a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld
Posted in Cyber Security

A Brief Weekly Review of Top Stories that Dominated the Cyberworld

Latest Blogs

a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld

By AMSAT Feb 26,2021

A Brief Weekly Review of Top Stories that Dominated the Cyberworld

Mac Malware infection, threat actors targeting Myanmar government websites, and hackers scanned for VMware vCenter servers were among the top stories that kept cybersecurity experts on tenterhooks around the world.

 

Here is a brief overview of what went wrong in the cybersecurity landscape in the past week.

At least 30,000 devices worldwide infected by shadowy Mac malware

Investigators at Red Canary, a managed detection and response firm, came across a mysterious piece of Mac malware that seemed to have infected at least 30,000 devices across the globe.

 

Researchers found two variants of the malware, including one designed to run on devices powered by Apple’s new M1 chip, which used the arm64 CPU architecture.

Myanmar government websites targeted by hackers in coup protest

Military-run websites in Myanmar were attacked by hackers as a cyber war exploded after authorities shut down the internet for a fourth straight night.

 

A group called Myanmar Hackers disrupted many government websites including the Central Bank, Myanmar Military’s propaganda page, state-run broadcaster MRTV, the Port Authority, Food and Drug Administration.

Hackers scanned for VMware vCenter servers impacted by major flaw

Hackers scanned the internet for vulnerable servers merely one day after VMware announced the availability of fixes for a critical flaw impacting vCenter Server.

 

Tracked as CVE-2021-21972, the vulnerability affected the vSphere Client component of vCenter Server and it can be abused by a remote, unauthenticated intruder to perform arbitrary commands with elevated privileges on the operating system that hosted vCenter Server.

 

There were over 6,000 potentially susceptible systems that are accessible directly from the internet.

 

TAGS

  • Cyber Crime
  • Security Updates
  • Cyberworld

Recent Blogs

Share this article

Ready to Get Started?

Our specialists are ready to tailor our security service solutions to fit the needs of your organization.

    By submitting the form, you agree to the Terms of Use and Privacy Policy

    cyber-forensics-significance-types-and-challenges
    Posted in Cyber Security

    Cyber Forensics: Significance, Types, and Challenges

    Latest Blogs

    cyber-forensics-significance-types-and-challenges

    By AMSAT Aug 28,2020

    Cyber Forensics: Significance, Types, and Challenges

    Cyber forensics is the technique of acquiring, validating, analyzing, and documenting evidence recovered from the systems or online used to carry out the crime. And it can be committed from many sources such as computers, networks, digital media or storage devices that could have important information for the investigators to find. In cyber forensics, file or data carving procedures are most commonly used to glean digital evidence from the source, hard drive or online domain. 


    Cyber forensics has enormous significance because it not only retrieves files hidden or detached from storage devices and systems, but forensics experts can also ascertain if there are any ongoing suspicious activities. Computer forensics help solve the issue of retrieving data from files where file system is inaccessible or file system structure is disrupted. Files may be purposely removed or, worse, configured to the interest of the suspect to hide their actions. 

    Significance of Computer Forensics Important for Your Organization

    To remain competitive in today’s fast-paced business environment, organizations have to rely heavily on technology. Customers expect organizations to have an online presence with easy-to-use, professional websites, be able to respond swiftly to online enquiries, and have the capacity to order online. Technology has become so important to people’s lives that they expect to have continuous access to their private emails and to be able to keep in touch with friends even during working hours.


    All this, nevertheless, means that they will encounter some kind of cybersecurity event and the truth is they are often ill-equipped to cope with the incident effectively. Yet, they often do not implement their acceptable computer usage policy or do not think about the control of USB devices that can be plugged into the network or mobile phones that may contain company data. Moreover, when an employee’s contract is completed, the organization often ignores the need to swiftly close down the employee’s user accounts which can include remote access to the network.


