Attacks

The Guardian Media Group Hit by Ransomware Attack

Companies looking to defend against ransomware should consider adopting a defense-in-depth strategy. Network segmentation, backups, regular patching, and vulnerability assessments are just a few of the measures that should be taken when attempting to lessen the likelihood of an attack. Promoting healthy cyber habits within a company is also crucial. https://www.infosecurity-magazine.com/news/ransomware-attack-guardian

Read More

How carding can affect your business

This article explains what carding is, how hackers can gain access to payment details and the effects carding cyber attacks can have on businesses. In the first six months of 2022, there were 230,937 credit card fraud reports filed in the US alone, highlighting the growth of carding as a threat vector This article will explore carding, how it operates and the devastating effects it can have on ecommerce businesses. Contents:  What is carding and…

Read More

Threat Actors Continue to Deploy Raspberry Robin

The primary attack vector has been infected USB drives which download a malicious MSI installer file that deploys the primary payload. Either msiexec.exe or wmic.exe are utilized as trusted installers. Some UBS drives have a configured autorun.inf file that will automatically run the payload, whereas others rely on social engineering to invite a targeted user to click on an associated .LNK file. The payload loader now deploys a decoy adware named BrowserAssistant in order to…

Read More

Microsoft Pushes Emergency Fix for Windows Server Hyper-V VM Issues

These updates are not delivered through Windows Updates and will not install automatically on impacted servers. To get the standalone package, admins must search for the KB number in the Microsoft Update Catalog, download it, and install it manually. They can also be manually imported into Windows Server Update Services (WSUS) and Microsoft Endpoint Configuration Manager. Microsoft also provides instructions on importing updates into WSUS and Configuration Manager from the Microsoft Update Catalog. “You do…

Read More

Ukraine’s DELTA Military System Users Targeted by Info-Stealing Malware

Phishing has continued to be one of the most common means of initial access for threat actors of all skill levels. In this instance, the actor was likely trying to steal credentials and information concerning the DELTA program in order to assist with counterintelligence. Protecting against phishing campaigns is often difficult as it takes just one user to fall victim to the campaign to be successful – it is even more difficult with advanced phishing…

Read More

McGraw Hill Exposed 100,000 Students’ Grades Through Misconfigured S3 Bucket

Researchers verified a small sample of the data and reached out to McGraw Hill, who did not initially respond. Finally, the company announced on September 21st that they had removed all sensitive data out of the public buckets. Due to the growing regulatory burden, it is highly recommended that organizations store sensitive customers data securely, and utilize third party cybersecurity services to verify the security of such data in order to avoid liability, regulatory fines,…

Read More

Malicious PyPI Package Masquerading as SentinelOne SDK Client, Stealing Developer Information

When developing tools, it can be easy to simply fall back on repositories to source libraries and packages to quickly fill gaps and reduce workload. However, especially when interfacing with commercial software, it is considered good practice to refer to documentation to identify approved sources for libraries and packages. For example, SentinelOne’s Frequently Asked Questions page reports that their SDK is available “directly from the Management console,” and not from any centralized repository like PyPI.…

Read More

Now-Patched MacOS Vulnerability “Achilles” Details Released

Companies should strive to patch MacOS devices as soon as their change management allows. Exploitation of this vulnerability is not particularly involved, according to Microsoft’s reporting, so malware packaged to use Achilles could surface very soon. Additionally, malware leveraging Achilles would not be prevented by Lockdown Mode, Apple’s optional protection feature for stopping zero-click code execution, since Gatekeeper requires the end user to open the malicious file. https://www.bleepingcomputer.com/news/security/microsoft-finds-macos-bug-that-lets-malware-bypass-security-checks/

Read More

CISA Releases Six Industrial Control Systems Advisories

Original release date: December 20, 2022 CISA released six Industrial Control Systems (ICS) advisories on December 20, 2022. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. CISA encourages users and administrators to review the newly released ICS advisories for technical details and mitigations: ICSA-22-354-01 Fuji Electric Tellus Lite V-Simulator ICSA-22-354-02 Rockwell Automation GuardLogix and ControlLogix ICSA-22-354-03 ARC Informatique PcVue ICSA-22-354-04 Rockwell Automation MicroLogix 1100 and 1400 ICSA-22-354-05 Delta 4G…

Read More

DarkTortilla Used on Grammarly and Cisco Phishing Sites

Some recommendations from the source article include: • Do not open suspicious links in emails.• Do not download the software from untrusted sources.• Use a reputed anti-virus and Internet security software package on your connected devices, including PC, laptop, and mobile.• Refrain from opening untrusted links and email attachments without verifying their authenticity. It is worth noting that if a link is visited and seems suspicious, it is recommended to navigate directly to the legitimate…

Read More