Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for How much does access ...

 Business

When the media reports about a company being attacked by ransomware, many folks imagine that cunning hackers first wrote dangerous malware, then searched long and hard for a way to hack the company, and finally encrypted its confidential data. Because of this, some business owners are still convinced that their   show more ...

company is not interesting enough for attackers to spend so much resources on hacking it. In reality, things couldnt be more different. A modern attacker in fact doesnt write the malware himself, but rents it, and he doesnt spend resources on hacking — he simply goes to the shadow market of initial access brokers. Experts in our Digital Footprint Intelligence service decided to find out how much money changes hands when cybercriminals buy and sell access to company infrastructure. How much for access? So how much do attackers spend when buying access to your infrastructure? This depends on many factors, but the most significant one is your companys revenue. After analyzing about two hundred adverts on the darknet, our experts came to the following conclusions: most ads offer access to small companies; almost half the ads offer access for less than $1000; cases where access is sold for more than $5000 are quite rare; the average cost of access to large companies ranges between $2000 to $4000. For sure, those are hardly enormous sums of money. But ransomware operators expect to reap in much greater sums from their blackmailing endeavors, so they are at least willing to spend this much on initial access. It seems to be the market price thats been settled on through organic supply-and-demand and widely-known purchasing power. Whats for sale? Attackers offer different types of access. Sometimes its information about a vulnerability that can be exploited for access. Other times its credentials for accessing Citrix or the sites hosting panel. But in the vast majority of cases (in more than 75% of ads) they offer a variant of access via RDP (sometimes in conjunction with a VPN). Accordingly this option of remote access to the companys infrastructure should be treated with increased attention. Where do the bad guys get hold of access? There are many options for obtaining initial access. Sometimes cybercriminals use the simplest way: password mining. But most often they send phishing emails to employees, or emails with malicious attachments (spyware, or, for example, stealers, which automatically collect credentials, authorization tokens, cookies, and so on from infected devices). Sometimes attackers also exploit known vulnerabilities in software before administrators patch it. Detailed results of the study, with examples of real initial access ads, can be found in the report on the Securelist website. How to stay safe? Since most often the subject of sale is remote access to a companys infrastructure via RDP, it is this that should be protected first of all. Our experts give the following recommendations: organize RDP access only through VPN; use strong passwords; use Network Level Authentication (if possible); use two-factor authentication for all critical services. In order to make passwords less likely to be leaked through phishing, its also recommended to use reliable security solutions with an anti-phishing engine both on employee devices and at the mail gateway level. And to be on the safe side, periodically raise your personnel's cybersecurity awareness. In addition, its quite useful to find out if someone is already discussing ways of accessing your companys infrastructure on the darknet, so monitoring such activity is advised. It is such monitoring that our Digital Footprint Intelligence service carries out.

 Malware and Vulnerabilities

A report has uncovered that threat actors could reach users’ crypto-keys by launching a side-channel attack named Hertzbleed. Independent advisories have been issued by the firms. Intel and AMD have no plans to release microcode patches to address this new family of side-channel attacks. Processors from ARM using the frequency scaling feature might as well affected by Hertzbleed. 

 Govt., Critical Infrastructure

The House Homeland Security appropriations subcommittee on Thursday approved a budget of $2.9 billion for the CISA, $417 million higher than the White House’s original budget request for the agency and $334 million above its fiscal 2022 allotment.

 Security Culture

The National Centers of Academic Excellence in Cybersecurity (NCAE-C) program is an initiative that recognizes US-based academic programs within colleges and universities that offer degrees and research in cybersecurity.

 Govt., Critical Infrastructure

U.S. agencies are instructed on how to apply network and multi-boundary security within Infrastructure-, Platform-, Software- and Email-as-a-Service cloud environments in the guidance.

 Identity Theft, Fraud, Scams

The scammers have borrowed the DHL company brand — even going so far as to mimic its colors, logo, and web design. Netizens have also reported receiving phishing emails from scammers posing as USPS.

