Malware Devil

Tuesday, April 6, 2021

Fileless Malware, Endpoint Attacks on the Rise

fileless malware Object

Cybercriminals are increasingly leveraging fileless malware, cryptominers and encrypted attacks, targeting users both at remote locations as well as corporate assets behind the traditional network perimeter. These were among the findings of WatchGuard Technologies’ Internet Security Report for Q4 2020, which found fileless malware and cryptominer attack rates grew by nearly 900% and 25%, respectively,..

The post Fileless Malware, Endpoint Attacks on the Rise appeared first on Security Boulevard.

Read More

The post Fileless Malware, Endpoint Attacks on the Rise appeared first on Malware Devil.



https://malwaredevil.com/2021/04/06/fileless-malware-endpoint-attacks-on-the-rise/?utm_source=rss&utm_medium=rss&utm_campaign=fileless-malware-endpoint-attacks-on-the-rise

Race to Cloud Continues Despite Security Concerns

cloud security race

After a year of shifting to the cloud at a dizzying pace, it seems that trend shows no sign of slowing down. Organizations continue the shift to complex cloud environments, though many find providers’ native security controls fall short of their needs. More than half of the organizations surveyed for the State of Cloud Security..

The post Race to Cloud Continues Despite Security Concerns appeared first on Security Boulevard.

Read More

The post Race to Cloud Continues Despite Security Concerns appeared first on Malware Devil.



https://malwaredevil.com/2021/04/06/race-to-cloud-continues-despite-security-concerns/?utm_source=rss&utm_medium=rss&utm_campaign=race-to-cloud-continues-despite-security-concerns

3 Best Practices for Building Secure Container Images

Organizations are increasingly turning to containers to fuel their digital transformations. According to BMC, a 2019 survey found that more than 87% of respondents were running containers—up from 55% just two years earlier. Additionally, 90% of survey participants that were running applications in containers were doing so in production. That was up from 84% in […]… Read More

The post 3 Best Practices for Building Secure Container Images appeared first on The State of Security.

The post 3 Best Practices for Building Secure Container Images appeared first on Security Boulevard.

Read More

The post 3 Best Practices for Building Secure Container Images appeared first on Malware Devil.



https://malwaredevil.com/2021/04/06/3-best-practices-for-building-secure-container-images/?utm_source=rss&utm_medium=rss&utm_campaign=3-best-practices-for-building-secure-container-images

Industrial IoT Needs to Catch Up to Consumer IoT

When it comes to cybersecurity, industrial IT—consisting mainly of operational technology (OT) and industrial control systems (ICS)—has failed to keep up with development in the enterprise IT world. That’s mostly because industries’ adoption of internet technology has been slower when compared with enterprises. It would take some time to close the gap, but concerted efforts […]… Read More

The post Industrial IoT Needs to Catch Up to Consumer IoT appeared first on The State of Security.

The post Industrial IoT Needs to Catch Up to Consumer IoT appeared first on Security Boulevard.

Read More

The post Industrial IoT Needs to Catch Up to Consumer IoT appeared first on Malware Devil.



https://malwaredevil.com/2021/04/06/industrial-iot-needs-to-catch-up-to-consumer-iot/?utm_source=rss&utm_medium=rss&utm_campaign=industrial-iot-needs-to-catch-up-to-consumer-iot

ISC Stormcast For Tuesday, April 6th, 2021 https://isc.sans.edu/podcastdetail.html?id=7444, (Tue, Apr 6th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post ISC Stormcast For Tuesday, April 6th, 2021 https://isc.sans.edu/podcastdetail.html?id=7444, (Tue, Apr 6th) appeared first on Malware Devil.



https://malwaredevil.com/2021/04/06/isc-stormcast-for-tuesday-april-6th-2021-https-isc-sans-edu-podcastdetail-htmlid7444-tue-apr-6th/?utm_source=rss&utm_medium=rss&utm_campaign=isc-stormcast-for-tuesday-april-6th-2021-https-isc-sans-edu-podcastdetail-htmlid7444-tue-apr-6th

Ransom Gangs Emailing Victim Customers for Leverage

Some of the top ransomware gangs are deploying a new pressure tactic to push more victim organizations into paying an extortion demand: Emailing the victim’s customers and partners directly, warning that their data will be leaked to the dark web unless they can convince the victim firm to pay up.

