many other threat groups are using these days to avoid detection and attribution. Legitimate tools give attackers a way to hide malicious activity behind seemingly legitimate processes, thereby giving them a way blend in on the victim network. Importantly, using such tools makes it much harder to attribute attacks and campaigns to specific groups as well."We are starting to see attackers use various attacks in their arsenal, and not only rely on custom developed malware," says Anthony Giandomenico, senior security researcher at Fortinet FortiGuard Labs, which also issued an advisory on the Thrip campaign this week. "Using a combination of tools that are publicly available [and] has legitimate uses, along with [custom] malware, makes for an effective attack."But as with previous campaigns, Thrip has also been using several custom-developed malware tools, Symantec says. They include Rikamanu, an information stealer; Catchamas, which is an updated version of Rikamanu; a keylogger named Mycicil; and a Trojan named Syndicasec."[Thrip has] absolutely matured in sophistication over the five years we have been tracking this group," DiMaggio says. "While we did not see any disruption or sabotage take place in this campaign, it technically may have been possible based on the systems Thrip was interested in."The takeaway for organizations is the need to be extremely careful and diligent in their security posture, Dimaggio says. With more attackers now using living off the land tools and blending in with legitimate traffic, active defense is now a necessity. "Active defense does not mean hacking back, but does mean proactively hunting for this type of activity in their environments."Related Content:Why Cybercriminals Attack: A DARK READING VIRTUAL EVENT Wednesday, June 27. Industry experts will offer a range of information and insight on who the bad guys are – and why they might be targeting your enterprise. Go here for more information on this free event. | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.cybersecurityintelligence.com/blog/category/technology--developments-15.html?page=73 | \n\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\n\t\t\t\t\n\t\t\t\t\r\n \r\n « Back to News\r\n\t\r\n\t\r\n\t\r\n\r\n\t\t\t\r\n\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\t2015-10-15\r\n\t\t\t\t\r\n\t\t\t\tSilent Circle has released a second version of its signature smartphone designed to defeat tracking and interception.\r\n\t\t\t\t\r\n\t\t\t\r\n\t\t\t\t\r\n\t\t\t\r\n\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\t2015-10-15\r\n\t\t\t\t\r\n\t\t\t\tBitcoin has been around for years. Its underlying technology \xe2\x80\x94 the blockchain \xe2\x80\x94 might be the most interesting and disruptive part of it.\r\n\t\t\t\t\r\n\t\t\t\r\n\t\t\t\t\r\n\t\t\t\r\n\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\t2015-10-13\r\n\t\t\t\t\r\n\t\t\t\tApple has acquired a UK software startup that could give its digital assistant Siri a boost and has a growing portfolio of AI acquisitions.\r\n\t\t\t\t\r\n\t\t\t\r\n\t\t\t\t\r\n\t\t\t\r\n\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\t2015-10-13\r\n\t\t\t\t\r\n\t\t\t\tAs everything in our Internet-enabled world becomes increasingly connected, everything is becoming accessible and potentially vulnerable.\r\n\t\t\t\t\r\n\t\t\t\r\n\t\t\t\t\r\n\t\t\t\r\n\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\t2015-10-12\r\n\t\t\t\t\r\n\t\t\t\tDreamy, Nosey, Tracker and Paranoid - the unlikely team of GCHQ avatars that can power remote surveillance & control of mobile phones.\r\n\t\t\t\t\r\n\t\t\t\r\n\t\t\t\t\r\n\t\t\t\r\n\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\t2015-10-08\r\n\t\t\t\t\r\n\t\t\t\tSmartphone users can do "very little" to stop security services getting "total control" over their devices, says Edward Snowden.\r\n\t\t\t\t\r\n\t\t\t\r\n\t\t\t\t\r\n\t\t\t\r\n\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\t2015-10-07\r\n\t\t\t\t\r\n\t\t\t\tThe Pentagon\'s emerging technology agency wants to know what a device\'s thermal output shows about potential cyber-intrusions.\r\n\t\t\t\t\r\n\t\t\t\r\n\t\t\t\t\r\n\t\t\t\r\n\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\t2015-10-06\r\n\t\t\t\t\r\n\t\t\t\tAI-powered business applications will automate jobs, rather than just a task and the the effects will ripple across organizations.\r\n\t\t\t\t\r\n\t\t\t\r\n\t\t\t\t\r\n\t\t\t\r\n\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\t2015-09-23\r\n\t\t\t\t\r\n\t\t\t\tA printed "memory label" from Xerox that stores 36 bits of data that can be encrypted and used for authentication & tracking\r\n\t\t\t\t\r\n\t\t\t\r\n\t\t\t\t\r\n\t\t\t\r\n\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\t2015-09-25\r\n\t\t\t\t\r\n\t\t\t\tStudy into artificial intelligence research is no longer the preserve of universities.\r\n\t\t\t\t\r\n\t\t\t\r\n\t\t\t\t\r\n\t\t\t\r\n\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\t2015-09-15\r\n\t\t\t\t\r\n\t\t\t\tAdvances in cryptography show how near-perfect computer security might be close at hand.\r\n\t\t\t\t\r\n\t\t\t\r\n\t\t\t\t\r\n\t\t\r\n \n\t\t\t\t\n\n\t\t\t\n \n\t\t\n \n \n \n \n\n \n\n\n\n\t\t\t\t\n\n\t\t\t\t\n\n\t\t\t\t\t\n\n\t\t\t\t\t\tDirectory of Suppliers\n\n\t\t\t\t\t\n\n\t\t\t\t\n\n\t\t\t\t\t\r\n \r\n \r\n \r\n DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.\r\n \r\n \r\n\t\r\n \r\n \r\n \r\n MIRACL provides the world\xe2\x80\x99s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.\r\n \r\n \r\n\t\r\n \r\n \r\n \r\n Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.\r\n \r\n \r\n\t\r\n \r\n \r\n \r\n Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.\r\n \r\n \r\n\t\r\n \r\n \r\n \r\n Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?\r\n \r\n \r\n\t\r\n \r\n \r\n \r\n Marsh is a global leader in insurance broking and risk management and has been a leader in combatting cyber threats since their emergence.\r\n \r\n \r\n\t\r\n \r\n \r\n \r\n Applause provides real-world software testing for functionality, usability, accessibility, load, localization and security.\r\n \r\n \r\n\t\r\n \r\n \r\n \r\n Certego is a company of the VEM Sistemi Group specialised in providing managed computer security services and to combat Cyber Crime.\r\n \r\n \r\n\t\r\n \r\n \r\n \r\n Sqreen is a web application security monitoring and protection solution helping companies protect their apps and users from attacks.\r\n \r\n \r\n\t\r\n \r\n \r\n \r\n Windscribe is a Virtual Private Network services provider offering secure encrypted access to the internet.\r\n \r\n \r\n\t\r\n \r\n \r\n \r\n Hardenite solution helps R&D, DevOps and IT teams to continuously manage security risks and hardening efforts of any Linux OS \xe2\x80\x93 based product, throughout the product life cycle.\r\n \r\n \r\n\t\r\n \r\n \r\n \r\n IT Jobs Watch provides a concise and accurate map of the prevailing IT job market conditions in the UK.\r\n \r\n \r\n\t\r\n \r\n \r\n \r\n Zeusmark are a digital brand security company. We enable companies to successfully defend their brands, revenue and consumers online.\r\n \r\n \r\n\t\r\n \r\n \r\n \r\n Swedish Incubators & Science Parks (SISP) is the Swedish industry association for Swedish incubators and science parks.\r\n \r\n \r\n\t\r\n \r\n \r\n \r\n PORTIC brings together several research centers and groups from P.PORTO in a single space, forming a superstructure dedicated to research, technology transfer, innovation and entrepreneurship.\r\n \r\n \r\n\t\r\n \r\n \r\n \r\n Nuts Technologies are simplifying data privacy and encryption with our innovative and novel data containers we call nuts based on our Zero Trust Data framework.\r\n \r\n \r\n\t\r\n \r\n \r\n \r\n Custard provide Network Security for all types of businesses across many industries, helping to keep them safe and secure.\r\n \r\n \r\n\t\r\n \r\n \r\n \r\n Defend your data with Arcserve all-in-one data protection and management solutions designed to be the right fit for your business, regardless of size or complexity.\r\n \r\n \r\n\t\r\n \r\n \r\n \r\n Myntex\xc2\xae is a leading encrypted phone provider, managing a world-class on-site Canadian data center. Our solutions protect against data breaches, digital surveillance, and cybercrime.\r\n \r\n \r\n\t\r\n \r\n \r\n \r\n Eqlipse Technologies provides products and high-end engineering solutions to customers in the Department of Defense and Intelligence Community.\r\n \r\n \r\n\t\r\n \r\n \r\n \r\n Third Wave Innovations (formerly RCS Secure) offers a full spectrum of cybersecurity safeguards and IT services.\r\n \r\n \r\n\n\t\t\t | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.cioandleader.com/30-of-critical-infrastructure-organizations-to-experience-severesecurity-breach-by-2025-gartner/ |
At least 30% of critical infrastructure organizations will experience a security breach by 2025, which will most likely result in the halting of an operations- or mission-critical cyber-physical system, according to Gartner.
Currently, critical infrastructure security has become a primary concern for governments across the globe, including the U.S., the U.K, EU, Canada and Australia who have individually identified specific sectors and considered them as ?critical infrastructure?, for example, communications, transport, energy, water, healthcare and public facilities.
?Governments in many countries are now realizing their national critical infrastructure has been an undeclared battlefield for decades,? said RuggeroContu, research director at Gartner. ?They are now making moves to mandate more security controls for the systems that underpin these assets.?
The reports which emerged in March showed that 38% of respondents are expected to increase spending on operational technology (OT) security between 5% and 10% in 2021, with another 8% of respondents predicting an increase of above 10%.
However, this may not be enough to counter underinvestment in this area over many years, according to Gartner.
Increased risk needs holistic security approach
The Gartner report also warned the security personnel that overlooking the security of operational technology (OT) could make critical infrastructures highly susceptible to attacks, which could potentially pose a threat to the nation as a whole. It is also being reported that by 2025, attackers will have weaponized a critical infrastructure cyber-physical system to successfully harm or kill humans.
Gartner recommends that security and risk management (SRM) leaders in critical infrastructure sectors develop a holistic approach to security, so that IT, OT and Internet of Things (IoT) security are managed in a coordinated effort.
?SRM leaders should accelerate efforts to discover, map and assess the security posture of all cyber-physical systems in their environment,? said Contu. ?Invest in threat intelligence and join industry groups to stay apprised of security best practices, upcoming mandates and requests for inputs from government entities.? ?SRM leaders should accelerate efforts to discover, map and assess the security posture of all cyber-physical systems in their environment,? said Contu. ?Invest in threat intelligence and join industry groups to stay apprised of security best practices, upcoming mandates and requests for inputs from government entities.?
| 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://techmonitor.ai/technology/cybersecurity/china-cyberattack-us-eu |
State-sponsored cyberattacks are currently the biggest threat to Chinese cybersecurity according to the country’s leading political advisory body. The statement from the Chinese People’s Political Consultative Conference (PCC) comes after the US and EU both called on Beijing to get a grip on the problem posed by Chinese hacking gangs targeting Western organisations and infrastructure.
PRC suffers thousands of state-sponsored cyberattacks, claims governmental body. (Photo by Mirko Kuzmanovic/ Shutterstock)
The PCC advises the Chinese government and is seen as a central part of the Chinese Communist Party’s political system.
State-sponsored cyberattacks and the threat they pose to China
Leading member of the PCC, Zhou Hongyi, said today that attacks sponsored by foreign governments have become the leading threat to the country’s cybersecurity.
“At the national level, China needs to establish a sample database for cyberattacks by hackers backed by foreign governments so attacks can be spotted more accurately in the future,” he said.
In recent years the Chinese government has identified 51 foreign hacking gangs targeting China, with these gangs launching thousands of cyberattacks, Hongyi claims. He said an aeronautical research university in Xi’an, Shaanxi province last April was attacked by hackers working for the US government’s National Security Agency.
However, these attacks are hard to report as most of them are “invisible”, he said.
Hongyi made his claims after Western governments called for China to control its APT gangs. Last week, the Centre for Cyber Security in Belgium publicly complained that China should sanction gangs like APT31, after it hacked a device belonging to Belgian MP Samuel Cogolati.
Content from our partners
The European Union Agency for Cybersecurity (ENISA) also recently released a warning against the sustained activity by seven Chinese cybercrime gangs, all of whom engage in cyber espionage on the West. Last month, the FBI released a formal warning against the “growing threat” posed by Chinese hackers, citing their willingness to target the infrastructure of the country’s political parties.
Geopolitical cyber landscape heats up in 2023
Cybercrime is an increasingly important weapon in geopolitical disputes, as highlighted in a recent report released by security company Group IB.
View all newsletters
Sign up to our newsletters
Data, insights and analysis delivered to you
By The Tech Monitor team
Sign up here
“This year, the largest number of attacks conducted by nation-state groups took place in the Asia-Pacific region. A considerable increase was also noticed in the number of nation-state hackers behind various military operations,” the report says.
“The motive of many nation-state threat actors was to disrupt or disable target parties’ command and control systems, gather intelligence, or conduct other activities that support traditional military objectives [like] attacks on China, compromising Sunwater’s (an Australian water supplier) infrastructure,” it continued.
Tensions between the US and China are particularly high, with the two countries engaged in a tech trade war which has seen Washington sanction several Chinese businesses over close links to the government. Today the US Department of Commerce added cloud computing and big data company Inspur Group and the Loongson chip manufacturer to its so-called “entity list” of Chinese businesses that US companies must acquire a licence to trade with.
Loongson and Inspur have been sanctioned “for acquiring and attempting to acquire US-origin items in support of China’s military organisation efforts,” the department of commerce said.
| 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.crn.com/news/security/10-hot-cyber-threat-intelligence-tools-and-services-in-2022 |
From Sophos’s ‘X-Ops’ To Blackcloak’s ‘Honeypot’ offering, firms are providing more proactive intelligence offerings to combat increasing cyberthreats.
For years, cybersecurity was seen as a mostly defensive operation to keep bad actors at bay, shoring up digital fortifications across a number of proven or potential attack vectors.
But cybersecurity companies, both big and small, are increasingly introducing new intelligence offerings as ways to combat cyberattacks, proactively trying to identify potential bad actors and their tactics before they unleash sometimes devastating attacks on organizations.
Some of the intelligence offering include the use of AI to sift through data and provide risk analytics to customers. Some include actual analysts diving into the dark web to find and assess risks.
Others offering provide a combination of AI and human intelligence capabilities.
Meanwhile, cybersecurity companies are also establishing new internal intelligence and general research units to enhance intelligence gathering and product development.
As part of CRN’s Cybersecurity Week 2022, here’s look at 10 intelligence hot tools and services offered by cybersecurity companies, from both large firms and startups.
* Trellix’s Advanced Research Center
* Sophos X-Ops
* Fortinet’s FortiRecon
* SentinelOne’s Singularity Vulnerability Mapping
* Cyberint’s Argos Edge
* BlackCloak’s ‘Honeypot’ deception trap
* Cybersixgill’s Dynamic Vulnerability Exploit (DVE) Intelligence
* Securonix: Identity Analytics and Intelligence
* CrowdStrike’s suite of threat intelligence products
* Nisos: Managed Intelligence
Trellix’s Advanced Research Center
San Jose, Calif.-based Trellix, the giant XDR stalwart, recently combined a number of research units, including its threat-intelligence group, into a new “Advanced Research Center.” The goal: to enhance Trellix’s global threat intelligence capabilities, as well as produce better products to combat cyberattacks.
The new center can already claim an early intelligence-gathering victory. Last month, Trellix announced it had identified a 15-year-old vulnerability in the open source Python programming language that’s still lurking in existing codes and that could put at risk 350,000 open-source coding projects.
Sophos X-Ops
Sophos is another cybersecurity company that recently consolidated various operations into one – with the aim of improving its intelligence-gathering and product capabilities.
The U.K.-based Sophos earlier this year consolidated three previously separate units – Sophos Labs, Sophos SecOps and Sophos AI – into one group called Sophos X-Ops. The new unit has 500 employees comprised of malware analysts, automation engineers, reverse engineers, cloud infrastructure experts and other experts at Sophos.
“The goal is to find (attackers) on a virtuous cycle faster and faster and faster – and then keep them out,” Raja Patel, senior vice president of products at Sophos, told CRN in August.
Fortinet’s FortiRecon
Part of a good intelligence operation is trying to guess how an adversary might think and act in a hostile environment – and that’s precisely what Fortnet’s new FortiRecon attempts to do for customers.
In June, the Sunnyvale, Calif.-based Fortinet unveiled FortiRecon, which the company said in a statement uses “machine learning, automation, and human intelligence to continually monitor an organization’s external attack surface, determine its brand risk, and deliver custom intel to act earlier and faster on threats.”
As John Maddison, executive vice president of products and CMO at Fortinet, said in a statement: “The sooner in the attack cycle you identify and stop an adversary, the less costly and damaging their actions. Employing a powerful combination of human and artificial intelligence, FortiRecon provides organizations with a view of what adversaries are seeing, doing and planning.”
SentinelOne’s Singularity Vulnerability Mapping
This is a product that acts like a sort of counter-intelligence service that helps find and identify vulnerabilities – and thus potential attack vectors.
In June, the Mountain View, Calif.-based SentinelOne, the cybersecurity platform provider, unveiled a vulnerability mapping feature that the company says “delivers vulnerability assessment, prioritization and remediation at machine speed.”
SentinelOne also has its well-known WatchTower and WatchTower Pro threat-hunting offerings that complement the new vulnerability mapping feature.
