Malware Devil

Thursday, April 1, 2021

2021-04-01 – Quick post: IcedID (Bokbot) activity

The post 2021-04-01 – Quick post: IcedID (Bokbot) activity appeared first on Malware Devil.



https://malwaredevil.com/2021/04/01/2021-04-01-quick-post-icedid-bokbot-activity/?utm_source=rss&utm_medium=rss&utm_campaign=2021-04-01-quick-post-icedid-bokbot-activity

Top 12 hacker tips to secure your SPA from Crowdsource

Read More

The post Top 12 hacker tips to secure your SPA from Crowdsource appeared first on Malware Devil.



https://malwaredevil.com/2021/04/01/top-12-hacker-tips-to-secure-your-spa-from-crowdsource-2/?utm_source=rss&utm_medium=rss&utm_campaign=top-12-hacker-tips-to-secure-your-spa-from-crowdsource-2

nOtWASP bottom 10: vulnerabilities that make you cry

Read More

The post nOtWASP bottom 10: vulnerabilities that make you cry appeared first on Malware Devil.



https://malwaredevil.com/2021/04/01/notwasp-bottom-10-vulnerabilities-that-make-you-cry-2/?utm_source=rss&utm_medium=rss&utm_campaign=notwasp-bottom-10-vulnerabilities-that-make-you-cry-2

Solver-Aided Constant-Time Circuit Verification

Read More

The post Solver-Aided Constant-Time Circuit Verification appeared first on Malware Devil.



https://malwaredevil.com/2021/04/01/solver-aided-constant-time-circuit-verification/?utm_source=rss&utm_medium=rss&utm_campaign=solver-aided-constant-time-circuit-verification

[Rockstar Games] high – SocialClub Account Take Over Through Import Friends feature (1500.00USD)

Read More

The post [Rockstar Games] high – SocialClub Account Take Over Through Import Friends feature (1500.00USD) appeared first on Malware Devil.



https://malwaredevil.com/2021/04/01/rockstar-games-high-socialclub-account-take-over-through-import-friends-feature-1500-00usd-2/?utm_source=rss&utm_medium=rss&utm_campaign=rockstar-games-high-socialclub-account-take-over-through-import-friends-feature-1500-00usd-2

Who Contains the Containers?

Read More

The post Who Contains the Containers? appeared first on Malware Devil.



https://malwaredevil.com/2021/04/01/who-contains-the-containers-2/?utm_source=rss&utm_medium=rss&utm_campaign=who-contains-the-containers-2

The Guide to Presenting Information Security’s Business Value

When it comes to information security and stressing the importance of cyber risk management, getting the whole company (especially the C-suite) on the same playing field becomes paramount. There’s no question that when diving into it for the first time, cyber security can be a daunting function. There are countless acronyms, concepts, and approaches that can be difficult to wrangle into layman’s terms. There becomes this struggle of trying to explain these nebulous concepts while emphasizing the significance of mature risk posture and proactive security strategies to keep the company’s assets and their clients secure.

The post The Guide to Presenting Information Security’s Business Value appeared first on Security Boulevard.

Read More

The post The Guide to Presenting Information Security’s Business Value appeared first on Malware Devil.



https://malwaredevil.com/2021/04/01/the-guide-to-presenting-information-securitys-business-value-2/?utm_source=rss&utm_medium=rss&utm_campaign=the-guide-to-presenting-information-securitys-business-value-2

The Guide to Presenting Information Security’s Business Value

When it comes to information security and stressing the importance of cyber risk management, getting the whole company (especially the C-suite) on the same playing field becomes paramount. There’s no question that when diving into it for the first time, cyber security can be a daunting function. There are countless acronyms, concepts, and approaches that can be difficult to wrangle into layman’s terms. There becomes this struggle of trying to explain these nebulous concepts while emphasizing the significance of mature risk posture and proactive security strategies to keep the company’s assets and their clients secure.

The post The Guide to Presenting Information Security’s Business Value appeared first on Security Boulevard.

