Aggregator
Ultralytics遭供应链投毒攻击,模型训练恐成挖矿!
Any company/person I can hire for an ethical SE research project?
Russian Hackers Hijacked Pakistani Actor Servers For C2 Communication
Secret Blizzard, a Russian threat actor, has infiltrated 33 command-and-control (C2) servers belonging to the Pakistani group Storm-0156, which allows Secret Blizzard to access networks of Afghan government entities and Pakistani operators. They have deployed their own malware, TwoDash and Statuezy, and leveraged Storm-0156’s malware, Waiscot and CrimsonRAT, to gather intelligence on targeted networks, which […]
The post Russian Hackers Hijacked Pakistani Actor Servers For C2 Communication appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
BianLian
“Iedereen is nodig” om weerbaar te zijn tegen oorlog en crises
A student in my uni hacked uni database and got access to student ID photos
Sophisticated Celestial Stealer Targets Browsers to Steal Login Credentials
Researchers discovered Celestial Stealer, a JavaScript-based MaaS infostealer targeting Windows systems that, evading detection with obfuscation and anti-analysis techniques, steals data from various browsers, applications, and cryptocurrency wallets. It operates as an Electron or NodeJS application, injecting code into vulnerable apps and communicating with C2 servers. The malware’s FUD status is maintained through regular updates […]
The post Sophisticated Celestial Stealer Targets Browsers to Steal Login Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
RansomHub
More From Our Main Blog: The Good, the Bad and the Ugly in Cybersecurity – Week 49
Police seize chat platform and laundering networks, Russian APT hijacks Pakistani actor's systems, and China targets global telecom providers.
The post The Good, the Bad and the Ugly in Cybersecurity – Week 49 appeared first on SentinelOne.
Cryptohack Roundup: Solana npm Package Attack's Wallet Risks
This week, Solana npm package attack, a Brazilian banking giant entered crypto trading and a Nebraska man pleaded guilty to cryptojacking. Australia tightened rules for crypto businesses and crypto losses dropped in 2024 and DMM Bitcoin will cease operations.
Webinar | The State of Observability in Financial Services
Russian Forces Accused of Secretly Planting Spyware on Phone
A Russian activist says security forces covertly installed spyware on his cellphone while he was detained in Moscow for aiding Ukraine. A report published Thursday shows the spyware received a broad range of permissions, from tracking location to reading encrypted messages.
Veeam Closes $2B Offering to Boost Data Resilience, Eyes IPO
CEO Anand Eswaran explains how Veeam's $2 billion secondary offering strengthens its financial position as the data resilience vendor prepares for an initial public offering. He discusses the company’s commitment to innovation and strategic pacts with Splunk, CrowdStrike and Palo Alto Networks.
CEO's Murder Sparks Outcry Over UHC's Coverage Denials
Law enforcement investigating murder of Brian Thompson, CEO of UnitedHealthCare are examining potential motives. But shell casings reportedly found at the crime scene spotlight one of the top motives speculated - anger over the company's alleged denial of coverage practices. Where does AI fit in?
Cryptohack Roundup: Solana npm Package Attack's Wallet Risks
This week, Solana npm package attack, a Brazilian banking giant entered crypto trading and a Nebraska man pleaded guilty to cryptojacking. Australia tightened rules for crypto businesses and crypto losses dropped in 2024 and DMM Bitcoin will cease operations.
Cybersecurity Snapshot: Study Raises Open Source Security Red Flags, as Cyber Agencies Offer Prevention Tips Against Telecom Spying Attacks
Don’t miss the Linux Foundation’s deep dive into open source software security. Plus, cyber agencies warn about China-backed cyber espionage campaign targeting telecom data. Meanwhile, a study shows the weight of security considerations in generative AI projects. And get the latest on ransomware trends, financial cybercrime and critical infrastructure security.
Dive into six things that are top of mind for the week ending Dec. 6.
1 - Study: Security of open source software projects must improveImproperly secured developer accounts. Lack of a standard naming schema for software components. The persistence of legacy software.