    Organizations have a lawful and ethical responsibility to defend their customer’s personal information; however, data leakage remains one of the major problems they face in todays’ technological world. When a cybersecurity incident happens, the IT staff is often expected to make a preliminary evaluation to try and recognize the precise nature and importance of the incident. But if they are do not train in cyber forensics, they are unable to retrieve vital company information lost to hacking or any other criminal activity. A forensic probe can save time which, in turn, results in saving of money. When articulating an incident response plan, organizations should provide staff with computer forensic training. 

    Types of Digital Forensics

    Three are three types of digital forensics.

    Disk Forensics 

    Digital forensics has to do with taking out information from storage media by finding active, altered, or removed files. 

    Network Forensics 

    A sub-branch of digital forensics, network forensics deals with supervision and evaluation of computer network traffic to gather significant information and legal evidence. 

    Wireless Forensics 

    The major objective of wireless forensics, which is a division of network forensics, is to provide the tools required to gather and examine the data from wireless network traffic. 

    Database Forensics 

    Database forensics deals with the study and investigation of databases and their connected metadata. 

    Malware Forensics 

    Malware forensics is related to the recognition of malicious code, to study their payload, viruses, worms, etc. 

    Email Forensics 

    This type of digital forensics deals with retrieval and examination of emails, including removed emails, calendars, and contacts. 

    Memory Forensics 

    Memory forensics is related to gathering data from system memory (system registers, cache, RAM) in raw form and then carving the data from raw junkyard. 

    Mobile Phone Forensics 

    Mobile phone forensics is mostly related to the investigation and examination of mobile devices. It helps recover phone and SIM contacts, call records, incoming and outgoing SMS/MMS, audio, videos, etc. 

    Challenges confronted by Digital Forensics

    One of the major challenges digital forensics encounter includes is the increase of personal computers and widespread use of the internet. Also, hacking tools are readily available and a lack of physical evidence makes examination ever more difficult. What’s more, there is a huge amount of storage space into Terabytes that makes the probing job exceptionally tricky and challenging. Finally, any technological changes need an upgrade or amendments to solutions. 

    Steps involved in computer forensics

    Here are the steps involved in computer forensics.


    Readiness


    This ensures that the forensics investigator and their respective team is always ready to take on an investigation at literally a moment’s notice. 

    Collection

    This is the area where the real physical evidence and any storage devices which are used to obtain the dormant data are pigeon-holed and sealed in tamper resistant bags. 

    Analysis

    This domain is where all of the collected evidence and the inactive data are examined in painful detail to find out how and where the cyberattack originated from, who the offenders are, and how this type of event can be prevented from entering the defense boundaries of the business or company in the future. 

    Presentation

    Once the analyses have been finalized, a summary of the conclusions is then presented to the IT staff of the company which was affected by the cyberattack. 

    Conclusion

    Although it’s difficult to investigate computer forensics, you can succeed in collecting evidence if you have the right tools. Evidence collection is a chief feature of a case, as prosecution is difficult without a considerable amount of proof. Organizations are duly responsible for defending their customers’ personal information, and they should use every trick in the book to make it happen. 

    AMSAT, one of Pakistan’s fast-growing cybersecurity companies, provides consultancy in a number of services, including cyber forensics. The company’s SWAT/Tiger and Forensic Teams, with years of experience and breadth of expertise, have been drawn from the world’s leading cybersecurity agencies and are on hand to educate and inform startups and large conglomerates about the significance of computer and cyber forensics. 

     

    TAGS

    • Cyber Crime
    • Security Updates

    Recent Blogs

    Share this article

    Ready to Get Started?

    Our specialists are ready to tailor our security service solutions to fit the needs of your organization.

      By submitting the form, you agree to the Terms of Use and Privacy Policy

      a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld
      Posted in Cyber Security

      A Brief Weekly Review of Top Stories that Dominated the Cyberworld

      Latest Blogs

      a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld

      By AMSAT Feb 19,2021

      A Brief Weekly Review of Top Stories that Dominated the Cyberworld

      It was a week tough on malicious threat actors and ransomware members. From stories highlighting Ukrainian and French police’s crackdown on Egregor ransomware members to the US indicting North Korean hackers over $1.3b bank heists, a number of events saw the law tightening its noose around the hackers’ neck!