This letter is from the Clop ransomware gang, putting pressure on a recent victim named on Clop’s dark web shaming site.

“Good day! If you received this letter, you are a customer, buyer, partner or employee of [victim],” the missive reads. “The company has been hacked, data has been stolen and will soon be released as the company refuses to protect its peoples’ data.”

“We inform you that information about you will be published on the darknet [link to dark web victim shaming page] if the company does not contact us,” the message concludes. “Call or write to this store and ask to protect your privacy!!!!”

The message above was sent to a customer of RaceTrac Petroleum, an Atlanta company that operates more than 650 retail gasoline convenience stores in 12 southeastern states. The person who shared that screenshot above isn’t a distributor or partner of RaceTrac, but they said they are a RaceTrac rewards member, so the company definitely has their email address and other information.

Several gigabytes of the company’s files — including employee tax and financial records — have been posted to the victim shaming site for the Clop ransomware gang.

In response to questions from KrebsOnSecurity, RaceTrac said it was recently impacted by a security incident affecting one of its third-party service providers, Accellion Inc.

For the past few months, attackers have been exploiting a a zero-day vulnerability in Accellion File Transfer Appliance (FTA) software, a flaw that has been seized upon by Clop to break into dozens of other major companies like oil giant Shell and security firm Qualys.

“By exploiting a previously undetected software vulnerability, unauthorized parties were able to access a subset of RaceTrac data stored in the Accellion File Transfer Service, including email addresses and first names of some of our RaceTrac Rewards Loyalty users,” the company wrote. “This incident was limited to the aforementioned Accellion services and did not impact RaceTrac’s corporate network. The systems used for processing guest credit, debit and RaceTrac Rewards transactions were not impacted.”

The same extortion pressure email has been going out to people associated with the University of California, which was one of several large U.S. universities that got hit with Clop ransomware recently. Most of those university ransomware incidents appeared to be tied to attacks on attacks on the same Accellion vulnerability, and the company has acknowledged roughly a third of its customers on that appliance got compromised as a result.

Clop is one of several ransom gangs that will demand two ransoms: One for a digital key needed to unlock computers and data from file encryption, and a second to avoid having stolen data published or sold online. That means even victims who opt not to pay to get their files and servers back still have to decide whether to pay the second ransom to protect the privacy of their customers.

As I noted in Why Paying to Delete Stolen Data is Bonkers, leaving aside the notion that victims might have any real expectation the attackers will actually destroy the stolen data, new research suggests a fair number of victims who do pay up may see some or all of the stolen data published anyway.

The email in the screenshot above differs slightly from those covered last week by Bleeping Computer, which was the first to spot the new victim notification wrinkle. Those emails say that the recipient is being contacted as they are a customer of the store, and their personal data, including phone numbers, email addresses, and credit card information, will soon be published if the store does not pay a ransom, writes Lawrence Abrams.

“Perhaps you bought something there and left your personal data. Such as phone, email, address, credit card information and social security number,” the Clop gang states in the email.

Fabian Wosar, chief technology officer at computer security firm Emsisoft, said the direct appeals to victim customers is a natural extension of other advertising efforts by the ransomware gangs, which recently included using hacked Facebook accounts to post victim shaming advertisements.

Wosar said Clop isn’t the only ransomware gang emailing victim customers.

“Clop likes to do it and I think REvil started as well,” Wosar said.

Earlier this month, Bleeping Computer reported that the REvil ransomware operation was planning on launching crippling distributed denial of service (DDoS) attacks against victims, or making VOIP calls to victims’ customers to apply further pressure.

“Sadly, regardless of whether a ransom is paid, consumers whose data has been stolen are still at risk as there is no way of knowing if ransomware gangs delete the data as they promise,” Abrams wrote.

Read More

The post Ransom Gangs Emailing Victim Customers for Leverage appeared first on Malware Devil.



https://malwaredevil.com/2021/04/05/ransom-gangs-emailing-victim-customers-for-leverage-2/?utm_source=rss&utm_medium=rss&utm_campaign=ransom-gangs-emailing-victim-customers-for-leverage-2

Monday, April 5, 2021

LinkedIn and LOLBINs

Yet another example of how LinkedIn can be abused by the bad guys… a phishing campaign which used job titles scraped from user profiles to…

The post LinkedIn and LOLBINs appeared first on Security Boulevard.