Those three issues put the reliability and security of free and open source software (FOSS) at risk, a new Linux Foundation study has found.
Published this week, “Census III of Free and Open Source Software — Application Libraries” is based on about 12 million observations of FOSS at 10,000-plus companies. Its aim: to provide a better understanding of FOSS use and security challenges, given FOSS’ widespread adoption globally.
“Our goal is to not only provide an updated list of the most widely used FOSS, but to also provide an example of how the distributed nature of FOSS requires a multi-party effort to fully understand the value and security of the FOSS ecosystem,” the study reads.
Data sharing, coordination and investment are keys to preserving the value of FOSS, which has become critical for the digital economy, the authors wrote.
Here are more details about the three key security issues identified in the study:
- To conduct their FOSS work, developers often use individual accounts, which typically lack the security protections of organizational accounts. Hosting FOSS projects under individual developer accounts creates multiple risks, such as making it easier for hackers to breach individual computing environments and tamper with FOSS code.
- A lot of legacy FOSS software still exists that isn’t being maintained nor updated, which makes the software more vulnerable to attacks.
- The FOSS ecosystem needs a standardized schema for naming software components, a key issue for supply chain security. “Until one is widely used, strategies for software security, transparency and more will have limited effect,” the study reads.
For more information about open source security:
- “Concise Guide for Developing More Secure Software” (Open Source Security Foundation)
- “OWASP Top 10 Risks for Open Source Software” (OWASP)
- “CISA Open Source Software Security Roadmap” (CISA)
- “Seven ways to secure open-source software” (SC World)
- “Is Open Source a Threat to National Security?” (InformationWeek)
Security teams in charge of defending networks and communications infrastructure should take steps to prevent attacks from China-affiliated hackers that have recently compromised the networks of major global telecom providers.
So said cyber agencies from Australia, Canada, New Zealand and the U.S. this week in a joint document that offers network and communications-infrastructure engineers recommendations for strengthening network visibility and hardening systems.
The silver lining: The cyberattackers are exploiting known, existing weaknesses in their victims’ infrastructure. “No novel activity has been observed,” reads the publication, titled “Enhanced Visibility and Hardening Guidance for Communications Infrastructure.”
“Patching vulnerable devices and services, as well as generally securing environments, will reduce opportunities for intrusion and mitigate the actors’ activity,” the document adds.
These are some of the recommendations for defenders of networks and communications systems.
- To enhance visibility
- Adopt alerting mechanisms to detect unauthorized changes to the network and configuration modifications to network devices.
- Monitor anomalous logins into user and service accounts, and disable inactive accounts.
- Implement a centralized logging system that can analyze data from multiple sources.
- To harden systems and devices
- Implement strong network segmentation.
- Adopt an access control list (ACL) strategy that denies access to the network by default, and log all denied traffic.
- Disconnect unneeded internet-facing infrastructure and monitor the infrastructure that does need to be exposed to the internet.
The joint document doesn’t name the hacking group. However, The Wall Street Journal identified it as Salt Typhoon when, citing anonymous sources, it reported in September that the group had breached several U.S. telecoms, including Verizon and AT&T.
Salt Typhoon’s main goal is reportedly to carry out cyber espionage activities on behalf of the Chinese government. Salt Typhoon’s cyber espionage campaign is “ongoing” and authorities feel there is still much to be discovered about it, a Cybersecurity and Infrastructure Security Agency (CISA) official told reporters this week.
“We cannot say with certainty that the adversary has been evicted,” CISA official Jeff Greene said during a press call, as quoted by Politico. According to NBC News, Greene also recommended that Americans use encrypted messaging apps to protect themselves from Salt Typhoon.
Last month, CISA and the FBI described the Chinese-government backed cyber espionage campaign as “broad and significant,” resulting in the theft of customer call records data; the compromise of private communications of government officials and politicians; and the copying of law enforcement information related to wiretap requests.
