Your Weekly DHS/CISA Threat Assessment (Aug …
Stay tuned for this update each week. This is a joint cybersecurity weekly product from the Missouri Information Analysis Center, St. Louis Fusion Center, Kansas City Regional Fusion Center and the Missouri Office of Homeland Security.
The US Cybersecurity and Infrastructure Security Agency (CISA) has released guidance to help government and private sector organizations prevent data breaches resulting from ransomware double extortion schemes. CISA’s fact sheet includes best practices for preventing ransomware attacks and protecting sensitive information from exfiltration attempts. The federal agency issued these recommendations in response to most ransomware gangs using data stolen from their victims’ networks as leverage in ransom negotiations under the threat of publishing the stolen info on dedicated leak sites.
Absolute Software announced a research revealing the significant management and security challenges faced by K-12 education IT teams with the rise in digital learning and widespread adoption of 1:1 device programs. The report underscores how increased device mobility and complexity are leaving schools increasingly vulnerable to security risks and potential attacks. As devices quickly became the primary mode of learning and connection for students and staff, school districts raced to expand their fleets; data shows that the total number of devices deployed across K-12 environments increased 74 percent from 2019 to 2020. At the same time, the disruption caused by digital learning – and the flurry of new technologies needed to support it – opened up new potential attack vectors for cybercriminals.
Analysis by CybSafe of incidents reported to the UK’s Information Commissioner’s Office (ICO) shows that ransomware attacks made up 22 percent of all reported cyber security incidents in the first half of 2021. This is up from 11 percent in the first half of 2020. Phishing still leads, accounting for 40 percent of all cybersecurity cases reported to the ICO, slightly down from 44 percent the year before, but ransomware has now edged into second place. Education is the sector hardest hit, with ransomware accounting for 32 percent of attacks in the first half of 2021 compared to just 11 percent the year before. With many schools rushing to transition to remote learning, increased attacks have resulted in schools losing coursework, financial records and COVID-19 testing data.
Cybersecurity researchers on Tuesday took the wraps off four up-and-coming ransomware groups that could pose a serious threat to enterprises and critical infrastructure, as the ripple effect of a recent spurt in ransomware incidents show that attackers are growing more sophisticated and more profitable in extracting payouts from victims. “While the ransomware crisis appears poised to get worse before it gets better, the cast of cybercrime groups that cause the most damage is constantly changing,” Palo Alto Networks’ Unit 42 threat intelligence team said in a report shared with The Hacker News. “Groups sometimes go quiet when they’ve achieved so much notoriety that they become a priority for law enforcement. Others reboot their operations to make them more lucrative by revising their tactics, techniques and procedures, updating their software and launching marketing campaigns to recruit new affiliates.”
“Cybersecurity doesn’t apply to me because my business is too small to matter,” and “Cybercriminals would never bother hacking us because we don’t have valuable data or many financial assets.” If these comments sound familiar, that’s because it is unfortunately the view held by a large majority of the SMB community. Small to medium sized businesses are slowly jumping on the cybersecurity bandwagon, but must first leave this ‘it would never happen to me’ mentality behind. It is understandable why small businesses would struggle to see why they would need to be protected from cyber attacks when our news outlets are littered each day with the latest breaches of multinational organizations. It seems like cyber crime belongs to the world of large enterprises and is not a concern for the average SMB. However, it is this false impression that only exacerbates the problem and helps to make small businesses an even better target for cybercriminals.
Battling in “the new frontier” of malign foreign influence requires finding ways to fill “a vast gaping hole” in helping Americans identify vulnerabilities and influence ops “every day living in technology but also with elections in the future,” the former director of the National Counterintelligence and Security Center said, adding that the Department of Homeland Security could fill that domestic engagement role. Bill Evanina told the Senate Intelligence Committee at an Aug. 4 hearing that “the holistic and comprehensive threat to the United States posed by the Communist Party of China is an existential threat, and it is the most complex, pernicious, aggressive, and strategic threat our nation has ever faced.” The private sector and academia “have become the geopolitical battle space for China” as leader Xi Jinping “has one goal: to be the geopolitical, military, and economic leader in the world, period.”