Read More

The post The Guide to Presenting Information Security’s Business Value appeared first on Malware Devil.



https://malwaredevil.com/2021/04/01/the-guide-to-presenting-information-securitys-business-value/?utm_source=rss&utm_medium=rss&utm_campaign=the-guide-to-presenting-information-securitys-business-value

CISO Stories Podcast: The Colonoscopy of CyberSecurity

The information and cybersecurity industry has no shortage of regulations, and many organizations simply rundown the list of requirements, load them into an excel spreadsheet and check the boxes to demonstrate they are in compliance. But is being compliant the same as being secure?

Join this podcast with special guest Lee Parrish who shares an analogy that illustrates why being compliant is not the same as being secure, and how we can change an organization’s orientation to keep the focus on security – check it out…

The post CISO Stories Podcast: The Colonoscopy of CyberSecurity appeared first on Security Boulevard.

Read More

The post CISO Stories Podcast: The Colonoscopy of CyberSecurity appeared first on Malware Devil.



https://malwaredevil.com/2021/04/01/ciso-stories-podcast-the-colonoscopy-of-cybersecurity/?utm_source=rss&utm_medium=rss&utm_campaign=ciso-stories-podcast-the-colonoscopy-of-cybersecurity

Breaking Down the Latest O365 Phishing Techniques

Microsoft Office 365 phish are some of the most common threats that reach end users inboxes. Over the course of a two-year period, PhishLabs has observed that O365 phish have accounted for more than half of all reported phish by enterprises – by a significant margin. 

The post Breaking Down the Latest O365 Phishing Techniques appeared first on Security Boulevard.

Read More

The post Breaking Down the Latest O365 Phishing Techniques appeared first on Malware Devil.



https://malwaredevil.com/2021/04/01/breaking-down-the-latest-o365-phishing-techniques/?utm_source=rss&utm_medium=rss&utm_campaign=breaking-down-the-latest-o365-phishing-techniques

New KrebsOnSecurity Mobile-Friendly Site

Dear Readers, this has been long overdue, but at last I give you a more responsive, mobile-friendly version of KrebsOnSecurity. We tried to keep the visual changes to a minimum and focus on a simple theme that presents information in a straightforward, easy-to-read format. Please bear with us over the next few days as we hunt down the gremlins in the gears.

We were shooting for responsive (fast) and uncluttered. Hopefully, we achieved that and this new design will render well in whatever device you use to view it. If something looks amiss, please don’t hesitate to drop a note in the comments below.

NB: KrebsOnSecurity has not changed any of its advertising practices: The handful of ads we run are still image-only creatives that are vetted by me and served in-house. If you’re blocking ads on this site, please consider adding an exception here. Thank you!

Read More

The post New KrebsOnSecurity Mobile-Friendly Site appeared first on Malware Devil.



https://malwaredevil.com/2021/04/01/new-krebsonsecurity-mobile-friendly-site/?utm_source=rss&utm_medium=rss&utm_campaign=new-krebsonsecurity-mobile-friendly-site

Legacy QNAP NAS Devices Vulnerable to Zero-Day Attack

Some legacy models of QNAP network attached storage devices are vulnerable to remote unauthenticated attacks because of two unpatched vulnerabilities.
Read More

The post Legacy QNAP NAS Devices Vulnerable to Zero-Day Attack appeared first on Malware Devil.



https://malwaredevil.com/2021/04/01/legacy-qnap-nas-devices-vulnerable-to-zero-day-attack/?utm_source=rss&utm_medium=rss&utm_campaign=legacy-qnap-nas-devices-vulnerable-to-zero-day-attack

Android “System Update” malware steals photos, videos, GPS location

A newly discovered piece of Android malware shares the same capabilities found within many modern stalkerware-type apps–it can swipe images and video, rifle through online searches, record phone calls and video, and peer into GPS location data–but the infrastructure behind the malware obscures its developer’s primary motivations.

First spotted by the research team at Zimperium zLabs, the newly found malware is already detected by Malwarebytes for Android. It does not have a catchy name, but because of its capabilities and its method for going unnoticed, we are calling it Android/Trojan.Spy.FakeSysUpdate, or in this blog, “FakeSysUpdate” for short.

FakeSysUpdate is not available on the Google Play store, and it is currently unclear how it is being delivered to Android devices. Even more obscured is the visibility of the app to victims.