Cyberint’s Argos Edge
The Tel Aviv, Israel-based Cyberint describes itself as “a pioneer in attack surface reconnaissance, fusing threat intelligence with external attack surface management.”
In June, the firm raised $40 million in funding – and immediately said it intended to use some of the money to further develop and expand Argos Edge, the firm’s SaaS threat intelligence and attack surface reconnaissance platform
Cyberint does dark web research as part of its intelligence work, helping it provide real-time actionable threat-intelligence alerts.
BlackCloak’s ‘Honeypot’ Deception Trap
We could get into how Orlando, Fla.-based BlackCloak recently added new mobile device security features to its Concierge Cybersecurity & Privacy Platform designed to protect top executives and other VIP-types from cyberattacks.
Among other things, the new features include a QR code scanner for an additional layer of malware protection on personal devices and a malicious calendar detection technology to detect suspicious invitations and newly added calendar items.
But let’s face it: It’s more fun to focus on BlackCloak’s proprietary deceptions technology, introduced last year, that lures attackers into effective cybertraps. In the espionage world, the lure-and-trap tactic is often referred to as a “honeypot” approach to identifying and catching bad guys.
BlackCloak was recently named one of CRN’s Emerging Security Vendors To Know In 2022.
Cybersixgill’s Dynamic Vulnerability Exploit (DVE) Intelligence
In August, Cybersixgill, a threat intelligence provider based in Tel Aviv, Israel, unveiled its new Dynamic Vulnerability Exploit (DVE) Intelligence solution, which the company claims is the “cybersecurity industry’s first end-to-end intelligence across the entire Common Vulnerabilities and Exposures (CVE) lifecycle.”
The aim of its new solution is to streamline vulnerability analysis to help companies reduce risk by accelerating their time to response. Among other products and services, Cybersixgill also offers “dark web intelligence” to identify potential threats before they happen.
In March, the company announced it had raised $35 million in a Series B funding round led by More Provident and Pension Funds and REV Venture Partners.
Securonix: Identity Analytics and Intelligence
Securonix often describes itself as deliverer of a next generation security analytics and operations platform. But others say that, when you get right down to it, it’s also a security intelligence solutions provider that allows users to “detect, track, evaluate and challenge security threats and risks.”
No matter how it’s described, investors love the Addison, Texas-based Securonix to the tune of more than $1 billion, which is how much the company earlier this year raised in a growth investment round led by Vista Equity Partners.
Among Securonix product add-ons: Identify Analytics and Intelligence.
CrowdStrike’s Suite Of Threat Intelligence Products
Cybersecurity stalwart CrowdStrike has a number of threat-intelligence products. Take your pick.
Some of the Austin, Texas-based company’s intelligence offerings include: Crowdstrike Falcon Intelligence (automated intelligence), CrowdStrike Falcon Intelligence Premium (cyber threat intelligence), CrowdStrike Falcon Intelligence Elite (assigned analyst) and CrowdStrike Falcon Intelligence Recon (digital risk protection).
CrowdStrike’s most recent intelligence- and detection-related announcements have dealt with AI-powered Indicators of Attack and a new cloud threat-hunting service.
Nisos: Managed Intelligence
This has to be one of our favorite corporate self-descriptions around, via Alexandria, Va.-based Nisos under the header: “Experts (yes, really)”: “We are the Managed Intelligence company (nope, we are not yet another cyber intelligence feed). Our services enable cyber security, corporate security, and trust and safety teams to leverage a world-class intelligence capability tailored to their needs.”
Among its solutions are cyber, fraud, platform, protective and third-party intelligence offerings. One particularly interesting offering: Reputation Intelligence.
Some investors obviously like what they see at Nisos, earlier this year providing the firm with $15 million in a Series B funding round led by Paladin Capital Group.
| 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.itworldcanada.com/article/cyber-security-today-a-look-at-some-of-the-top-stories-i-reported-on-in-2020/440041 | A look at some of the top stories I reported on in 2020.\nWelcome to Cyber Security Today. It’s Monday December 28th. I’m Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com.\nTo hear the podcast click on the arrow below:\n\n\n \n\nIt’s the last week of the year, a time when reporters often look back on the stories they’ve done and highlight ones that are significant or memorable in some way. I found four I’ve done on this podcast. I’ll talk about three of them today, all of which deal with ransomware. The fourth, a very sophisticated bank scam against an individual, I’ll talk about on Wednesday.\nAt October’s SecTor virtual conference Julian Pileggi of the security firm Mandiant gave advice to organizations on how to initially deal with a ransomware attack: First, disconnect the IT network from the Internet so the attackers can’t use it for communications. However, don’t disable the internal network. Do that and IT staff can’t investigate. You can block IT system-to-system communications at the network level. This stops the spread of the ransomware from computer to computer. If you’re sure it’s safe a couple of IT staff might be allowed remote access to your IT systems with their computers to help repair or restore the system — if those PCs have multifactor authentication for safe login, and if you’re sure they aren’t infected. Don’t shut computers or servers. That could make things worse.\nIT staff should collect information on the ransom note and the encrypted file extensions. That can be used to search through the Internet with a safe computer to learn what type of ransomware you’ve been hit with. That may help with remediation. Some strains of ransomware have been cracked by security companies who offer free decryption keys that can be used by skilled IT staff or consultants.\nDon’t contact the hackers until getting advice from your company’s lawyer.\nPreserve and protect your backups, if they’re available and unencrypted. Block IT system-to-system communications at the network level. This stops the spread of the ransomware from computer to computer.\nDon’t destroy evidence or wipe compromised systems. Make a copy if necessary — and if you’re sure it isn’t infected. Remember your forensics team, insurers and the police want to see systems in their original state.\nThe best way to prepare for ransomware — or any cyber attack — is have and practice an incident response plan.\nAt the MapleSec conference IT World Canada organized in October my podcast co-host Terry Cutler told some chilling stories of the many data breach investigations he’s worked on. One company was in such bad shape after a ransomware attack its systems kept getting re-infected after software was re-installed on all of its computer systems. It turned out the laptop being used by a technician to help restore service hadn’t been thoroughly scrubbed. It was spreading malware. The lesson: After a cyber attack every computer used for recovery has to be pristine. The same organization had a heck of a time restoring data from ancient backup tapes. The lesson: Practice data recovery before a security incident so problems are revealed.\nIn November I came across a report about a ransomware attack that from start to finish took only eight hours. Usually IT and security teams have days or weeks to detect a successful cyber attack before malware is launched. You can’t count on that anymore. According to a service called The DFIR Report a threat group launched its ransomware package eight hours after first compromising an organization. The attackers got into the firm’s Windows domain controller by somehow knowing the username and password of the administrator. The report doesn’t say if the credentials were stolen or the administrator was tricked into giving them away. Regardless, the account wasn’t secured with multifactor authentication. And the account was senior enough that the attacker could move to other internal systems, which yielded their passwords. It seems like the security of this organization wasn’t very good because the attacker could disable security tools on systems. After only seven hours of looking around the ransomware was spread. The ransom note demanded about $88,000 in bitcoin.\nThere are a couple of lessons from this attack: Forcing two-factor authentication for all users is vital. IT administrators should have to use stronger multifactor authentication. Things have to be set up to prevent an attacker doing what this one did — move across systems. Automated computer network monitoring has to be installed to watch for suspicious activity.\nFinally, once a year hire someone outside the organization to look over the entire IT system to see where the flaws are. Cybersecurity takes time and money. If you don’t spend it then in eight hours you could be out of business.\nThat’s it for today. Links to details about today’s stories can be found in the text version of this podcast at ITWorldCanada.com. That’s where you’ll also find my news stories aimed at cybersecurity professionals.\nSubscribe to Cyber Security Today on Apple Podcasts, Google Podcasts or add us to your Flash Briefing on your smart speaker. Thanks for listening. I\xe2\x80\x99m Howard Solomon\n | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://cybersecuritynews.com/chinese-hackers-us-infrastructure/ | b'
One moment, please...
Please wait while your request is being verified...
' | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.ciodive.com/news/security-network-home/576401/ |
Thousands of Americans suddenly working from home has brought uncertainty into how companies operate. It's also tested network capacity and opened up organizations to security risks.
"If you suddenly put 500 employees at home, you now have 500 brand new attack surfaces that are visible to the internet that you didn't have before," Tom Arnold, co-founder and principal of Payment Software Company, part of NCC Group, told CIO Dive in an interview.
Home networks are not necessarily as secure as an office, so, hackers have a better chance of business email compromise, credential phishing, malware and spam email campaigns working and doing great harm.
But whose responsibility is to secure the home network – the employee or their employer? Both.
COVID-19 presents opportunity to hackers
As the pandemic has grown, so have cyberattacks. Starting in late January, Proofpoint saw an increase in business compromise emails – phishing – that prey on virus concerns.
"Threat actors are actively using COVID-19 social engineering themes to try to take advantage of remote workers, health concerns, stimulus payments, trusted brands, and more," Sherrod DeGrippo, senior director of threat research and detection at Proofpoint, told CIO Dive in an email. "As the pandemic has occurred over a number of weeks, and remains an area of concern worldwide, the overall collective volume of lures only continues to increase."
And phishing attacks continue to be successful. Even before the pandemic, PwC ran a simulated phishing attack on mid- to large-sized financial institutions and found 70% of phishing emails made it to their targets, and 7% of recipients clicked on malicious links.
Work with employees, on their level
Responsibility for stopping attacks is "ultimately with the person at home, but it's going to be the organization's information security people who have to provide those individuals the help they need" to be successful, Jeffrey Goldberg, chief defender against the dark arts of 1Password, told CIO Dive in an interview.
Companies should not expect all of their employees to be IT people; nor should companies overwhelm those suddenly working from home with a long list of things they must do right now, said Goldberg.
Instead, help them do things "incrementally. If you tell them to make sure you update absolutely everything all at once, it's just too big of a burden," he said, especially given the extra stress and anxiety in the world right now.
Start with "low hanging fruit," said Goldberg. That includes making sure the computer, their web browser and the tools they most often use go through regular security updates. "A huge majority of compromises on people's desktop and home computers is through exploiting vulnerabilities that have already been patched by the vendor," he said.
IT can guide employees on how to update their router, and make sure they're not using the default password.
This can be a tricky process for those who aren't necessarily IT savvy, so those guiding employees must be patient and compassionate.
"For some organizations, you suddenly have a bunch of people working remote and many of them aren't software developers. It's a very hard thing to ask, so before you start asking, make sure that you have the support system set up to help people," Goldberg said.
Protect company devices, or deploy new ones
For organizations that send employees home with devices, Arnold suggests protecting those devices with whitelisting software, which stops any attempt to reconfigure the hardware, whether by employee or a hacker who breaks in.
"Think of an alarm system that works inside the computer but also locks the configuration of a computer," he said. "The employee can't accidentally install something."
If an employee does click on something that then tries to install malicious software, the whitelisting software stops the process.
Companies should consider sending employees home with devices, or deploying new devices, said Arnold, especially because in some homes, one computer may serve the entire family. Not everyone sets up separate accounts for each user on a home machine.
"While it would be easy to say 'don't do that,' trying to get those changes are going to be really hard," said Goldberg. "A cheap computer for doing work may turn out to be the appropriate solution."
And be prepared for mistakes, on behalf of both employees working from home and IT teams trying to make sure they can do so, and safely, said Arnold.
"I worry about the IT departments of these companies, and I don't care how big they are," said Arnold. "When you suddenly have to deploy that many laptops in that short of an amount of time, humans make mistakes. Just because we're human beings, those mistakes will be exploited, and that's what [hackers] are scanning for."
Correction: This article has been updated to correct 1Password attribution to the proper speaker.
| 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.helpnetsecurity.com/2011/11/18/hackers-destroy-pump-in-us-water-utility-attack/ | \n Hackers attacking SCADA systems and wreaking havoc in a nation’s critical infrastructure has become a justified concern for all countries. But, setting aside Iran and attacks against its nuclear program for a moment, the U.S. seems to attract a seemingly disproportionate amount of these kind of assaults.\nThe latest has targeted the control system of the city water utility in Springfield, Illinois, and has resulted in the destruction of a water pump, Wired reports.\nThe hackers have staged the attack from an Russian IP address and have used login credentials for the SCADA system used by the utility which they acquired by previously hacking into the networks of the manufacturer and vendor of the said SCADA system.\nSoftware vendors usually keep that kind of information because they need to remotely access the systems they sold for maintenance and updating purposes. In this case, the discovery of the compromise has raised a crucial question: How many other systems sold by the same vendor will be attacked in the future – or have been attacked already – due to this breach?\nThe utility’s operators have noticed some difficulties with the system’s remote functionality months before the pump incident, but thought it was a normal instability of the system.\nAll this information was in a report released by a state fusion center\nJoe Weiss, the security expert and managing partner of Applied Control Solutions who discovered this information from a report compiled by a state fusion center, still hasn’t managed to track down which water utility was hacked (the report doesn’t say) and, consequently, which software vendor was breached.\nThe fact that the utility company is located in Springfield was revealed by the Department of Homeland Security in a statement, leading to speculation that City Water Light and Power is the one. \n\n\n \n \n \n \n\n \n \n | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://cybernews.com/cyber-war/west-lists-russia-affiliated-hackers-warns-of-attack-on-critical-infrastructure/ |
Moscow is believed to be exploring options for a potential cyberattack involving malware, DDoS attacks, and cyber espionage.
The Five Eyes, an intelligence-sharing alliance consisting of the US, UK, Australia, Canada, and New Zealand, issued a joint warning, claiming Russian state-sponsored actors, together with cyber gangs, might strike critical infrastructure in the West.
According to the warning, the Russians might employ cyberattacks as retaliatory measures to the economic costs imposed on Russia in the wake of Moscow's war in Ukraine.
The cyber watchdogs of five countries claim that cybercrime groups might work in tandem with state-sponsored actors. For example, Conti, a notorious ransomware gang, pledged allegiance to Vladimir Putin after the Russian troops poured into Ukraine.
"These Russian-aligned cybercrime groups have threatened to conduct cyber operations in retaliation for perceived cyber offensives against the Russian government or the Russian people, "reads the statement.
Cybercrime groups might conduct distributed denial-of-service (DDoS) attacks or use well-known extortion tactics to disrupt critical infrastructure facilities, potentially causing significant disruption to operations.
VIDEO
The past 24 months saw several ransomware attacks on vital facilities in the West. These attacks might have been carried out with the Kremlin's political goals in mind.
Together with several Russian state agencies, the advisory lists several criminal groups that might work on Russia's behalf: The CoomingProject, Killnet, MUMMY SPIDER, SALTY SPIDER, SCULLY SPIDER, SMOKEY SPIDER, WIZARD SPIDER, The Xaknet Team.
Recommended mitigation measures for businesses and organizations are included in the advisory.
Last week the US, together with security researchers, announced they'd found a new strain of malware that targets industrial control systems (ICS) and could disrupt critical infrastructure.
Government-backed hackers developed a custom-made tool, dubbed Pipedream or INCONTROLLER, that enables threat actors to scan for, compromise, and control affected devices once they're connected to the operational technology (OT) network.
Earlier this month, Ukraine announced its Computer Emergency Response Team (CERT-UA) successfully prevented Russian hackers from attacking the country's electrical grid with Industroyer2 malware.
