November 22, 2021

Fortify Security Team
Nov 22, 2021

Title: Wind Turbine Giant Vestas Says Data Was Compromised in Security Incident

Date Published: November 22, 2021

Excerpt: “There is no indication that the incident has impacted third party operations, including customer and supply chain operations,” the company’s Monday update states. “Vestas’ manufacturing, construction and service teams have been able to continue operations, although several operational IT systems have been shut down as a precaution. Vestas has already initiated a gradual and controlled reopening of all IT systems.”

Title: Guidance for Retailers To Prevent Websites Becoming Black Friday Cyber Traps

Date Published: November 22, 2021

Excerpt: “In total, the National Cyber Security Centre (NCSC) has identified a total of 4,151 retailers that had been compromised by hackers attempting to exploit vulnerabilities on checkout pages to divert payments and steal details. One of the key things that online retailers can do to help prevent payments and personal data being stolen is to apply the available security patches that stop cyber criminals from being able to exploit known vulnerabilities in Magento and any other software they use.”

Title: Iran’s Mahan Air Claims It Has Failed a Cyber Attack, Hackers Say the Opposite

Date Published: November 22, 2021

Excerpt: “Hooshyarane Vatan hacker group claimed responsibility for the attack and added that it was able to access internal documents, emails and reports that linked the airline to the IRGC. The group explained that the company was able to detect the security breach, but did not stop it. The tension is high between Teheran and the Western countries, the latter are blaming Iran for a series of attacks against organizations worldwide.”

Title: SEC Warning as Phishing and Vishing Attacks Mount

Date Published: November 22, 2021

Excerpt: “Con artists have used the names of real SEC employees and email messages that falsely appear to be from the SEC to trick victims into sending the fraudsters money. Impersonation of US government agencies and employees (as well as of legitimate financial services entities) is one common feature of advance fee solicitations and other fraudulent schemes,” it continued. The SEC extended the warning to any form of unsolicited communication, including emails and letters, claiming it will never ask for payments related to enforcement actions, offer to confirm trades, or seek detailed personal and financial information.”

Title: Conti Ransomware Group In-Depth Analysis

Date Published: November 18, 2021

Excerpt: “Ransomware attacks work by encrypting the victim’s business-critical data, rendering it
inaccessible. After triggering the attack, cybercriminals will offer to sell a decryption key to
the victim. If the victim doesn’t comply, they simply have to accept the catastrophic loss of
their most valuable data. Some ransomware attacks use a two-pronged strategy. Attackers will demand a ransom payment for decrypting data, and threaten to publicly publish sensitive data if the ransom
is not paid by a certain deadline. (”Double Extortion”).”

Title: Why the ‘Basement Hacker’ Stereotype Is Wrong — and Dangerous

Date Published: November 22, 2021

Excerpt: “At its core, the Basement Hacker represents a fundamental and ongoing misunderstanding of the modern cyber adversary. As Sun Tzu wrote in The Art of War, “If you know yourself but not the enemy, for every victory gained you will also suffer a defeat.” The Basement Hacker myth gives organizations of all sizes a false sense of superiority over threat actors, whom they perceive as untrained, benign, and weird. Gone unchecked, this sense of superiority can spur complacency among risk managers and executives who determine security budgets, leading to underinvestment in security teams, overreliance on automation, or both.”

Title: Emotet Botnet Comeback Orchestrated by Conti Ransomware Gang

Date Published: November 19, 2021

Excerpt: “The botnet operators provided initial access at an industrial scale, so many malware operations depended on Emotet for their attacks, especially those in the so-called Emotet-TrickBot-Ryuk triad. Ryuk is the predecessor of Conti ransomware. The switch occurred last year when Conti activity started to increase and Ryuk detections dwindled. The operators of both ransomware strains have a long history of attacks hitting organizations in the healthcare and education sector. AdvIntel researchers say that once Emotet disappeared from the scene, top-tier cyber criminal groups, like Conti (loaded by TrickBot and BazarLoader) and DoppelPaymer (loaded by Dridex) were left without a viable option for high-quality initial access.”

Title: Human Error Behind 5 ‘High-profile’ Healthcare Data Breaches

Date Published: November 22, 2021

Excerpt: “Yes, you read that right. According to a study by IBM, 95% of cyber security breaches are primarily caused by human error. Being unaware of the proper security protocols and cyber security best practices, your employees can inadvertently grant hackers access to your network and systems. Despite having cutting-edge IT security infrastructure, several renowned healthcare organizations have fallen victim to devastating cyber attacks and data breaches due to human error.”

Title: DMARC and the Prevention of World Health Organization Phishing Scams

Date Published: November 22, 2021

Excerpt: “One tool that may have been useful in the prevention of these phishing attempts and subsequent data breaches is Domain-based Message Authentication, Reporting, & Conformance, or DMARC. While DMARC does not completely prevent phishing attempts, it does provide increased protection by increasing safety protocols and authentication checks, adding author linkage, increasing transparency regarding sender and recipient, and providing the monitoring and protection of a domain from fraudulent email creation1. DMARC can be a powerful tool in preventing phishing sources from using spoof emails that mirror that of the intended target or organization, therefore making it easier to recognize phishing attempts or completely blocking them from arriving at the sender.”

Title: Sudan Was Cut Off From the Internet for 25 Days

Date Published: November 22, 2021

Excerpt: “The country’s longest recorded network disruption was back in 2018, when Sudanese authorities cut off access to social media (and messaging apps like WhatsApp) for 68 consecutive days from December 21, 2018, to February 26, 2019. After that, there was a full mobile Internet shutdown reported from June 3 to July 9, 2019, that lasted 36 days. This time, in 2021, it was 25 days when the Internet access was reduced to just a trickle of traffic getting through.”

Recent Posts

June 10, 2022

Title: Bizarre Ransomware Sells Decryptor on Roblox Game Pass Store Date Published: June 9, 2022 Excerpt: “A new ransomware is taking the unusual approach of...

June 9, 2022

Title: New Symbiote Malware Infects all Running Processes on Linux Systems Date Published: June 9, 2022 Excerpt: “A newly discovered Linux malware known...

June 8, 2022

Title: Surfshark, ExpressVPN pull out of India Over Data Retention Laws Date Published: June 7, 2022 Excerpt: “Surfshark announced today they are shutting down...

June 6, 2022

Title: Italian City of Palermo Shuts Down all Systems to Fend off Cyberattack Date Published: June 6, 2022 Excerpt: “The municipality of Palermo in...

June 3, 2022

Title: Critical Atlassian Confluence Zero-Day Actively Used in Attack Date Published: June 2, 2022 Excerpt: “Hackers are actively exploiting a new Atlassian...

June 2, 2022

Title: Conti Ransomware Targeted Intel Firmware for Stealthy Attacks Date Published: June 2, 2022 Excerpt: “Researchers analyzing the leaked chats of the...

June 1, 2022

Title: Ransomware Attacks Need Less Than Four Days to Encrypt Systems Date Published: June 1, 2022 Excerpt: “The duration of ransomware attacks in 2021...