       

      Here’s a gist of the top stories of the past week.

      Egregor Ransomware Members Arrested by Ukrainian, French police

      In a major crackdown, French and Ukrainian police arrested members of the Egregor ransomware cartel. French public radio channel France Inter reported that the detained suspects provided hacking, logistical, and monetary support for the Egregor gang.

      North Korean Hackers Indicted Over $1.3 Billion Bank Heists

      The U.S. Justice Department said it had indicted three North Korean military intelligence officials connected to high-profile cyber-attacks that included the theft of $1.3 billion in money and crypto-currency from organizations across the globe.

      Cybercriminals Leak Files Purportedly Stolen from Law Firm Jones Day

      A group of threat actors began leaking files ostensibly stolen from Jones Day, a key U.S.-based law firm. The cybercriminals behind the ransomware drive, known as Clop, are notorious for encrypting files on compromised systems, as well as stealing files from the victim and threatening to leak them unless a ransom is paid.

      TAGS

      • Cyber Crime
      • Weekly Roundup

      Recent Blogs

      Share this article

      Ready to Get Started?

      Our specialists are ready to tailor our security service solutions to fit the needs of your organization.

        By submitting the form, you agree to the Terms of Use and Privacy Policy

        a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld
        Posted in Cyber Security

        A Brief Weekly Review of Top Stories that Dominated the Cyberworld

        Latest Blogs

        a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld

        By AMSAT Feb 12,2021

        A Brief Weekly Review of Top Stories that Dominated the Cyberworld

        The outgoing week brought a sense of relief for those associated with the world of cybersecurity. Far from the stories highlighting ransomware and malware attacks by malicious threat actors, the week saw some positive developments in terms of vulnerability patch-ups and fixes. With Fortinet patching critical flaws in SSL VPN and Microsoft fixing 56 bugs to a major vulnerability fixed in SAP Commerce product, security enthusiasts and mavens were taken aback by these unexpectedly positive happenings.

         

        Here is a brief review of some of the notable cybersecurity events in the week gone by.

        Fortinet fixed critical flaws in SSL VPN and web firewall

        Fortinet fixed many critical vulnerabilities affecting its products. The flaws ranged from Remote Code Execution (RCE) to SQL Injection, to Denial of Service (DoS) and impact the FortiProxy SSL VPN and FortiWeb Web Application Firewall (WAF) products.

        Microsoft February 2021 Patch Tuesday fixed 56 bugs, including Windows zero-day

        Microsoft released its monthly batch of security updates, known as Patch Tuesday. In February alone, the software behemoth fixed 56 security vulnerabilities, including a Windows bug that was being exploited in the wild.

         

        Tracked as CVE-2021-1732, the Windows zero-day was an elevation of privilege bug in Win32k, a core component of the Windows operating system.

        Critical flaw patched in SAP Commerce product

        SAP released seven new security notes on February 2021 Security Patch Day, including a Hot News note that addressed a critical flaw in SAP Commerce. It also updated six previously released notes.

        Tracked as CVE-2021-21477 and featuring a CVSS score of 9.9, the critical issue could be abused for remote code execution.

        TAGS

        • Web firewall
        • Security Updates
        • Fortinet

        Recent Blogs

        Share this article

        Ready to Get Started?

        Our specialists are ready to tailor our security service solutions to fit the needs of your organization.

          By submitting the form, you agree to the Terms of Use and Privacy Policy

          a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld
          Posted in Latest News

          A Brief Weekly Review of Top Stories that Dominated the Cyberworld

          Latest Blogs

          a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld

          By AMSAT Feb 04,2021

          A Brief Weekly Review of Top Stories that Dominated the Cyberworld

          From the news covering Agent Tesla malware variants using new techniques to do away with antivirus security to Fonix ransomware planning to close down operations, the cybersecurity landscape saw a handful of events that remained the highlights of the outgoing week.