VIDEO
More from Cybernews:A day in the life of a Ukraine cyber soldier
Dangers of quantum computing: from new-style warfare to breaking encryption
We need to fix the internet before expecting it to be better in the metaverse - interview
Retail and wholesale saw over 400% increase in phishing attacks
Know your NFT dealer, urges cybersec analyst
Subscribe to our newsletter
| 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.darkreading.com/cyberattacks-data-breaches/mocana-joins-silicon-vendors-to-protect-the-internet-of-things | PRESS RELEASESan Francisco, CA– Mocana, a provider of IoT security solutions for industrial control systems and the Internet of Things (IoT), announced that it will support the new Platform Security Architecture (PSA) framework from Arm, a set of threat models and security analyses, together with common hardware and software architectural specifications, for connected devices. The Arm architecture is used in more than 100 billion silicon chips embedded within smartphones, supercomputers, medical instruments, agricultural sensors, and servers. Mocana was recently recognized as the leading provider of industrial IoT security platforms for industrial manufacturing and automation by Frost & Sullivan. Together, the companies will help silicon vendors and OEMs to accelerate the development of more secure systems for the IoT and the Industrial IoT (IIoT).Mocana’s IoT Security Platform is a cybersecurity software solution that allows applications to leverage hardware and software-based cryptographic controls within embedded systems. The software is optimized for resource-constrained devices with limited memory and processing power. Mocana’s software is typically compiled as part of an application installed on a microchip or microprocessor board within a larger device or machine. This cryptographic software is already integrated with Arm Cortex®-A, Cortex-R and Cortex-M processors, and the security software is integrated with more than 70 chipsets, most of which are Arm-based, and 30 real-time operating systems."As the Internet of Things scales, we will see billions of devices connected to the Internet and industrial networks," said Dean Weber, CTO of Mocana. "Making sure devices are truly trustworthy takes cooperation across the entire technology ecosystem, including the chip designers, silicon vendors, hardware, software and cloud providers. Mocana is pleased to support PSA to help the industry standardize on a model for embedded security."Mocana is supporting PSA and SoCs with Arm TrustZone® security technology. Mocana provides a non-open source software solution for IoT and embedded devices used in industrial, automotive, medical, aerospace, and many critical infrastructure sectors. Built for mission-critical applications, Mocana’s cryptographic engine is compliant with cybersecurity standards NIST FIPS 140-2, IEC 62443-3-3. The solution provides certificate-based authentication, secure boot verification, secure over-the-air (OTA) updates and advanced trust chaining integrated with hardware secure elements such as TrustZone and TPM."Connected devices are being deployed at a rapid pace and to truly realize the benefits of these technologies, which have potentially life-changing implications, security can no longer be optional," said Paul Williamson, vice president and general manager, IoT Device IP, Arm. "This is a shared industry responsibility, which is why Arm is working with partners including Mocana to shift the economics of security by providing a common framework for building more secure connected devices through PSA."For silicon vendors and original equipment manufacturers (OEMs) building IoT and IIoT devices, Mocana supports a comprehensive set of secure communications and messaging protocols, including: X.509, OCSP, SCEP, TCP/IP, TLS/SSL, DTLS, SSH, IPsec/IKE, wireless (802.11i), multicast, OPC UA, MQTT, DDS, AMQP, Modbus, DNP3, and BACNet.Silicon vendors and OEMs interested in learning more about Mocana’s solutions and support of Arm PSA should visit Mocana at Arm Techcon, October 24 to 27 at the Santa Clara Convention Center. | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.eskenzipr.com/2013/10/01/cybersecurity-on-the-political-agenda/ | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
|
https://drata.com/blog/cyberattacks-on-local-governments-on-the-rise | Computer servers run by the city of Dallas were found to be infected with malware on May 3, 2023, spurring staff to begin shutting off computers to prevent its spread.The effects of the attack were sprawling, including hits to police and public courts, hampering residents' ability to report nonemergencies to the city's 311 service, leaving people unable to pay water bills online, and taking the city's public library system offline. One month later, the city reported most, but not all, services had successfully been restored.Private sector employees may be understandably focused on how cyberattacks can affect their employer and the private data their company keeps on them. But in today's geopolitical environment, hackers are increasingly targeting governments to sow chaos and rake in profit.Drata analyzed threat trends from BlackBerry, the FBI, and credible news reports to illustrate the increasing threat posed by cyberattacks on local governments and the public sector. Local government is sweeping and includes services like law enforcement, public health services, 911 call centers, and educational organizations—as well as departments providing important business functions like permitting and code enforcement. The attacks themselves can be lucrative and are conducted by groups bent on one-upping each other with larger and grander victims they can boast about.In one of the most disruptive forms of cyberattack, ransomware is installed on a computer system, encrypting and locking it so it cannot be accessed until a ransom fee is paid. And the cost for a public sector organization to contain and secure systems after an attack can average $2.6 million in 2023, up from $2 million the year prior, according to IBM's 2023 threat report.In Dallas' case, the city has taken months to navigate May's ransomware attack. The city council approved spending $4 million on threat detection services in the aftermath and proposed an additional $9.7 million in its forthcoming budget for more security. The city is also footing the bill for credit monitoring for people whose data was affected, which includes everyday citizens.Singling Out GovernmentAttacks on government facilities nearly doubled from 2021 to 2022, according to data kept by the FBI's Internet Crime Complaint Center.There is some evidence that governments are beginning to prioritize the prevention and mitigation of these breaches. From 2018 to 2020, the share of state governments outsourcing their cybersecurity resources dropped from 60% to 43%, according to a Deloitte study of government cybersecurity preparedness. The firm advises that organizations with dedicated in-house workers are better equipped to manage security threats.Still, state governments comprise only a small fraction of the tens of thousands of local governments that serve as potential targets for cybercriminals and foreign nations.And the repercussions often extend beyond the attacked organization and its employees.In Dallas' case, city workers have voiced concerns about their children's private information being among the data stolen by criminals, leaving minors vulnerable to identity theft and damage to their credit and financial potential once they become adults.Nearly 90,000 Soft Targets NationwidePublic and private sector experts agree local governments are an appealing target due to their numbers—and because they are often under resourced to handle ransomware and other forms of cyberattacks. By one estimation, there are nearly 40,000 cities, towns, and townships and around 50,000 special government districts nationwide.The authors of the first-ever nationwide survey of local governments' cybersecurity practices just before the COVID-19 pandemic identified "a lack of cybersecurity preparedness within these governments and a lack of adequate funding for it."The federal Cybersecurity and Infrastructure Security Agency, also known as CISA, released a strategic plan in August 2023 declaring "too many American organizations are soft targets" and calling for state and local governments as well as tribal and territorial governments to harden their IT systems.Local government attacks grew so much in 2021 that the FBI issued a memo the following spring warning that local government had become the second most-targeted entity behind academia.The implications can be potentially life-threatening when considering the services our local governments control. The memo cites attacks taking down COVID-19 vaccination efforts and suspending county computer systems.In 2023, just 14% Percent of Local Governments Collaborated Against ThreatsA consortium of local governments working together to thwart cyberattacks has existed for at least 20 years—yet only about 14% of governments, or 13,000 of them, have opted to take part, according to CISA. The organization, called MS-ISAC, has also noted publicly that opting in is only part of the battle; staying engaged with all members to share best practices and techniques is an ongoing effort.The organization hosts regular webinars and sends out threat alerts to keep partners vigilant against vulnerabilities in software that emerge.Why Paying Up Doesn't Pay When it Comes to RansomwareFederal authorities most often recommend against paying a ransom to attackers because there is no way to assure the criminal will act in good faith and destroy the stolen data in return.Doing so could also "embolden" the criminals to target other organizations, according to the FBI.Analysis of cyberattacks from IBM reveals paying the ransom in the case of a ransomware attack doesn't make financial sense, either. Not including the ransom amount itself, organizations that paid a ransom spent about 2% less to mitigate the attack than organizations that didn't, according to IBM. But if the ransom was high, on the order of several million dollars, that cost could easily outpace the small potential savings.Instead, data suggests incorporating automation into cybersecurity measures can help lower mitigation costs after an attack. Organizations leveraging automation were able to handle attacks in 16% fewer days—with accordingly lower personnel expenditures—than organizations that did not incorporate automation.Rather than paying ransoms, experts also recommend governments approve greater funding for cybersecurity as well as improve policies and generate a culture that considers security at all levels of staff. | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.cybersecurityintelligence.com/blog/security-flaws-in-smart-city-technology-3751.html |
The “smart city” sounds like a digital utopia, a place where data eliminates first-world hassles, dangers and injustices. But there are some problems with smart cities. Smart-city technology continues to roll out in municipalities worldwide, everything from automated alerts about weather hazards and traffic issues to smart lighting and connected trash systems. However, like the rest of the Internet of Things (IoT) ecosystem, security is always a concern. Researchers at IBM and Threatcare have found vulnerabilities in smart city devices, which are used for everything from traffic monitoring to radiation detection. This means hackers could potentially hijack the devices, either to create panic or to prevent the devices from detecting when a real emergency exists, says Daniel Crowley, research director at IBM X-Force Red, a security-testing unit.“Attackers could manipulate water level sensor responses to report flooding in an area where there is none, creating panic, evacuations and destabilization,” Crowley said, adding that the same could be true for radiation monitors at nuclear power plants and similar critical infrastructure. “Conversely, attackers could silence flood sensors to prevent warning of an actual flood event, or other catastrophes…”. “I think the danger is that when you’re relying upon sensor data for safety reasons, and that sensor data can be corrupted” continues Crowley.The researchers say they found a total of 17 vulnerabilities across systems used in smart-city technology. To test the systems, the researchers began by dissecting firmware they were able to obtain online, then later acquired some of the systems after spotting potential vulnerabilities, says Jennifer Savage, a security researcher at Threatcare.Some warnings systems have already been used by hackers, at least to cause mischief. Last year, a prankster set off emergency sirens across Dallas for more than 90 minutes, and hackers have previously hijacked TV emergency signals and tampered with digital road-warning signs.The researchers advise agencies and companies implementing smart-sensor systems to restrict IP addresses permitted to connect to the devices and to safeguard passwords and digital keys used to gain access. They also recommended using standard security tools and hiring outside testers to verify that the systems are secure.After all, unlike home-automation systems, people often have little direct control over what systems installed by their local governments could have an impact on their lives. “As smart cities become more common, the industry needs to re-examine the frameworks for these systems, to design and test them with security in mind from the start,” Crowley said.I-HLS: You Might Also Read:US City Of Atlanta Suffers An Attack:Dubai: Internet City:
Directory of Suppliers
XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.
CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.
Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.
Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?
BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.
DataGuidance is a platform used by privacy professionals to monitor regulatory developments, mitigate risk and achieve global compliance.
WhiteHat’s products enable customers to “Hack Yourself First” so that they gain a greater understanding of the actual risk to their business.
Conscio Technologies is a specialist in IT security awareness. Our solutions allow you to easily manage innovative online IT awareness campaigns.
Digital DNA provides Law-Enforcement-Grade Computer Forensics, Cyber Security and E-Discovery Investigations.
Rockwell Automation offer industrial security solutions to protect the integrity and availability of your complex automation solutions.
Capula is a leading system integration specialist for control, automation and operational IT systems across all applications and industry sectors.
IAmI is a first in Tokenization Cloud-based IAM Security Services, delivering the most advanced form of Two-Factor Authentication.
ByteLife Solutions specialises in the provision of IT infrastructure services and solutions, including cybersecurity.
CyManII was established to create economically viable, pervasive, and inconspicuous cybersecurity in American manufacturing to secure the digital supply chain and energy automation.
Project Moore is an Amsterdam law firm specialising in IT-law and privacy.
Cybersecurity Innovation Hub is a non-profit network organization focused on cooperation, information sharing, research and implementation of cutting-edge technologies in cybersecurity.
Stellar Cyber makes Open XDR, the only comprehensive security platform providing maximum protection of applications and data wherever they reside.
Emagined Security is a leading provider of professional services for Information Security and Compliance solutions.
Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.
Pragma is a CREST approved global provider of cybersecurity solutions. We help organisations strengthen cyber resilience and safeguard valuable information assets with a pragmatic approach.
ZINAD is an information security company offering state-of-the-art cybersecurity awareness products, solutions and services.
| 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://blog.segu-info.com.ar/2021/07/global-cybersecurity-index-2020-itu.html |
Se presentó la cuarta edición del prestigioso ranking de ciberseguridad mundial
Global Cybersecurity Index 2020, [PDF] desarrollado por la Unión Internacional de
Telecomunicaciones (ITU, agencia de las Naciones Unidas especializada en la
coordinación de las telecomunicaciones a nivel global), el cual refleja los
avances logrados en materia de ciberseguridad por los 194 estados miembros y
presentado hoy.Este índice recoge 82 preguntas sobre los compromisos
de ciberseguridad de los estados miembros en cinco pilares: medidas legales,
técnicas, organizativas, de desarrollo de capacidad y de cooperación.
1.
Medidas legales: Medición de la madurez de las leyes y normativas sobre
ciberdelincuencia y ciberseguridad.
En este pilar se evalúan
cuestiones tales como: que los países evaluados cuenten con algún tipo de
legislación sobre ciberseguridad, normativa de protección de datos y normativa
sobre infraestructuras críticas.
2. Medidas técnicas: Medición de la
aplicación de las capacidades técnicas a través de los organismos nacionales y
sectoriales.En este pilar se evalúan cuestiones tales como:
que los países evaluados tengan CSIRT activos, participen en un CSIRT regional y
que cuenten con mecanismos de notificación para la protección de la infancia en
línea.
3. Medidas organizativas: Medición de las estrategias
nacionales y las organizaciones que aplican la ciberseguridad.
En
este pilar se evalúan cuestiones tales como: que los países evaluados tengan
estrategias nacionales de ciberseguridad, agencias de ciberseguridad,
estrategias e iniciativas de protección de la infancia en línea.
4.
Medidas de desarrollo de capacidad: Medición de las campañas de concientización,
la formación, la educación y los incentivos para el desarrollo de capacidades en
ciberseguridad.
En este pilar se evalúan cuestiones tales como: que
los países evaluados lleven a cabo iniciativas de concientización en materia de
ciberseguridad, que cuenten con programas de I+D en ciberseguridad y que
declaren tener industrias nacionales de ciberseguridad.
5. Medidas de
cooperación: Medición de la colaboración entre agencias, empresas y países.
En
este pilar se evalúan cuestiones tales como: que los países evaluados participen
en asociaciones público-privadas de ciberseguridad, que cuenten con acuerdos
bilaterales de ciberseguridad y con acuerdos multilaterales de ciberseguridad.
Fuente: ITU
| 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.cybersecurity-review.com/hackers-stole-data-from-multiple-electric-utilities-in-recent-ransomware-attack/ | \n\t\t\t\nHackers stole data belonging to multiple electric utilities in an October ransomware attack on a US government contractor that handles critical infrastructure projects across the country, according to a memo describing the hack obtained by CNN.\nFederal officials have closely monitored the incident for any potential broader impact on the US power sector while private investigators have combed the dark web for the stolen data, according to the memo sent this month to power company executives by the North American grid regulator\xe2\x80\x99s cyberthreat sharing center.\nThe previously unreported incident is a window into how ransomware attacks on critical US companies are handled behind the scenes as lawyers and federal investigators quietly spring into action to determine the extent of the damage.\nRead more…\nSource: CNN News\n\n \n\t\t\t\t\t | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://cybernews.com/security/ken-gill-cpi-security-when-it-comes-to-cybersecurity-its-important-to-stay-vigilant-both-at-work-and-at-home/ |
As more people begin to understand the importance of updating their cybersecurity posture, experts emphasize that the same level of attention should be directed at securing their homes.
Even though having cameras installed around one’s property offer a sense of security, not everyone is on board with the idea of having surveillance devices in every corner of their house. While some have concerns regarding the vulnerabilities of the camera devices themselves, others simply don't feel comfortable with being filmed.
To discuss prevalent misconceptions surrounding smart home gadgets and the benefits of video security solutions, Cybernews invited Ken Gill, CEO and Founder of CPI Security – a company on a mission to secure homes and businesses.
How did the idea of CPI Security originate? What has the journey been like since your launch in 1991?
I’ve been installing security systems since I was in high school. After high school and a short stint in the hotel industry, I provided security and video systems in south Florida. We installed security systems for the Ft. Lauderdale Airport, the IRS, and Fortune 500 companies. Eventually, opened CPI Security in Charlotte, N.C., my hometown. Since we began in 1991, CPI has expanded to 11 locations across the southeast and protects more than a quarter of a million homes and businesses. The journey has been exciting, challenging, but most of all, rewarding. The industry and the technology we use to protect our customers have evolved significantly in the last three decades. Still, our mission has remained the same, to make our communities safer.
Can you introduce us to your smart home solutions? What are their key features?
We have a variety of smart home solutions that make our customers’ lives more efficient and convenient. Each smart home device is integrated into our security systems, which can all be controlled from a single app or the security panel on the wall.
Our CPI video doorbell pro is one of the best defenses to protect your home and online purchases. Our interface allows customers to lock their door or arm their system while observing or communicating with whoever is at the front door, even if you aren’t home. Bonus: All CPI video solutions are encrypted, and access is restricted to the account holder or a person the account holder gives access.
One of our most popular smart home solutions is our keyless smart lock. Customers can lock or unlock their door remotely or assign unique codes to the babysitter or dog walker to give them access during certain times of the day.
Our smart thermostat is another fan favorite. If you forget to turn the temperature down after leaving for a long weekend, you can adjust the temperature remotely from the CPI InTouch app. Customers see cheaper electric bills when they set the thermostat to a schedule. Because the smart thermostat is integrated with the entire CPI Security System, if the fire communicator detects smoke, it will automatically cut off the HVAC system to reduce the spread of a fire.
One of our newest smart home devices is our smart water shut-off valve. When paired with our water sensor, the smart water shut-off valve will automatically cut off the water when the sensor detects a leak in your home. With water leaks costing, on average, nearly $11,000 in damage, our smart water shut-off valve can mitigate water damage and save you thousands.
Have you ever driven down the road and wondered if you shut the garage door? Our smart garage door controller is the perfect solution! No need to turn around. You can confirm whether you left it open or closed from the InTouch app on your phone or turn on the “door left open” notification so you never forget to close it. You can also program the garage door to open or close based on an alarm or home automation event, like having it automatically close when you lock the front door.
Our smart plug allows customers to turn the lights on remotely or set them to a schedule to make it appear someone is home, making it the perfect addition to your smart security system.
What are some of the most popular ways for threat actors to bypass various physical security measures?
CPI believes in and supports a layered approach to physical security using video solutions, perimeter, and interior protection.
We see burglars try to break glass windows or doors to get into businesses after hours. We often recommend our customers equip their businesses or homes with glass break detectors and door/window sensors. If someone tries to open the window or throw a rock at it to break it, the alarm will trigger, and our central station operator will respond and get the authorities to the location immediately.
Our most recent security feature can stop intruders before they even get inside. Our latest outdoor cameras feature perimeter alerts. When the camera detects someone on the property, it whistles and flashes a light to warn the person they’re being recorded. We’ve already seen it deterring crime. See it in action here!
In addition to perimeter protection, we have a variety of interior protections, like motion sensors, that will also trigger the alarm. CPI uses encrypted sensors that frequency hop to protect against sophisticated hackers that use RF jamming or replay attacks to compromise the system.
Sometimes we see intruders rip the security panel off the wall or damage it to disable the system. But our security systems feature crash and smash detection. So, even if the intruder damages the panel, we still receive a signal and can dispatch police. It’s like a security system for your security system.
How did the recent global events affect your field of work? Were there any new challenges you had to adapt to?
When the pandemic stopped everyone and everything in its tracks, we turned to technology to keep moving, from virtual health care to school and work. We found new customers reach out to see how they could make their lives more efficient from home, and again technology was the answer. Thankfully, our products were already in place. It was just a matter of introducing the home automation solutions we offer to new customers.
Because we offer professional installation and monitoring, some of our work must still be done in person. We faced one challenge during the pandemic: ensuring our sales representatives, technicians, and customers were safe during on-site visits. Like the rest of the world, we adapted quickly to ensure our team members and customers were protected. We continuously follow the latest guidelines from the Center for Disease Control and Prevention to help mitigate the spread of COVID-19.
