Posted in Cyber Security

A Brief Weekly Review of Top Stories that Dominated the Cyberworld

Latest Blogs

a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld

By AMSAT Sep 24,2021

A Brief Weekly Review of Top Stories that Dominated the Cyberworld

Pakistan had one of the most embarrassing moments on the global security landscape when a 35-year-old Pakistani citizen, Mohammad Fahd, was sentenced to 12 years in prison in the US for his involvement in illegal hacking of AT&T phones. In another major development, European law enforcement agencies dismantled an organized crime group allegedly involved in online fraud, money laundering, and other illegal activities. Besides, the outgoing week saw some other events unfold on the security front.


Here’s a brief review of the major developments of the past week.    

 

Illegal Unlocking of AT&T Phones: Pakistani Citizen Sentenced to Prison in U.S


A 35-year-old Pakistani citizen, involved in an AT&T hacking scheme, was sentenced to 12 years in prison in the United States.


The scheme initiated in 2012, when convict Mohammad Fahd and others employed AT&T call center employees for help in cracking phones sold by the telecom giant to customers.

Fahd was primarily helped directly by AT&T call center workers to unlock phones, but when in 2013 AT&T enforced a new system that made it more tough for employees to unlock devices, the man employed someone to create a piece of malware that, once installed on AT&T’s internal systems, would let him remotely crack a larger number of phones from Pakistan.

 

Illegal Unlocking of AT&T Phones: Pakistani Citizen Sentenced to Prison in U.S

 

European law enforcement authorities cracked down on an organized crime group purportedly involved in online fraud, money laundering, and other illegal activities.


With help from Europol and Eurojust, the police made over 100 arrests — chiefly in Spain, with some in Italy — conducted 16 house searches, and froze 118 bank accounts. They seized 

several electronic equipment, hundreds credit cards, SIM cards, and more.


The group, which was connected to the Italian Mafia, swindled hundreds of individuals through attack methods such as phishing, SIM exchange, and even business email compromise (BEC). The proceeds were laundered through a network of fake companies and couriers.

Illegal Unlocking of AT&T Phones: Pakistani Citizen Sentenced to Prison in U.S

Cisco announced the availability of patches for a number of serious flaws in IOS XE software that could be misused to perform random code remotely, cause denial of service, or manipulate device configuration.

 

The most critical of these issues was CVE-2021-34770, which could have led to remote code execution without verification, with administrator privileges.

 

Found in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol processing of IOS XE software for Catalyst 9000 wireless controllers, the virus can also have been abused to cause a denial of service (DoS) condition.

TAGS

  • AT&T hacking
  • Security Updates
  • Cisco

Recent Blogs

Share this article

Ready to Get Started?

Our specialists are ready to tailor our security service solutions to fit the needs of your organization.

    By submitting the form, you agree to the Terms of Use and Privacy Policy

    a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld
    Posted in Uncategorized

    A Brief Weekly Review of Top Stories that Dominated the Cyberworld

    Latest Blogs

    a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld

    By AMSAT Sep 17, 2021

    A Brief Weekly Review of Top Stories that Dominated the Cyberworld

    Cyberattacks perpetrated will no longer be taken lying down, as was clearly visible by the tone and tenor of a U.S. general. Gen. Paul Nakasone resolved that he would fight incursions that had weakened major government agencies and companies. In another striking development of the outgoing week, experts also saw cybersecurity as a major risk for airlines in the wake of 9/11 attacks. So, calling the past week as being replete with some unprecedented developments won’t be off the mark.  

     

    Here’s a brief review of the major developments of the past week.

    Cybersecurity Viewed as Grave Risk in Wake of 9/11

    After improving their security protocols in the aftermath of the 9/11 attacks to end plane hijackings, airlines are now confronted with growing threats aimed at computers and electronic equipment crucial for their operations and safety.

     

    Since the calamity two decades ago, carriers and airports have strengthened cockpits, prohibited sharp objects in carry-on luggage and upgraded technology to detect explosives.

    Willie Walsh, director general of the International Air Transport Association, said: “We are more secure.”

    US General Promised ‘Surge’ against Foreign-based Cyberattacks

    The U.S. general who leads the country’s efforts to frustrate foreign-based cyberattacks, and punish the culprits, reveals he’s executing a “surge” to fight invasions that have incapacitated government agencies and companies responsible for vital infrastructure.

     

    In an interview, Gen. Paul Nakasone said the government experts were more focused on better finding and sharing information about cyberattacks by divulging the means by which those attacks were conducted.

     

    Nakasone said: “Even six months ago, we probably would have said, ‘Ransomware, that’s criminal activity. But if it has an impact on a nation, like we’ve seen, then it becomes a national security issue. If it’s a national security issue, then certainly we’re going to surge toward it.”

    TAGS

    • Cyber Crime
    • Security Updates

    Recent Blogs

    Share this article

    Ready to Get Started?

    Our specialists are ready to tailor our security service solutions to fit the needs of your organization.