Once FakeSysUpdate is implanted on a device, it disguises itself to its victims by masquerading as a generic “System Update” application. In fact, when a threat actor uses FakeSysUpdate to steal targeted information from an infected, asleep device, FakeSysUpdate will also send a fraudulent notification posing as a “System Update” that is “Searching for update.”

Beneath the surface, FakeSysUpdate can let a malicious actor steal highly sensitive information while also granting them dangerous control of a victim’s device.

According to Zimperium zLabs, the malware can allow a threat actor to monitor GPS locations, record phone calls, record ambient audio, take photos from the front-facing and rear-facing cameras on a device, observe the device’s installed applications, inspect bookmark and search history from Google Chrome, Mozilla Firefox, and Samsung Internet Browser, and steal SMS messages, phone contacts, and call logs.

If you’ve read our coverage on these types of capabilities in the past, you might think that FakeSysUpdate is just the latest stalkerware-type app on the market. After all, the threats of stalkerware are near identical–pinpointed GPS locations that can reveal a domestic abuse survivor’s location after escape, stolen text messages that can uncover a survivor’s safety planning, and broad, non-consensual invasions of privacy that can harm anyone.

But the inner workings of FakeSysUpdate potentially betray the common uses of stalkerware.

First, according to the researchers at Zimperium zLabs, once the malware is installed on a device, the device is registered with the Firebase Command and Control (C2), upon which a threat actor can send commands through the Firebase messaging service to, for instance, steal a device’s contacts list, record microphone audio, or take a picture using the device’s cameras.

At issue here is who can send the C2 commands. If the commands can be sent by the apps users’, so they can spy on their victims, then it looks like a stalkerware-type app. If the commands can only be issued by the app’s creators, then there’s a good chance that FakeSysUpdate is not stalkerware, but information-gathering spyware. Unlike stalkerware, most (but not all) spyware doesn’t care who its victims are–it is simply looking for information that can be used for extortion or to facilitate further attacks with malware.

That’s contrary to many of the stalkerware-type apps that we see, which are, for lack of a better word, “user-friendly.” They do not require a high-tech proficiency to use or understand. They do not have illegible interfaces. Instead, these apps have familiar layouts, intuitive designs, and easy-to-use commands. For many apps, it’s as simple as logging into a web platform, clicking a menu item, and browsing through private photos without any consent.

Which brings us to the second point: If this piece of malware isn’t being advertised–or if it isn’t really known–as a stalkerware-type app, then it’s less likely that it’s been built as one.

Stalkerware-type apps do not hide in the shadows. They flood Google results for anyone searching how to spy on their romantic partners. They place sponsored articles in major city newspapers (yes, really). The more egregious ones even advertise themselves specifically on their so-called abilities to “catch” cheating partners.

Without knowing how FakeSysUpdate is being advertised–which relates to our lacking information on how it is primarily being delivered to devices–we cannot definitively ascertain its purpose.

Despite the uncertainty, though, one thing is clear: This piece of malware could be devastating. Whether for malicious information gathering or for non-consensual surveillance of a romantic partner, these invasions of privacy are flat-out wrong.

We thank Zimperium zLabs for discovering this malware and for bringing it to the public’s attention.

The post Android “System Update” malware steals photos, videos, GPS location appeared first on Malware Devil.



https://malwaredevil.com/2021/04/01/android-system-update-malware-steals-photos-videos-gps-location-2/?utm_source=rss&utm_medium=rss&utm_campaign=android-system-update-malware-steals-photos-videos-gps-location-2

Android “System Update” malware steals photos, videos, GPS location

A newly discovered piece of Android malware shares the same capabilities found within many modern stalkerware-type apps–it can swipe images and video, rifle through online searches, record phone calls and video, and peer into GPS location data–but the infrastructure behind the malware obscures its developer’s primary motivations.

First spotted by the research team at Zimperium zLabs, the newly found malware is already detected by Malwarebytes for Android. It does not have a catchy name, but because of its capabilities and its method for going unnoticed, we are calling it Android/Trojan.Spy.FakeSysUpdate, or in this blog, “FakeSysUpdate” for short.