Read More

The post LinkedIn and LOLBINs appeared first on Malware Devil.



https://malwaredevil.com/2021/04/05/linkedin-and-lolbins/?utm_source=rss&utm_medium=rss&utm_campaign=linkedin-and-lolbins

What is Third-Party Risk?

As if managing your own risk profile isn’t challenging enough today, your organization must concern itself with how …

The post What is Third-Party Risk? appeared first on Hyperproof.

The post What is Third-Party Risk? appeared first on Security Boulevard.

Read More

The post What is Third-Party Risk? appeared first on Malware Devil.



https://malwaredevil.com/2021/04/05/what-is-third-party-risk/?utm_source=rss&utm_medium=rss&utm_campaign=what-is-third-party-risk

Personal Info for More Than Half a Billion Facebook Users Leaked Online

Someone leaked the phone numbers and personal information for over half a billion Facebook users online. Alon Gal, CTO at cybercrime intelligence firm Hudson Rock, tweeted out that someone had dumped hundreds of millions of Facebook records onto a hacking forum: 

The post Personal Info for More Than Half a Billion Facebook Users Leaked Online appeared first on Security Boulevard.

Read More

The post Personal Info for More Than Half a Billion Facebook Users Leaked Online appeared first on Malware Devil.



https://malwaredevil.com/2021/04/05/personal-info-for-more-than-half-a-billion-facebook-users-leaked-online/?utm_source=rss&utm_medium=rss&utm_campaign=personal-info-for-more-than-half-a-billion-facebook-users-leaked-online

Getting to Know DevSecOps

You’ve probably heard the term DevSecOps  thrown around a lot in recent years, and for good reasons. The …

The post Getting to Know DevSecOps appeared first on Hyperproof.

The post Getting to Know DevSecOps appeared first on Security Boulevard.

Read More

The post Getting to Know DevSecOps appeared first on Malware Devil.



https://malwaredevil.com/2021/04/05/getting-to-know-devsecops/?utm_source=rss&utm_medium=rss&utm_campaign=getting-to-know-devsecops

Online Course: Cloud Top Ten Risks

I am pleased to report that the fourth course for the University of Minnesota in my online Cloud Cybersecurity specialization, Cloud Top Ten Risks, is now available for registration. The course itself should be running in a week or two, depending on internal processes at Coursera.

The post Online Course: Cloud Top Ten Risks appeared first on Security Boulevard.

Read More

The post Online Course: Cloud Top Ten Risks appeared first on Malware Devil.



https://malwaredevil.com/2021/04/05/online-course-cloud-top-ten-risks/?utm_source=rss&utm_medium=rss&utm_campaign=online-course-cloud-top-ten-risks

Parent/Child Agreement Contract

Nowadays having an online agreement or a set of rules that guides both a child and parent on online usage and expectations makes a lot of sense.  It also allows an opportunity for both the parent and child to talk about the components that are in the contract as a way to dialog about the importance of being in the digital world.

The post Parent/Child Agreement Contract appeared first on Security Boulevard.

Read More

The post Parent/Child Agreement Contract appeared first on Malware Devil.



https://malwaredevil.com/2021/04/05/parent-child-agreement-contract/?utm_source=rss&utm_medium=rss&utm_campaign=parent-child-agreement-contract

Ransom Gangs Emailing Victim Customers for Leverage

Some of the top ransomware gangs are deploying a new pressure tactic to push more victim organizations into paying an extortion demand: Emailing the victim’s customers and partners directly, warning that their data will be leaked to the dark web unless they can convince the victim firm to pay up.

The post Ransom Gangs Emailing Victim Customers for Leverage appeared first on Security Boulevard.

Read More

The post Ransom Gangs Emailing Victim Customers for Leverage appeared first on Malware Devil.



https://malwaredevil.com/2021/04/05/ransom-gangs-emailing-victim-customers-for-leverage/?utm_source=rss&utm_medium=rss&utm_campaign=ransom-gangs-emailing-victim-customers-for-leverage

Workforce Cyber Intelligence 101: An Overview

Learn about the components of “workforce cyber intelligence” and how it can enable you to empower and protect your employees in this blog series from DTEX.

