a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld
Posted in Cyber Security

A Brief Weekly Review of Top Stories that Dominated the Cyberworld

Latest Blogs

a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld

By AMSAT April 30,2021

A Brief Weekly Review of Top Stories that Dominated the Cyberworld

The world of cybersecurity saw a slew of significant events in the past week. New research indicated that the coronavirus pandemic and work from home (WFH) requirements are prompting a spike in cyberattacks against banks and insurance companies. But the headline of the week was healthcare service provider UnitingCare Queensland being hit by a cyberattack.

 

Here’s a brief roundup of the major developments of the past week.

Coronavirus, WFH cause rise in cyberattacks against banks, insurers

As per new research, Covid-19 and work from home (WFH) requirements are causing a major surge in cyberattacks against financial institutions.


A COVID Crime Index 2021 report observed how the remote working model is affecting the banking and insurance industries.

 

As the pandemic continues to have an extensive impact, the swift transition to WFH models is being loosened in some neighborhoods, but many organizations are choosing to either continue letting staff work remotely or are adopting hybrid working practices.

 

But security has proven to be a challenge as well. According to the research, 74% of banks and insurers have experienced an increase in cyberattacks since the beginning of the pandemic, with “criminal activity” spotted by financial entities has mounted by close to a third (29%).

UnitingCare Queensland struck by cyberattack

Earlier this week, a cyber-attack hit healthcare service provider UnitingCare Queensland (UCQ), rendering some of its digital and technology systems inaccessible.


UCQ operates aged care facilities and numerous hospitals including St Andrew’s War Memorial Hospital.
Chinese firms covertly own almost a third of top VPNs, while other owners are based in countries with weak or no privacy laws, possibly putting users at risk, security experts have warned.

 

Local media reports suggest that the incident was allegedly triggered by ransomware which had affected email and operations booking systems, causing staff to turn to paper-based procedures.

Apple fixed macOS Gatekeeper bypass flaw exploited in the wild

Technology giant Apple issued a wide range of security fixes resolving issues including an actively exploited zero-day flaw and a separate Gatekeeper bypass vulnerability.


One of the most prominent fixes is for a flaw found by Cedric Owens. Tracked as CVE-2021–30657, the flaw let hackers circumvent Gatekeeper, Apple’s built-in protection mechanism for code signing and confirmation.

 
In a blog post, Owens mentioned how cybercriminals could easily create a macOS payload that is not checked by Gatekeeper.

TAGS

  • Cyber Crime
  • Security Updates

Recent Blogs

Share this article

Ready to Get Started?

Our specialists are ready to tailor our security service solutions to fit the needs of your organization.

    By submitting the form, you agree to the Terms of Use and Privacy Policy

    a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld
    Posted in Cyber Security

    A Brief Weekly Review of Top Stories that Dominated the Cyberworld

    Latest Blogs

    a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld

    By AMSAT April 21,2021

    A Brief Weekly Review of Top Stories that Dominated the Cyberworld

    The week saw a number of incidents that shook the world of cybersecurity. From dozens of organizations targeted in attacks aimed at Covid vaccine cold chain to Reddit launching a public bounty program, many events caught the attention of security experts around the globe.

    Here’s a brief review of what took place in the past week.

    44 Companies Targeted in Attacks Focused on Covid-19 Vaccine Cold Chain

    As many as 40 organizations were targeted in a global drive aimed at the Covid-19 vaccine cold chain infrastructure, which deals with the distribution of vaccines and their storage at the required temperatures.


    As per IBM Security X-Force, the number of affected organizations is higher compared to the preceding evaluation.


    Operating in Europe, North America, South America, Africa, and Asia, the targeted organizations are involved in the transportation, warehousing, storage, and distribution of Covid-19 vaccines.

    Reddit Launched Public Bug Bounty Program

    Reddit announced the launch of a public bug bounty program on the vulnerability hunting platform HackerOne.


    After a three-year private bug bounty program on the hunting platform, the program was going public with an expanded scope.


    Reddit said that the purpose of the program is to keep users’ accounts, identities, and private data secure, including chats, messages, email addresses, voting records, and subreddit subscriptions.