Aside from health risks, the pandemic also posed a host of other challenges to businesses like supply chain issues. To overcome those shortages, we had to go to other providers for certain components of our security and home automation products. Doing so involved retesting and recertifying the products to ensure they were meeting the high standards we expect and deliver to our customers.
What myths and misconceptions surrounding smart home devices do you come across most often?
Sometimes we find customers are wary of having cameras inside their homes out of fear the cameras could be hacked. At CPI Security, we take our customer's privacy very seriously and have stringent protocols to protect them.
For customers with any video device, we encourage them to turn on two-factor authentication for an additional layer of protection. Two-factor authentication requires the account administrator to approve and authorize access to the device whenever an unregistered device tries to access the account. If the customer doesn't recognize the device or person trying to access the account, they can simply deny access.
In addition, all video streams are encrypted and sent over a VPN connection for added security. So, even if there is no security on the local Wi-Fi network or the customer's Wi-Fi is somehow compromised, cameras always connect over a high-security path, using VPN or HTTPS.
CPI also offers local, remote, and cloud video storage options. We uphold the integrity of these storage options by encrypting them and requiring two proprietary viewers, so the video is safe even in storage.
In addition, some consumers are concerned about the vulnerabilities of our products on their Wi-Fi networks. As shown, our solutions are secure, but many home networks are not. CPI offers mesh network software with malware and anti-virus protection to ensure their networks are secure.
What predictions do you have for the future of technology in the public safety field?
As technology advances, we think public safety will become better, faster, and harder to crack. In the last 30 years, we’ve seen the security industry shift to rely more heavily on video and audio verification. In recent years, video and audio have gotten clearer, giving our law enforcement officers a better chance at catching the bad guys. The clarity of security devices and cameras will continue to improve in time.
We’re already using artificial intelligence to detect and warn customers of potential threats or people, animals, and objects on their property. We predict artificial intelligence will continue to advance and develop, making the detection and verification of security threats even more precise. The better technology gets, the sooner we can be alerted to real dangers, which in turn gives customers more time to get to safety and CPI more time to get the authorities there quickly.
We also anticipate the evolution of Next Generation 911 and deeper integration with our monitoring center. This means a faster and more efficient response to real vs. potential threats and the ability to show audio, visual, and other contextual details directly to the responding agencies or officers.
What tips would you give to those looking to secure not only their homes but also their networks?
When it comes to cybersecurity, it’s important to stay vigilant both at work and at home. Private email and customer accounts are generally more vulnerable to cyber-attacks since residential users tend not to be as aware of cybercrime vulnerabilities, nor do they usually protect themselves as robustly as businesses do. Here are a few tips to keep your personal devices and networks secure to prevent crimes such as identity theft, ransomware, and viruses:
Use 14 character-pass-phases for your logins. They are nearly impossible to crack. However, most people still use 6-8 character passwords that novice hackers can easily crack in less than an hour.
Another tip is to avoid reusing passphrases and never use your work account passphrase for personal logins. Doing so increases the risk to you and your company.
Always set a pass-phase for your home’s wireless network since hackers can drive around the neighborhood or sit in the parking lot of a condo or apartment complex and simply try to find unprotected networks.
When joining a public wireless network, you usually are prompted to decide if you’d like your device to be discoverable by others on the web. Our advice is never to allow this to happen. This is a significant risk in public places like airports and coffee lounges.
Use two-factor authentication whenever possible.
Use trusted professionals that are licensed and can confirm the security of their solutions.
What other aspects of our lives do you hope to see enhanced by technology in the near future?
All of our technology helps our customers live a more convenient and efficient lifestyle. We foresee more technology becoming available to make every aspect of our lives easier, and we will explore new technologies that also protect our customers from safety hazards. For example, I would like to see more products that prevent or mitigate fires, break-ins, and natural disasters. Any technology that protects property and saves lives is worth exploring.
Right now, we are testing wellness solutions like sensors that can be placed in the home and help monitor the health of elderly loved ones. The sensors will monitor sleep, diet, and digestion patterns. Whenever there is a noteworthy change, account holders will be notified so they can take appropriate action.
Tell us, what’s next for CPI Security?
In the next few months, we’re excited to be rolling out new business analytics cameras that will help business owners protect their property and manage their business. By creating and using rules around movement or group gatherings, business owners can transform how they protect their business and gather information to make informed decisions. No more guessing rush times or if customers are waiting in long lines. Know exactly where to place high-value items by tracking which areas customers gravitate to. This is another example of how technology is making life more efficient. We can’t wait to see it in place to help our small business owners succeed!
| 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://netdiligence.com/newsletters/cyber-risk-news-vol-251-december-16-2022/ | We bring to your attention a sampling of recent media stories involving cyber risk & privacy liability. Among the stories we\xe2\x80\x99re highlighting this month: Hive Ransomware extorted over $100M in ransom payments, Medibank hacker releases more private health information, Forefront Dermatology data breach $3.75M class action settlement, A Ransomware Attack Hit Two Michigan Schools, and more.\nRansomware Corner\nHive Ransomware extorted over $100M in ransom payments from over 1,300 companies\nThe authorities reported that from June 2021 through at least November 2022, threat actors employed the Hive ransomware in attacks aimed at a wide range of businesses and critical infrastructure sectors, including Government Facilities, Communications, Critical Manufacturing, Information Technology, and especially Healthcare and Public Health (HPH). Click to read entire article.\nHealthcare\nForefront Dermatology data breach $3.75M class action settlement\nForefront Dermatology will pay $3.75 million to resolve claims it failed to protect patient and employee information from a 2021 data breach. The settlement benefits consumers whose personal information was compromised in a May 2021 ransomware attack on Forefront Dermatology. Click to read entire article.\nCommunity Health Network notifying patients about data breach\nINDIANAPOLIS \xe2\x80\x94 Community Health Network is notifying patients of a possible data breach. The hospital system discovered third-party tracking technologies on some of its websites, including the MyChart patient portal, and on some of its appointment scheduling sites. Click to read entire article.\nNewYork-Presbyterian Hospital Notifies 12K of Healthcare Data Breach\nAlong with NewYork-Presbyterian Hospital, Gateway Ambulatory Surgery Center and CorrectCare Integrated Health also reported healthcare data breaches recently. Click to read entire article.\nPublic Entity\nA Ransomware Attack Hit Two Michigan Schools\nIn response to a ransomware attack, two Michigan school districts have shuttered. Kevin Oxley, the superintendent of the Jackson County Intermediate School District, announced that until Wednesday school would remain closed. Click to read entire article.\nCounty of Tehama, Calif., Identifies and Addresses Data Security Incident\nRED BLUFF, Calif., Nov. 17, 2022 /PRNewswire/ \xe2\x80\x94 Today, the County of Tehama, California announced that it has addressed a data security incident that resulted in unauthorized access to files on its systems. Click to read entire article.\nData breach impacts 5.3k Sacramento County Correctional Health patients\nSACRAMENTO, Calif. \xe2\x80\x94 For nearly five months, thousands of Sacramento County Correctional Health patients had their information exposed to the public internet in a data breach by a county contractor, Sacramento County announced Thursday. Click to read entire article.\nProfessional Services\nDavaco data breach $540K class action settlement\nDavaco is a project-management firm that assists its clients in developing and maintaining projects. The company has reportedly provided services to brands such as Target, Sephora, Home Depot, Starbucks and more. According to a class action lawsuit, Davaco failed to protect employee data from third parties \xe2\x80\x94 resulting in a ransomware data breach in June 2021. The breach allegedly compromised sensitive employee information, including names, Social Security numbers and identification card numbers. Click to read entire article.\nFinancial Services\nCounsel in Capital One Data Breach Suit Awarded $53.2 Million\nThe lawyers responsible for obtaining a $190 million class action settlement in litigation against Capital One Financial Corp. over a 2019 data breach will recover $53.2 million in fees, according to an order by the US District Court for the Eastern District of Virginia. Click to read entire article.\nOld Point National Bank Announces Data Breach Compromising Customers\xe2\x80\x99 Social Security Numbers and Bank Account Numbers\nOn November 9, 2022, Old Point National Bank reported a data breach with the Montana Attorney General after the company learned that an unauthorized party was able to access an employee\xe2\x80\x99s email account that contained sensitive information belonging to certain bank customers. According to Old Point, the breach resulted in the names, driver\xe2\x80\x99s license numbers and photos, Social Security numbers, and bank account numbers and balances being compromised. Click to read entire article.\nMiddletown Valley Bank Reports Data Breach Following Unauthorized Access to Computer Network\nOn November 14, 2022, Middletown Valley Bank reported a data breach with the Montana Attorney General after the company discovered that an unauthorized party had gained access to files on the bank\xe2\x80\x99s computer network containing sensitive consumer information. According to Middletown Valley Bank, the breach resulted in the following consumer data being leaked: names, financial account numbers, Social Security numbers, driver\xe2\x80\x99s license numbers, passport numbers, and other identifying information that was provided then when applying for products or services. Click to read entire article.\nAAA Collections, Inc. Files Notice of Data Breach After Unauthorized Party Accessed the Company\xe2\x80\x99s Computer System\nOn November 16, 2022, AAA Collections, Inc. reported a data breach with the Montana Attorney General\xe2\x80\x99s Office after the company learned that an unauthorized party was able to access sensitive consumer data contained on its computer system. Click to read entire article.\nThe Rosewood Corporation Files Notice of Data Breach, Leaking Consumers\xe2\x80\x99 Social Security Numbers\nAccording to Rosewood, the breach resulted in the names, addresses, Social Security numbers, driver\xe2\x80\x99s license numbers, government identification numbers, and health insurance information belonging to certain individuals being compromised. Click to read entire article.\nAsia Pacific\nMedibank hacker releases more private health information\nThe hacker, or hackers, behind the Medibank cyber attack have re-emerged after several days of online silence, releasing more private health information on the Dark Web. Click to read entire article.\nFive Million AirAsia Passengers And Employees Personal Data Might Be Compromised\nMultiple reports from the cybersecurity world have noted that AirAsia may have become the latest victim of the Daixin ransomware group. The attack apparently took place over a period of two days earlier this month and has resulted in the leakage of personal data belonging to 5 million unique passengers as well as all of the group\xe2\x80\x99s employees. Click to read entire article.\nFarrer Park Hospital fined $58,000 over data breach affecting medical information of 2,000 people\nPersonal details of about 3,500 people were automatically forwarded from two hospital employees’ email accounts to a third party. Click to read entire article.\n | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://www.infosecurity-magazine.com/news/china-wuhan-earthquake-cyber-attack/ | The Wuhan Earthquake Monitoring Center in China has been hit by a cyber-incident perpetuated by a hacker group with an “overseas government background.”\n\nThe Global Times newspaper, owned by the Chinese Communist Party, reported on July 26 that the Wuhan Municipal Emergency Management Bureau revealed that the Monitoring Center had been subjected to a cyber-attack by an “overseas organization.”\n\nIn its statement on Wednesday July 26, the Bureau said the public safety center immediately sealed off affected equipment and reported the attack to the authorities, according to the Global Times.\n\nThe newspaper claimed that “preliminary evidence suggests that the government-backed cyber-attack on the center came from the US.” It said that a Trojan horse program originating from abroad had been discovered at the Wuhan Earthquake Monitoring Center, as confirmed by the Jianghan sub-bureau – a public security bureau.\n\nIn a press conference on July 26, Chinese Foreign Ministry Spokesperson Mao Ning condemned the attack, and commented that “the US government is engaged in malicious cyber operations against not just China but countries around the world.”\n\nHowever, when questioned whether the US had directly carried out the attack she said, “a hacker group with overseas government background.”\n\nNing also accused the US of “politicizing and weaponizing cybersecurity issues,” and said the Whitehouse’s actions are hampering global efforts to tackle cybercrime.\n\nGrowing Tensions \n\nThe news comes amid growing tensions between the US and China, which has reportedly spilled into the cyber realm.\n\nIn July 2023, Microsoft revealed that it had discovered a Chinese espionage campaign that compromised at least 25 organizations, including the US government. This shortly followed a joint advisory from government cybersecurity agencies from the US, Australia, Canada, New Zealand and the UK in May 2023 that warned about Chinese cyber activity targeting critical national infrastructure networks in the US.\n\nThe Chinese government has also previously expressed concerns about US cyber activity in its country, issuing a ban against products sold by US chipmaker giant Micron on cybersecurity grounds.\n\nSpeaking to Infosecurity, Ian Thornton-Trump, CISO for Cyjax, expressed skepticism that the US would have been behind this attack, believing it is more likely the perpetrator is an independent actor or hacktivist “possibly sympathetic to the current tensions with Taiwan.”\n\nHe noted: “Firstly, even if the origin of the attack came from several US-based autonomous system number (ASNs), it’s not likely any credible US Government or US-contracted APT group would use an IP address attributable to the country of where the attack originated from – proxies and VPNs would be a likely tactic and the attack would have been to try and conduct espionage from say an IP address located in India.”\n\nThornton-Trump also questioned what the US government would gain by targeting a public safety service like the Wuhan Earthquake Monitoring Center – particularly as it would mean losing the “moral high ground of your cyber operations.”\n | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |
https://cymulate.com/blog/cyber-threat-breakdown-november-2023/ | \nHere is the November 2023 breakdown of threats, with a short list of IoCs. The full IoC list for each specific threat is available from the Cymulate app.\nReminder: The Cymulate BAS Immediate Threat capabilities can be configured to automatically update your SIEM list of IoCs, including hashes, URLs, domain names, etc.\nNote: The period character \xe2\x80\x98.\xe2\x80\x99 in the hash names has been replaced with a \xe2\x80\x98\xc2\xb7\xe2\x80\x99 out of an abundance of security caution.\nTable of Contents\n\xc2\xa0Stealthy WailingCrab Malware Misuses MQTT Messaging Protocol\nRansomware Spotlight Trigona\nDPRK State-Linked Cyber Actors Conduct Software Supply Chain Attacks\nIsrael-Hamas War Spotlight Shaking the Rust Off SysJoker\nInfectedSlurs Botnet Spreads Mirai via Zero-Days\nDiamond Sleet Supply Chain Compromise Distributes A Modified Cyberlink Installer\nLitterDrifter Campaign\nAttack Signals Possible Return of Genesis Market Abuses Nodejs and EV Code Signing\nRealtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats\nHrServ Previously Unknown Web Shell Used in APT Attack\nStopRansomware LockBit 30 Ransomware Affiliates Exploit CVE 2023-4966 Citrix Bleed Vulnerability CISA AA23-325A\nThreat Actor Shifts To Own Websites To Deploy Malicious SolarMarker Payloads\nXWorm Malware Exploring CC Communication\nUAC-0050 Cyber Attack Using Remcos RAT Disguised as SBU Request\nSuspected Rattlesnake Organization Uses Nim Backdoor To Spy On Intelligence From Many Countries In South Asia\nA Deep Dive into Phobos Ransomware Recently Deployed by 8Base Group\nStately Taurus Targets the Philippines As Tensions Flare in the South Pacific\nAndariel Threat Group Attacks Servers Vulnerable To Apache ActiveMQ Vulnerability CVE-2023-46604\nStately Taurus APT Targets The Philippines With Trojans\nThreat Trend Report On Kimsuky\nRedline Dropped Through MSIX Package\nCert IL Alert – Iranian groups attack Israel with wipers\nUS Cert Alert – Rhysida Ransomware\nAdversaries Exploit Confluence Vulnerability to Deploy Ransomware\nGhostLocker – A Work In Progress RaaS\nMalvertiser Copies PC News Site To Deliver RedLine Infostealer\nRansomware Roundup – Knight\nMultiple North Korean threat actors exploiting the TeamCity CVE-2023-42793 vulnerability\nUS Cert Alert – Royal Ransomware Updated\nIMPERIAL KITTEN Deploys Novel Malware Families\nGhostSec – From Fighting ISIS to Possibly Targeting Israel with RaaS\nStealthy Flax Typhoon hackers use LOLBins to evade detection\nSysAid Zero-Day Path Traversal Vulnerability Exploited CVE-2023-47246\nMuddyC2Go Latest C2 Framework Used by Iranian APT MuddyWater Spotted in Israel\nCert IL Alert – Exela Stealer\nBlueNoroff strikes again with new macOS malware\nFrom DarkGate To DanaBot\nCert IL Alert – Phishing campaign in Israel by Iranian Muddy Water\nRapid7-Observed Exploitation of Atlassian Confluence CVE-2023-22518\nAgonizing Serpens Aka Agrius Targeting the Israeli Higher Education and Tech Sectors\nMalware Dropped Through a ZPAQ Archive\nCert IL Alert – New Phishing Campaign\nAnalysis Of Activities of Suspected APT-C-36 Blind Eagle Organization Launching Amadey Botnet Trojan\nSuspected Exploitation of Apache ActiveMQ CVE-2023-46604\nElastic Catches DPRK Passing Out KANDYKORN\nSecurity Brief TA571 Delivers IcedID Forked Loader\nA Retrospective on AvosLocker\nFrom Albania to the Middle East The Scarred Manticore is Listening\n \nStealthy WailingCrab Malware Misuses MQTT Messaging Protocol\nWailingCrab, also known as WikiLoader, is a sophisticated multi-component malware delivered almost exclusively by an initial access broker tracked as Hive0133, which overlaps with TA544.\nWailingCrab was first observed in December 2022, and since then, it has been used extensively in email campaigns to deliver the Gozi backdoor, often against Italian targets.\nIn recent months, Hive0133 has targeted organizations beyond Italy with email campaigns delivering WailingCrab frequently using themes such as overdue delivery or shipping invoices.\nIoCs\n56b_browsing7001d029626cf1ae7ce295a63ed59b5ed087504f887c217fc753ff3a1f2b5XxX7Dll\xc2\xb7dll\nSHA1: 74aa7d555b8972362ba53e47f596e3403f5699b6\nMD5: f6ea7ec5d94bc65bf82a6b42b57a6c82\nSHA256: 56b7001d029626cf1ae7ce295a63ed59b5ed087504f887c217fc753ff3a1f2b5\n50810e4696dd0_browsing75ca23349e3e1c3a87fc7b46ab89f4b1eb093a5cfb74f84cc51XxX6Dll\xc2\xb7dll\nSHA1: 19307cd55c54e8d4db3666fd11d69f2fe27942c0\nMD5: f6d0b9617405f35bb846d671edda75d3\nSHA256: 50810e4696dd075ca23349e3e1c3a87fc7b46ab89f4b1eb093a5cfb74f84cc51\n9d80eb4be1e9139a03a6aa3f053fec14ed1880251b1f13d85d84d_edr7d64dddd581XxX1Dll\xc2\xb7dll\nSHA1: 7b3a2f5423e4b44b228ef8298d2947e307d43645\nMD5: 971dd6c48909adf98861fb8457125faa\nSHA256: 9d80eb4be1e9139a03a6aa3f053fec14ed1880251b1f13d85d84d7d64dddd581\nRansomware Spotlight Trigona\nThe Trigona ransomware was first tracked by Trend Micro as Water Ungaw emerged in October 2022.\nIoCs\n1_browsing70fa5d29cdb562d41a054abf2a57ca29fc233805b59692a1a57ebf25449be7cXxX4Exe\xc2\xb7exe\nSHA1: f158dd1eea5a99f9a93d9acde8a57e04eb028bbb\nMD5: 17576d27c0bcd5ab82a73f0b7d4a3e55\nSHA256: 170fa5d29cdb562d41a054abf2a57ca29fc233805b59692a1a57ebf25449be7c\n4a0623195_browsing7c53dee1a11ff3eb84caad082f18761aee49e72d79c7f1d32884e34XxX6Exe\xc2\xb7exe\nSHA1: f899824e38a6d260df9b79d72b40899617819113\nMD5: 0a8ee230e5390b8855b1968daee6827e\nSHA256: 4a06231957c53dee1a11ff3eb84caad082f18761aee49e72d79c7f1d32884e34\nhttp://45\xc2\xb7227\xc2\xb7253\xc2\xb799\nSHA1: nan\nMD5: nan\nSHA256: nan\nDPRK State-Linked Cyber Actors Conduct Software Supply Chain Attacks\nDPRK state-linked cyber actors conduct software supply chain attacks Overview The National Intelligence Service (NIS) of the Republic of Korea (ROK) and the National Cyber Security Centre (NCSC) of the United Kingdom (UK) have identified Democratic People’s Republic of Korea (DPRK) state-linked cyber actors targeting software supply chain products widely used by government organizations financial institutions and defense industry companies globally.\nIoCs\n6c121f2b2efa6592c2c22b2921815_browsing7ec9e63f385e7a1d7425857d603ddef8c59XxX47Macho\xc2\xb7macho\nSHA1: 9e9a5f8d86356796162cee881c843cde9eaedfb3\nMD5: 5faf36ca90f6406a78124f538a03387a\nSHA256: 6c121f2b2efa6592c2c22b29218157ec9e63f385e7a1d7425857d603ddef8c59\na64fa9f1c_browsing76457ecc58402142a8728ce34ccba378c17318b3340083eeb7acc67XxX43Dylib\xc2\xb7dylib\nSHA1: 769383fc65d1386dd141c960c9970114547da0c2\nMD5: 660ea9b8205fbd2da59fefd26ae5115c\nSHA256: a64fa9f1c76457ecc58402142a8728ce34ccba378c17318b3340083eeb7acc67\nhttp://zacharryblogs\xc2\xb7com\nSHA1: nan\nMD5: nan\nSHA256: nan\nIsrael-Hamas War Spotlight Shaking the Rust Off SysJoker\nA new variant of the SysJoker Windows malware developed in the Rust language has been linked to targeted attacks against Israel by a Hamas-affiliated threat actor.\nIoCs\n6_browsing7ddd2af9a8ca3f92bda17bd990e0f3c4ab1d9bea47333fe31205eede8ecc706XxX51Exe\xc2\xb7exe\nSHA1: f15f3ca6571c60e2116c0170f36992e856e2b10a\nMD5: 31c2813c1fb1e42b85014b2fc3fe0666\nSHA256: 67ddd2af9a8ca3f92bda17bd990e0f3c4ab1d9bea47333fe31205eede8ecc706\ne0_browsing76e9893adb0c6d0c70cd7019a266d5fd02b429c01cfe51329b2318e9239836XxX54Exe\xc2\xb7exe\nSHA1: 29e0815512b6f939e66693dcd54408b6d9900c78\nMD5: d51e617fe1c1962801ad5332163717bb\nSHA256: e076e9893adb0c6d0c70cd7019a266d5fd02b429c01cfe51329b2318e9239836\nhttp://85\xc2\xb731\xc2\xb7231\xc2\xb749\nSHA1: nan\nMD5: nan\nSHA256: nan\nInfectedSlurs Botnet Spreads Mirai via Zero-Days\nIn late October 2023, the Akamai SIRT observed an increase in activity targeting a rarely used TCP port on their honeypots, peaking at 20 attempts per day and later averaging two to three attempts daily.\nSubsequent investigation until November 9 revealed a specific HTTP exploit path and targeted port, raising questions about discovered devices fitting the profile due to an odd HTTP response Server header with internet slang roots.\nIoCs\nf8abf9fb1_browsing7f59cbd7381aa9f5f2e1952628897cee368defd6baa6885d74f3eccXxX10Elf\xc2\xb7elf\nSHA1: 1da12852d25ed66a13bd14cd4fc243118dd14c95\nMD5: cc888ace5a9ad90e95c7a08504a9de7f\nSHA256: f8abf9fb17f59cbd7381aa9f5f2e1952628897cee368defd6baa6885d74f3ecc\n7cc62a1bb2db82e_browsing76183eb06e4ca84e07a78cfb71241f21212afd1e01cb308b2XxX16Elf\xc2\xb7elf\nSHA1: db49b39b43fd1cd44f8695f3d5606b714ecd5c35\nMD5: 8cafa4aecaeedc2beb48dc083f1516dd\nSHA256: 7cc62a1bb2db82e76183eb06e4ca84e07a78cfb71241f21212afd1e01cb308b2\nhttp://dfvzfvd\xc2\xb7help\nSHA1: nan\nMD5: nan\nSHA256: nan\nDiamond Sleet Supply Chain Compromise Distributes A Modified Cyberlink Installer\nResearchers uncovered a supply chain attack by the North Korea-based threat actor Diamond Sleet (ZINC) involving a malicious variant of an application developed by CyberLink Corp.,\na software company that develops multimedia software products.\nThis malicious file is a legitimate CyberLink application installer that has been modified to include malicious code that downloads, decrypts, and loads a second-stage payload.\nThe file, which was signed using a valid certificate issued to CyberLink Corp., is hosted on legitimate update infrastructure owned by CyberLink and includes checks to limit the time window for execution and evade detection by security products.\nIoCs\n166d1a6ddcde4e859a89c2c825cd3c8c953a86bfa92b343de_browsing7e5bfbfb5afb8beXxX14Exe\xc2\xb7exe\nSHA1: 141b635caacd8def3a1869cfb717262207ecae35\nMD5: 575ebf994b75d091e8df381cce992aaa\nSHA256: 166d1a6ddcde4e859a89c2c825cd3c8c953a86bfa92b343de7e5bfbfb5afb8be\n0895_browsing73b3a1167f387dcdad5e014a5132e998b2c89bff29bcf8b06dd497d4e63dXxX13Png\xc2\xb7png\nSHA1: dde44c91e9394b97a6d18f5b13031e2399853b03\nMD5: fbcbfe33cc9d29566ce2c0a4021b54fb\nSHA256: 089573b3a1167f387dcdad5e014a5132e998b2c89bff29bcf8b06dd497d4e63d\n166d1a6ddcde4e859a89c2c825cd3c8c953a86bfa92b343de_edr7e5bfbfb5afb8beXxX14Exe\xc2\xb7exe\nSHA1: 141b635caacd8def3a1869cfb717262207ecae35\nMD5: 575ebf994b75d091e8df381cce992aaa\nSHA256: 166d1a6ddcde4e859a89c2c825cd3c8c953a86bfa92b343de7e5bfbfb5afb8be\nLitterDrifter Campaign\nThe LitterDrifter worm is written in VBS and has two main functionalities: automatic spreading over USB drives and communication with a broad, flexible set of command-and-control servers.\nThese features are implemented in a manner that aligns with the group’s goals, effectively maintaining a persistent command and control (C2) channel across a wide array of targets.\nLitterDrifter seems to be an evolution of a Gamaredon group activity to a propagating USB Powershell worm.\nIoCs\n50f5e8f6_browsing73915508d2add406f1c72de5112a01a1b3fdd41b314029c796a7d754XxX9Txt\xc2\xb7txt\nSHA1: fa7a9c86744c233efa9289e919ec1ebb66e1ee84\nMD5: 8096dfaa954113242011e0d7aaaebffd\nSHA256: 50f5e8f673915508d2add406f1c72de5112a01a1b3fdd41b314029c796a7d754\n3cfb6514e51f40a4c325e04a35c1_browsing74af4dab95167019e6aa36a2c422e35d7b72XxX2Txt\xc2\xb7txt\nSHA1: e1e46550f77b4cc2560668865d68169f5a641601\nMD5: 6349dd85d9549f333117a84946972d06\nSHA256: 3cfb6514e51f40a4c325e04a35c174af4dab95167019e6aa36a2c422e35d7b72\nhttp://triticumos\xc2\xb7ru\nSHA1: nan\nMD5: nan\nSHA256: nan\nAttack Signals Possible Return of Genesis Market Abuses Nodejs and EV Code Signing\nThe Trend Micro Managed XDR team encountered malicious operations that used techniques similar to the ones used by Genesis Market.\nThe threat actor behind these operations abused Node.js to act as a platform for the backdoor Extended Validation (EV) Code Signing for defense evasion and possibly Google Colab to host search engine-optimized download sites.\nIoCs\nd9ca193b5da85a3841ec_browsing749b67168c906e21bbaac40f0a0bff40839efb3a74c1XxX27Exe\xc2\xb7exe\nSHA1: 506accb774d2a2be4b0ee3bdd3c549f09684ab9b\nMD5: 8ade6f83a1ad66110945cac3ab34a3c5\nSHA256: d9ca193b5da85a3841ec749b67168c906e21bbaac40f0a0bff40839efb3a74c1\ncb99365bac3d168e295aa0_browsing764a1c67e1a7e582731880ad0522e9b6b3616275dfXxX24Exe\xc2\xb7exe\nSHA1: 3364dd410527f6fc2c2615aa906454116462bf96\nMD5: da354f956ee4d8d0bb714b4bda0c57f6\nSHA256: cb99365bac3d168e295aa0764a1c67e1a7e582731880ad0522e9b6b3616275df\nhttps://91\xc2\xb7212\xc2\xb7166\xc2\xb716\nSHA1: nan\nMD5: nan\nSHA256: nan\nRealtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats\nCVE-2021-35394 was disclosed on Aug.\n16 2021.\nThe vulnerability affects UDPServer in Realtek Jungle SDK version 2.0 and later Realtek Jungle SDK version 3.4.14B.\nRemote unauthenticated attackers could leverage this vulnerability to achieve arbitrary command execution, leading to devices being taken over.