For more information about Salt Typhoon and its ongoing cyber espionage campaign:
- “Salt Typhoon's surge extends far beyond US telcos” (The Register)
- “Chinese hackers breached T-Mobile's routers to scope out network” (Bleeping Computer)
- “Telcos struggle to boot Chinese hackers from networks” (Axios)
- “China's 'Salt Typhoon' Hackers Breached US Networks Using Existing Flaws” (PCMag)
- “Salt Typhoon Builds Out Malware Arsenal With GhostSpider” (Dark Reading)
As organizations deepen their generative AI use, security and data protection considerations feature prominently in their plans — including whether to build their own generative AI infrastructure.
That’s according to the Linux Foundation’s “Shaping the Future of Generative AI” report, which polled 316 respondents familiar with their organizations’ generative AI adoption.
“Security remains a cornerstone of this transformation. As organizations embrace GenAI, safeguarding sensitive data and ensuring compliance with industry standards have become critical imperatives,” reads an Open Source Security Foundation blog about the report.
Among organizations deploying their own generative AI infrastructure, security and data control ranked as the top motivation for doing so. Three other data security priorities — data sovereignty; privacy; and intellectual property protection — ranked third, fifth and eighth, respectively.
(Source: Linux Foundation's "Shaping the Future of Generative AI," November 2024)
Meanwhile, respondents, who were based primarily in the Americas, Europe and Asia-Pacific, ranked security as the second most important criteria when choosing a generative AI model or tool, with privacy and regulatory compliance ranking fourth and fifth, respectively.
(Source: Linux Foundation's "Shaping the Future of Generative AI," November 2024)
Furthermore, respondents, who included executives, developers, consultants, data scientists and operations staffers, also ranked security and data protection risks high when asked about their concerns when adopting generative AI models and tools.
(Source: Linux Foundation's "Shaping the Future of Generative AI," November 2024)
For more information about AI security, check out these Tenable blogs:
- “AI Security Roundup: Best Practices, Research and Insights”
- “How to Discover, Analyze and Respond to Threats Faster with Generative AI”
- “Never Trust User Inputs — And AI Isn't an Exception: A Security-First Approach”
- “Securing the AI Attack Surface: Separating the Unknown from the Well Understood”
- “Do You Think You Have No AI Exposures? Think Again”
Here’s a report that cyber teams at critical infrastructure organizations will likely find useful and informative.
The topic: How CISA’s red team breached a critical infrastructure organization’s IT network and then compromised a domain controller and a human machine interface (HMI), which served as an operational technology (OT) dashboard.
The unnamed organization requested that CISA conduct the red team assessment (RTA), in which CISA acted like a cyberattacker to probe the organization’s cybersecurity detection and response processes and procedures.
In broad strokes, here are some of the ways in which CISA’s red team circumvented the critical infrastructure organization’s cyber defenses:
- After failing to gain initial success via spearphishing, CISA’s red team hit pay dirt when it discovered a web shell left on a Linux web server by mistake.
- Using the web shell, CISA’s red team ran arbitrary commands on the Linux web server and moved laterally into the internal network.
- Using valid accounts, it compromised the organization’s domain and several sensitive business systems.
- Eventually, CISA’s team compromised a Windows domain controller, which allowed it to move laterally to all Windows hosts.
- With persistent access to Linux and Windows systems across the organization’s networks, CISA’s red team probed further, accessing, among other assets, the HMI OT dashboard.
Timeline of CISA's red team cyberthreat activity
(Source: CISA’s advisory “Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a US Critical Infrastructure Sector Organization,” November 2024)
Key findings include:
- The organization didn’t properly block access from the perimeter network to the internal network.
- The organization relied too much on host-based tools, while lacking sufficient network-layer protections.
- Multiple systems were insecurely configured.
- The organization failed to review security alerts that were triggered by the red team’s actions.
- Identity management was poor.
- The organization used software that is known to be insecure and outdated.
Some of CISA’s mitigation recommendations for cybersecurity teams are:
- Adopt the principle of least privilege, segment the perimeter network, and adopt firewalls, access control lists and intrusion prevention systems.