    US Expelled Russian Envoys, Imposed Sanctions for Hacking

    The Biden administration expelled 10 Russian diplomats and imposing sanctions against scores of companies and people, holding Russia responsible for meddling in last year’s presidential election and the cyber hacking of federal agencies.


    The sweeping measures were aimed at punishing Russia for actions that US officials say cut to the core of American democracy and to prevent future acts by imposing financial costs on Moscow, including by targeting its capacity to borrow money.

    TAGS

    • Cyber Crime
    • Security Updates

    Recent Blogs

    Share this article

    Ready to Get Started?

    Our specialists are ready to tailor our security service solutions to fit the needs of your organization.

      By submitting the form, you agree to the Terms of Use and Privacy Policy

      a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld
      Posted in Cyber Security

      A Brief Weekly Review of Top Stories that Dominated the Cyberworld

      Latest Blogs

      a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld

      By AMSAT April 16,2021

      Dealing with cyber-threat: a complex challenge

      The world of cybersecurity was catapulted when officials revealed that a Sweden’s national sports federations, including FIFA, were hacked by Russian military intelligence in 2017-18. And that was not it! The cyberworld received another shock when it discovered that FBI agents launched a court-authorized cyber campaign to remove malicious web shells from hundreds of formerly hacked Microsoft Exchange servers in the United States. More alarmingly, at least 100 million devices were affected by a spate of Domain Name System (DNS) flaws in TCP/IP stacks in the outgoing week.

       

      Here’s a brief review of what took place in the past week.

      Russians Hacked Swedish Sports Body

      Officials divulged that Russian military intelligence in 2017-18 hacked the organization that supervised Sweden’s national sports federations, including FIFA and the World Anti-Doping Agency.

       

      Swedish prosecutors said the “repeated and comprehensive breaches” of the Swedish Sports Confederation by GRU led to athletes’ personal details, such as medical records, being accessed and that information being published by Swedish media.

       

      The hacking was revealed after a probe by the Swedish Security Service in cooperation with the security services of other countries. But the investigation has been stopped due to the lack of the necessary preconditions for taking legal proceedings abroad or extradition to Sweden.

      FBI Agents Covertly Removed Web Shells from Hacked Microsoft Exchange Servers

      The U.S. Department of Justice (DoJ) said that FBI agents carried out a court-authorized cyber drive to remove malicious web shells from hundreds of formerly hacked Microsoft Exchange servers in the United States.

       

      In the wake of an upsurge in major in-the-wild zero-day attacks against Exchange Server installations that happened worldwide in January, farsighted organizations scrambled to lock down exposed Microsoft email servers and eliminate web shells that were installed by threat actors.

       

      Unfortunately, several organizations were not able to fix systems and/or remove related malware that was installed.

      NAME:WRECK” DNS Flaws in TCP/IP Stacks Affected At Least 100 Million Devices

      Experts revealed that a string of Domain Name System (DNS) flaws affected popular TCP/IP stacks.

      Jointly called NAME:WRECK and identified in the DNS implementations of FreeBSD, Nucleus NET, IPnet, and NetX, the vulnerabilities could also be exploited to carry out denial of service (DoS) attacks, to execute code remotely, or take devices offline.

       

      The flaws were recognized as part of Project Memoria, a research initiative aimed at enhancing the overall security of IoT devices and which has already led to the discovery of more than 40 issues in popular TCP/IP stacks, critical components providing basic network connectivity for an extensive range of devices.

      TAGS

      • Cyber Crime
      • Security Updates
      • Hacked Microsoft Exchange Servers

      Recent Blogs

      Share this article

      Ready to Get Started?

      Our specialists are ready to tailor our security service solutions to fit the needs of your organization.

        By submitting the form, you agree to the Terms of Use and Privacy Policy

        a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld
        Posted in Uncategorized

        A Brief Weekly Review of Top Stories that Dominated the Cyberworld

        Latest Blogs

        a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld

        By AMSAT April 9,2021

        A Brief Weekly Review of Top Stories that Dominated the Cyberworld

        The outgoing week saw many events that made headlines. From social media giant Facebook removing over a dozen network fueling deception campaigns to a leading open-source security management company raising $75m, the world of cybersecurity was witness to a number of spectacular developments.

        Here’s a brief review of what took place in the past week.