      By submitting the form, you agree to the Terms of Use and Privacy Policy

      a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld
      Posted in Miscellaneous

      A Brief Weekly Review of Top Stories that Dominated the Cyberworld

      Latest Blogs

      a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld

      By AMSAT September, 10, 2021

      A Brief Weekly Review of Top Stories that Dominated the Cyberworld

      The outgoing week saw legions of developments on the cybersecurity front. From technology giant Apple delaying the rollout of child protection tools, to the FBI’s warning about the impact of a ransomware attack on the food supply chain, the security domain had its fair share of headline-grabbing events.

       

      Here’s a brief review of the major developments of the past week.    

      Apple Delayed Rollout of Child Protection Tools

       

      Technology behemoth Apple revealed it would delay the rollout of its contentious new child pornography safety tools, accused by some of disrupting the confidentiality of its devices and services.

       

      Apple cited the feedback from customers, human rights groups, researchers and others for the delay.

       

      In a statement, the company said: “We have decided to take additional time over the coming months to collect input and make improvements before releasing these critically important child safety features,” the company said in a statement.

      FBI Warned Ransomware Attack Could Impact Food Supply Chain

      The Federal Bureau of Investigation (FBI) warned businesses in the Food and Agriculture sector about a surge in ransomware assaults that could disrupt the food supply chain.

       

      The high dependance on smart technologies, Internet-connected (IoT) devices, and industrial control systems expose the sector to several types of cyberattacks that might lead to disrupted processes, impacting the whole food supply chain.

       

      The FBI said that all types of organizations in the sector — including farms, manufacturers, markets, and restaurants — were vulnerable.

      BladeHawk Hackers Spied on Kurds with Forged Android Apps 

      Experts at ESET said that bogus Android apps were being installed on the handsets of Kurds in a spying drive promoted across social media.  

       

      The researchers also said that a string of attacks executed by the BladeHawk hacking group was focused on targeting the Kurdish ethnic group through their Android handsets.

       

       

      Believed to have been active for more than a year, the campaign was exploiting Facebook and using the social media platform as a trigger for the distribution of forged mobile apps. 

      TAGS

      • Cyber Crime
      • Security Updates

      Recent Blogs

      Share this article

      Ready to Get Started?

      Our specialists are ready to tailor our security service solutions to fit the needs of your organization.

        By submitting the form, you agree to the Terms of Use and Privacy Policy

        a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld
        Posted in Cyber Security

        A Brief Weekly Review of Top Stories that Dominated the Cyberworld

        Latest Blogs

        a-brief-weekly-review-of-top-stories-that-dominated-the-cyberworld

        By AMSAT Sep 03,2021

        A Brief Weekly Review of Top Stories that Dominated the Cyberworld

        In another week that kept security experts on their toes, the cyberworld saw a slew of events with far-reaching consequences: A cyberattack that hit Boston Public Library is one such incident. In addition, the Federal Bureau of Investigation’s (FBI) alert about Hive ransomware on healthcare systems and FBI, CISA’s warning about a spike in ramsomware attacks on holidays featured among a handful of headline-grabbing news items of the outgoing week.

         

        A brief review of the major developments of the past week is as follows.    

        Boston Public Library Hit by Cyberattack

        As per news reports, the Boston Public Library came under a cyberattack earlier this week that disrupted its computer network.

         

        In a statement the library posted on its website, no sensitive employee of patron data was stolen or affected.

         

        A statement issued by the university read: “We experienced a systemwide technical outage due to a cybersecurity attack, pausing public computer and public printing services, as well as some online resources,” adding “affected systems were taken offline immediately, and proactive steps were taken to isolate the problem and shut down network communication.”

        FBI, CISA Warned of Spike in Ransomware Attacks on Holidays

        The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) warned against an increase in ransomware assaults during holidays and weekends.

        In a statement, the agencies observed that a rise in cyber-incidents involving ransomware was witnessed during previous U.S. holidays such as the Fourth of July weekend in 2021.

        They also stated that they had no clue that a cyberattack would happen over the imminent Labor Day holiday, but encouraged businesses to review their cybersecurity posture and apply recommended best practices to ensure they were safeguarded.

        FBI Issued Alert about Hive Ransomware amid Growing Attacks on Healthcare Systems

        The Federal Bureau of Investigation (FBI) issued a comprehensive alert about the Hive ransomware that was aggressively attacking healthcare systems. The new ransomware displayed strong file encryption capabilities and even ended backups to support the assault.

        Hive ransomware also works on the double-extortion plan as it steals data before encryption, while it abuses phishing emails to deceive business users to exfiltrate the network. 

        Experts Said Flaws Could Let Hackers Disarm Fortress Home Security Systems

        Security experts at cybersecurity company Rapid7 highlighted a few flaws that threat actors could exploit to remotely deactivate one of the home security systems offered by Fortress Security Store, a US-based physical solutions provider.

