A lot has changed over the past four years. We’ve seen major ransomware and wipers take the Internet by storm. Empires of bots have done everything from mining crypto to helping change how people vote. And business travel has come to a standstill thanks to a viral enemy that caused a global pandemic. As they show more ...
say, what a time to be alive. You know what hasn’t changed? Kaspersky’s Global Research and Analysis Team (GReAT) and its quest to help keep the good guys one step ahead of the bad ones in the virtual and physical world. What does that have to do with four years ago? Well, my dear readers, let me tell you. A bit over four years ago, I wrote on this very blog about an upcoming chat on Reddit with members of GReAT, who were going to jump on Reddit to answer all of your questions for roughly one, maybe two hours. Boy, was I wrong. You folks had tons of questions, and the team ended up spending more than four hours answering them (reread that chat here). Let’s just say I know how Gilligan and the crew felt about the Skipper’s “three hour tour.” As I said, a lot has changed in four years. Then again, some things haven’t: On November 12, we will be hosting AMA with GReAT 2.0, another chance to ask the team absolutely anything. Wondering what router Costin uses in his home? How Vitaly can play Doom in YARA? Or how Brian is able to wrangle APTs and chickens? Well, your chance to find out is coming. Join us on November 12 at 7:00 PM GMT, when Costin Raiu, Vitaly Kamluk, Brian Bartholomew, Noushin Shabab, Aseel Kayal, Ivan Kwiatkowski, Maria Namestnikova, Dmitry Bestuzhev, Den Demeter, Igor Kuznetsov, and Kurt Baumgartner will field any and all questions in the forum. Be sure to follow us on Twitter, where we will post the link for you to log in to Reddit and ask us anything.
On Monday, Oct. 26, KrebsOnSecurity began following up on a tip from a reliable source that an aggressive Russian cybercriminal gang known for deploying ransomware was preparing to disrupt information technology systems at hundreds of hospitals, clinics and medical care facilities across the United States. Today, show more ...
officials from the FBI and the U.S. Department of Homeland Security hastily assembled a conference call with healthcare industry executives warning about an “imminent cybercrime threat to U.S. hospitals and healthcare providers.” The agencies on the conference call, which included the U.S. Department of Health and Human Services (HHS), warned participants about “credible information of an increased and imminent cybercrime threat to US hospitals and healthcare providers.” The agencies said they were sharing the information “to provide warning to healthcare providers to ensure that they take timely and reasonable precautions to protect their networks from these threats.” The warning came less than 24 hours after this author received a tip from Alex Holden, founder of Milwaukee-based cyber intelligence firm Hold Security. Holden said he saw online communications this week between cybercriminals affiliated with a Russian-speaking ransomware group known as Ryuk in which group members discussed plans to deploy ransomware at more than 400 healthcare facilities in the U.S. One participant on the government conference call today said the agencies offered few concrete details of how healthcare organizations might better protect themselves against this threat actor or purported malware campaign. “They didn’t share any IoCs [indicators of compromise], so it’s just been ‘patch your systems and report anything suspicious’,” said a healthcare industry veteran who sat in on the discussion. However, others on the call said IoCs may be of little help for hospitals that have already been infiltrated by Ryuk. That’s because the malware infrastructure used by the Ryuk gang is often unique to each victim, including everything from the Microsoft Windows executable files that get dropped on the infected hosts to the so-called “command and control” servers used to transmit data between and among compromised systems. Nevertheless, cybersecurity incident response firm Mandiant today released a list of domains and Internet addresses used by Ryuk in previous attacks throughout 2020 and up to the present day. Mandiant refers to the group by the threat actor classification “UNC1878,” and aired a webcast today detailing some of Ryuk’s latest exploitation tactics. Charles Carmakal, senior vice president for Mandiant, told Reuters that UNC1878 is one of most brazen, heartless, and disruptive threat actors he’s observed over the course of his career. “Multiple hospitals have already been significantly impacted by Ryuk ransomware and their networks have been taken offline,” Carmakal said. One health industry veteran who participated in the call today and who spoke with KrebsOnSecurity on condition of anonymity said if there truly are hundreds of medical facilities at imminent risk here, that would seem to go beyond the scope of any one hospital group and may implicate some kind of electronic health record provider that integrates with many care facilities. So far, however, nothing like hundreds of facilities have publicly reported ransomware incidents. But there have been a handful of hospitals dealing with ransomware attacks in the past few days. –Becker’s Hospital Review reported today that a ransomware attack hit Klamath Falls, Ore.-based Sky Lakes Medical Center’s computer systems. –WWNY’s Channel 7 News in New York reported yesterday that a Ryuk ransomware attack on St. Lawrence Health System led to computer infections at Caton-Potsdam, Messena and Gouverneur hospitals. –SWNewsMedia.com on Monday reported on “unidentified network activity” that caused disruption to certain operations at Ridgeview Medical Center in Waconia, Minn. SWNews says Ridgeview’s system includes Chaska’s Two Twelve Medical Center, three hospitals, clinics and other emergency and long-term care sites around the metro area. This is a developing story. Stay tuned for further updates. Update, 10:11 p.m. ET: The FBI, DHS and HHS just jointly issued an alert about this, available here.