        Google Fixed Critical Code Execution Flaw in Android

        Search engine titan Google patched more than 30 vulnerabilities in Android, including a remote code execution flaw in the System component.

         

        The code execution vulnerability, tracked as CVE-2021-0430 and impacting Android 10 and 11, was considered critical severity. The bug was patched as part of the 2021-04-01 security patch level.

        Five other flaws were addressed in the System component: three elevation of privilege and two information disclosure issues. All of these featured a severity rating of high.

        Facebook Eliminated 14 Networks Fueling False Campaigns

        Facebook announced that in March it eliminated a total of 14 networks of accounts from its online services, for spreading false content meant to manipulate public opinion.

         

        These networks, which emerged from 11 countries, included a total of 1,167 Facebook accounts and 290 Instagram accounts, as well as 255 pages and 34 groups on Facebook, the social platform announced.

        $75 Million Raised by Open-Source Security Management Firm WhiteSource

        WhiteSource, an open-source security management company, announced that it had raised $75 million in a Series D funding round.

         

        The Series C funding round was announced in October 2018, when the company secured $35 million. The latest round, which brings the total raised by the company to more than $120 million, was led by Pitango Growth, with participation from M12, Susquehanna Growth Equity, and 83North.

         

        WhiteSource, founded in 2011, has developed a product designed to help software development teams capably manage the open source components they use.

         

        WhiteSource has offices in the United States, United Kingdom and Israel, with over 800 customers worldwide, including nearly a quarter of Fortune 100 companies.

        TAGS

        • Cyber Crime
        • Security Updates
        • Cyber Security News

        Recent Blogs

        Share this article

        Ready to Get Started?

        Our specialists are ready to tailor our security service solutions to fit the needs of your organization.

          By submitting the form, you agree to the Terms of Use and Privacy Policy

          key-security-trends-to-follow-in-2021
          Posted in Cyber Security | Tagged , ,

          Key Cybersecurity Trends, Threats, and Events to Emerge in 2021

          Latest Blogs

          key-security-trends-to-follow-in-2021

          By AMSAT April 8,2021

          Key Cybersecurity Trends, Threats, and Events to Emerge in 2021

          Looking back on a year of unparalleled uncertainty, almost everyone from all walks of life learned some lessons, including cybersecurity leaders and experts. The sudden change in working patterns prompted millions of employees to work from home, putting enormous strain on access to IT systems.

           

          Cybercriminals didn’t let their guards down in determining how these and other changes created flaws to target and abuse either, which led to an upsurge in cyber-threat activity. By the end of March, more than 40,000 newly registered websites had already been identified with Covid-related names, which experts classified as “highly vulnerable” sites due to the scams and malware being pushed onto gullible consumers.

           

          By and large, cybersecurity emerged as a high priority for organizations as well as consumers who relied on technology more than ever before. So, remembering how vital it is to talk about cybersecurity more openly and therefore inspire deeper appreciation of the threats and best preemptive strategies, here are some major trends to look out in 2021:

          1. Employee fatigue

          Post Covid-19, a dramatic shift in working patterns has upended employees’ routine life: work from home has forced them to clock in more hours, which means very little respite with barely any gaps between meetings, and virtually no commute. All this has caused considerable employee fatigue or complacency, which means more human errors leading to cybersecurity issues. And this implies that businesses need to think about a whole new level of IT security education program, including ensuring people to step away and take a break.

           
          When you make a cybersecurity error at the workplace, it’s easy to go down and approach a responsive member of your IT security team. But it becomes extremely difficult to do at home now shorn of direct access to your usual go-to person, and it requires far more confidence to admit. Organizations need to take this human error factor into account and ensure steady edge security, regardless of the connection.

          2. Surge in ransomware attacks

          Ransomware attacks continue to rise both in frequency and severity, which doesn’t bode well for businesses. As everyone grappled to bear down with Covid-19 and move data and systems online, malicious threat actors saw more opportunities to exploit systems that were set up in haste.

          In these well-coordinated attacks, business data is held hostage by the cybercriminals who will demand payment or compensation in order to return access to the data. Unscrupulous threat actors continue to innovate and improve their encryption processes, making them even harder to crack. They will continue to target the most susceptible businesses that cannot afford to lose their data and raise pressure to cave in to the extortion. While an all-inclusive data security system is central in helping to foil an attack, a simple backup of your valuable company data is one of the best safeguards against a ransomware attack.