FakeSysUpdate is not available on the Google Play store, and it is currently unclear how it is being delivered to Android devices. Even more obscured is the visibility of the app to victims.

Once FakeSysUpdate is implanted on a device, it disguises itself to its victims by masquerading as a generic “System Update” application. In fact, when a threat actor uses FakeSysUpdate to steal targeted information from an infected, asleep device, FakeSysUpdate will also send a fraudulent notification posing as a “System Update” that is “Searching for update.”

Beneath the surface, FakeSysUpdate can let a malicious actor steal highly sensitive information while also granting them dangerous control of a victim’s device.

According to Zimperium zLabs, the malware can allow a threat actor to monitor GPS locations, record phone calls, record ambient audio, take photos from the front-facing and rear-facing cameras on a device, observe the device’s installed applications, inspect bookmark and search history from Google Chrome, Mozilla Firefox, and Samsung Internet Browser, and steal SMS messages, phone contacts, and call logs.

If you’ve read our coverage on these types of capabilities in the past, you might think that FakeSysUpdate is just the latest stalkerware-type app on the market. After all, the threats of stalkerware are near identical–pinpointed GPS locations that can reveal a domestic abuse survivor’s location after escape, stolen text messages that can uncover a survivor’s safety planning, and broad, non-consensual invasions of privacy that can harm anyone.

But the inner workings of FakeSysUpdate potentially betray the common uses of stalkerware.

First, according to the researchers at Zimperium zLabs, once the malware is installed on a device, the device is registered with the Firebase Command and Control (C2), upon which a threat actor can send commands through the Firebase messaging service to, for instance, steal a device’s contacts list, record microphone audio, or take a picture using the device’s cameras.

At issue here is who can send the C2 commands. If the commands can be sent by the apps users’, so they can spy on their victims, then it looks like a stalkerware-type app. If the commands can only be issued by the app’s creators, then there’s a good chance that FakeSysUpdate is not stalkerware, but information-gathering spyware. Unlike stalkerware, most (but not all) spyware doesn’t care who its victims are–it is simply looking for information that can be used for extortion or to facilitate further attacks with malware.

That’s contrary to many of the stalkerware-type apps that we see, which are, for lack of a better word, “user-friendly.” They do not require a high-tech proficiency to use or understand. They do not have illegible interfaces. Instead, these apps have familiar layouts, intuitive designs, and easy-to-use commands. For many apps, it’s as simple as logging into a web platform, clicking a menu item, and browsing through private photos without any consent.

Which brings us to the second point: If this piece of malware isn’t being advertised–or if it isn’t really known–as a stalkerware-type app, then it’s less likely that it’s been built as one.

Stalkerware-type apps do not hide in the shadows. They flood Google results for anyone searching how to spy on their romantic partners. They place sponsored articles in major city newspapers (yes, really). The more egregious ones even advertise themselves specifically on their so-called abilities to “catch” cheating partners.

Without knowing how FakeSysUpdate is being advertised–which relates to our lacking information on how it is primarily being delivered to devices–we cannot definitively ascertain its purpose.

Despite the uncertainty, though, one thing is clear: This piece of malware could be devastating. Whether for malicious information gathering or for non-consensual surveillance of a romantic partner, these invasions of privacy are flat-out wrong.

We thank Zimperium zLabs for discovering this malware and for bringing it to the public’s attention.

The post Android “System Update” malware steals photos, videos, GPS location appeared first on Malware Devil.



https://malwaredevil.com/2021/04/01/android-system-update-malware-steals-photos-videos-gps-location/?utm_source=rss&utm_medium=rss&utm_campaign=android-system-update-malware-steals-photos-videos-gps-location

Thousands of Zero-Day Spear Phishing Attacks Continue to Target Covid-19 Pharmaceuticals

Three days before the end of 2020 SlashNext Threat Labs observed a flurry of spear-phishing attacks targeting companies working to deliver Covid-19 vaccines and therapeutics to curb the pandemic. Many of these attacks continue and have been active during the first quarter of 2021 with more than 1,000 spear phishing domains belonging to the same […]

The post Thousands of Zero-Day Spear Phishing Attacks Continue to Target Covid-19 Pharmaceuticals first appeared on SlashNext.