         

        According to the company, its products are used by thousands of consumers and companies.

        The vulnerabilities were discovered in Fortress’ S03 WiFi Security System, which connects to a current Wi-Fi network or phone line.

         

        Rapid7 researchers revealed that the product was impacted by two vulnerabilities that could be exploited remotely.

        TAGS

        • Cyber Crime
        • Security Updates
        • Boston Public Library
        • Ransomware Attacks

        Recent Blogs

        Share this article

        Ready to Get Started?

        Our specialists are ready to tailor our security service solutions to fit the needs of your organization.

          By submitting the form, you agree to the Terms of Use and Privacy Policy

          increased-ransomware-attacks-lay-bare-the-state-of-cybersecurity
          Posted in Endpoint Security

          Increased Ransomware Attacks Lay Bare the State of Cybersecurity

          Latest Blogs

          increased-ransomware-attacks-lay-bare-the-state-of-cybersecurity

          By AMSAT Sep 01, 2021

          Increased Ransomware Attacks Lay Bare the State of Cybersecurity

          Every few years a slew of major threats, including APTs, IoT Security and Cloud Security, draw the attention of security vendors, start-ups, media and board meetings. Today, it can be safely said that Ransomware is dominating the discourse, particularly after so many high-profile events have been part of the news cycle, as well as several stories on healthcare providers being wronged by such attacks. 

           

          Ransomware is not a new phenomenon, and nor are its delivery systems; even demanding ransom isn’t new. The technical novelty presented in Ransomware events, encoding files on a hard drive, can’t be considered very sophisticated. However, despite handling a threat that we had several years to prepare for and defend ourselves from, Ransomware is amazingly popular because it works, and it is very lucrative for the threat actors. 

           

          In earlier threats, the security industry has confronted challenges of new technical competences emanating from cybercriminals. In the heyday of banking malware, new ground-breaking features such as HTML injections and Man-In-The-Browser were presented by their developers, causing vendors to struggle in detecting fake activities. APTs emerged as a major threat because they were able to dodge conventional cyber defence principles, which focused on the perimeter and had no “strategic depth” of finding threat actors after they were already in the systems. IoT and Cloud security required new methods as the settings that they sought to defend were quite different from the settings that security solutions were intended for. In contrast, ransomware has none of these challenges.

           

          The term ransomware was initially used to describe a specific type of malware that encoded the victim’s hard drive and demanded a ransom to decode the infected files. Once companies started to alleviate the threat by applying more demanding backup policies, the attack loosened and began to include data exfiltration as well. Whether a ransom is wanted for data decoding or the deterrence of the data’s publication, there are similar technical challenges of delivering an effective attack, as well as foiling it.

           

          The key delivery technique of ransomware is through spear phishing. A malware-affected document is sent as attachment to one of the company’s employees, which is triggered once the document is opened. This type of delivery technique has been part of the default method of most APT groups since they came into the limelight in almost 2010. While the industry has generally focused on the standard change that it had to experience in order to alleviate APTs, shifting from safeguarding the organization’s perimeters to securing the organization’s internal networks as well, many vendors specifically dealt with spear phishing as well. Despite directly dealing with these threats as well as the abundant time that has passed since they were first detected – ransomware establish that this issue has not been solved in several organizations. Attack vectors from over a decade ago are still tremendously successful, even when they are executed by cybercriminal groups and not developed countries.

           

          The attack vector is not the only component of the attack. When data exfiltration is used to hold the organization for ransom, we again meet a method that has been disseminated by APTs. The act of exfiltration is a vital part of these age-old threats and should hypothetically be spotted by the solutions aimed to alleviate it. The fact that many ransomware events include the publication of internal data from files and documents demonstrates that even after over a decade, the security business fails to defend many organizations.

           

          It’s not claimed that the industry fails to halt attacks on a technical level. We only hear about the successful attacks and possibly many more attacks are stopped compared to those that were successful. Nevertheless, the fact that so many large and prestigious businesses fall victim to an attack that in many cases does not represent any new technical challenge suggests that there are still many issues that need to be fixed. The fiasco is not technical in nature, but a business one. 

           

          One of the main challenges of cybersecurity is the fact that attacks can come in several forms and trajectories. Numerous bases need to be covered in order to be secured. Cybersecurity has become very multifaceted, in terms of applying solutions to shield one own’s organization that we have authorizations now to ensure everything is applied properly.

           

           

          If we really want to defend businesses all together, not just specific customers, to ensure a safe cyberspace for all, the security business needs to stop focusing on the trending topics and begin working on solving the real problems. Until these issues are resolved, ransomware and malware will continue to inflict damage and illustrate just how bad the overall security situation is.

          TAGS

          • Cyber Crime
          • Security Updates
          • Ransomware Attacks

          Recent Blogs

          Share this article

          Ready to Get Started?

          Our specialists are ready to tailor our security service solutions to fit the needs of your organization.

            By submitting the form, you agree to the Terms of Use and Privacy Policy