           

          Here is the gist of the news items that made headlines.

          Agent Tesla Malware Detected Using New Delivery & Evasion Methods

          Agent Tesla malware variants was reportedly using new methods to try and eliminate endpoint antivirus security.

           

          The Windows spyware now targets Microsoft’s Antimalware Scan Interface (AMSI) in a bid to beat endpoint protection software, while also employing a multi-stage installation process and exploiting Tor and Telegram messaging API to communicate with a command-and-control (C2) server.

          Fonix ransomware sought to shut down operation

          The cybercrime group behind the FonixCrypter ransomware announced on Twitter that they were planning on shutting down their operation.

           

          The FonixCrypter gang, as a gesture of goodwill towards past victims, had also released a package containing a decryption tool, how-to instructions, and the ransomware’s master decryption key.

          SonicWall SMA 100 zero-day exploited in the wild

          According to a tweet by cybersecurity firm NCC Group, a SonicWall SMA 100 zero-day flaw was being actively exploited in the wild.

           

          On January 22nd, SonicWall revealed that they experienced an attack on their internal systems using a “probable” zero-day susceptibility in specific SonicWall networking devices.

          TAGS

          • Cyber Crime
          • Security Updates

          Recent Blogs

          Share this article

          Ready to Get Started?

          Our specialists are ready to tailor our security service solutions to fit the needs of your organization.

            By submitting the form, you agree to the Terms of Use and Privacy Policy

            all-you-should-know-about-psi-dss-and-its-significance
            Posted in Vulnerability

            All you Should Know about PSI DSS and Its Significance

            Latest Blogs

            all-you-should-know-about-psi-dss-and-its-significance

            By AMSAT Feb 10,2021

            All you Should Know about PSI DSS and Its Significance

            What is PCI DSS?

            Constituted by a few renowned financial services including Visa, MasterCard, in 2004, Payment Card Industry Data Security Standard (PCI DSS) is a set of safety standards aimed at protecting credit and debit card transactions against data holdup and scam. The PCI SSC is not legally authorized to force compliance, but it is mandatory for any business that processes credit or debit card transactions. It’s also considered as the most effective method to protect sensitive data and information, thus helping companies create enduring and reliable relationships with their clients.

             

            PCI-compliant security offers an important asset that apprises clients that it’s safe to transact with your business. On the contrary, the cost of nonconformity, both in financial and reputational terms, should be sufficient to persuade any entrepreneur not to underestimate data security. A data break that discloses important customer information is expected to have severe consequences on a company. A breach may lead to fines from payment card issuers, lawsuits, reduced sales and a harshly dented reputation.

             

            After undergoing a breach, a company may have to stop accepting credit card dealings or be compelled to pay higher ensuing charges than the original cost of security conformity. The investment in PCI security events ensures that other facets of your commerce are safe from nefarious hackers or cybercriminals.

            PCI DSS Compliance levels

            Split into four levels, PCI compliance is based on the yearly number of credit or debit card transactions processed by a company. The cataloguing level ascertains what a company needs to do to continue to be compliant.
             

            Level 1: This level has to do with traders processing upwards of 6 million credit or debit card transactions yearly. Carried out by an approved PCI auditor, the transactions must undergo an internal audit once a year. Also, they must submit to a PCI image by an Approved Scanning Vendor (ASV).

             

            Level 2: This level deals with traders processing between one and 6 million real-world credit or debit card transactions per year. They need to complete an assessment once a year using a Self-Assessment Questionnaire (SAQ). Additionally, a quarterly PCI scan may be required.

             

            Level 3: Applies to merchants processing between 20,000 and one million e-commerce transactions annually. They must complete an annual valuation using the pertinent SAQ, while a quarterly PCI scan may also be needed.