Emotet, a notorious malware threat, got a superficial facelift this week, hiding within a fake Microsoft Office request asking users to update Microsoft Word to take advantage of new features.
Cybersecurity leaders continue to grapple with issues that most CISOs face – fending off growing and evolving threats, raising awareness on phishing attacks and ransomware, and locking down access.
According to researchers, more than 100,000 Windows systems have not yet been updated to protect against a previously-patched, critical, and wormable flaw in Windows called SMBGhost.
Even after the kill switch was found, the ransomware continued to ravage every system and all the data it touched — attacking computer systems of 300 organizations in 150 countries.
The phishing document, which was uploaded to a free code hosting website (notabug.org), uses template injection to download and execute a remote template weaponized with a malicious macro.
A study by Positive Technologies showed the presence of high-risk vulnerabilities at most companies. However, half of these vulnerabilities can be eliminated by installing the latest software updates.
The Ryuk ransomware operators are increasingly relying on a malware-as-a-service tool - the Buer loader - to deliver the malware, rather than botnets such as Trickbot and Emotet, according to Sophos.
For the future of securing connected devices, stakeholders throughout the supply chain need to be held accountable for better visibility and security to guarantee adequate protection for end-users.
?The Maze cybercrime gang, which began operating in May 2019, is shutting down its operations after rising to become one of the most prominent players performing ransomware attacks.
Like almost all ransomware gangs today, REvil runs a ransomware-as-a-service (RaaS) operation. They are driven by profit and want to make $2 billion from their ransomware service.
Enso Security, a Tel Aviv-based startup that is building a new application security posture management platform, today announced that it has raised a $6 million seed funding round led by YL Ventures.
The so-called UNC 1878 hacking group, which is reportedly behind a string of ransomware attacks on hospitals, seems to have risen from the dead, again using its malware family of choice, Ryuk.
The operators conducting these campaigns have actively targeted hospitals, retirement communities, and medical centers, even in the midst of the ongoing global health crisis.
In the final days of voting, election officials and cybersecurity experts are keeping a close eye on a range of possible ways foreign governments and other hackers could interfere.
Caller ID spoofing, a technique used by scammers, is when someone calling your phone deliberately falsifies the information transmitted to your caller ID display to disguise their identity.
By making a commitment to a unified approach to security, then doing what's necessary to operationalize it, organizations can establish a better security model for the next normal.
The US FBI, DHS, and HHS issued a joint alert Wednesday warning of an "imminent" increase in ransomware attacks and other cyber threats against hospitals and healthcare providers.
In the past few years, the use of automation in many spheres of cybersecurity has increased dramatically, but penetration testing has remained stubbornly immune to it due to several issues.
Palo Alto Networks found that 27,000 newly parked domains are on average identified daily. Overall, the firm has identified 5 million newly parked domains in the past six months.
Today, multiple reports have emerged from Home Depot customers in Canada stating that the company had sent them hundreds of emails containing order information of strangers.
The security flaws in Hörmann gateway devices can be exploited for both attacks that require access to the local network and attacks that can be launched remotely from the internet.
A dashboard for one of the app’s databases was exposed to the internet without a password, allowing anyone to read, browse and search the database — including private user data.
Barracuda Networks' latest analysis found that in the period from June to September 2020, over 1000 schools, colleges, and universities faced more than 3.5 million spear-phishing attacks.
The remote code execution flaw (CVE-2020-14882) may allow unauthenticated attackers with network access via HTTP to achieve total compromise and takeover of vulnerable Oracle WebLogic Servers.
Ransomware attacks have become an all-too-familiar reality for hospitals just as COVID-19 has forced many to spread themselves thin and accelerated the adoption of virtual care.
According to a survey from cybersecurity firm Netwrix, organizations in the financial sector are most concerned about security incidents and exhibited severe changes in their cybersecurity priorities.
The Canberra-based cybersecurity firm archTIS has got on the acquisition trail. The company announced it will acquire Nuclear Cyber in a share-based deal valued at $9.75 million.
As citizens across the world have celebrated those on the front line of healthcare, malicious actors have seized the opportunity to take advantage of pandemic-caused disruption.
Sweden’s leading security firm Gunnebo AB suffered a ransomware attack, and the hackers have posted the stolen data on the dark web. Reportedly, the company’s servers were compromised in August 2020.
A life insurance company that suffered three separate data breaches in one year has agreed to pay a $1 million settlement for breaking US healthcare data privacy regulations.