- Tune network appliances to detect anomalous behavior, and limit the use of admin tools.
- Harden system configuration by, for example, removing “unconstrained delegation” functionality from all servers.
- Keep systems and software up to date.
- Adopt a centralized identity and access management system.
- Prohibit the storage of passwords in plaintext.
To get all the details, read CISA’s advisory “Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a US Critical Infrastructure Sector Organization.”
To learn more about securing OT systems in critical infrastructure environments, check out these Tenable resources:
- “CISA Finding: 90% of Initial Access to Critical Infrastructure Is Gained Via Identity Compromise. What Can You Do About It?” (blog)
- “OT Security Master Class: Understanding the Key Principles, Challenges, and Solutions” (on-demand webinar)
- “Operational Technology (OT) Security: How to Reduce Cyber Risk When IT and OT Converge” (guide)
- “5 Key OT Security Use Cases For The DoD: Safeguarding OT Networks and Cyber-Physical Systems” (white paper)
- “Unlock Advanced IoT Visibility in your OT Environment Security” (on-demand webinar)
Here’s a stat to remind your organization to make sure its virtual private network (VPN) system is configured correctly, has no vulnerabilities and is up to date: Almost 30% of ransomware attacks in the third quarter compromised insecure VPNs to gain initial access, sharply up from about 5% in the second quarter.
That’s according to Corvus Insurance’s “Q3 2024 Cyber Threat Report,” which said many of the ransomware attacks in Q3 leveraged outdated VPN software and poorly protected VPN gateways.
Specifically, organizations shouldn’t allow the use of common usernames and weak passwords in their VPN user accounts, and should protect them with multi-factor authentication.
“The persistence of weak credentials and lack of multi-factor authentication on VPN gateways has facilitated these attacks, making secure access controls crucial for mitigating threats,” reads the report.
The Corvus ransomware report also found that five ransomware groups — RansomHub, PLAY, LockBit 3.0, MEOW and Hunters International — accounted for 40% of all attacks. However, the ransomware ecosystem remains diverse, with almost 60 groups active during the third quarter, which makes the threat landscape more complex for cyber teams to manage.
For more information about ransomware prevention:
- “How Can I Protect Against Ransomware?” (CISA)
- “Best practices for protection from ransomware in cloud storage” (TechTarget)
- “Steps to Help Prevent & Limit the Impact of Ransomware (Center for Internet Security)
- “Mitigating malware and ransomware attacks” (UK National Cyber Security Centre)
- “Preventing Ransomware Attacks at Scale” (Harvard Business Review)
VIDEO
Ultimate Guide to Ransomware for Businesses (TechTarget)
6 - Interpol tackles financial cybercrime with thousands of arrestsA five-month Interpol operation led by South Korea has led to the arrest of 5,500-plus suspected financial cybercriminals and to the seizure of more than $400 million in assets.
With Operation HAECHI, Interpol and law enforcement partners from 40 countries went after cyber crooks involved in a variety of financial scams, including:
- voice phishing
- romance scams
- investment fraud
- e-commerce fraud
International collaboration is key to fighting financial cybercrime, which has devastating effects on its victims, Interpol Secretary General Valdecy Urquiza said in a statement.
“It’s only through united efforts that we can make the real and digital worlds safer,” he said.
Cybersecurity Snapshot: Study Raises Open Source Security Red Flags, as Cyber Agencies Offer Prevention Tips Against Telecom Spying Attacks
Don’t miss the Linux Foundation’s deep dive into open source software security. Plus, cyber agencies warn about China-backed cyber espionage campaign targeting telecom data. Meanwhile, a study shows the weight of security considerations in generative AI projects. And get the latest on ransomware trends, financial cybercrime and critical infrastructure security.
Dive into six things that are top of mind for the week ending Dec. 6.
1 - Study: Security of open source software projects must improveImproperly secured developer accounts. Lack of a standard naming schema for software components. The persistence of legacy software.
Those three issues put the reliability and security of free and open source software (FOSS) at risk, a new Linux Foundation study has found.