The post Workforce Cyber Intelligence 101: An Overview appeared first on Dtex Systems Inc.

The post Workforce Cyber Intelligence 101: An Overview appeared first on Security Boulevard.

Read More

The post Workforce Cyber Intelligence 101: An Overview appeared first on Malware Devil.



https://malwaredevil.com/2021/04/05/workforce-cyber-intelligence-101-an-overview/?utm_source=rss&utm_medium=rss&utm_campaign=workforce-cyber-intelligence-101-an-overview

Introducing LogRhythm 7.7: Improving the Analyst Experience with Detail Page and Timeline View

Security analysts are constantly challenged to investigate security incidents and mitigate them quickly. But does your security operations center (SOC) have the full picture of what’s occurring in the environment to remediate the impact of a false negative? LogRhythm is…

The post Introducing LogRhythm 7.7: Improving the Analyst Experience with Detail Page and Timeline View appeared first on LogRhythm.

The post Introducing LogRhythm 7.7: Improving the Analyst Experience with Detail Page and Timeline View appeared first on Security Boulevard.

Read More

The post Introducing LogRhythm 7.7: Improving the Analyst Experience with Detail Page and Timeline View appeared first on Malware Devil.



https://malwaredevil.com/2021/04/05/introducing-logrhythm-7-7-improving-the-analyst-experience-with-detail-page-and-timeline-view/?utm_source=rss&utm_medium=rss&utm_campaign=introducing-logrhythm-7-7-improving-the-analyst-experience-with-detail-page-and-timeline-view

A week in security (March 29 – April 4)

Last week on Malwarebytes Labs, our podcast featured Malwarebytes senior security researcher JP Taggart, who talked to us about why you need to trust your VPN.

You’ve likely heard the benefits of using a VPN: You can watch TV shows restricted to certain countries, you can encrypt your web traffic on public WiFi networks, and, importantly, you can obscure your Internet activity from your Internet Service Provider, which may use that activity for advertising.

But obscuring your Internet activity—including the websites you visit, the searches you make, the files you download—doesn’t mean that a VPN magically disappears those things. It just means that the VPN itself gets to see that information instead.

On Malwarebytes Labs, we also wrote about six social media safety sins to say goodbye to, and we advised Steam users not to fall for the “I accidentally reported” scam that is making rounds right now. We also covered how a 5G slicing vulnerability could be used in DoS attacks, the one reason your iPhone needs a VPN, what you need to know about malicious commits found in PHP code repository, the latest ransomware attacking schools, called PYSA, and we tried to report on the npm netmask vulnerability in a way that anyone can actually understand it.

Finally, we looked at the latest Android “System Update” malware that steals photos, videos, GPS location, and we thought it was time to cool down some fervor and say that, you know what, Internet password books are OK.

Other Cybersecurity news:

Stay safe!

The post A week in security (March 29 – April 4) appeared first on Malwarebytes Labs.

The post A week in security (March 29 – April 4) appeared first on Malware Devil.



https://malwaredevil.com/2021/04/05/a-week-in-security-march-29-april-4-3/?utm_source=rss&utm_medium=rss&utm_campaign=a-week-in-security-march-29-april-4-3

Joy Of Tech® ‘Zuckerberg And His Leaks’

via the Comic Noggins of Nitrozac and Snaggy at The Joy of Tech® !

via the Comic Noggins of Nitrozac and Snaggy at The Joy of Tech®!

Permalink

The post Joy Of Tech® ‘Zuckerberg And His Leaks’ appeared first on Security Boulevard.

Read More

The post Joy Of Tech® ‘Zuckerberg And His Leaks’ appeared first on Malware Devil.



https://malwaredevil.com/2021/04/05/joy-of-tech-zuckerberg-and-his-leaks/?utm_source=rss&utm_medium=rss&utm_campaign=joy-of-tech-zuckerberg-and-his-leaks

A week in security (March 29 – April 4)

Last week on Malwarebytes Labs, our podcast featured Malwarebytes senior security researcher JP Taggart, who talked to us about why you need to trust your VPN.