The post Thousands of Zero-Day Spear Phishing Attacks Continue to Target Covid-19 Pharmaceuticals appeared first on Security Boulevard.

Read More

The post Thousands of Zero-Day Spear Phishing Attacks Continue to Target Covid-19 Pharmaceuticals appeared first on Malware Devil.



https://malwaredevil.com/2021/04/01/thousands-of-zero-day-spear-phishing-attacks-continue-to-target-covid-19-pharmaceuticals/?utm_source=rss&utm_medium=rss&utm_campaign=thousands-of-zero-day-spear-phishing-attacks-continue-to-target-covid-19-pharmaceuticals

Intelligent Reflecting Surface for Wireless Communication Security and Privacy

Read More

The post Intelligent Reflecting Surface for Wireless Communication Security and Privacy appeared first on Malware Devil.



https://malwaredevil.com/2021/04/01/intelligent-reflecting-surface-for-wireless-communication-security-and-privacy-2/?utm_source=rss&utm_medium=rss&utm_campaign=intelligent-reflecting-surface-for-wireless-communication-security-and-privacy-2

Amnesiac DRAM: A Proactive Defense Mechanism Against Cold Boot Attacks

Read More

The post Amnesiac DRAM: A Proactive Defense Mechanism Against Cold Boot Attacks appeared first on Malware Devil.



https://malwaredevil.com/2021/04/01/amnesiac-dram-a-proactive-defense-mechanism-against-cold-boot-attacks-2/?utm_source=rss&utm_medium=rss&utm_campaign=amnesiac-dram-a-proactive-defense-mechanism-against-cold-boot-attacks-2

April 2021 Forensic Quiz, (Thu, Apr 1st)

Introduction

Today’s diary is a forensic quiz for April 2021.  This month’s quiz will also be a contest.  The prize is a Raspberry Pi.  Rules for the contest follow:

  • Only one submission per person.
  • The first person to submit the correct answers will win the Raspberry Pi.
  • Submissions will be made using the form on our contact page at: https://isc.sans.edu/contact.html
  • Use April 2021 Forensic Quiz Submission for the Subject: line.
  • Provide the following information:
    • IP address of the infected Windows computer.
    • Host name of the infected Windows computer.
    • User account name on the infected Windows computer.
    • Date and time the infection activity began in UTC (the GMT or Zulu timezone).
    • The family or families of malware on the infected computer.

Material for this forensic quiz is located at this Github repository.  This repository contains a zip archive containing a pcap of network traffic from the infected Windows host.  The repository also contains another zip archive with malware and artifacts recovered from the infected Windows host.  Be very careful with the malware and artifacts zip because it has actual malware from a recently-infected Windows computer.  If you don’t know what you’re doing, do not download the malware and artifacts.  I always recommend people do this quiz in a non-Windows environment, if possible.


Shown above:  A meme about usernames and passwords on an infected Windows host.

Requirements

Analysis of the infection traffic requires Wireshark or some other pcap analysis tool.  Wireshark is my tool of choice to review pcaps of infection traffic.  However, default settings for Wireshark are not optimized for web-based malware traffic.  That’s why I encourage people to customize Wireshark after installing it.  To help, I’ve written a series of tutorials.  The ones most helpful for this quiz are:

I always recommend participants use a non-Windows environment like BSD, Linux, or macOS.  Why?  Because most pcaps in these traffic analysis quizzes contain traffic with Windows-based malware.  If you’re using a Windows host to review such pcaps, your antivirus (or Windows Defender) may delete or alter the pcap.  Worst case?  If you extract malware from a pcap and accidentally run it, you might infect your Windows computer.

Analysis of the malware and artifacts should also be done in a non-Windows environment, unless you are a skilled malware analyst.  However, reviewing the malware and artifacts in a non-Windows environment like Linux shouldn’t pose any problems.  Feel free to search for (or submit) malware from this quiz on sites like:

Most of the above sites require some sort of account to log in and search for samples.  Some of these sites provide free accounts that only require a valid email address.  Alternatively, search Google or other search engines for the SHA256 hashes of malware samples from this quiz.  You might get links from the above sites in your search results.