Published this week, “Census III of Free and Open Source Software — Application Libraries” is based on about 12 million observations of FOSS at 10,000-plus companies. Its aim: to provide a better understanding of FOSS use and security challenges, given FOSS’ widespread adoption globally.
“Our goal is to not only provide an updated list of the most widely used FOSS, but to also provide an example of how the distributed nature of FOSS requires a multi-party effort to fully understand the value and security of the FOSS ecosystem,” the study reads.
Data sharing, coordination and investment are keys to preserving the value of FOSS, which has become critical for the digital economy, the authors wrote.
Here are more details about the three key security issues identified in the study:
- To conduct their FOSS work, developers often use individual accounts, which typically lack the security protections of organizational accounts. Hosting FOSS projects under individual developer accounts creates multiple risks, such as making it easier for hackers to breach individual computing environments and tamper with FOSS code.
- A lot of legacy FOSS software still exists that isn’t being maintained nor updated, which makes the software more vulnerable to attacks.
- The FOSS ecosystem needs a standardized schema for naming software components, a key issue for supply chain security. “Until one is widely used, strategies for software security, transparency and more will have limited effect,” the study reads.
For more information about open source security:
- “Concise Guide for Developing More Secure Software” (Open Source Security Foundation)
- “OWASP Top 10 Risks for Open Source Software” (OWASP)
- “CISA Open Source Software Security Roadmap” (CISA)
- “Seven ways to secure open-source software” (SC World)
- “Is Open Source a Threat to National Security?” (InformationWeek)
Security teams in charge of defending networks and communications infrastructure should take steps to prevent attacks from China-affiliated hackers that have recently compromised the networks of major global telecom providers.
So said cyber agencies from Australia, Canada, New Zealand and the U.S. this week in a joint document that offers network and communications-infrastructure engineers recommendations for strengthening network visibility and hardening systems.
The silver lining: The cyberattackers are exploiting known, existing weaknesses in their victims’ infrastructure. “No novel activity has been observed,” reads the publication, titled “Enhanced Visibility and Hardening Guidance for Communications Infrastructure.”
“Patching vulnerable devices and services, as well as generally securing environments, will reduce opportunities for intrusion and mitigate the actors’ activity,” the document adds.
These are some of the recommendations for defenders of networks and communications systems.
- To enhance visibility
- Adopt alerting mechanisms to detect unauthorized changes to the network and configuration modifications to network devices.
- Monitor anomalous logins into user and service accounts, and disable inactive accounts.
- Implement a centralized logging system that can analyze data from multiple sources.
- To harden systems and devices
- Implement strong network segmentation.
- Adopt an access control list (ACL) strategy that denies access to the network by default, and log all denied traffic.
- Disconnect unneeded internet-facing infrastructure and monitor the infrastructure that does need to be exposed to the internet.
The joint document doesn’t name the hacking group. However, The Wall Street Journal identified it as Salt Typhoon when, citing anonymous sources, it reported in September that the group had breached several U.S. telecoms, including Verizon and AT&T.
Salt Typhoon’s main goal is reportedly to carry out cyber espionage activities on behalf of the Chinese government. Salt Typhoon’s cyber espionage campaign is “ongoing” and authorities feel there is still much to be discovered about it, a Cybersecurity and Infrastructure Security Agency (CISA) official told reporters this week.
“We cannot say with certainty that the adversary has been evicted,” CISA official Jeff Greene said during a press call, as quoted by Politico. According to NBC News, Greene also recommended that Americans use encrypted messaging apps to protect themselves from Salt Typhoon.
Last month, CISA and the FBI described the Chinese-government backed cyber espionage campaign as “broad and significant,” resulting in the theft of customer call records data; the compromise of private communications of government officials and politicians; and the copying of law enforcement information related to wiretap requests.