Amateur threat actors have been able to compromise critical infrastructure like industrial control systems (ICS) and other operational technology (OT) assets more often lately. Compromises of exposed OT assets rose over the past 18 months, according to threat researchers at Mandiant, with attackers using readily-available tools and common techniques to gain access to the systems. Attackers can get into those because they’re often connected to the internet without authentication and visible via connected-device search engines, like Shodan. Why else is this happening more now? And what can businesses with a lot of OT involved in their critical infrastructure do against attacks like this?
A cybersecurity flaw in a software designed by BlackBerry Ltd could put at risk cars and medical equipment that use it and expose highly sensitive systems to attackers, the U.S. drugs regulator and a federal agency said on Tuesday. The warning came after the Canadian company disclosed that its QNX Real Time Operating System has a vulnerability that could allow an attacker to execute an arbitrary code or flood a server with traffic until it crashes or gets paralyzed. The software is used by automakers including Volkswagen, BMW and Ford Motor in many critical functions including the Advanced Driver Assistance System.
EUREKA, Mo.,— Rockwood School District (the “District”) today is providing information about a recent event that may impact the privacy of some personal data related to current and former employees and students. The confidentiality, privacy, and security of information in the District’s care is one of its highest priorities and the District takes this incident very seriously. Although the District has not received any reports of actual or attempted misuse of the impacted information, the District is providing this notice in an abundance of caution. What Happened?
ShadowPad, an infamous Windows backdoor that allows attackers to download further malicious modules or steal data, has been put to use by five different Chinese threat clusters since 2017. “The adoption of ShadowPad significantly reduces the costs of development and maintenance for threat actors,” SentinelOne researchers Yi-Jhen Hsieh and Joey Chen said in a detailed overview of the malware, adding “some threat groups stopped developing their own backdoors after they gained access to ShadowPad.” The American cybersecurity firm dubbed ShadowPad a “masterpiece of privately sold malware in Chinese espionage.”
A virtual private network (VPN) is the perfect solution for a lot of issues you might experience online- accessing blocked sites, hiding your browsing activity, getting rid of internet throttling, finding better deals, and much more. But does a VPN protect you from hackers? Is your private information and files safer on the internet with a VPN? How much of a difference does it make in terms of data protection? The answer to these questions isn’t as simple as Yes or No. So, keep reading to find out. You should definitely use a VPN on a public network or your home wi-fi because it significantly protects your privacy. But a VPN can’t simply protect you from every single type of cyber attack. Some attacks are very sophisticated and complex, which even a VPN can’t prevent.
IT and communication companies in Israel were at the center of a supply chain attack campaign spearheaded by an Iranian threat actor that involved impersonating the firms and their HR personnel to target victims with fake job offers in an attempt to penetrate their computers and gain access to the company’s clients. The attacks, which occurred in two waves in May and July 2021, have been linked to a hacker group called Siamesekitten (aka Lyceum or Hexane) that has primarily singled out oil, gas, and telecom providers in the Middle East and in Africa at least since 2018, researchers from ClearSky said in a report published Tuesday.
The U.S. State Department was purportedly the victim of a serious cyber attack in recent weeks, according to a Fox News report published on Saturday. The extent of breach and when it was discovered are currently unknown. Citing an unnamed source, the outlet stated that the Department of Defense’s Cyber Command had issued notifications of a possibly serious breach. Although it’s unclear whether the State Department’s operations have been affected by the attack, Fox reported that the department’s work to evacuate thousands of Americans and Afghans from Kabul, Afghanistan amid the withdrawal of U.S. forces had not been affected.
Recent news posts
State, Local, Federal Cybersecurity Executives Confer On 2022 Threats, Attack Landscape
Your Weekly DHS/CISA Threat Assessment (September 14)
Assistant to the Special Agent in Charge at USSS-DHS Leads Keynote Presentation in Philadelphia
CISA Insights: Risk Considerations for Managed Service Provider Customers
Your Weekly DHS/CISA Threat Assessment (September 3)
Attend an Event!
Connect and collaborate with fellow security innovators at our Virtual Cybersecurity Summits.