             

            Level 4: This has to do with traders processing fewer than 20,000 e-commerce dealings or year, or those that process as much as one million real-world dealings. An annual evaluation using the pertinent SAQ must be finished and a three-monthly PCI scan may be obligatory.

            PCI DSS requirements

            The PCI SSC has delineated 12 requirements for management of cardholder data and upkeeping a protected network. Divided between six wide-ranging objectives, all are essential for a company to become compliant.

            Protect network

            1. A firewall configuration must be installed and maintained
            2. System passwords must be unique (not vendor-supplied)

            Protect cardholder data

            1. Deposited cardholder data must be secured
            2. Transmissions of cardholder data across public networks must be encoded

            Vulnerability management

            1. Anti-virus software must be employed and frequently updated
            2. Safe systems and applications must be designed and maintained

            Access control

            1. Cardholder data access must be limited to a business need-to-know basis
            2. Every individual with computer access must be allocated a unique ID
            3. Physical access to cardholder data must be limited

            Network monitoring and testing

            1. Admittance to cardholder data and network resources must be followed and checked
            2. Security systems and procedures must be regularly tested

            Information security

            1. A policy regarding information security must be maintained

            Significance of PCI DSS

            There are a number of benefits associated with the PCI DSS. First of all, it protects the data of your enterprise and your employees. While navigating through risks such as malware threats and social engineering, you should take the appropriate precautions to keep your computers, networks, and servers protected. Secondly, increasing customer confidence is also very important, as you would never approach a business if you knew your credit card information may be stolen. Your business will not be taken seriously if people are uncomfortable about you keeping their data secure.
             
            Thirdly, PCI DSS helps protect your clients, who trust you with their card data to transact with your business. But rest assured, you are the only one to suffer should your data get breached. It’s your duty to keep your client’s data secure while it’s in your possession. In case you fail to secure your client’s data, you are liable to lawsuits and penalties, particularly if you misleadingly told them your business was safe. Being PCI- compliant can help minimize these fines and penalties while reducing the number of lawsuits your business may get into. Last but not least, PCI DSS reduces the expenses of data breaches for they can cost you dearly in that you may suffer both in financial and customer confidence terms.

            Conclusion

            Since its formation, PCI DSS has undergone several changes in a bid to keep up with changes to the online threat scene. Although new requirements are sporadically added, the simple rules for conformity have remained continuous. One of the more noteworthy of these additions was Requirement 6.6, which was set up more than a decade ago to defend data against some of the most widespread web application attack vectors and other malicious inputs. Employing such methods can help criminals possibly gain access to a host of data — including sensitive customer information. Satisfying this need can be developed either through application code appraisals or by understanding a web application firewall (WAF).
             
            The first option consists of a physical assessment of web application source code along with a fault assessment of application security. It needs an accomplished internal resource or third party to run the assessment, while final accord must come from an external organization. Additionally, the selected evaluator is required to remain up-to-date on the latest trends in web application security to ensure that all future threats are properly dealt with.

            TAGS

            • Vulnerability management
            • Security Updates
            • PSI DSS

            Recent Blogs

            Share this article

            Ready to Get Started?

            Our specialists are ready to tailor our security service solutions to fit the needs of your organization.

              By submitting the form, you agree to the Terms of Use and Privacy Policy

              a-comprehensive-overview-of-os-hardening
              Posted in Application Security

              A Comprehensive Overview of OS Hardening

              Latest Blogs

              a-comprehensive-overview-of-os-hardening

              By AMSAT Feb 1,2021

              A Comprehensive Overview of OS Hardening

              Based on the theory of least privilege, hardening is about reducing the attack surface available to the threat actors and other malicious hackers. Hardening is a vital component of information security and includes the principles of deterrence, denial, delay and detection.