For more information about Salt Typhoon and its ongoing cyber espionage campaign:
- “Salt Typhoon's surge extends far beyond US telcos” (The Register)
- “Chinese hackers breached T-Mobile's routers to scope out network” (Bleeping Computer)
- “Telcos struggle to boot Chinese hackers from networks” (Axios)
- “China's 'Salt Typhoon' Hackers Breached US Networks Using Existing Flaws” (PCMag)
- “Salt Typhoon Builds Out Malware Arsenal With GhostSpider” (Dark Reading)
As organizations deepen their generative AI use, security and data protection considerations feature prominently in their plans — including whether to build their own generative AI infrastructure.
That’s according to the Linux Foundation’s “Shaping the Future of Generative AI” report, which polled 316 respondents familiar with their organizations’ generative AI adoption.
“Security remains a cornerstone of this transformation. As organizations embrace GenAI, safeguarding sensitive data and ensuring compliance with industry standards have become critical imperatives,” reads an Open Source Security Foundation blog about the report.
Among organizations deploying their own generative AI infrastructure, security and data control ranked as the top motivation for doing so. Three other data security priorities — data sovereignty; privacy; and intellectual property protection — ranked third, fifth and eighth, respectively.
(Source: Linux Foundation's "Shaping the Future of Generative AI," November 2024)
Meanwhile, respondents, who were based primarily in the Americas, Europe and Asia-Pacific, ranked security as the second most important criteria when choosing a generative AI model or tool, with privacy and regulatory compliance ranking fourth and fifth, respectively.
(Source: Linux Foundation's "Shaping the Future of Generative AI," November 2024)
Furthermore, respondents, who included executives, developers, consultants, data scientists and operations staffers, also ranked security and data protection risks high when asked about their concerns when adopting generative AI models and tools.
(Source: Linux Foundation's "Shaping the Future of Generative AI," November 2024)
For more information about AI security, check out these Tenable blogs:
- “AI Security Roundup: Best Practices, Research and Insights”
- “How to Discover, Analyze and Respond to Threats Faster with Generative AI”
- “Never Trust User Inputs — And AI Isn't an Exception: A Security-First Approach”
- “Securing the AI Attack Surface: Separating the Unknown from the Well Understood”
- “Do You Think You Have No AI Exposures? Think Again”
Here’s a report that cyber teams at critical infrastructure organizations will likely find useful and informative.
The topic: How CISA’s red team breached a critical infrastructure organization’s IT network and then compromised a domain controller and a human machine interface (HMI), which served as an operational technology (OT) dashboard.
The unnamed organization requested that CISA conduct the red team assessment (RTA), in which CISA acted like a cyberattacker to probe the organization’s cybersecurity detection and response processes and procedures.
In broad strokes, here are some of the ways in which CISA’s red team circumvented the critical infrastructure organization’s cyber defenses:
- After failing to gain initial success via spearphishing, CISA’s red team hit pay dirt when it discovered a web shell left on a Linux web server by mistake.
- Using the web shell, CISA’s red team ran arbitrary commands on the Linux web server and moved laterally into the internal network.
- Using valid accounts, it compromised the organization’s domain and several sensitive business systems.
- Eventually, CISA’s team compromised a Windows domain controller, which allowed it to move laterally to all Windows hosts.
- With persistent access to Linux and Windows systems across the organization’s networks, CISA’s red team probed further, accessing, among other assets, the HMI OT dashboard.
Timeline of CISA's red team cyberthreat activity
(Source: CISA’s advisory “Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a US Critical Infrastructure Sector Organization,” November 2024)
Key findings include:
- The organization didn’t properly block access from the perimeter network to the internal network.
- The organization relied too much on host-based tools, while lacking sufficient network-layer protections.
- Multiple systems were insecurely configured.
- The organization failed to review security alerts that were triggered by the red team’s actions.
- Identity management was poor.
- The organization used software that is known to be insecure and outdated.
Some of CISA’s mitigation recommendations for cybersecurity teams are:
- Adopt the principle of least privilege, segment the perimeter network, and adopt firewalls, access control lists and intrusion prevention systems.
- Tune network appliances to detect anomalous behavior, and limit the use of admin tools.
- Harden system configuration by, for example, removing “unconstrained delegation” functionality from all servers.