Security researchers stumbled across the new variant of Mirai botnet, which is still in development mode, infecting hundreds of devices by exploiting old security vulnerabilities.
Several law firms have been under attack in recent times. The immigration law firm, Fragomen, disclosed a leak of sensitive information of current and former Google employees.
While some of the sites don’t seem to be directly related to fake online shops, 39 fraudulent sites were found claiming to sell Garden of Life products, dog food, and book resellers.
The FBI and CISA released a joint alert against threat actors using Mimikatz, primarily developed for penetration testers, to obtain login credentials from internet-facing domain controllers.
According to a report published by Accenture Cyber Threat Intelligence (ACTI), Russia-linked cyber-espionage group Turla has hacked into the systems of an undisclosed European government organization.
Microsoft rushed to take action on Wednesday after Defender Advanced Threat Protection (ATP) users reported getting Cobalt Strike and Mimikatz alerts that turned out to be false positives.
Ubuntu Security Notice 4610-1 - It was discovered that fastd did not properly handle receive buffers under certain circumstances. A remote attacker could possibly use this issue to cause a memory leak, resulting in a denial of service.
Microsoft Edge suffers from information disclosure and remote code execution vulnerabilities. Affected builds include 85.0.564.83, 85.0.564.86, 85.0.564.70, 86.0.622.38, 86.0.622.43, 86.0.622.48, 86.0.622.51, and 86.0.622.56.
Red Hat Security Advisory 2020-4401-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This asynchronous patch is a security update for Red Hat JBoss Enterprise Application Platform 7.3 for Red Hat Enterprise Linux 6, 7, and 8. Issues addressed include an XML injection vulnerability.
Ubuntu Security Notice 4609-1 - Fabian Henneke discovered that GOsa incorrectly handled client cookies. An authenticated user could exploit this with a crafted cookie to perform file deletions in the context of the user account that runs the web server. It was discovered that GOsa incorrectly handled user access show more ...
control. A remote attacker could use this issue to log into any account with a username containing the word "success". Various other issues were also addressed.
Red Hat Security Advisory 2020-4402-01 - Red Hat JBoss Enterprise Application Platform 7.3 is a platform for Java applications based on the WildFly application runtime. This asynchronous patch is a security update for Red Hat JBoss Enterprise Application Platform 7.3. Issues addressed include an XML injection vulnerability.
The US Federal Bureau of Investigation (FBI), Departments of Homeland Security, and Health and Human Services (HHS) issued a joint alert Wednesday warning of an "imminent" increase in ransomware and other cyberattacks against hospitals and healthcare providers. "Malicious cyber actors are targeting the [Healthcare and Public Health] Sector with TrickBot malware, often leading to ransomware
An active botnet comprising hundreds of thousands of hijacked systems spread across 30 countries is exploiting "dozens of known vulnerabilities" to target widely-used content management systems (CMS). The "KashmirBlack" campaign, which is believed to have started around November 2019, aims for popular CMS platforms such as WordPress, Joomla!, PrestaShop, Magneto, Drupal, Vbulletin, OsCommerence,
You've probably run into a major problem when trying to scrape Google search results. Web scraping tools allow you to extract information from a web page. Companies and coders from across the world use them to download Google's SERP data. And they work well – for a little while. After several scrapes, Google's automated security system kicks in. Then it kicks you out. The standard was to bypass
Many thanks to the great folks at Recorded Future, who have sponsored my writing for the past week. If 2020 taught the security industry anything, it is this: There has never been a better time to be a cybercriminal. From extortion ransomware to cyberespionage campaigns, adversaries are capitalizing on uncertainty, show more ...
causing chaos, and cashing in. … Continue reading "Become a security intelligence expert, with these free tools from Recorded Future"
Voting machines are under the microscope, scammers are posing as rap stars, and American politician AOC isn't the only one who's been getting into the Among Us game. All this and much more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans show more ...
Graham Cluley and Carole Theriault, joined this week by James Thomson. Plus don't miss the first part of our featured interview with LastPass's Dalia Hamzeh.
US hospitals and healthcare providers have been warned that there is evidence of a credible and imminent threat that they will be targeted by ransomware. In an alert jointly released by the FBI, the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Health and Human Services (HHS), the show more ...
agencies reveal that it has "credible information of an increased and imminent cybercrime threat to US hospitals and healthcare providers." Read more in my article on the Bitdefender Business Insights blog.
