Tag Archive for: 21st

21st August – Threat Intelligence Report


For the latest discoveries in cyber research for the week of 21st August, please download our Threat_Intelligence Bulletin

TOP ATTACKS AND BREACHES

  • The German Federal Bar (BRAK) Association, which oversees 28 regional bars throughout Germany and represents approximately 166,000 lawyers on a national and international scale, is currently investigating a ransomware attack on its Brussels office. NoEscape ransomware group claimed responsibility for this attack.

Check Point Harmony Endpoint and Threat Emulation provide protection against this threat (Ransomware.Win.NoEscape)

  • Discord.io has confirmed that the company is handling a data breach exposing the information of 760,000 members, which led to the temporarily suspension of services. This comes after a cybercriminal going by the moniker Akihirah has posted the database of Discord in an underground forum.
  • Colorado’s Department of Health Care Policy and Financing (HCPF) has released a notice that personal health data of about 4 million members of state health programs from IBM-managed systems has been obtained in Cl0p ransomware group’s third-party MOVEit attack during May 2023.

Check Point IPS blade, Harmony Endpoint and Threat Emulation provide protection against this threat (Progress MOVEit Transfer Multiple Vulnerabilities; Webshell.Win.Moveit, Ransomware.Win.Clop, Ransomware_Linux_Clop; Exploit.Wins.MOVEit)

  • Suspected North Korean hackers, thought to have ties to a North Korean entity Kimsuky group, have targeted a joint U.S.-South Korea military exercise. Reportedly, no classified information was stolen.

Check Point Threat Emulation and Anti-Bot Blade provide protection against this threat (TrojanDownloader.Win.Kimsuky.A; Backdoor.WIN32.Kimsuky.A)

  • Following a confidential data breach at Tesla, caused by two employees during May 2023 and affecting over 75K people, the company began notifying current and former employees that their information (Social Security numbers, names and addresses) has been exposed in the breach.
  • Researchers have identified a widespread hacking campaign targeting LinkedIn accounts worldwide. They have noticed the attackers are using leaked credentials from 3rd party websites, or brute-forcing…

Source…

Students at Fayetteville Technical Community College find themselves on the front lines of 21st century warfare


FAYETTEVILLE, N.C. (WTVD) — Fayetteville Technical Community College is training people to protect others from cyber attacks.

The FBI issued a new warning about the possibility of Russian cyber attacks on U.S. infrastructure, placing some students in Fayetteville on the front lines in a way they didn’t initially expect.

Christopher Barksdale is a retired veteran and former Army aircraft mechanic. Now, his new boot camp is inside a classroom at Fayetteville Technical Community College.

“It does kind of feel like you’re on the front line but in a digital sense,” Barksdale said. “You hear about digital attacks here and digital attacks there and it’s almost like you’re getting involved in a major conflict going on again.”

Barksdale enrolled in a six-week program designed to teach students foundation in cyber security.

Instructor Darryl Carter specializes in taking students with zero experience and building them into finely-tuned experts.

“The same technology that they use to operate your car is the same technology that they are going to use to try and break into your computer at home,” Carter explained. “So we have to (get) them scripting and we have to teach them software development and teach how programs are written and how to do that safely and effectively.”

Copyright © 2022 WTVD-TV. All Rights Reserved.

Source…

Malware and Hacking: The 21st Century Enterprise Battleground


Traditional cybersecurity teams are falling behind in the fight against malware and hacking. With the rise of remote work and the mobile workforce over the last 2 years, cybersecurity across the Internet and cloud domains is more complex than ever. Over the same period, the number of malware, ransomware, and hacker attacks has grown exponentially, with more than 1/3 of enterprises experiencing a ransomware attack, according to IDC. Compounding the problem: even untrained cyber attackers can use “Ransomware as a Service” platforms to perform increasingly intelligent and powerful attacks. Join us as experts explore these and other security-related issues – and examine how Cisco’s Umbrella solution help.

 

Source…

[Webinar] Risky Business – Protecting Your Data From Hackers? – April 21st, 11:30 am – 1:00 pm CDT | Association of Certified E-Discovery Specialists (ACEDS)


Paul Price

Paul Price
Vice President, Forensic Services
Xact Data Discovery

Paul Price is the Vice President, Forensic Services at Xact Data Discovery, where he manages the firm’s technical operations in areas of digital forensics and cyber security. In addition to supervising forensic examiners, he maintains an active case load and conduct digital forensic investigations for civil litigation, criminal matters, internal investigations, and cyber security efforts.

Prior to entering the private sector as a consultant, Mr. Price gained invaluable experience and training as a law enforcement officer, where he received certification as a Computer Forensic Examiner. Over the course of his career, Mr. Price has conducted, assisted, or supervised over 1000 forensic exams for local, state, and federal law enforcement agencies as well as law firms, corporations, and private individuals. His law enforcement background includes specialized assignments in Financial Crimes Investigation, Crime Scene, Computer Forensics, and Counterterrorism. Paul spent the last five years of his law enforcement career on assignment with the FBI working National Security matters and held a TS/SCI security clearance.

Mr. Price has worked on several high-profile engagements around the globe including cases dealing with Intellectual Properties, Trade Secrets, Bankruptcy, Embezzlement, Fraud, Commercial Litigation, Family Law, and Criminal matters. His work requires him to identify, preserve, analyze, and document electronically stored information (ESI) from computers, servers, mobile devices, VOIP systems, and many other sources of ESI for the purposes of evidentiary or root cause analysis. Mr. Price has been recognized and testified as a forensic expert in legal proceedings pending in both State and Federal courts.

Source…