Active Directory (AD) Environment

The infected Windows host is part of an AD environment, so the pcap contains information about the Windows user account. The user account is formatted as firstname.lastname.  The AD environment characteristics are:

  • LAN segment range: 192.168.5.0/24 (192.168.5.0 through 192.168.5.255)
  • Domain: cliffwater.net
  • Domain Controller: 192.168.5.5 – Cliffwater-DC
  • LAN segment gateway: 192.168.5.1
  • LAN segment broadcast address: 192.168.5.255

Final Words

Again, the zip archive with a pcap of the traffic for this exercise is available in this Github repository.  The winner of today’s contest and analysis of the infection will be posted in an upcoming ISC diary two weeks from today on Wednesday April 14th.

I think the Raspberry Pi is an older model like a Raspberry Pi 2 or Raspberry Pi 3, but I will find out and update or add a comment to this diary.

Brad Duncan
brad [at] malware-traffic-analysis.net

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post April 2021 Forensic Quiz, (Thu, Apr 1st) appeared first on Malware Devil.



https://malwaredevil.com/2021/04/01/april-2021-forensic-quiz-thu-apr-1st/?utm_source=rss&utm_medium=rss&utm_campaign=april-2021-forensic-quiz-thu-apr-1st

Wednesday, March 31, 2021

Cyber Security Roundup for April 2021

  

A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar month, March 2021.


How not to disclosure a Hack
UK fashion retailer FatFace angered customers in its handling of a customer data theft hack.  The clothes retailer revealed a data theft which included its customer’s full names, home addresses, email addresses, and partial debitcredit card details. The payment card details included the last four digits and the card’s security verification code, the latter code is never permitted to be stored after a payment card authorisation under Payment Card Industry Data Security Standard requirements, so it would appear the business was not PCI DSS compliant at the time of their hack, which strongly suggests the business may not doing enough of the expected IT security good practices to prevent being hacked in the first place, a poor IT defence posture which appears to have even been corroborated by their hackers.

FatFace CEO Liz Evans released a statement which said “On 17th January 2021 FatFace identified some suspicious activity within its IT systems. We immediately launched an investigation with the assistance of experienced security professionals who, following a thorough investigation, determined that an unauthorized third party had gained access to certain systems operated by us during a limited period of time earlier the same month. FatFace quickly contained the incident and started the process of reviewing and categorising the data potentially involved in the incident.”

Customers were said to be angered that it took FatFace over two months to notify them of the breach, under the UK Data Protection Act (GDPR), UK businesses are required by law to notify data subjects (customers) within 72 hours of learning their personal data had been compromised.  Customers were said to be even further incensed that emails sent to them by FatFace were titled “Strictly private and confidential“, which they considered implied they should help FatFace cover up the breach, and there was no apology by the FatFace CEO to boot.

Computer Weekly said it had learnt that FatFace paid a £1.5m ($2 million US dollar) ransom to the Conti Ransomware gang, disclosing the gang gained access to FatFace network and their IT systems via a phishing email on 10th January 2021. The ransomware attack was said to be executed on 17th January 2021 and over 200Gb of data was exfiltrated.  As part of ransomware negotiation, the original ransom ask for $8m worth of Bitcoin, was said to have included the Conti gang providing the following cybersecurity advice to FatFace:
  • IT teams to implement email filtering
  • conduct employee phishing tests
  • conduct penetration testing
  • review Active Directory password policy
  • invest in better endpoint detection and response (EDR) technology, apparently recommending Cylance or VMware Carbon Black
  • better protect the internal network and isolate critical systems
  • implement offline storage and tape-based backup
All very sound advice.

More and More Ransomware Attacks
The Harris Federation, which runs 50 primary and secondary schools, and Birmingham College probably wished they had followed the alleged Conti gang’s anti-ransomware security advice after they were taken out by ransomware attacks. 

