You are here

Cybersecurity

No Joke – Joker’s Stash Calling it Quits, This Time

Joker’s Stash, one of the oldest, most successful credit card and point-of-sale dump repositories appears to be closing its doors. According to Flashpoint, between PCI-DSS enhancements, COVID-19, and blockchain domain takedowns, Joker’s Stash may have finally succumbed to death by a thousand cuts. As many utilities accept credit cards for payments, there is always concern about the card processing platform or service becoming compromised and actors absconding with hundreds or thousands of payment card records processed for utility payments.

WaterISAC Spotlighted during Recent Cybersecurity Evangelist Podcast

WaterISAC Cybersecurity Risk Analyst Jen Walker put the spotlight on WaterISAC during a recent “Cybersecurity Evangelist” podcast she hosts for risk management firm Gate 15. Jen spoke with WaterISAC Director of Preparedness and Response Chuck Egli, and together they discussed how WaterISAC operates in support of the security and resilience of the water and wastewater sector. Their conversation included discussions of WaterISAC’s products and services, providing an orientation for new and aspiring members and a refresher for WaterISAC veterans.

CISA Analysis Report: Strengthening Security Configurations to Defend against Attacks Targeting Cloud Services

The Cybersecurity and Infrastructure Security Agency (CISA) has published an analysis report advising that threat actors are using phishing and other vectors to exploit poor cyber hygiene practices within a victims’ cloud services configuration, adding that it is aware of several recent successful attacks. CISA observes these types of attacks frequently occurred when victim organizations’ employees worked remotely and used a mixture of corporate laptops and personal devices to access their respective cloud services.

Threat Awareness – MegaCortex Ransomware Overview

Researchers at Heimdal Security have provided a high-level overview of MegaCortex ransomware. While MegaCortex has been primarily known to target enterprise networks, members may recall that version 2 has been linked to its OT process aware cousin, EKANS. For more on EKANS and its relationship to MegaCortex v2, members are encouraged to review the Security & Resilience Update on February 4, 2020.

General Cybersecurity Hygiene Compendium

‘Tis the new year, and with a new year comes a great time to revisit some of the basic blocking and tackling of cybersecurity. Listed in this post you will find sage guidance on some cyber hygiene basics. Tackle a topic a week and you’re sure to keep busy. Oh, and don’t forget to review those policies and procedures (#9 in WaterISAC’s 15 Cybersecurity Fundamentals for Water and Wastewater Utilities) – these tips and tools could be valuable updates!

NSA Cybersecurity Directorate Releases 2020 Year in Review

The National Security Agency (NSA) Cybersecurity Directorate has released its 2020 Year in Review, outlining key milestones and mission outcomes achieved during its first full year of existence. The report begins by highlighting NSA Cybersecurity’s contributions to the 2020 elections, Operation Warp Speed, and the Department of Defense’s pandemic-influenced transition to telework. But it also discusses the organization’s work to strengthen public-private partnerships and steps it took to build a more diverse and resilient workforce.

Cybersecurity and Physical Security Convergence Guide (CISA)

The Cybersecurity and Infrastructure Security Agency (CISA) has published a Cybersecurity and Physical Security Convergence Action Guide, which provides guidance on converging cybersecurity and physical security functions to better position organizations to mitigate cyber-physical threats. Convergence is defined as formal collaboration between previously disjointed security functions, and is anchored by communication, coordination, and collaboration.

Cyber Threat Intelligence - The Importance of OSINT for ICS

Adversaries do not usually have to work too hard to discover valuable information to plan and execute attacks against their targets. Even threat actors targeting ICS are able to find plenty of open source information during their reconnaissance phase to disrupt operational functions. For example, Dragos observed adversaries conducting ICS-targeting activities that sought data about energy infrastructure and physical processes necessary to recover from a compromise.

FBI PIN: Egregor Ransomware Targets Businesses Worldwide, Attempting to Extort Businesses by Publicly Releasing Extorted Data

The FBI has published a Private Industry Notification (PIN) on the Egregor ransomware, noting that the threat actors behind this operation have so far claimed to have compromised over 150 victims worldwide. The PIN provides an overview of the Egregor operation, observing that once a victim company’s network is compromised the threat actors exfiltrate and encrypt files on the network. The threat actors then demand a ransom payment for the return of the exfiltrated files and decryption of the network.

Pages

Subscribe to Cybersecurity