\nIoCs\n26e96945ee32199536d4c85124a24c28e853b55_browsing7eb31f3907d19f08b9798dff4XxX1Elf\xc2\xb7elf\nSHA1: 68ec5f83bf5cff8c0af67a175a617b0f577ff557\nMD5: aaee43e63d5a3abd70ffa774a16c816e\nSHA256: 26e96945ee32199536d4c85124a24c28e853b557eb31f3907d19f08b9798dff4\n196_browsing7370203138b9324f11c5cb3fd15ac8d2f0c585373486614600b676a4e2641XxX2Elf\xc2\xb7elf\nSHA1: c1700d081795b6770cb71eb79b3b3328253d2afe\nMD5: 75ade86d5cb702c76576c587c167c451\nSHA256: 1967370203138b9324f11c5cb3fd15ac8d2f0c585373486614600b676a4e2641\nhttp://3\xc2\xb7235\xc2\xb728\xc2\xb7168\nSHA1: nan\nMD5: nan\nSHA256: nan\nHrServ Previously Unknown Web Shell Used in APT Attack\nKaspersky reports on a newly discovered DLL file identified as hrserv.dll, which is a previously unknown web shell exhibiting sophisticated features such as custom encoding methods for client communication and in-memory execution.\nIoCs\nf3851_browsing7692ab3e817182a396a407d9fe1c260c89bb6b733764737562f235115f0XxX4Dll\xc2\xb7dll\nSHA1: a5796a2cc31e1ab1a8a12131f803affe735a835f\nMD5: d0fe27865ab271963e27973e81b77bae\nSHA256: f38517692ab3e817182a396a407d9fe1c260c89bb6b733764737562f235115f0\nf3851_edr7692ab3e817182a396a407d9fe1c260c89bb6b733764737562f235115f0XxX4Dll\xc2\xb7dll\nSHA1: a5796a2cc31e1ab1a8a12131f803affe735a835f\nMD5: d0fe27865ab271963e27973e81b77bae\nSHA256: f38517692ab3e817182a396a407d9fe1c260c89bb6b733764737562f235115f0\nStopRansomware LockBit 30 Ransomware Affiliates Exploit CVE 2023-4966 Citrix Bleed Vulnerability CISA AA23-325A\nThe Cybersecurity and Infrastructure Security Agency (CISA) Federal Bureau of Investigation (FBI) Multi-State Information Sharing & Analysis Center (MS-ISAC), and the Australian Signals Directorates Australian Cyber Security Center (ASDs ACSC) have issued a joint Cybersecurity Advisory (CSA).\nThe advisory shares Indicators of Compromise (IOCs), Tactics Techniques and Procedures (TTPs), and detection methods associated with LockBit 3.0 ransomware exploiting the CVE-2023-4966 vulnerability also known as Citrix Bleed.\nThis vulnerability affects Citrix NetScaler web application delivery control (ADC) and NetScaler Gateway appliances.\nThe advisory includes TTPs and IOCs gathered from the FBI ACSC and information voluntarily shared by Boeing.\nBoeing observed LockBit 3.0 affiliates exploiting CVE-2023-4966 to gain initial access to Boeing Distribution Inc.\nIts parts and distribution business and similar activity has been reported by other trusted third parties impacting their organizations.\nIoCs\ne55_browsing7e1440e394537cca71ed3d61372106c3c70eb6ef9f07521768f23a0974068XxX183Exe\xc2\xb7exe\nSHA1: ec401ae8ddebef4038cedb65cc0d5ba6c1fdef28\nMD5: 37f7241963cf8279f7c1d322086a5194\nSHA256: e557e1440e394537cca71ed3d61372106c3c70eb6ef9f07521768f23a0974068\n1_browsing7a27b1759f10d1f6f1f51a11c0efea550e2075c2c394259af4d3f855bbcc994XxX185Dll\xc2\xb7dll\nSHA1: 364ef2431a8614b4ef9240afa00cd12bfba3119b\nMD5: 206b8b9624ee446cad18335702d6da19\nSHA256: 17a27b1759f10d1f6f1f51a11c0efea550e2075c2c394259af4d3f855bbcc994\nhttp://62\xc2\xb7233\xc2\xb750\xc2\xb725/en-us/test\xc2\xb7html\nSHA1: nan\nMD5: nan\nSHA256: nan\nThreat Actor Shifts To Own Websites To Deploy Malicious SolarMarker Payloads\nResearchers analyzed the latest SolarMarker campaign, noting a shift from using Google Drive and compromised WordPress sites to the threat actors’ own websites for deploying malicious payloads.\nThis change provides greater control over the hosting environment, allowing them to quickly remove the malicious landing page hindering researchers’ scrutiny.\nThe landing pages mimic legitimate companies with replicas of self-publishing and engineering company sites.\nDespite this shift, the threat actors continue to employ SEO poisoning to manipulate search engine rankings.\nThe initial infection chain remains similar to previous campaigns involving users clicking on links that redirect to a dynamically generated payload download page.\nThe payload is served from the attackers’ server hosted on the Hestia Control Panel over port 8083.\nThe latest SolarMarker payloads drop decoys like SumatraPDF and PDF files.\nIoCs\ne25d336e9160e0f9e0e9d3932f561_browsing7247e3e3c37828e92b3321d3ed744b77f52XxX3Exe\xc2\xb7exe\nSHA1: cf51b44e96e516f9478b0465b0cd8b7c4c1dbb21\nMD5: 80b2e25abd8a70909cc7b94bec90efc2\nSHA256: e25d336e9160e0f9e0e9d3932f5617247e3e3c37828e92b3321d3ed744b77f52\n7d1c_browsing7561a6c3f78a6bd5cbe4265fff1fdb9d3b87814d655221a372660ca4d565XxX5Exe\xc2\xb7exe\nSHA1: df28ca50d4d6440f11d7fc737986920c6f71e6ad\nMD5: e33c50ee3bdb341ae0739c9b0a1093c1\nSHA256: 7d1c7561a6c3f78a6bd5cbe4265fff1fdb9d3b87814d655221a372660ca4d565\nhttp://146\xc2\xb770\xc2\xb7169\xc2\xb7170\nSHA1: nan\nMD5: nan\nSHA256: nan\nXWorm Malware Exploring CC Communication\nA sophisticated phishing campaign, initially detected in September, has shown a remarkable evolution in its tactics. Initially focused on disseminating DarkGate malware, this campaign has now incorporated more complex and elusive strategies. These advanced techniques are not only aimed at evading detection but also include anti-analysis measures, enabling the continued spread of DarkGate. More recently, this campaign has also been observed distributing PikaBot malware. Cybersecurity firm Cymulate has identified a sample in the wild that could be linked to this campaign, though the connection remains uncertain.\nIoCs\n7df14d2929a500eec6a144ec8e68_browsing7960bbea047f9a78a46ea64faa1fa28f8724XxX6Dll\xc2\xb7dll\nSHA1: 624c0a51cc720d82dd814d6bf0ef52940ab02f7d\nMD5: 090f6384ef4463a23a331d03e796af6c\nSHA256: 7df14d2929a500eec6a144ec8e687960bbea047f9a78a46ea64faa1fa28f8724\n0ee68c8008e2a8d6252db3d3b1a1b01_browsing79e1f868b0b3240bbcec3d1c29d5364fbXxX7Dll\xc2\xb7dll\nSHA1: 06a9689266396eea2e893e17db33647f1175048b\nMD5: 250c1b9f4f4b2fe05977ed2dc0bd85ec\nSHA256: 0ee68c8008e2a8d6252db3d3b1a1b0179e1f868b0b3240bbcec3d1c29d5364fb\na0434d04361c1d134819_mail71f4072681781b2075a5c8025c028ef85f50357b808cXxX1Zip\xc2\xb7zip\nSHA1: dbe84264b6a722aae5ea014f7a8694bb0f0669a1\nMD5: e5b3ac1c9b784feec61401a3b3f81ece\nSHA256: a0434d04361c1d13481971f4072681781b2075a5c8025c028ef85f50357b808c\nUAC-0050 Cyber Attack Using Remcos RAT Disguised as SBU Request\nCERT-UA has identified a widespread phishing campaign impersonating the Security Service of Ukraine.\nIoCs\na4d5382438138f6_browsing79073396bca73dc4f6bc39420966944f4fea8a9ab4087d004XxX6Exe\xc2\xb7exe\nSHA1: 649f3f6259c5c8b0d81ef769afd70c24fd61414a\nMD5: 78850bbef776551ca830317fb244b086\nSHA256: a4d5382438138f679073396bca73dc4f6bc39420966944f4fea8a9ab4087d004\n2ce640_browsing749819e27d457827eede4d14abbf65981cd716ef25d9489b7eeba314d2XxX2Rar\xc2\xb7rar\nSHA1: 45b2ac4c1723487b1a9a88b21b2330f698992332\nMD5: 769f464fa505add7a477ad95407afec3\nSHA256: 2ce640749819e27d457827eede4d14abbf65981cd716ef25d9489b7eeba314d2\nhttp://111\xc2\xb790\xc2\xb7147\xc2\xb798\nSHA1: nan\nMD5: nan\nSHA256: nan\nSuspected Rattlesnake Organization Uses Nim Backdoor To Spy On Intelligence From Many Countries In South Asia\nSidewinder, also known as Sidewinder QiAnXin, has an internal tracking number APT-Q-39.\nThis organization is generally believed to have a background in South Asia and was disclosed by domestic and foreign security vendors in 2018.\nIts earliest attack activities can be traced back to 2012.\nThe organization’s attack targets are generally government and military departments in China and many South Asian countries.\nSome of its attacks also involve universities and scientific research institutions.\nIoCs\n1409f9d855c06f66fb_browsing7d7c7bf9f821b5d1631da926b07dcdb260606e09763ad3XxX224Exe\xc2\xb7exe\nSHA1: 59a44179fdaf06cf7756ba77091eb05a1666b110\nMD5: 30ddd9ebe00f34f131efcd8124462fe3\nSHA256: 1409f9d855c06f66fb7d7c7bf9f821b5d1631da926b07dcdb260606e09763ad3\n0355_browsing7c70951eb3fa74e1650eb9dc87b8e3820a063fb4b14ccc8c8cd887a77f35XxX225Docx\xc2\xb7docx\nSHA1: 18a561aa100c87d386e4a256b4e3aaac12d067e2\nMD5: 7bea8ea83d5b4fe5985172dbb4fa1468\nSHA256: 03557c70951eb3fa74e1650eb9dc87b8e3820a063fb4b14ccc8c8cd887a77f35\n0355_mail7c70951eb3fa74e1650eb9dc87b8e3820a063fb4b14ccc8c8cd887a77f35XxX225Docx\xc2\xb7docx\nSHA1: 18a561aa100c87d386e4a256b4e3aaac12d067e2\nMD5: 7bea8ea83d5b4fe5985172dbb4fa1468\nSHA256: 03557c70951eb3fa74e1650eb9dc87b8e3820a063fb4b14ccc8c8cd887a77f35\nA Deep Dive into Phobos Ransomware Recently Deployed by 8Base Group\nCisco Talos has recently observed an increase in activity conducted by 8Base, a ransomware group that uses a variant of the Phobos ransomware and other publicly available tools to facilitate their operations.\nIoCs\n2_browsing704e269fb5cf9a02070a0ea07d82dc9d87f2cb95e60cb71d6c6d38b01869f66XxX7Exe\xc2\xb7exe\nSHA1: aed68cfa282ec2b0f8a681153beaebe3a17d04ee\nMD5: 9376f223d363e28054676bb6ef2c3e79\nSHA256: 2704e269fb5cf9a02070a0ea07d82dc9d87f2cb95e60cb71d6c6d38b01869f66\n518544e56e8ccee401ffa1b0a01a10ce23e49ec21ec441c6c_browsing7c3951b01c1b19cXxX9Exe\xc2\xb7exe\nSHA1: 4a8f0331abaf8f629b3c8220f0d55339cfa30223\nMD5: 2809e15a3a54484e042fe65fffd17409\nSHA256: 518544e56e8ccee401ffa1b0a01a10ce23e49ec21ec441c6c7c3951b01c1b19c\nfc4b14250db_edr7f66107820ecc56026e6be3e8e0eb2d428719156cf1c53ae139c6XxX13Exe\xc2\xb7exe\nSHA1: b092a6bf7fb6755e095ed9f35147d1c6710cf2c4\nMD5: b119cdd3d02b60009b9ad39da799ed3b\nSHA256: fc4b14250db7f66107820ecc56026e6be3e8e0eb2d428719156cf1c53ae139c6\nStately Taurus Targets the Philippines As Tensions Flare in the South Pacific\nCoinciding with these real-world events, researchers observed three Stately Taurus campaigns during the month of August.\nThese campaigns are assessed to have targeted entities in the South Pacific, including the Philippines government.\nThe campaigns leveraged legitimate software, including Solid PDF Creator and SmadavProtect (an Indonesian-based antivirus solution), to sideload malicious files.\nThreat authors also creatively configured the malware to impersonate legitimate Microsoft traffic for command and control (C2) connections.\nIoCs\n24c6449a9e234b0_browsing7772db8fdb944457a23eecbd6fbb95bc0b1398399de798584XxX23Dll\xc2\xb7dll\nSHA1: 7cd582a3e8799cb5b621c7f602e9d027c860e5af\nMD5: 8f7fc5613e1d0305f5c8450801178dcf\nSHA256: 24c6449a9e234b07772db8fdb944457a23eecbd6fbb95bc0b1398399de798584\n2b05a04cd9_browsing7d7547c8c1ac0c39810d00b18ba3375b8feac78a82a2f9a314a596XxX24Dll\xc2\xb7dll\nSHA1: 4098f3773e7bc426787888f1458da64253d42fbe\nMD5: 6bce82d85999d3eba967577299aa7352\nSHA256: 2b05a04cd97d7547c8c1ac0c39810d00b18ba3375b8feac78a82a2f9a314a596\nbebde82e636e2_mail7aa91e2e60c6768f30beb590871ea3a3e8fb6aedbd9f5c154c5XxX29Zip\xc2\xb7zip\nSHA1: 0d2e6c416056a549604ba441a9ded8fe922df741\nMD5: 8f8896294a2229cd66332fbb80c35411\nSHA256: bebde82e636e27aa91e2e60c6768f30beb590871ea3a3e8fb6aedbd9f5c154c5\nAndariel Threat Group Attacks Servers Vulnerable To Apache ActiveMQ Vulnerability CVE-2023-46604\nThe Andariel group is exploiting the Apache ActiveMQ remote code execution vulnerability (CVE-2023-46604) to install malware, specifically NukeSped and TigerRat backdoors.\nWhile there are no direct logs, it is presumed that the group is using this vulnerability to carry out the installation.\nCVE-2023-46604 is a remote code execution vulnerability in the Apache ActiveMQ server and if an unpatched server is exposed, attackers can remotely execute malicious commands and gain control of the system.\nDuring the investigation, it was confirmed that the NukeSped backdoor previously associated with the Andariel group was installed on a specific system.\nThe Apache ActiveMQ server was identified on the compromised system along with various attack logs, including indications of HelloKitty ransomware.\nThe attacker utilized a malicious Java class file in the exploitation process, and the malware is responsible for downloading and installing additional payloads in both Windows and Linux environments.\nIoCs\ndd13cf13c1fbdc_browsing76da63e76adcf36727cfe594e60af0dc823c5a509a13ae1e15XxX32Exe\xc2\xb7exe\nSHA1: a191b1cfbdfcc53dc49d35d21f3f5b52808dc476\nMD5: dc9d60ce5b3d071942be126ed733bfb8\nSHA256: dd13cf13c1fbdc76da63e76adcf36727cfe594e60af0dc823c5a509a13ae1e15\nc3c0cf25d682e981c_browsing7ce1cc0a00fa2b8b46cce2fa49abe38bb412da21da99cb7XxX34Exe\xc2\xb7exe\nSHA1: c789942d013d8b45b6988ecc6491f5f1a1746311\nMD5: 26ff72b0b85e764400724e442c164046\nSHA256: c3c0cf25d682e981c7ce1cc0a00fa2b8b46cce2fa49abe38bb412da21da99cb7\nhttp://168\xc2\xb7100\xc2\xb79\xc2\xb7154:9090/Notification\xc2\xb7msi\nSHA1: nan\nMD5: nan\nSHA256: nan\nStately Taurus APT Targets The Philippines With Trojans\nIn August 2023, researchers identified three Stately Taurus campaigns targeting entities in the South Pacific, including the Philippines government.\nThese campaigns utilized legitimate software like Solid PDF Creator and SmadavProtect (an Indonesian antivirus solution) to sideload malicious files.\nThe malware was creatively configured to mimic legitimate Microsoft traffic for command and control (C2) connections.\nIn the first campaign, a Stately Taurus malware package hosted on Google Drive disguised itself as a ZIP file containing meeting minutes.\nVictims unaware of a hidden DLL file inadvertently side-loaded the malicious file while attempting to execute the visible Solid PDF Creator.\nThe second campaign used a ZIP file named NUGs Foreign Policy Strategy referencing the National Unity Government of Myanmar.\nSimilar to the first, this campaign employed the same sideloading technique, including additional hidden files.\nThe third campaign, structurally identical to the first, used the filename Labour Statement.zip.\nVictims again deceived by a visible Solid PDF Creator inadvertently loaded the hidden malicious DLL establishing a connection to 45.121.146[.]113 for C2 consistent with the previous campaigns.\nIoCs\n24c6449a9e234b0_browsing7772db8fdb944457a23eecbd6fbb95bc0b1398399de798584XxX49Dll\xc2\xb7dll\nSHA1: 7cd582a3e8799cb5b621c7f602e9d027c860e5af\nMD5: 8f7fc5613e1d0305f5c8450801178dcf\nSHA256: 24c6449a9e234b07772db8fdb944457a23eecbd6fbb95bc0b1398399de798584\nhttp://45\xc2\xb7121\xc2\xb7146\xc2\xb7113\nSHA1: nan\nMD5: nan\nSHA256: nan\nThreat Trend Report On Kimsuky\nThis AhnLab research report from September 2023 highlights a significant increase in the activities of the Kimsuky group, specifically in the use of RandomQuery malware.\nThe activities of other malware were reported to be relatively low or non-existent during this period.\nThe Kimsuky group is known for its cyber threats, and this surge in activity indicates a potential increase in cyber risk.\nThe report does not provide further details on the nature of these activities or their potential impact.\nIt is recommended that organizations remain vigilant and ensure their cyber security measures are up to date to mitigate any potential threats.