You are here

Cybersecurity

Threat Awareness – Ransomware Groups Attempting to Destroy Data Rather than Encrypt to Ensure Payouts

Last week, researchers began noticing at least one ransomware group attempting to “up” the data extortion game. Researchers at Cyderes and Stairwell observed a BlackCat/ALPHV sample attempting to corrupt files within the victim’s environment rather than encrypting them and then staging the files for destruction. The data destruction functionality is being linked to Exmatter, a tool that has previously been associated with BlackMatter.

OT/ICS Cyber Resilience – Joint Cybersecurity Advisory on Control System Defense

CISA and the National Security Agency (NSA) published a joint cybersecurity advisory about control system defense for operational technology (OT) and industrial control systems (ICSs). According to the advisory, Control System Defense: Know the Opponent (AA22-265A) is intended to provide critical infrastructure owners and operators with an understanding of the tactics, techniques, and procedures (TTPs) used by malicious cyber actors.

Joint Cybersecurity Advisory – Iranian State Actors Conduct Cyber Operations Against the Government of Albania

Yesterday, the Cybersecurity and Infrastructure Security Agency (CISA) and the FBI published a joint Cybersecurity Advisory (CSA) with technical details on cyber activity by Iranian state-sponsored threat actors that launched a destructive cyberattack against the government of Albania. Members are encouraged to review this advisory for greater understanding of adversary capabilities and behaviors and for recommended mitigations to protect systems from similar threatsirrespective of threat group or victimology.

OT/ICS Cyber Resilience – The Value in Analyzing Water & Wastewater Systems Cyber Threats Around the Globe

Today, Dragos published the Gulf Cooperation Council (GCC) Water & Wastewater Systems Cyber Threat Perspective that highlights cyber threats currently targeting water and wastewater systems in the GCC region – comprising Bahrain, Kuwait, Oman, Qatar, Saudi Arabia, and the United Arab Emirates. While the geography may not seem relevant to U.S.

OT/ICS Cyber Resilience – Regardless of Size, OT Vulnerability Management Cannot be Ignored

Depending on the size of and resources available at your utility, you may not have implemented a vulnerability management program for your OT infrastructure, let alone for IT. If you have a mature program for OT you are in the minority. However, even if you don’t have a defined program, vulnerability management is a foundational cybersecurity activity that cannot be ignored by anyone.

Threat Awareness – Emotet Botnet Now Delivering Quantum and BlackCat Ransomware

The infamous Emotet botnet is now being used by attackers to deliver Quantum and BlackCat ransomware, based on a report by the cybersecurity firm AdvIntel. Emotet is a very common malware and AdvIntel has observed 1,267,598 total Emotet infections worldwide during the first nine months of 2022. Emotet typically propagates via email phishing campaigns and often hijacks email threads.

DHS Announces a Billion Dollars in Funding for First-Ever State and Local Cybersecurity Grant Program

Last week, the Department of Homeland Security (DHS) announced a first-of-its-kind cybersecurity grant program specifically for state, local, and territorial (SLT) governments across the country. This State and Local Cybersecurity Grant Program, made possible by President Biden’s Bipartisan Infrastructure Law, provides $1 billion in funding to SLT partners over four years, with $185 million available for FY22, to support SLT efforts to address cyber risk to their information systems.

Pages

Subscribe to Cybersecurity