 Trends, Reports, Analysis

Conti leaked financial information in its first dump of data in 81% of attacks, according to a Rapid7 report, whereas Cl0p only leaked it in 30%. Cl0p leaked employee personal information in 70% of its first leaks, while Conti only leaked it in 27%.

 Identity Theft, Fraud, Scams

Menlo Labs analysts were able to confirm that a campaign with the unique string of “DH4 VIP3R L337” had leveraged 147 unique lures to steal the credentials of 164 users spanning various companies, from financial services to cybersecurity firms.

 Security Culture

The new degree program will start in Fall 2023 to meet the growing demand for computer science professionals. The number of jobs in the cybersecurity industry is expected to grow by more than 30 percent in the next decade.

 Identity Theft, Fraud, Scams

Cybercriminals are using monkeypox outbreaks to fool victims into disclosing their personal information. Monkeypox is high on the news agenda and has people’s attention. The email claims that their organization has been monitoring the spread of the disease in the local area, and the updates provided by the local health officials, the CDC, and WHO.

 Malware and Vulnerabilities

In a new initiative, the BlackCat group has begun publishing details of victims on websites open to the public Internet, with the data available in a searchable form. It has already listed 112GB of stolen data, including Social Security numbers, from 1,500 employees of a hotel and spa in Oregon.

 Malware and Vulnerabilities

F5 Labs discovered new Android-based information-stealing malware, dubbed MaliBot. It was spotted targeting online banking and cryptocurrency wallet users in Italy and Spain. Some of the banks targeted by MaliBot using this approach include UniCredit, Santander, CaixaBank, and CartaBCC. Due to the malware's   show more ...

adaptability and the power it offers attackers over the device, it could theoretically be used for more than just stealing credentials and bitcoin.

 Feed

A sophisticated Chinese advanced persistent threat (APT) actor exploited a critical security vulnerability in Sophos' firewall product that came to light earlier this year to infiltrate an unnamed South Asian target as part of a highly-targeted attack. "The attacker implement[ed] an interesting web shell backdoor, create[d] a secondary form of persistence, and ultimately launch[ed] attacks

 Feed

WordPress websites using a widely used plugin named Ninja Forms have been updated automatically to remediate a critical security vulnerability that's suspected of having been actively exploited in the wild. The issue, which relates to a case of code injection, is rated 9.8 out of 10 for severity and affects multiple versions starting from 3.0. It has been fixed in 3.0.34.2, 3.1.10, 3.2.28,

 Feed

An enterprise-grade surveillanceware dubbed Hermit has been put to use by entities operating from within Kazakhstan, Syria, and Italy over the years since 2019, new research has revealed. Lookout attributed the spy software, which is equipped to target both Android and iOS, to an Italian company named RCS Lab S.p.A and Tykelab Srl, a telecom services provider which it suspects to be a front

 Feed

It was first the pandemic that changed the usual state of work - before, it was commuting, working in the office & coming home for most corporate employees. Then, when we had to adapt to the self-isolation rules, the work moved to home offices, which completely changed the workflow for many businesses.As the pandemic went down, we realized success never relied on where the work was done. Whether

 Guest blog

With Father's Day falling this weekend in the United States and UK, more people might be more willing than normal to believe the latest scam to be spreading via WhatsApp is true. But I'm afraid it isn't. Sorry dads, Heineken isn't giving away free coolers of beer. Read more in my article on the Hot for Security blog.

 Guest blog

Owners of NAS drives manufactured by QNAP have been advised that the company is "thoroughly investigating" reports that a new variant of the DeadBolt ransomware is targeting devices, locking up data and demanding victims pay a fee to extortionists. Read more in my article on the Hot for Security blog.

2022-06
WED
THU
FRI
SAT
SUN
MON
TUE
JuneJulyAugust