- Keep systems and software up to date.
- Adopt a centralized identity and access management system.
- Prohibit the storage of passwords in plaintext.
To get all the details, read CISA’s advisory “Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a US Critical Infrastructure Sector Organization.”
To learn more about securing OT systems in critical infrastructure environments, check out these Tenable resources:
- “CISA Finding: 90% of Initial Access to Critical Infrastructure Is Gained Via Identity Compromise. What Can You Do About It?” (blog)
- “OT Security Master Class: Understanding the Key Principles, Challenges, and Solutions” (on-demand webinar)
- “Operational Technology (OT) Security: How to Reduce Cyber Risk When IT and OT Converge” (guide)
- “5 Key OT Security Use Cases For The DoD: Safeguarding OT Networks and Cyber-Physical Systems” (white paper)
- “Unlock Advanced IoT Visibility in your OT Environment Security” (on-demand webinar)
Here’s a stat to remind your organization to make sure its virtual private network (VPN) system is configured correctly, has no vulnerabilities and is up to date: Almost 30% of ransomware attacks in the third quarter compromised insecure VPNs to gain initial access, sharply up from about 5% in the second quarter.
That’s according to Corvus Insurance’s “Q3 2024 Cyber Threat Report,” which said many of the ransomware attacks in Q3 leveraged outdated VPN software and poorly protected VPN gateways.
Specifically, organizations shouldn’t allow the use of common usernames and weak passwords in their VPN user accounts, and should protect them with multi-factor authentication.
“The persistence of weak credentials and lack of multi-factor authentication on VPN gateways has facilitated these attacks, making secure access controls crucial for mitigating threats,” reads the report.
The Corvus ransomware report also found that five ransomware groups — RansomHub, PLAY, LockBit 3.0, MEOW and Hunters International — accounted for 40% of all attacks. However, the ransomware ecosystem remains diverse, with almost 60 groups active during the third quarter, which makes the threat landscape more complex for cyber teams to manage.
For more information about ransomware prevention:
- “How Can I Protect Against Ransomware?” (CISA)
- “Best practices for protection from ransomware in cloud storage” (TechTarget)
- “Steps to Help Prevent & Limit the Impact of Ransomware (Center for Internet Security)
- “Mitigating malware and ransomware attacks” (UK National Cyber Security Centre)
- “Preventing Ransomware Attacks at Scale” (Harvard Business Review)
VIDEO
Ultimate Guide to Ransomware for Businesses (TechTarget)
6 - Interpol tackles financial cybercrime with thousands of arrestsA five-month Interpol operation led by South Korea has led to the arrest of 5,500-plus suspected financial cybercriminals and to the seizure of more than $400 million in assets.
With Operation HAECHI, Interpol and law enforcement partners from 40 countries went after cyber crooks involved in a variety of financial scams, including:
- voice phishing
- romance scams
- investment fraud
- e-commerce fraud
International collaboration is key to fighting financial cybercrime, which has devastating effects on its victims, Interpol Secretary General Valdecy Urquiza said in a statement.
“It’s only through united efforts that we can make the real and digital worlds safer,” he said.
The post Cybersecurity Snapshot: Study Raises Open Source Security Red Flags, as Cyber Agencies Offer Prevention Tips Against Telecom Spying Attacks appeared first on Security Boulevard.
Cybersecurity Insights with Contrast CISO David Lindner | 12/06/24
The NIST CVE backlog is a digital plague crippling a critical control layer in an organization's cybersecurity architecture. CISOs and security leaders are left scrambling, their defenses undermined by the very agency tasked with providing threat intelligence. Firewalls, intrusion detection systems, vulnerability scanners — in short, billions of dollars in security investment — have been rendered even more reactive and inaccurate. The situation has given malicious actors the upper hand. This backlog throws sand in the gears of these tools, leaving gaping holes in defenses. It's a systemic failure leaving organizations vulnerable.
The post Cybersecurity Insights with Contrast CISO David Lindner | 12/06/24 appeared first on Security Boulevard.