When ransomware enters a corporate network, it usually does so through e-mail, software vulnerabilities, or unprotected remote connections. Having an insider deliberately deploy malware seems implausible. However, as real-world evidence shows, some attackers think this method of delivering ransomware is effective, and show more ...
some attackers are now recruiting company employees by offering them a percentage of the ransom. A creative delivery scheme As absurd as it may sound, some seek out accomplices through spam. For example, one message directly offers “40%, $1 million in bitcoin” to anyone willing to install and deploy DemonWare ransomware on their organization’s main Windows server. Researchers masquerading as interested accomplices received a link to a file along with instructions for launching the malware. However, the person behind the mailing was apparently an inexperienced cybercriminal; the researchers had no trouble getting him to talk. The threat actor in question was a young Nigerian man who had scoured LinkedIn, looking for senior executives to contact. He abandoned his original plan — e-mailing malware — once he realized how strong corporate cybersecurity systems are. What’s wrong with the scheme? To convince his targets their participation would be safe, the threat actor claimed the ransomware would erase all evidence of the crime, including any potential security footage, and recommended deleting the executable file to avoid leaving any clues. One might expect the criminal planned to trick his accomplices — arguably, once the server was encrypted, he would not care what happened to the person who did it — but he doesn’t appear to have understood how digital forensics investigations work. The decision to use DemonWare also betrayed his inexperience. Although attackers do still use DemonWare, it is actually rather unsophisticated malware whose source code is available on GitHub. The malware’s creator allegedly made it to demonstrate how easy it is to write ransomware. How to stay safe Although this example is just that — one specific example — insiders taking part in a ransomware attack is entirely realistic. Far more likely than someone launching malware on a network, however, is a scenario in which someone sells access to an organization’s information system. The market for access to corporate networks has long existed on the dark web, and ransomers often purchase access from other cybercriminals — so-called Initial Access Brokers. It’s they who may be specifically interested in buying data for remote access to the organization’s network or cloud servers. Ads for such purchases aimed at disgruntled or fired employees float around the dark web. To ensure no one jeopardizes your company’s security by letting ransomers into its networks, we recommend you: Adopt a strategy of least privilege; Keep careful records of access attempts to the organization’s network and servers, and revoke rights and change passwords when employees are dismissed; Install on every server security solutions that can counter today’s malware; Use Managed Detection and Response solutions, which help identify suspicious activity in your infrastructure before attackers have a chance to inflict serious damage.
This latest discovery comes after news broke over the weekend that the Razer Synapse software can be used to gain elevated privileges when connecting a Razer mouse or keyboard.
Cloudflare claimed to have deflected the largest volumetric DDoS attack directed at a financial service firm. It saw 17.2 million requests generated per second from 20,000 bots spread across 125 countries.
Every attack allows attackers to gain more knowledge about OT systems, including their operations, physical processes, and technology. This knowledge allows attackers to enhance their capabilities.
These fake support reps provide private "support" to OpenSea users needing help, which invariably leads to the loss of cryptocurrency and NFT collectibles stored in the victim's MetaMask wallets.
Recent incidents have shown that software supply chain cyberattacks aren’t going away anytime soon. As such, it’s up to software vendors to secure their products. This requires a holistic approach.
A data breach at Chico State University exposed the personal information of students who requested COVID-19 vaccination religious exemptions. The information was posted on an anonymous online forum.
According to Sina Tech, the Sanjiangkou Police in the eastern Chinese city of Putian are now investigating the EV company Nio for assisting in the destruction and forgery of evidence.
The vulnerability exists within the ConnectedPDF service, implemented by the FoxitPhantomConnectedPDFService.exe binary. An attacker can create a specially crafted PDF file to abuse this flaw.
The Boston-based company announced a new free-of-charge cloud application to help organizations identify and measure their ability to effectively recover in the event of a ransomware attack.
A PowerShell script used by the Pysa ransomware operation gives us a sneak peek at the types of data they attempt to steal during a cyberattack. The threat actors use the stolen data in multiple ways.
From 2017 to June 30, 2021, the FTC received over 800,000 consumer reports from service members, including veterans, active duty, reservists, and their families. Total losses tally up to $822 million.
Despite security improvements over the last seven years, the U.S. Agency for International Development (USAID) needs to better protect personally identifiable data, according to an OIG report.
Trend Micro researchers recently detected an aggressive malware distribution campaign delivering LokiBot via multiple techniques, including the exploitation of older vulnerabilities.
“You will definitely be seeing a set of concrete announcements” from both the federal government and the private sector, a senior administration official told reporters on Tuesday.
BLUELIGHT malware was discovered being delivered to a victim alongside RokRAT. RokRAT is a backdoor previously attributed to use by ScarCruft/APT37, which is also known as InkySquid.
Class action lawsuits have been filed against T-Mobile over the recently disclosed data breach that has been confirmed to impact more than 50 million of the company’s customers.
US Secret Service officials, who were called in to investigate the incident, told Peterborough officials that the stolen funds had been laundered and converted to cryptocurrency.
It comes as Congress weighs new legislation concerning data breach notification laws and cybersecurity insurance industry regulation, historically viewed as two of the most consequential policy areas.