The ransomware epidemic dominated the 2021 Palo Alto Networks Unit 42 Report, echoing the constant stream of IT media headlines, namely that ransomware gangs continue to evolve their tactics and operations, and are making more and more serious money.  We are within a golden age of ransomware crime, and there are no signs of a rest bite. PA Unit 42 found that the average ransom paid by organisations nearly tripled over the past year, from $115,123 in 2019 to $312,493. High-end ransoms have gone up significantly too. Between 2015 and 2019, the largest-known individual ransom demand was $15 million. In 2020 groups were demanding as much as $30 million to unlock a victim’s files and systems.

A Russian man in the US pleaded guilty to plotting to extort money from the electric car company Tesla, after he was accused of offering an employee £721k ($1m) to place ransomware on Tesla’s network. He was quoted as saying that he and his co-conspirators would steal the data and if Tesla refused to pay the ransom the company’s secrets would be placed on the internet.

Microsoft Exchange Zero-Day, Exploitations Led by Hafnium

Further information about the Exchange Server zero-day vulnerability exploitations came to light throughout March, as summarised below. 
UK Gov to Ramp up Cyber Offenses and Defences
Prime Minister Boris Johnson announced he was creating a “cyber corridor” in the North of England, to bolster Britain’s cyber warfare capabilities against hostile countries and terrorist groups.  A new UK National Cyber Force (NCF) will lay out “a new cyber strategy to create a cyber ecosystem.”

The NCF review will “set out the importance of cyber technology” to the UK’s way of life “whether it’s defeating our enemies on the battlefield, making the internet a safer place or developing cutting-edge tech to improve people’s lives.“ Basing this task force in the North of England is intended to generate economic growth in the digital and defence industries while drawing in the private sector and academia to work with the government on projects.


Britain’s biggest banks, including Barclays, HSBC, and NatWest, and insurance companies, including Aviva and Direct Line, will face new tougher testing of their cyber defences by the Bank of England’s Financial Policy Committee (FPC). Industry sources said the FPC will test their ability to withstand a coordinated global series of cyberattacks to form the centrepiece of the Bank of England’s stress scenario reporting.
However, one recently introduced UK cybersecurity law, which was meant to boost the resilience of the UK’s energy sector by obliging gas and electricity firms to report to hacks, doesn’t appear to be very effectively adopted. Network & Information Systems (NIS) Regulations 2018 were introduced into UK law three years ago and has parallels with the DPAGDPR law which was introduced at the same time. Like the GDPR, NIS requires the UK critical national infrastructure firms (i.e. ISPs, utilities) and energy sector firms (i.e. gas and electricity firms) to quickly report any hacks to their regulating authority, Ofgem. According to Sky News, only one company has ever tried to file a report informing the regulator that it had been hacked, but they were dismissed as the incident did not meet the threshold for being reported.
Recently, the British government confirmed Russian state-sponsored hackers have successfully penetrated the computer networks of the UK’s energy grids, without disrupting them, and former defence secretary Gavin Williamson warned that “thousands and thousands and thousands” of people could be killed if an attempt at disruption was made.  Responding to Sky News about NIS compliance, a UK government spokesperson said: “The UK’s critical infrastructure is extremely well protected and over the past five years we have invested £1.9bn in the National Cyber Security Strategy to ensure our systems remain secure and reliable.” UK Gov then added that a formal review of the impact of NIS will take place within the next 12 months.
Stay safe and secure.



BLOG


VULNERABILITIES AND SECURITY UPDATES
AWARENESS, EDUCATION AND THREAT INTELLIGENCE

The post Cyber Security Roundup for April 2021 appeared first on Security Boulevard.

Read More

The post Cyber Security Roundup for April 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/03/31/cyber-security-roundup-for-april-2021/?utm_source=rss&utm_medium=rss&utm_campaign=cyber-security-roundup-for-april-2021

Top 5 Attack Techniques May Be Easier to Detect Than You Think

New analysis shows attackers for the most part are continuing to rely on the same techniques and tactics they have been using for years.

The post Top 5 Attack Techniques May Be Easier to Detect Than You Think appeared first on Malware Devil.



https://malwaredevil.com/2021/03/31/top-5-attack-techniques-may-be-easier-to-detect-than-you-think-3/?utm_source=rss&utm_medium=rss&utm_campaign=top-5-attack-techniques-may-be-easier-to-detect-than-you-think-3

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...