\nIoCs\n1426269940ef6036941ccfbf68b0b65259bc_browsing72918f30481465a11d8b97250f07XxX136Lnk\xc2\xb7lnk\nSHA1: c0ecac442d2a58be19a486393e84ce68ef0b7575\nMD5: fb5aec165279015f17b29f9f2c730976\nSHA256: 1426269940ef6036941ccfbf68b0b65259bc72918f30481465a11d8b97250f07\nc626_browsing77543eeb50e0def44fc75009a7748cdbedd0a3ccf62f50d7f219f6a5aa05XxX138Chm\xc2\xb7chm\nSHA1: b5224224fdbabdea53a91a96e9f816c6f9a8708c\nMD5: 364d4fdf430477222fe854b3cd5b6d40\nSHA256: c62677543eeb50e0def44fc75009a7748cdbedd0a3ccf62f50d7f219f6a5aa05\nhttp://smart\xc2\xb7com-www\xc2\xb7click\nSHA1: nan\nMD5: nan\nSHA256: nan\nRedline Dropped Through MSIX Package\nSANS Analysts say that recent developments have highlighted the MSIX package file format, particularly concerning the malwares that had been found to circumvent several security measures when delivered through an MSIX package.\nIoCs\n82db2d060d69ab6f88b85b_browsing79cf16255ee30982db1228d6e94ea02bf4feb2f181XxX1Zip\xc2\xb7zip\nSHA1: 88e9a850a66c08cddf943eb1b69c1eb86a7bfa5d\nMD5: d3163127b1e6b7c3a21d04fd39beffbd\nSHA256: 82db2d060d69ab6f88b85b79cf16255ee30982db1228d6e94ea02bf4feb2f181\n82db2d060d69ab6f88b85b_edr79cf16255ee30982db1228d6e94ea02bf4feb2f181XxX1Zip\xc2\xb7zip\nSHA1: 88e9a850a66c08cddf943eb1b69c1eb86a7bfa5d\nMD5: d3163127b1e6b7c3a21d04fd39beffbd\nSHA256: 82db2d060d69ab6f88b85b79cf16255ee30982db1228d6e94ea02bf4feb2f181\n82db2d060d69ab6f88b85b_mail79cf16255ee30982db1228d6e94ea02bf4feb2f181XxX1Zip\xc2\xb7zip\nSHA1: 88e9a850a66c08cddf943eb1b69c1eb86a7bfa5d\nMD5: d3163127b1e6b7c3a21d04fd39beffbd\nSHA256: 82db2d060d69ab6f88b85b79cf16255ee30982db1228d6e94ea02bf4feb2f181\nCert IL Alert – Iranian groups attack Israel with wipers\nThe National Cyber Directorate has information about an Iranian attack group operating with Wipers (aggressive server and workstation erasers) in the Israeli internet space. The National Cyber Directorate deems it appropriate to share this information.\nIoCs\nWiper1_browsingHtml\xc2\xb7html\nSHA1: a2d52a998c4343aa565e703372c0bd5ea325c12c\nMD5: 8f9b77145385c9d0f7d75942790ffc4e\nSHA256: abfde7c29a4a703daa2b8ad2637819147de3a890fdd12da8279de51a3cc0d96d\nWiper1_edrHtml\xc2\xb7html\nSHA1: a2d52a998c4343aa565e703372c0bd5ea325c12c\nMD5: 8f9b77145385c9d0f7d75942790ffc4e\nSHA256: abfde7c29a4a703daa2b8ad2637819147de3a890fdd12da8279de51a3cc0d96d\nUS Cert Alert – Rhysida Ransomware\nThe Federal Bureau of Investigation (FBI) Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint CSA to disseminate known Rhysida ransomware IOCs and TTPs identified through investigations as recently as September 2023.\nRhysidaan emerging ransomware variant has predominately been deployed against the education, healthcare, manufacturing, information technology, and government sectors since May 2023\nIoCs\n0_browsing78163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937bXxX2Exe\xc2\xb7exe\nSHA1: 3e2272b916da4be3c120d17490423230ab62c174\nMD5: 24a648a48741b1ac809e47b9543c6f12\nSHA256: 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b\nedfae1a69522f8_browsing7b12c6dac3225d930e4848832e3c551ee1e7d31736bf4525efXxX8Exe\xc2\xb7exe\nSHA1: 0098c79e1404b4399bf0e686d88dbf052269a302\nMD5: db89ec570e6281934a5c5fcf7f4c8967\nSHA256: edfae1a69522f87b12c6dac3225d930e4848832e3c551ee1e7d31736bf4525ef\nhttp://157\xc2\xb7154\xc2\xb7194\xc2\xb76\nSHA1: nan\nMD5: nan\nSHA256: nan\nAdversaries Exploit Confluence Vulnerability to Deploy Ransomware\nOn November 5 2023 Red Canary detected suspected exploitation of Atlassian Confluence CVE-2023-22518 that led to an attempt to deploy Cerber ransomware.\nIoCs\nf2e1_browsing7ec85c3f8ee26a3be3ce52c6e140448941d705a9bdedb7c1aa82a9d9707fXxX3Exe\xc2\xb7exe\nSHA1: c13c49b52069287bbf74b328e6ce084587ec5ffb\nMD5: 7415347d5ea5f0db29ec95a4a61aba90\nSHA256: f2e17ec85c3f8ee26a3be3ce52c6e140448941d705a9bdedb7c1aa82a9d9707f\nf2e1_edr7ec85c3f8ee26a3be3ce52c6e140448941d705a9bdedb7c1aa82a9d9707fXxX3Exe\xc2\xb7exe\nSHA1: c13c49b52069287bbf74b328e6ce084587ec5ffb\nMD5: 7415347d5ea5f0db29ec95a4a61aba90\nSHA256: f2e17ec85c3f8ee26a3be3ce52c6e140448941d705a9bdedb7c1aa82a9d9707f\nhttp://193\xc2\xb7176\xc2\xb7179\xc2\xb741\nSHA1: nan\nMD5: nan\nSHA256: nan\nGhostLocker – A Work In Progress RaaS\nWhat makes the current landscape unusual is the entry of hacktivist groups into this domain.\nOne such group, GhostSec, has introduced a novel Ransom-as-a-Service encryptor known as GhostLocker.\nIoCs\nabac31b552_browsing7803a89c941cf24280a9653cdee898a7a338424bd3e9b15d792972XxX4Exe\xc2\xb7exe\nSHA1: e59372a29c43af4d15ed77784547aae34d3a6bdc\nMD5: 9c66d8fde4e6d395558182156e6fe298\nSHA256: abac31b5527803a89c941cf24280a9653cdee898a7a338424bd3e9b15d792972\n7e14d88f60fe80f8fa2_browsing7076566fd77e51c7d04674973a564202b4a7cbfaf2778XxX2Exe\xc2\xb7exe\nSHA1: 63ddf8364efe1130ecf788ab9ce566026a972cbe\nMD5: 81a136029d29d26920c0287faf778776\nSHA256: 7e14d88f60fe80f8fa27076566fd77e51c7d04674973a564202b4a7cbfaf2778\nhttp://88\xc2\xb7218\xc2\xb762\xc2\xb7219/download\nSHA1: nan\nMD5: nan\nSHA256: nan\nMalvertiser Copies PC News Site To Deliver RedLine Infostealer\nIn a recent campaign, researchers discovered a threat actor mimicking the legitimate Windows news portal WindowsReport.com to distribute a malicious installer for the widely used processor tool CPU-Z.\nThe genuine Windows Report site was not compromised; instead, threat actors replicated its content to deceive users.\nThis incident is part of a broader malvertising effort targeting various utilities like Notepad++ Citrix and VNC Viewer, which is evident in the campaign’s infrastructure and cloaking techniques to avoid detection.\nThe malicious ad promotes CPU-Z, a popular Windows utility using the likely compromised or fake identity of Scott Cooper.\nCloaking is employed to show a standard blog to unintended visitors, while those searching for CPU-Z and clicking the ad are led to a download page with a deceptive URL.\nThe payload includes a digitally signed MSIX installer containing a malicious PowerShell script and a loader known as FakeBat facilitating the installation of Redline Stealer.\nIoCs\n9acbf1a5cd040c6dcecbe4e8e65044b380b_browsing7432f46c5fbf2ecdc97549487ca88XxX86Exe\xc2\xb7exe\nSHA1: 97ad717d9f028ec11b14303e245f180fb3c1d816\nMD5: a468d19fc98a47339a5fb82d57fd9e57\nSHA256: 9acbf1a5cd040c6dcecbe4e8e65044b380b7432f46c5fbf2ecdc97549487ca88\n55d3ed51c3d8f56ab305a40936b446f_browsing761021abfc55e5cc8234c98a2c93e99e1XxX82Zip\xc2\xb7zip\nSHA1: 3b22fa8cbb2cd671cf051843f4b4e02ccbf0db50\nMD5: 08246a76130d756af9ebe5f663f6c504\nSHA256: 55d3ed51c3d8f56ab305a40936b446f761021abfc55e5cc8234c98a2c93e99e1\nhttp://94\xc2\xb7131\xc2\xb7111\xc2\xb7240\nSHA1: nan\nMD5: nan\nSHA256: nan\nRansomware Roundup – Knight\nKnight is a relatively new ransomware group that arrived in August 2023.\nLike many attackers, the gang behind this variant employs double extortion tactics where the Knight ransomware encrypts files on victims machines and exfiltrates data for extortion purposes.\nIoCs\nfba8fee602b5c3db46cbbb45ff2f8aa_browsing72791f47f8b8c6a556334d3d3358cebbaXxX64Exe\xc2\xb7exe\nSHA1: 87090405611573e0679617a9930ed33d6f8b81fa\nMD5: a1fe65416c9291a85fbd24d227d0ae8d\nSHA256: fba8fee602b5c3db46cbbb45ff2f8aa72791f47f8b8c6a556334d3d3358cebba\ncd92bf9c3349b086eec621de24_browsing7bbb1bceebffb90863a46496c3b41fb13ec745XxX63Exe\xc2\xb7exe\nSHA1: 8616973f7386be0c1a0c3b10c538c8678cdf6e8b\nMD5: 52026376e76ca95627a04bc765951a34\nSHA256: cd92bf9c3349b086eec621de247bbb1bceebffb90863a46496c3b41fb13ec745\nhttp://89\xc2\xb723\xc2\xb796\xc2\xb7203/333/xwenxub285p83ecrzvft\xc2\xb7exe\nSHA1: nan\nMD5: nan\nSHA256: nan\nMultiple North Korean threat actors exploiting the TeamCity CVE-2023-42793 vulnerability\nSince early October 2023, researchers observed two North Korean nation-state threat actors, Diamond Sleet and Onyx Sleet, exploiting CVE-2023-42793, a remote code execution vulnerability affecting multiple versions of the JetBrains TeamCity server.\nTeamCity is a continuous integration/continuous deployment (CI/CD) application used by organizations for DevOps and other software development activities.\nIoCs\n000_browsing752074544950ae9020a35ccd77de277f1cd5026b4b9559279dc3b86965eeeXxX14Exe\xc2\xb7exe\nSHA1: fadbbb63e948b5b3bbbaeedc77e69472143a3b86\nMD5: 19a05a559b0c478f3049cd414300a340\nSHA256: 000752074544950ae9020a35ccd77de277f1cd5026b4b9559279dc3b86965eee\nf251144f_browsing7ad0be0045034a1fc33fb896e8c32874e0b05869ff5783e14c062486XxX17Dll\xc2\xb7dll\nSHA1: 5cb95a50e298fbd754bd42eec8666fd272d40de7\nMD5: c42f28b2851dd63928ac76d74e536ba4\nSHA256: f251144f7ad0be0045034a1fc33fb896e8c32874e0b05869ff5783e14c062486\nhttp://162\xc2\xb719\xc2\xb771\xc2\xb7175:7443/bottom\xc2\xb7gif\nSHA1: nan\nMD5: nan\nSHA256: nan\nUS Cert Alert – Royal Ransomware Updated\nSince September 2022, Royal has targeted over 350 known victims worldwide, and ransomware demands have exceeded 275 million USD.\nRoyal conducts data exfiltration and extortion prior to encryption and then publishes victim data to a leak site if a ransom is not paid.\nPhishing emails are among the most successful vectors for initial access by Royal threat actors.\nThere are indications that Royal may be preparing for a re-branding effort and/or a spinoff variant.\nIoCs\n4cd00234b18e04dcd_browsing745cc81bb928c8451f6601affb5fa45f20bb11bfb5383ceXxX6Txt\xc2\xb7txt\nSHA1: 1206bd44744d61f6c31aba2234c34d3e35b5bac7\nMD5: 57bd8fba4aa26033fa080f390b31ed0e\nSHA256: 4cd00234b18e04dcd745cc81bb928c8451f6601affb5fa45f20bb11bfb5383ce\n8a99353662ccae11_browsing7d2bb22efd8c43d7169060450be413af763e8ad7522d2451XxX2Exe\xc2\xb7exe\nSHA1: 7902b08fb184cfb9580d0ad950baf048a795f7c1\nMD5: 527c71c523d275c8367b67bbebf48e9f\nSHA256: 8a99353662ccae117d2bb22efd8c43d7169060450be413af763e8ad7522d2451\nhttp://47\xc2\xb787\xc2\xb7229\xc2\xb739\nSHA1: nan\nMD5: nan\nSHA256: nan\nIMPERIAL KITTEN Deploys Novel Malware Families\nCrowdStrike Intelligence has identified an Iran-nexus adversary as the subject of a series of cyberattacks and strategic web compromise operations in the Middle East as well as a range of other targets.\nIoCs\n32c40964f_browsing75c3e7b81596d421b5cefd0ac328e01370d0721d7bfac86a2e98827XxX32Exe\xc2\xb7exe\nSHA1: 01b4ed3e7d026f9b9038e93bb3313602256aaf2f\nMD5: 6d02207c9ce1b3967077065c40eb1bb1\nSHA256: 32c40964f75c3e7b81596d421b5cefd0ac328e01370d0721d7bfac86a2e98827\n32c40964f_edr75c3e7b81596d421b5cefd0ac328e01370d0721d7bfac86a2e98827XxX32Exe\xc2\xb7exe\nSHA1: 01b4ed3e7d026f9b9038e93bb3313602256aaf2f\nMD5: 6d02207c9ce1b3967077065c40eb1bb1\nSHA256: 32c40964f75c3e7b81596d421b5cefd0ac328e01370d0721d7bfac86a2e98827\nhttp://95\xc2\xb7164\xc2\xb761\xc2\xb7254\nSHA1: nan\nMD5: nan\nSHA256: nan\nGhostSec – From Fighting ISIS to Possibly Targeting Israel with RaaS\nThe hacker collective called GhostSec has unveiled an innovative Ransomware-as-a-Service (RaaS) framework called GhostLocker.\nThey provide comprehensive assistance to customers interested in acquiring this service through a dedicated Telegram channel.\nPresently, GhostSec is focusing its attacks on Israel.\nThis move represents a surprising departure from their past activities and stated agenda.\nIoCs\n663ac2d88_browsing7df18e6da97dd358ebd2bca55404fd4a1c8c1c51215834fc6d11b33XxX5Exe\xc2\xb7exe\nSHA1: 57067dc15355c91fbbacf4f0f8b74555aae2dfd3\nMD5: bdc119efae38ea528c10adbd4c9000e4\nSHA256: 663ac2d887df18e6da97dd358ebd2bca55404fd4a1c8c1c51215834fc6d11b33\nee22_browsing7cd0ef308287bc536a3955fd81388a16a0228ac42140e9cf308ae6343a3fXxX7Exe\xc2\xb7exe\nSHA1: 57b54340bb46950a708d0cb773101a77a9da0d95\nMD5: dfbaa667c07fdd5ad2543ce98d097027\nSHA256: ee227cd0ef308287bc536a3955fd81388a16a0228ac42140e9cf308ae6343a3f\nhttp://195\xc2\xb72\xc2\xb779\xc2\xb7117\nSHA1: nan\nMD5: nan\nSHA256: nan\nStealthy Flax Typhoon hackers use LOLBins to evade detection\nMicrosoft has identified a new hacking group it now tracks as Flax Typhoon that targets government agencies and education critical manufacturing and information technology organizations likely for espionage purposes.\nThe threat actor does not rely much on malware to gain and maintain access to the victim network and prefers using mostly components already available on the operating system, the so-called living-off-the-land binaries or LOLBins, and legitimate software.\nOperating since at least mid-2021, Flax Typhoon mainly targeted organizations in Taiwan, although Microsoft discovered some victims in Southeast Asia, North America, and Africa.\nIoCs\n05eda38_browsing7de52fbad830dc6166483cf24247f0084137dda4534718cdd9afd8eb1XxX1Exe\xc2\xb7exe\nSHA1: 16d366e2a2e421652414f81ce9b57ab620593a32\nMD5: b19ceba22473bad92a46d2f9d4e7893f\nSHA256: 05eda387de52fbad830dc6166483cf24247f0084137dda4534718cdd9afd8eb1\ne8c_browsing7d7f8c4084e5b7f56d8b20726544ad7d5946bef0fe4116509fac9ca4be90bXxX2Exe\xc2\xb7exe\nSHA1: 089fce9aa80662c655e07dfc5185ecdae23250c9\nMD5: a1bcf57d667a392148a69eb5846cf6ba\nSHA256: e8c7d7f8c4084e5b7f56d8b20726544ad7d5946bef0fe4116509fac9ca4be90b\nhttp://45\xc2\xb7195\xc2\xb7149\xc2\xb7224\nSHA1: nan\nMD5: nan\nSHA256: nan\nSysAid Zero-Day Path Traversal Vulnerability Exploited CVE-2023-47246\nA new vulnerability (CVE-2023-47246) in SysAid on-prem software was discovered by researchers.\nThe exploit carried out by a group called DEV-0950 (Lace Tempest) involved uploading a malicious archive into the webroot, leading to unauthorized access.\nThe attacker then used a WebShell to control the system, deploying a PowerShell script to execute a malware loader (user.exe) loading the GraceWire trojan into specific processes.\nTo cover their tracks, a second PowerShell script was used to erase evidence from the disk and SysAid on-prem server logs.\nIoCs\nb5acf14cdac40be590318dee95425d0_browsing746e85b1b7b1cbd14da66f21f2522bf4dXxX1Exe\xc2\xb7exe\nSHA1: 30d083734c44641f35079498faa1bfffdad37434\nMD5: c9d5934e996e50b1417ac5ba5fb87103\nSHA256: b5acf14cdac40be590318dee95425d0746e85b1b7b1cbd14da66f21f2522bf4d\nb5acf14cdac40be590318dee95425d0_edr746e85b1b7b1cbd14da66f21f2522bf4dXxX1Exe\xc2\xb7exe\nSHA1: 30d083734c44641f35079498faa1bfffdad37434\nMD5: c9d5934e996e50b1417ac5ba5fb87103\nSHA256: b5acf14cdac40be590318dee95425d0746e85b1b7b1cbd14da66f21f2522bf4d\nhttp://45\xc2\xb7155\xc2\xb737\xc2\xb7105\nSHA1: nan\nMD5: nan\nSHA256: nan\nMuddyC2Go Latest C2 Framework Used by Iranian APT MuddyWater Spotted in Israel\nA previously unreported C2 framework suspected to be in use by the MuddyWater APT group is now being used by an unknown group.\nIoCs\nf2189e5d10_browsing7981a6e7584427a5a542e479a8a63d3dfc8ac7567688725b48887fXxX7Ps1\xc2\xb7ps1\nSHA1: cdb048d11f8ef68a7c0e2656f767ba681b3c9dc6\nMD5: 3c6486dfb691fc6642f1d35bdf247b90\nSHA256: f2189e5d107981a6e7584427a5a542e479a8a63d3dfc8ac7567688725b48887f\nffbcafc28eb2e836034_browsing79882a17f04c4df0a9a2cbe952724c4279fc347906df0XxX10Ps1\xc2\xb7ps1\nSHA1: 9b72725074836bcaf45954ec8a6fac482094240d\nMD5: 57641ce5af4482038c9ea27afcc087ee\nSHA256: ffbcafc28eb2e83603479882a17f04c4df0a9a2cbe952724c4279fc347906df0\nhttp://45\xc2\xb7150\xc2\xb764\xc2\xb723\nSHA1: nan\nMD5: nan\nSHA256: nan\nCert IL Alert – Exela Stealer\nRecently, an increase in the use of InfoStealer malware has been observed around the world.\nIn light of this trend, the National Cyber Agency was notified of a phishing campaign in Israel using InfoStealer malware.