              OS hardening

              This is the act of putting together an OS strongly, updating it, making rules and strategies to help supervise the system securely, eliminating unnecessary applications and services. The purpose of this exercise is to reduce a computer OS’s contact to threats and to alleviate possible risk. OS hardening is one of the most significant steps toward thorough information security, since operating systems evolve over time and add more features and capabilities.

              Windows hardening


              Windows is packed with a collection of features, applications and software that ought to be properly configured to guarantee the system is as hardened as possible.

              Secure installation

              Windows 10 must be installed fresh on a system. It’s important to create or find an appropriate installation media for your Windows 10 system (a reliable USB drive, preferably).

              Clean up unwanted programs

              Even in fresh installations of Windows 10, a system is expected to have unnecessary programs installed, which expand the attack surface, making it easy for hackers to unleash attacks. Make sure you confirm that all installed programs are authentic and not bootlegged software, which could be filled with bloat and malware.

              Encryption

              It’s essential to encode hard drives. Windows 10 is equipped with BitLocker and hasan easy encryption process. Trusted Platform Module (TPM) must be empowered to encode with BitLocker. Advanced editions of Windows 10 are equipped with TPM aided by default, while secure boot should be used together with encryption, linking the hard drive to the system hardware and ensuring that only Microsoft-trusted firmware is used upon boot.

              BIOS configuration

              Windows 10 systems come laden with a Basic Input Output System (BIOS) like previous versions of Windows. The BIOS has a DOS-ish interface but doesn’t require wide-ranging coding experience to operate. Before working with the BIOS, research whether your Windows 10 variant has any BIOS configuration applicable to it, then configure away.

              Linux hardening

              Most systems have confidential data that should be protected. To do this, we need to protect our Linux system, by physically taking security measures to prevent unauthorized people from access the system in the first place. Then installation should be done properly, so a strong foundation is there. Finally, a set of common security measures need to be applied. Once it’s all done, your server or desktop system should be effectively secured.

              Fundamental rules of system hardening

              System hardening can be divided into a few core principles. These include the principle of least privilege, segmentation, and reduction.

              Principe of least privilege

              The principle of least privileges suggests that you give users and processes the bare minimum of consent to do their job. It is like granting a visitor access to a building. You could give full access to the building, including all sensitive areas. The other option is to only let your guest access a single floor where they need to be. The choice is easy, right?

              Examples:

              • When read-only access is sufficient, don’t give write permissions
              • Don’t allow executable code in memory areas that are highlighted as data sections
              • Do not run applications as the root user, as an alternative use a non-privileged user account

              Segmentation

              The next principle is that you divide greater areas into smaller ones. If we look at that building again, we have split it into numerous floors. Each floor can be additionally divided into diverse regions. Perhaps you visitor is only permitted on floor 4, in the blue zone. If we interpret this to Linux security, this code would apply to memory usage. Each process can only access their own memory sections.

              Reduction

              The objective of this principle is to eliminate something that is not sternly needed for the system to work. It appears like the principle of least privilege, yet it focuses on averting something altogether.

              Steps of system hardening

               

              1.  Install security updates and patches
              2.  Use strong passwords
              3.  Bind processes to local host
              4.  Implement a firewall
              5.  Keep things clean
              6.  Security configurations
              7.  Limit access
              8.  Monitor your systems
              9.  Create backups (and test!)
              10.  Perform system auditing

              Conclusion

              Contemporary computing environments are discrete infrastructures which need any organization to develop interruption finding plans for the servers. An organization must similarly update its computer arrangement plan when relevant changes occur. The environment will only work efficiently if the process is centralized. Therefore, it’s incumbent upon financial institutions to develop, execute and monitor suitable information security programs. Whether systems are maintained in-house or by a third-party vendor, appropriate security controls and risk management systems should be put into place.

              TAGS

              • OS Hardening
              • Security Updates
              • Windows hardening

              Recent Blogs

              Share this article

              Ready to Get Started?

              Our specialists are ready to tailor our security service solutions to fit the needs of your organization.

                By submitting the form, you agree to the Terms of Use and Privacy Policy