Reading Time: ~ 4 min. Nurul Mohd-Reza knows how to empathize with the customers she serves. Her work with marginalized groups as a college student, she says, helped prepare her for when the pandemic turned many of her customers’ businesses upside down last March. Here she discusses what she’s learned show more ...
after just 10 months in the industry and provides some advice for those looking to dive headfirst into something new. Tell us a little bit about your career background. How did you get to where you are today? I started working at Webroot back in January, so my time here hasn’t been long. For most of my collegiate career I worked in the Division of Student Affairs at CU Boulder, focusing specifically on leadership and development. I served as a student advisor to university officials and local businesses. And so, as time went on, I became very interested in the dynamic between people and business. From there, I knew I wanted to dive deeper into this realm but was unsure on how to get started. So after college I began working in healthcare operations. I believe what got me interested in this career path was when I attended Denver Start Up Week, which was a phenomenal experience. It opened my eyes to the unfamiliar world of customer success. Seeing how companies used technology and data to proactively understand their customer persona, and on top of that, scale engagements to fit their customer’s needs was truly insane. I thought what better way of molding my interests than being on the front lines serving as an advocate between people and product. And how did you land at Webroot specifically? It’s a funny story. I had come across this position and halfway through filling out the application I thought I might not be well-equipped for the role, so I actually ended up not finishing the application. And then a recruiter reached out to me and said they were interested in starting a conversation. It was unconventional, but I’m very grateful she reached out because it gave me an opportunity to explain my transition and why I wanted to make that jump into tech. From there, I ended up interviewing here at Webroot and it was a great experience overall. Being early on in my career, I knew I wanted to work in an environment that obviously fostered growth, professionally and personally. After speaking with my current boss, I was very optimistic about the trajectory of Webroot, as well as the vision for Customer Success and this team specifically. What are your core responsibilities as a customer retention specialist? I would say my time is split between two main responsibilities. My primary role is to oversee the renewal process for a subset of SMBC contracts projected for the quarter. On the other hand, we are a customer facing role. So handling business customer inquiries as they arise. This involves everything from advising customers on certain buying decisions to providing in-product guides. However, we are starting to shift our focus on how to effectively connect with customers throughout their lifecycle. Previously, we’ve concentrated on the renewal period which is 90 days before expiration. Now, we’re starting to expand our scope and engage with customers to create those smooth onboarding workflows, as well as push early-on adoption of the product. At the end of the day, it’s really about strategy—how do we effectively educate and guide the customer to build depth behind the product in hopes of retaining that relationship for the long haul. What would you say has been the most significant challenge of your career so far? I think one of the most significant challenges was switching to an industry I’d never worked in before. The learning curve was steep in terms of familiarizing myself with the products we offer, our workflow with all the various systems we use, and the dynamic relationships between our various partners. In Customer Success, it’s not simply about securing renewals. The process involves having to solve roadblocks in order to help a customer achieve their goal. We have to work with a range of departments to solve issues the customer is facing—whether it be from a product standpoint or a billing redundancy. So being able to learn each player’s role and then manage those relationships was obviously a challenge to begin with. It’s exciting, though. It keeps you on your feet and you get to meet a lot of new people from diverse backgrounds. Another obvious challenge was COVID-19. I had only been working in the office for about two months when the pandemic hit. Learning how to onboard remotely was new and something I had to juggle with most definitely. What skills do you feel have carried over well from your work in public affairs? I believe Customer Success is focused on building relationships with our customers—which to my advantage was a valuable skill I carried over from my work in public affairs. In this role, it’s very important to enjoy solving problems and addressing issues head-on. You have to be incredibly flexible and create some sense of fluidity in the midst of a growing que of customer requests. In my previous role, I worked with marginalized communities to combat an array of social issues. So learning how to communicate with empathy, while also moving with focus and intent was crucial and very much transcends into my current role now. Do you have a favorite part of the job after 10 months with the company? I’m optimistic about being able to refine the customer journey. I believe the beauty behind Customer Success is it’s still an unknown territory. Everywhere you look, companies have a different way and methodology on how they interact with the customer. Not to mention, the type of technology and automation coming into play is fascinating. In addition to that, our team is fairly new, which gives us a range of autonomy to create the structure and the formatting that we believe will best deliver value to our customers throughout their lifecycle. Although we are now part of a 15,000-person organization, it still feels like a start-up environment. We are constantly working to strategize and envision how we want the customer experience to evolve. To me, it’s very exciting to be at the intersection of all these moving parts. Any advice for someone in your same situation, looking to cross over into the tech industry? Well, given my experience, I’d say don’t doubt your capabilities. No experience is wasted experience. Even if you might not be the absolute perfect fit for a position, you have a breadth of skills you’ve developed over the past couple of years that will help mold you into whatever new role you’re interested in. I believe one of the best pieces of advice I was ever given was don’t close a door on yourself before the opportunity even presents itself. By saying you can’t do this, or you don’t have the skills for that, you’ve already blocked out all these great possibilities. So be open to new experiences and don’t hold back. To see what positions are available for you at OpenText, visit our careers page here. The post Employee Spotlight: Nurul Mohd-Reza, Customer Retention Specialist appeared first on Webroot Blog.