New in Cybersecurity – Insights, threat trends, & RSA learnings

Read Time:2 Minute, 52 Second

AT&T Business’ most recently #BizTalks Twitter Chat—What’s New in Cybersecurity—Insights, Threat Trends, & RSA Learnings—explored many emerging concepts in the cybersecurity industry. [Optional sentence: Our very own Tawnya Lancaster, AT&T Cybersecurity’s threat intelligence and trends Research lead, did a takeover of the @ATTBusiness Twitter handle to provide her point of view.] Head to the @ATTBusiness Twitter page—go.att.com/twchat—to see the full chat and learn more.

It was an interesting conversation with diverse opinions. Here are some of the highlights.

Adversary tactics

The top question in terms of engagement was this one, and lots of interesting perspectives:

A3: Human weakness remains the Achilles Heel of #cybersecurity.

And human stupidity is not going to change any time soon.

We are gullible creatures.#cybersecurity #biztalks #ATTinfluencer

— Joseph Steinberg (@JosephSteinberg) June 15, 2022

A3.a: Rapidly evolving IoT malware & compromised personal devices as entry points into networks are trends. This shows an accelerated threat of home networks becoming entry points into corporate networks which has been an issue since 2020. #BizTalks #Cybersecurity #ATTInfluencer pic.twitter.com/1xoSZ304j7

— ��Tyler Cohen Wood (@TylerCohenWood) June 15, 2022

Ransomware is not new but is trending again because criminal hackers can easily get paid in crypto currencies. Also, many of those attacks are hybrid in nature, being automated and augmented with machine learning algorithms. #Cybersecurity, #BizTalks, #ATTInfluencer

— Chuck Brooks (@ChuckDBrooks) June 15, 2022

A3… This fact has proven especially problematic during the COVID-19 pandemic and will remain so in the post-pandemic era as remote working has made it easier to carry out successful social engineering campaigns… #cybersecurity #biztalks #ATTinfluencer

— Joseph Steinberg (@JosephSteinberg) June 15, 2022

Edge computing was a hot question

A7: What “Edge” means is so fluid that communication issues and differences of understanding are likely to lead to problems…#BizTalks #Cybersecurity #ATTInfluencer

— Joseph Steinberg (@JosephSteinberg) June 15, 2022

A7.c: There is a genuine concern that network attacks are almost inevitable, with over two-thirds of respondents in the #ATTCybersecurityInsightsReport2022 indicating that they think their network will be compromised with malware.#BizTalks #Cybersecurity #ATTInfluencer pic.twitter.com/giiy3JlO80

— ��Tyler Cohen Wood (@TylerCohenWood) June 15, 2022

A7: … And, of course, there are inherent risks created by moving to the edge for performance reasons – make sure you understand them.

And, if you don’t, once again, bring in outside help. From the start. Before things go wrong.#BizTalks #Cybersecurity #ATTInfluencer

— Joseph Steinberg (@JosephSteinberg) June 15, 2022

Organized cybercrime is clearly top of mind as well

A5.a: Organized cybercrime has a strong distribution network for ransomware as a service. Because of their organized nature, the velocity of attacks has increased. Not required to perform attacks themselves but can easily buy the service. #BizTalks #Cybersecurity #ATTInfluencer pic.twitter.com/vdI6NtKOoR

— ��Tyler Cohen Wood (@TylerCohenWood) June 15, 2022

Biggest risk is losing digital trust for every organization. Dealing with continuous digital transformation efforts, complicated regulatory environment, the complex supply chain ecosystem, and the hybrid workspace #BizTalks #Cybersecurity #ATTEmployee

— Bindu Sundaresan (@BinduSundaresan) June 15, 2022

A5: … Cybercriminals have even been developing the equivalent of “strategic partnerships” – with ransomware as a service providers, with parties negotiating ransomware payments, etc…#cybersecurity #biztalks #ATTinfluencer

— Joseph Steinberg (@JosephSteinberg) June 15, 2022

Don’t forget to follow @ATTBusiness on Twitter and stay tuned for our monthly #BizTalks Twitter Chats which cover a range of topics, including cybersecurity, 5G, manufacturing and supply chain, and healthcare.