\nThis phishing campaign operates against government offices and government bodies private companies, law enforcement organizations, and non-profit organizations.\nSimilar campaigns have been identified around the world using scripts and executable files in corporate networks to mine cryptocurrencies, steal information, and gain a persistent foothold in corporate networks by embedding backdoors in these systems.\nIoCs\n76164b2c3428931693853216b2e00c46a0_browsing747e8b6295435efd863928ad338757XxX1Exe\xc2\xb7exe\nSHA1: 2d7829afd587d68a40e9a2f6a2906935ca81827a\nMD5: c8afc499ffcc240e41dfb15423da6ba9\nSHA256: 76164b2c3428931693853216b2e00c46a0747e8b6295435efd863928ad338757\n76164b2c3428931693853216b2e00c46a0_edr747e8b6295435efd863928ad338757XxX1Exe\xc2\xb7exe\nSHA1: 2d7829afd587d68a40e9a2f6a2906935ca81827a\nMD5: c8afc499ffcc240e41dfb15423da6ba9\nSHA256: 76164b2c3428931693853216b2e00c46a0747e8b6295435efd863928ad338757\nhttps://t\xc2\xb7me/ExelaStealer\nSHA1: nan\nMD5: nan\nSHA256: nan\nBlueNoroff strikes again with new macOS malware\nResearchers have identified a new malware variant attributed to the BlueNoroff APT group.\nBlueNoroffs campaigns are financially motivated, frequently targeting cryptocurrency exchanges, venture capital firms, and banks.\nIoCs\n5b39_browsing7f36a764f210c1cbd249c3370e9f5bab1d66dc5d9b433f666ac67b4d3e7eXxX4Macho\xc2\xb7macho\nSHA1: 677b119edfa1335b6eb9b7307b034bee512dbc1a\nMD5: 74dc52345a60001098ff92a1d50bbd06\nSHA256: 5b397f36a764f210c1cbd249c3370e9f5bab1d66dc5d9b433f666ac67b4d3e7e\nb8c_browsing751694945bff749b6a0cd71e465747402cfd25b18dc233c336e417b3e1525XxX2Macho\xc2\xb7macho\nSHA1: 588d84953ae992c5de61d3774ce86e710ed42d29\nMD5: a446402c1de5dfddd50b77a95fcfc671\nSHA256: b8c751694945bff749b6a0cd71e465747402cfd25b18dc233c336e417b3e1525\nhttp://104\xc2\xb7168\xc2\xb7214\xc2\xb7151\nSHA1: nan\nMD5: nan\nSHA256: nan\nFrom DarkGate To DanaBot\nResearchers have identified two instances of DarkGate infections targeting the finance and manufacturing industries.\nThe stealer is distributed through drive-by downloads disguised as fake installers and document reports.\nDarkGate is a loader developed in Borland Delphi and was introduced for sale on a Russian-speaking hacking forum in early June 2023 with the developer claiming to have worked on it since 2017.\nIt boasts a wide range of features, including hVNC AnyDesk credential theft, crypto mining rootkit, reverse proxy keylogger, and remote desktop access.\nDarkGate is available for $1000 for one day’s use or $15000 for monthly access.\nThe loader is initially delivered in formats like LNK VBS and MSI, which execute an AutoIt script.\nThe initial access happens through drive-by downloads where users looking for unclaimed money inadvertently download a fake report as a ZIP archive containing the malicious VBS script.\nAfter infection, DarkGate establishes persistence in the host Startup folder, running the malicious AutoIt script in the ProgramData folder.\nIt can manipulate browser data, delete shadow copies (if the user has administrative rights), and initiate a host shutdown.\nIoCs\n741_browsing7ee2722871b2c667174acc43dd3e79fcdd41bef9a48209eeae0ed43179e1fXxX118Exe\xc2\xb7exe\nSHA1: 415f9b8794e7a275df66a0bda548b83d22a8636e\nMD5: 137215315ebf1a920f6ca96be486e358\nSHA256: 7417ee2722871b2c667174acc43dd3e79fcdd41bef9a48209eeae0ed43179e1f\n741_edr7ee2722871b2c667174acc43dd3e79fcdd41bef9a48209eeae0ed43179e1fXxX118Exe\xc2\xb7exe\nSHA1: 415f9b8794e7a275df66a0bda548b83d22a8636e\nMD5: 137215315ebf1a920f6ca96be486e358\nSHA256: 7417ee2722871b2c667174acc43dd3e79fcdd41bef9a48209eeae0ed43179e1f\nhttp://dreamteamup\xc2\xb7shop\nSHA1: nan\nMD5: nan\nSHA256: nan\nCert IL Alert – Phishing campaign in Israel by Iranian Muddy Water\nAccording to the Israeli CERT, there is an ongoing phishing campaign by an Iranian Muddy Water group\nIoCs\n9a_browsing785f508890d250ab9e3a43f974a89f3311ebd0e85ec98b46c76bdb7bef7cfbXxX1Exe\xc2\xb7exe\nSHA1: 2f7056621e1a8ecb20a7639635d403e2c44e6135\nMD5: 04afff1465a223a806774104b652a4f0\nSHA256: 9a785f508890d250ab9e3a43f974a89f3311ebd0e85ec98b46c76bdb7bef7cfb\n9a_edr785f508890d250ab9e3a43f974a89f3311ebd0e85ec98b46c76bdb7bef7cfbXxX1Exe\xc2\xb7exe\nSHA1: 2f7056621e1a8ecb20a7639635d403e2c44e6135\nMD5: 04afff1465a223a806774104b652a4f0\nSHA256: 9a785f508890d250ab9e3a43f974a89f3311ebd0e85ec98b46c76bdb7bef7cfb\nRapid7-Observed Exploitation of Atlassian Confluence CVE-2023-22518\nAs of November 5, 2023, Rapid7 Managed Detection and Response (MDR) is observing the exploitation of Atlassian Confluence in multiple customer environments, including for ransomware deployment.\nIoCs\n4ed46b98d04_browsing7f5ed26553c6f4fded7209933ca9632b998d265870e3557a5cdfeXxX2Elf\xc2\xb7elf\nSHA1: f4384ca1c2250d58a17e692ce2a8efd7dcc97a73\nMD5: 9e0a8f1097176a5215648b9376db6611\nSHA256: 4ed46b98d047f5ed26553c6f4fded7209933ca9632b998d265870e3557a5cdfe\n4ed46b98d04_edr7f5ed26553c6f4fded7209933ca9632b998d265870e3557a5cdfeXxX2Elf\xc2\xb7elf\nSHA1: f4384ca1c2250d58a17e692ce2a8efd7dcc97a73\nMD5: 9e0a8f1097176a5215648b9376db6611\nSHA256: 4ed46b98d047f5ed26553c6f4fded7209933ca9632b998d265870e3557a5cdfe\nhttp://j3qxmk6g5sk3zw62i2yhjnwmhm55rfz47fdyfkhaithlpelfjdokdxad\xc2\xb7onion\nSHA1: nan\nMD5: nan\nSHA256: nan\nAgonizing Serpens Aka Agrius Targeting the Israeli Higher Education and Tech Sectors\nIsraeli researchers have identified and identified the Iranian-linked Agonizing Serpens cyber-attack group, which has been carrying out a series of destructive attacks on Israeli businesses since January 2023.\nIoCs\ne43d66b_browsing7a4fa09a0714c573fbe4996770d9d85e31912480e73344124017098f9XxX108Exe\xc2\xb7exe\nSHA1: d8d0990edbf63e63ceea553f7b83d361870ef7c2\nMD5: 9adbaed8fe8106ae41229cca8bab7c83\nSHA256: e43d66b7a4fa09a0714c573fbe4996770d9d85e31912480e73344124017098f9\n18c909a2b8c5e16821d6ef908f56881aa0ecceeaccb5fa1e54995935fcfd12f_browsing7XxX102Exe\xc2\xb7exe\nSHA1: 83506de48bd0c50ea00c9e889fe980f56e6c6e1b\nMD5: a822b9e6eedf69211013e192967bf523\nSHA256: 18c909a2b8c5e16821d6ef908f56881aa0ecceeaccb5fa1e54995935fcfd12f7\nhttp://185\xc2\xb7105\xc2\xb746\xc2\xb719\nSHA1: nan\nMD5: nan\nSHA256: nan\nMalware Dropped Through a ZPAQ Archive\nA honeypot detected a phishing attempt that enticed a potential victim to open a “ZPAQ” archive.\nThis file format is not commonly seen, which could potentially allow it to bypass standard security controls.\nIoCs\n1c33eef0d22dc54bb2a41af4850_browsing70612cd4579529e31b63be2141c4be9183eb6XxX2Unkn\xc2\xb7unkn\nSHA1: ee34091507162e77f08c9f08a334a58b70c3974d\nMD5: 5ce58d3325f4f75c01aab605a44cf0fb\nSHA256: 1c33eef0d22dc54bb2a41af485070612cd4579529e31b63be2141c4be9183eb6\n1c33eef0d22dc54bb2a41af4850_edr70612cd4579529e31b63be2141c4be9183eb6XxX2Unkn\xc2\xb7unkn\nSHA1: ee34091507162e77f08c9f08a334a58b70c3974d\nMD5: 5ce58d3325f4f75c01aab605a44cf0fb\nSHA256: 1c33eef0d22dc54bb2a41af485070612cd4579529e31b63be2141c4be9183eb6\nCert IL Alert – New Phishing Campaign\nThis campaign is characterized by the delivery of emails from legitimate and recognized accounts to recipients, containing links to download malicious files. The content and subject line of the sent message is tailored to the sender’s address, encouraging recipients to activate the included link. The malicious files linked are, in fact, modified versions of legitimate and signed Remote Monitoring and Management (RMM) software, accompanied by a configuration file designed to establish contact with the attacker’s servers.\nIoCs\naca2ef4528452d6cd5aed06d024632ca3ac4a36bb9_browsing7946b430f0b72ea53d4cd7XxX2Exe\xc2\xb7exe\nSHA1: 657e239c44e4263032b9cfc2b64c6dca8878198d\nMD5: 08802238e1c7efac1c664b3e81bb2a85\nSHA256: aca2ef4528452d6cd5aed06d024632ca3ac4a36bb97946b430f0b72ea53d4cd7\nb0450638_browsing793d13f21a051eae481c82d6c0fa0f08bb9cfa6131cbf12f1bb6d55dXxX4Fpx\xc2\xb7fpx\nSHA1: 25a2c90143e0cd638aed8657e50933ba90952abf\nMD5: 590753b3b08393c380f0c8519c693c12\nSHA256: b0450638793d13f21a051eae481c82d6c0fa0f08bb9cfa6131cbf12f1bb6d55d\n28fadc26a2bee90_mail7fbdbf1aaebac6c7e6f8aa95e8c312cd659d19b82d1dfa70eXxX5Zip\xc2\xb7zip\nSHA1: 11b14763023772cc2eebfa306aef0c9e946b491b\nMD5: 1f0b9aed4b2c8d958a9b396852a62c9d\nSHA256: 28fadc26a2bee907fbdbf1aaebac6c7e6f8aa95e8c312cd659d19b82d1dfa70e\nAnalysis Of Activities of Suspected APT-C-36 Blind Eagle Organization Launching Amadey Botnet Trojan\nIn daily hunting activities, Weixin discovered that the APT-C-36 organization recently attempted to add the Amadey botnet Trojan to its usual PDF spear phishing attack flow.\nThe Amadey botnet Trojan is a modular botnet Trojan that appeared for sale on Russian hacker forums around October 2018.\nIt has the capabilities of intranet traversal information theft, remote command execution, script execution, and DDoS attacks.\nIoCs\nf4862630f94ac5_browsing75f310edc6f8ddef9f6253f60f862808d6d56c4c514f562d02XxX367Exe\xc2\xb7exe\nSHA1: 73c31e665f02782a39cedb39efb088e7c620bd9c\nMD5: 461a67ce40f4a12863244efeef5ebc26\nSHA256: f4862630f94ac575f310edc6f8ddef9f6253f60f862808d6d56c4c514f562d02\n393af4eb6a0e6228a12629303515b629424_browsing76ce6c56bc659b6cee17afa05dc3fXxX363Vbs\xc2\xb7vbs\nSHA1: 793e237a3e762e46852e8c8205726fee3e7339cc\nMD5: 05b99bee0d8ba95f5ccb1d356939daa8\nSHA256: 393af4eb6a0e6228a12629303515b62942476ce6c56bc659b6cee17afa05dc3f\nhttp://213\xc2\xb7226\xc2\xb7123\xc2\xb714/8bmeVwqx/Plugins/cred64\xc2\xb7dll\nSHA1: nan\nMD5: nan\nSHA256: nan\nSuspected Exploitation of Apache ActiveMQ CVE-2023-46604\nBeginning Friday, October 27, Rapid7 Managed Detection and Response (MDR) identified suspected exploitation of Apache ActiveMQ CVE-2023-46604 in two different customer environments.\nIn both instances, the adversary attempted to deploy ransomware binaries on target systems in an effort to ransom the victim organizations.\nBased on the ransom note and available evidence, we attribute the activity to the HelloKitty ransomware family, whose source code was leaked on a forum in early October.\nRapid7 observed similar indicators of compromise across the affected customer environments, both of which were running outdated versions of Apache ActiveMQ.\nIoCs\n8c226e1f640b5_browsing70a4a542078a7db59bb1f1a55cf143782d93514e3bd86dc07a0XxX360Msi\xc2\xb7msi\nSHA1: 5fc62671aef4b355d2050bf2904c7615cb0795ea\nMD5: c7198ed957a2e21b4a3349e9d2220690\nSHA256: 8c226e1f640b570a4a542078a7db59bb1f1a55cf143782d93514e3bd86dc07a0\n81_browsing77455ab89cc96f0c26bc42907da1a4f0b21fdc96a0cc96650843fd616551f4XxX359Msi\xc2\xb7msi\nSHA1: 5ea03fa8326ed87a0c81740092c131f23bc5f651\nMD5: 478dcb54e0a610a160a079656b9582de\nSHA256: 8177455ab89cc96f0c26bc42907da1a4f0b21fdc96a0cc96650843fd616551f4\nhttp://172\xc2\xb7245\xc2\xb716\xc2\xb7125\nSHA1: nan\nMD5: nan\nSHA256: nan\nElastic Catches DPRK Passing Out KANDYKORN\nElastic Security Labs is disclosing a novel intrusion targeting blockchain engineers of a crypto exchange platform.\nThe intrusion leveraged a combination of custom and open source capabilities for initial access and post-exploitation.\nIoCs\n92_browsing7b3564c1cf884d2a05e1d7bd24362ce8563a1e9b85be776190ab7f8af192f6XxX378Dylib\xc2\xb7dylib\nSHA1: e68bfa72a4b4289a4cc688e81f9282b1f78ebc1f\nMD5: 973225dc83f568ef6208d49fe2648fc0\nSHA256: 927b3564c1cf884d2a05e1d7bd24362ce8563a1e9b85be776190ab7f8af192f6\n3ea2ead8f3cec030906dcbffe3efd5c5d_browsing77d5d375d4a54cca03bfe8a6cb59940XxX377Macho\xc2\xb7macho\nSHA1: d28830d87fc71091f003818ef08ff0b723b3f358\nMD5: 9ca5df575e5bd60035202dabd67b7af2\nSHA256: 3ea2ead8f3cec030906dcbffe3efd5c5d77d5d375d4a54cca03bfe8a6cb59940\nhttp://23\xc2\xb7254\xc2\xb7226\xc2\xb790\nSHA1: nan\nMD5: nan\nSHA256: nan\nSecurity Brief TA571 Delivers IcedID Forked Loader\nProofpoint researchers identified TA571 delivering the Forked variant of IcedID in two campaigns on 11 and 18 October 2023.\nBoth campaigns included over 6000 messages, each impacting over 1200 customers in a variety of industries globally.\nIoCs\n5d5bc4f49_browsing7406b59369901b9a79e1e9d1e0a690c0b2e803f4fbfcb391bcfeef1XxX1Dll\xc2\xb7dll\nSHA1: 59dd3d2477211eb4fcd72b542812a2036fa0e1e8\nMD5: 0245e02cbb6ffe2716c2aeb7fb8006d0\nSHA256: 5d5bc4f497406b59369901b9a79e1e9d1e0a690c0b2e803f4fbfcb391bcfeef1\n0a61d_browsing734db49fdf92f018532b2d5e512e90ae0b1657c277634aa06e7b71833c4XxX3Vbs\xc2\xb7vbs\nSHA1: 9159cc10479a91d38bc9554fb374077842cb2a84\nMD5: d1a959dad577d838505e6edca6255c0b\nSHA256: 0a61d734db49fdf92f018532b2d5e512e90ae0b1657c277634aa06e7b71833c4\nhttp://modalefastnow\xc2\xb7com\nSHA1: nan\nMD5: nan\nSHA256: nan\nA Retrospective on AvosLocker\nOn October 11, 2023, the Cybersecurity and Infrastructure Security Agency (CISA) published an advisory for AvosLocker, which was a sophisticated double extortion Ransomware-as-a-Service (RaaS) group that was last active in May 2023.\nAlthough the threat group is not currently active, the security community can learn how to counteract other threats that employ similar tactics and procedures (TTPs).\nIoCs\nfb544e1f_browsing74ce02937c3a3657be8d125d5953996115f65697b7d39e237020706fXxX25Exe\xc2\xb7exe\nSHA1: e2bdef45d8dd4b1811396781b0bc94092d268a88\nMD5: 76e177a94834b3f7c63257bc8011f60f\nSHA256: fb544e1f74ce02937c3a3657be8d125d5953996115f65697b7d39e237020706f\n43b_browsing7a60c0ef8b4af001f45a0c57410b7374b1d75a6811e0dfc86e4d60f503856XxX28Exe\xc2\xb7exe\nSHA1: f6f94e2f49cd64a9590963ef3852e135e2b8deba\nMD5: d285f1366d0d4fdae0b558db690497ea\nSHA256: 43b7a60c0ef8b4af001f45a0c57410b7374b1d75a6811e0dfc86e4d60f503856\nhttp://avosjon4pfh3y7ew3jdwz6ofw7lljcxlbk7hcxxmnxlh5kvf2akcqjad\xc2\xb7onion\nSHA1: nan\nMD5: nan\nSHA256: nan\nFrom Albania to the Middle East, The Scarred Manticore is Listening\nCheck Point Research (CPR) is monitoring an ongoing Iranian espionage campaign by Scarred Manticore, an actor affiliated with the Ministry of Intelligence and Security (MOIS).\nIoCs\n911_browsing7bd328e37be121fb497596a2d0619a0eaca44752a1854523b8af46a5b0cebXxX25Dll\xc2\xb7dll\nSHA1: 6ec0c1d6311656c76787297775a8d0cb0aa6c4c7\nMD5: da0085a97c38ead734885e5cced1847f\nSHA256: 9117bd328e37be121fb497596a2d0619a0eaca44752a1854523b8af46a5b0ceb\n1146b1f38e420936b_browsing7c5f6b22212f3aa93515f3738c861f499ed1047865549cbXxX16Exe\xc2\xb7exe\nSHA1: 6cafd44c86fff605b4c25582955b725b96c1d911\nMD5: 85427a8a47c4162b48d8dfb37440665d\nSHA256: 1146b1f38e420936b7c5f6b22212f3aa93515f3738c861f499ed1047865549cb\ne1ad1_edr73e49eee1194f2a55afa681cef7c3b8f6c26572f474dec7a42e9f0cdc9dXxX31Exe\xc2\xb7exe\nSHA1: c0afb5797e6873bbee69f9bf0aa7a9dd3a1c6fff\nMD5: 31f2369d2e38c78f5b3f2035dba07c08\nSHA256: e1ad173e49eee1194f2a55afa681cef7c3b8f6c26572f474dec7a42e9f0cdc9d\n \nThat is all for now!\nStay cyber safe\xc2\xa0and see you next month!\n \n | 0 | {'Exception': <method-wrapper '__str__' of JSONDecodeError object at 0x7f397cd2d860>, 'Generation': '!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!'} | meta-llama/Meta-Llama-3.1-8B-Instruct |