You are here

Cybersecurity

Threat Awareness – Threat Actors Continuing the Trend of Targeting Victims Through Google Search Results

Bleeping Computer has written an article covering a malicious campaign abusing Google ads that was discovered by researchers from Sentinel Labs. The malvertising campaign redirected victims to a fake Amazon Web Services login page, registered to what is believed to be a Brazilian threat actor. The most notable thing to remember is that in many instances the bad ads rank very high in the search results. For instance, when searching for “aws,” this campaign’s malicious result appeared second, right behind Amazon’s own promoted search result.

Cyber Resilience – MFA is not a Substitute for Employee Training

Dark Reading has written an article about the recent reddit hack and how the details that have been released demonstrate the limitations of two-factor authentication and the benefits of employee training. Despite reddit requiring the use of two-factor authentication internally, attackers were still able to convince an employee to click on a malicious link and harvest their credentials.

Joint Cybersecurity Advisory - #StopRansomware - Ransomware Attacks on Critical Infrastructure Fund DPRK Espionage Activities

The Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), the FBI, the Department of Health and Human Services (HHS), and Republic of Korea’s Defense Security Agency and National Intelligence Service just released a joint Cybersecurity Advisory (CSA) to warn network defenders of malicious activity targeting U.S. and South Korean Healthcare and Public Health (HPH) Sector organizations as well as other critical infrastructure sectors.  

Joint Cybersecurity Advisory - ESXiArgs Ransomware Virtual Machine Recovery Guidance

The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI published a joint Cybersecurity Advisory (CSA) in response to the ongoing ransomware campaign known as “ESXiArgs.” This CSA provides guidance for network defenders on how to use the recovery script that CISA released as well as recommended mitigations. Members are encouraged to review the advisory, but be advised that recovery script as reported in

Threat Awareness - Use of Microsoft OneNote to Spread Malicious Payloads Rising

SC Magazine has written an article covering the rise of a new malware trend: using Microsoft’s OneNote to distribute payloads. Researchers from both Proofpoint and Sophos have observed various threat actors executing campaigns that deliver malware through OneNote attachments, likely as part of criminals’ continued attempts to test out new methods of bypassing threat detection software.

Threat Awareness - Medusa Botnet Malware Returns with Enhanced Capabilities, Ransomware Module

Bleeping Computer has written an article discussing the latest strain of the Medusa malware, which has existed in one form or another since 2015. While primarily a DDoS botnet, researchers at Cyble have discovered a new variant in the wild that’s based on the Mirai botnet’s source code leak from 2016, giving Medusa extensive new capabilities. However, the main concern is the addition of a ransomware module that gives Medusa more flexibility in how it can be used once it infects a machine.

Pages

Subscribe to Cybersecurity