Read More

Ransomware Roundup – 2022/06/16

Read Time:4 Minute, 24 Second

FortiGuard Labs has become aware of several ransomware strains that caught the public’s attention for the week of June 13th, 2022. It is imperative to raise awareness about ransomware variants because infections can cause severe damage to organizations. This week’s Ransomware Roundup Threat Signal covers Nyx, Solidbit, RobbinHood and HelloXD ransomware along with the Fortinet protections against them.What is Nyx ransomware?Nyx is a double-extortion ransomware that was recently discovered. It steals data from the victim and encrypts files on the compromised machine and then demands a ransom from the victim in exchange for file recovery and not leaking the stolen information to the public. It leaves a ransom note in a file called READ_ME.txt that includes the victim’s unique ID, the attacker’s contact email address as well as secondary email address which the victim should use in case the attacker did not respond within 48 hours of the first email being sent to the attacker. Nyx ransomware’s ransom noteThe ransomware adds the following file extension to the files it encrypts:[victim’s unique ID].[the attacker’s primary contact email].NYX Files encrypted by Nyx ransomwareWhat is the Status of Coverage?FortiGuard Labs provides the following AV coverage against Nyx ransomware:W32/Filecoder.NHQ!tr.ransomWhat is Solidbit ransomware?Solidbit is a ransomware that encrypts files on the compromised machine and demands a ransom from the victim for file recovery. Solidbit ransomware’s lock screenSolidbit ransomware drops a ransom note in a file named RESTORE-MY-FILES.txt, which includes Solidbit’s own TOR site where the victim is asked to visit to contact the attacker along with the decryption ID. Solidbit ransomware’s ransom noteThe TOR site offers free decryption of a file (up to a maximum file size of 1MB) to prove that decryption works properly. The Solidbit threat actor also provides chat support for victims. Solibit ransomware’s TOR siteWhat is the Status of Coverage?FortiGuard Labs provides the following AV coverage against Solidbit ransomware:MSIL/Filecoder.APU!tr.ransomWhat is RobbinHood ransomware?RobbinHood is a ransomware has been in the wild since at least 2019. This ransomware is covered in this week’s ransomware roundup given a report recently surfaced that it was responsible for infecting an auto parts manufacture in February, 2022 which resulted in shutdown of the factories.Written in Golang, RobbinHood is a simple ransomware that encrypts files on the compromised machine and demands ransom for decrypting the affected files. A typical ransom note left behind by RobbinHood ransomware has the attacker’s bitcoin address and asks the victim to pay the ransom within 3 to 4 days depending on the ransomware variant. The attacker warns that the ransom amount increases by $10,000 each day if the payment is not made during the specified window. However, some RobbinHood ransom notes state that the victim’s keys will be removed after 10 days. This makes file recovery impossible in order to add pressure to the victim to pay the ransom. Also, the attacker asks the victim not to contact law enforcement or security vendors.Known file extensions that RobbinHood ransomware adds to encrypted files include “.enc_robbin_hood” and “.rbhd”.It also deletes shadow copies, which makes file recovery difficult.What is the Status of Coverage?FortiGuard Labs provides the following AV coverage against RobbinHood ransomware:W32/Robin.AB!tr.ransomW32/Robin.A!trW32/RobbinHood.A!tr.ransomW32/RobbinHood.A!trW32/Ransom_Win32_ROBBINHOOD.SMW32/Filecoder_RobbinHood.D!tr.ransomW32/Filecoder_RobbinHood.D!trW32/Filecoder_RobbinHood.C!trW32/Filecoder_RobbinHood.B!tr.ransomW32/Filecoder_RobbinHood.B!trW32/Filecoder_RobbinHood.A!trWhat is HelloXD ransomware?HelloXD is a ransomware that targets both Windows and Linux systems. The ransomware has been in the field since at least November 2021 and typically comes with a logo having a red face with horns. HelloXD ransomware logoIn order to inhibit file recovery, it deletes shadow copies before encrypting files. After files are encrypted, it drops a ransom note named “Hello.txt”., This contains a unique personal ID for the victim, Tox chat ID to contact the attacker as well as instruction to download and install Tox. The note also states that a ransom payment needs to be made within 96 hours of the infection or else the ransom amount will increase. Files that were encrypted by HelloXD have a “.hello” file extension.Some of the HelloXD ransomware samples reportedly deploy MicroBackdoor, an open-source backdoor to the compromised machine. The backdoor allows the attackers to keep foothold in the victim’s machine and will not likely be removed from the victim’s machine even if a ransom payment is made. What is the Status of Coverage?FortiGuard Labs provides the following AV coverage against HelloXD ransomware:W32/Filecoder_Hello.C!trW64/Filecoder_Hello.C!trW64/Filecoder_Hello.A!tr.ransomMSIL/Filecoder.2362!tr.ransomW32/GenKryptik.FPIJ!trW64/CoinMiner.EJER!trW32/PossibleThreatAnything Else to Note?Victims of ransomware are cautioned against paying ransoms by such organizations as CISA, NCSC, the FBI, and HHS. Payment does not guarantee files will be recovered. It may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities which could potentially be illegal according to a U.S. Department of Treasury’s Office of Foreign Assets Control (OFAC) advisory.

Read More

A Vulnerability in Cisco Email Security Appliance, Cisco Secure Email & Web Manager Could Allow for an Authentication Bypass – PATCH: NOW – TLP: WHITE

Read Time:14 Second

A vulnerability in Cisco Email Security Appliance, Cisco Secure Email & Web Manager could Allow for an authentication bypass under specific conditions. Exploitation of this vulnerability could allow for an unauthenticated attacker to gain unauthorized access to the web-based management interface of the affected device.

Read More