A computer retail company based in the U.S. was the target of SideWalk backdoor as part of a recent campaign undertaken by a Chinese APT group primarily known for targeting East and Southeast Asia.
Businesses the world over have been faced with rising levels of opportunist criminals preying on vulnerabilities during the pandemic, and the financial services sector didn’t go unscathed.
"This malicious program has been detected in eight Play Store applications that Google has suppressed," say the Belgian authorities in a statement published this Friday on their website.
He impersonated an Apple customer support technician in a socially engineered email campaign that stole people’s iCloud passwords to break into accounts and collect their private photos and videos.
DirtyMoe’s attack chain begins with the attackers attempting to gain admin privileges on a target’s Windows machine. It often relies on the PurpleFox exploit kit to misuse EternalBlue.
The previously undocumented malware has been dubbed "Sardonic" by Bitdefender, which it encountered during a forensic investigation in the wake of an unsuccessful attack carried out by FIN8.
The vulnerability ties the decryption of SM2 encrypted data, the changes depend on the targeted application and data it maintains (i.e. credentials) in the heap while the issue is exploited.
According to VMware, an unauthenticated attacker who has network access to the vRealize Operations Manager API could exploit the vulnerability to add new nodes to an existing vROps cluster.
EITest was first identified in 2014 and historically used large numbers of compromised WordPress sites and social engineering techniques to trick users into downloading malware.
Mirai-based botnet operators were found exploiting a new security flaw in the Realtek SDK, impacting hundreds of thousands of devices worldwide. The vulnerabilities were spotted in Realtek chipsets just two days ago. Vulnerable device owners are recommended to apply the patch as soon as possible.
A set of malware campaigns have been discovered spreading commodity RATs and using a .NET-based crypter service 3losh to target travel and hospitality businesses in Latin America. These campaigns use either compromised or attacker-controlled websites to host their tools and payloads. Furthermore, security analysts stumbled across multiple campaigns using the same 3losh crypter and infection scripts to spread RATs.
Mozi, a P2P botnet known to target IoT products, has gained new capabilities to aim at network gateways created by Huawei, Netgear, and ZTE. Mozi propagates by exploiting weak and default remote access passwords and unpatched vulnerabilities. The key security recommendation is always to use a strong password and regularly update the firmware of the network devices.
Proofpoint researchers observed an increase in COVID-19 related threats since late June 2021. They observed high-volume COVID-19 related campaigns from RustyBuer, Formbook, and Ave Maria malware.
Ubuntu Security Notice 5051-1 - John Ouyang discovered that OpenSSL incorrectly handled decrypting SM2 data. A remote attacker could use this issue to cause applications using OpenSSL to crash, resulting in a denial of service, or possibly change application behaviour. Ingo Schwarze discovered that OpenSSL incorrectly show more ...
handled certain ASN.1 strings. A remote attacker could use this issue to cause OpenSSL to crash, resulting in a denial of service, or possibly obtain sensitive information. Various other issues were also addressed.
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.
Ubuntu Security Notice 5037-2 - USN-5037-1 fixed vulnerabilities in Firefox. The update introduced a regression that caused Firefox to repeatedly prompt for a password. This update fixes the problem. Multiple security issues were discovered in Firefox. If a user were tricked into opening a specially crafted website, show more ...
an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, trick a user into accepting unwanted permissions, or execute arbitrary code. Various other issues were also addressed.
A computer retail company based in the U.S. was the target of a previously undiscovered implant called SideWalk as part of a recent campaign undertaken by a Chinese advanced persistent threat group primarily known for singling out entities in East and Southeast Asia. Slovak cybersecurity firm ESET attributed the malware to an advanced persistent threat it tracks under the moniker SparklingGoblin
I'm sure you would agree that, in today's digital world, the majority of applications we work on require some type of credentials – to connect to a database with a username/password, to access computer programs via authorized tokens, or API keys to invoke services for authentication. Credentials, or sometimes just referred to as 'Secrets,' are pieces of user or system-level confidential
A financially motivated threat actor notorious for setting its sights on retail, hospitality, and entertainment industries has been observed deploying a completely new backdoor on infected systems, indicating the operators are continuously retooling their malware arsenal to avoid detection and stay under the radar. The previously undocumented malware has been dubbed "Sardonic" by Romanian
Cybersecurity researchers have disclosed five previously unreported security vulnerabilities affecting B. Braun's Infusomat Space Large Volume Pump and SpaceStation that could be abused by malicious parties to tamper with medication doses without any prior authentication. McAfee, which discovered and reported the flaws to the German medical and pharmaceutical device company on January 11, 2021,
Graham Cluley Security News is sponsored this week by the folks at 1Password. Thanks to the great team there for their support! The shift to remote and hybrid work has introduced new vulnerabilities, putting your critical data at risk. With less oversight into security protocols and the behavior of your staff, it’s show more ...
more important than … Continue reading "Build and improve your company’s culture of security with 1Password"
A 40-year-old man has agreed to plead guilty to US court charges that he broke into thousands of Apple iCloud accounts and stole hundreds of thousands of images and videos of young women. Read more in my article on the Hot for Security blog.