          3. Likelihood of more security incidents

          A number of businesses in Europe sought to move key business processes to the cloud over the next few years, but with the onset of Covid-19, the plan has been pushed back a few months. Instead of taking the time to recodify processes, a transitional boost and shift step was added: the swift move. While the procedure may still be the same, the setting and security change. In 2021, companies are recodifying to gain the real benefits of agility from the cloud, while security teams are still rectifying the issues from the transitional shift. This ongoing migration at pace will lead to security holes, and we’re likely to see more cloud security events until the shifts are complete and we return to a semblance of stability, at least for a while.

          4. SOC teams to grapple with a new work environment and more work pressure

          As many companies look to cut costs, one natural solution is to hasten the digitization of processes. This means a surge of cybersecurity data returning to the security operations center (SOC). Add to this the shift already seen in telemetry as employees work from home, and a rise from more new association tools and cloud processes. Several SOC teams had also been accustomed to using numerous screens for big data analytics, and consistent team meetings to discuss multifaceted issues; so, the shift to work remotely, often with one screen, has been difficult for some.

          4. Increased focus on privacy

          In the West, especially in Europe, increased focus on data privacy has been seen in the last few months. Just one example of how momentous this has become is a major smartphone company running TV adverts in the region underlining its data protection capabilities. Simultaneously, we have the EU looking to build EU clouds, such as the Gaia-X project, that align to the broader EU cloud approach. All of this shows the priority of privacy on the EU agenda.

          TAGS

          • Cybersecurity Mesh
          • Security Trends
          • Integrating AI with cyber security
          • Cyber warfare

          Recent Blogs

          Share this article

          Ready to Get Started?

          Our specialists are ready to tailor our security service solutions to fit the needs of your organization.

            By submitting the form, you agree to the Terms of Use and Privacy Policy

            a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld
            Posted in Cyber Security

            A Brief Weekly Review of Top Stories that Dominated the Cyberworld

            Latest Blogs

            a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld

            By AMSAT April 2,2020

            A Brief Weekly Review of Top Stories that Dominated the Cyberworld

            The cyberworld saw its fair share of events in the outgoing week: from a bug in ‘netmask’ npm package that affected hundreds of thousands of projects to several ransomware gangs targeting vulnerable exchange servers, and so on. But the development that stood out in the entire week was the event where German lawmakers were targeted by Russian threat actors.

             

            Here’s a brief review of what took place in the past week.

            German MPs Again Targeted by Russian Threat Actors: Report

            As per local media, many German lawmakers fell victim to a cyber-attack, with security experts conjecturing Russian hackers might be behind the incident.


            Der Spiegel weekly said that cybercriminals used phishing emails to gain access to the computers of at least seven federal MPs and 31 lawmakers in regional parliaments.


            The magazine added that it was not clear whether any sensitive information was accessed.

            280,000 Projects Affected by Vulnerability in ‘Netmask’ npm Package

            Security expects suspected that a flaw in the netmask npm package could expose private networks and lead to a wide range of attacks, including malware delivery.


            Tracked as CVE-2021-28918, the newly identified issue resided in the fact that the package would erroneously read octal encoding, essentially resulting in the misapprehension of supplied IP addresses.


            Due to this bug, netmask would consider private IP addresses as external IP addresses and the other way around, thus opening the door to a variety of attacks, depending on the manner in which the package is used.

            Vulnerable Exchange Servers Targeted by More Ransomware

            The Black Kingdom/Pydomer ransomware operators joined the ranks of cybercriminals targeting the Exchange Server bugs that Microsoft revealed in early March.


            The four zero-day flaws had been targeted in live attacks well before patches were released for them on March 2. The number of unpatched Exchange installations plummeted drastically, going from roughly 80,000 on March 14 to fewer than 30,000 on March 22.

            TAGS

            • Cyber Crime
            • Security Updates
            • Russian Threat
            • German MPs

            Recent Blogs

            Share this article

            Ready to Get Started?

            Our specialists are ready to tailor our security service solutions to fit the needs of your organization.

              By submitting the form, you agree to the Terms of Use and Privacy Policy