You’ve likely heard the benefits of using a VPN: You can watch TV shows restricted to certain countries, you can encrypt your web traffic on public WiFi networks, and, importantly, you can obscure your Internet activity from your Internet Service Provider, which may use that activity for advertising.

But obscuring your Internet activity—including the websites you visit, the searches you make, the files you download—doesn’t mean that a VPN magically disappears those things. It just means that the VPN itself gets to see that information instead.

On Malwarebytes Labs, we also wrote about six social media safety sins to say goodbye to, and we advised Steam users not to fall for the “I accidentally reported” scam that is making rounds right now. We also covered how a 5G slicing vulnerability could be used in DoS attacks, the one reason your iPhone needs a VPN, what you need to know about malicious commits found in PHP code repository, the latest ransomware attacking schools, called PYSA, and we tried to report on the npm netmask vulnerability in a way that anyone can actually understand it.

Finally, we looked at the latest Android “System Update” malware that steals photos, videos, GPS location, and we thought it was time to cool down some fervor and say that, you know what, Internet password books are OK.

Other Cybersecurity news:

Stay safe!

The post A week in security (March 29 – April 4) appeared first on Malwarebytes Labs.

The post A week in security (March 29 – April 4) appeared first on Malware Devil.



https://malwaredevil.com/2021/04/05/a-week-in-security-march-29-april-4-2/?utm_source=rss&utm_medium=rss&utm_campaign=a-week-in-security-march-29-april-4-2

A week in security (March 29 – April 4)

Last week on Malwarebytes Labs, our podcast featured Malwarebytes senior security researcher JP Taggart, who talked to us about why you need to trust your VPN.

You’ve likely heard the benefits of using a VPN: You can watch TV shows restricted to certain countries, you can encrypt your web traffic on public WiFi networks, and, importantly, you can obscure your Internet activity from your Internet Service Provider, which may use that activity for advertising.

But obscuring your Internet activity—including the websites you visit, the searches you make, the files you download—doesn’t mean that a VPN magically disappears those things. It just means that the VPN itself gets to see that information instead.

On Malwarebytes Labs, we also wrote about six social media safety sins to say goodbye to, and we advised Steam users not to fall for the “I accidentally reported” scam that is making rounds right now. We also covered how a 5G slicing vulnerability could be used in DoS attacks, the one reason your iPhone needs a VPN, what you need to know about malicious commits found in PHP code repository, the latest ransomware attacking schools, called PYSA, and we tried to report on the npm netmask vulnerability in a way that anyone can actually understand it.

Finally, we looked at the latest Android “System Update” malware that steals photos, videos, GPS location, and we thought it was time to cool down some fervor and say that, you know what, Internet password books are OK.

Other Cybersecurity news:

Stay safe!

The post A week in security (March 29 – April 4) appeared first on Malwarebytes Labs.

The post A week in security (March 29 – April 4) appeared first on Malware Devil.



https://malwaredevil.com/2021/04/05/a-week-in-security-march-29-april-4/?utm_source=rss&utm_medium=rss&utm_campaign=a-week-in-security-march-29-april-4

CERIAS – Randall Brooks’ Cyber Supply Chain Risk Management (SCRM) And Its Impact On Information And Operational Technology’

Many thanks to CERIAS Purdue University for publishing their outstanding videos on the organization’s YouTube channel. Enjoy and Be Educated Simultaneously!

Permalink

The post CERIAS – Randall Brooks’ Cyber Supply Chain Risk Management (SCRM) And Its Impact On Information And Operational Technology’ appeared first on Security Boulevard.

Read More

The post CERIAS – Randall Brooks’ Cyber Supply Chain Risk Management (SCRM) And Its Impact On Information And Operational Technology’ appeared first on Malware Devil.



https://malwaredevil.com/2021/04/05/cerias-randall-brooks-cyber-supply-chain-risk-management-scrm-and-its-impact-on-information-and-operational-technology/?utm_source=rss&utm_medium=rss&utm_campaign=cerias-randall-brooks-cyber-supply-chain-risk-management-scrm-and-its-impact-on-information-and-operational-technology

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...