Tag Archive for: strike

Microsoft SQL servers hijacked to deliver Cobalt Strike and ransomware


Unknown threat actors are targeting poorly protected Microsoft SQL servers, in an attempt to infect them with a new strain of ransomware

A new report from cybersecurity researchers Securonix outlines a campaign in which hackers first try to brute-force their way into MS SQL servers.

Source…

Hackers strike Iranian government, releasing presidential documents


A group of hackers working against the Iranian government have struck again, this time with a second trove of documents obtained from the highest levels of the authoritarian regime.

Credit for the attack was claimed by the group calling itself “Ghiam ta Sarnegoun”, or “Rise to Overthrow”.

The attack follows a similar episode in early May, when the group defaced the website of Iran’s foreign ministry with messages in support of Maryam Rajavi, president-elect of the National Council of Resistance of Iran — a politician-in-exile with backing from many in the west, including in Washington.

Among the documents posted in the second attack, which were posted online on 29 May, were directives from the office of Iran’s president, Ebrahim Raisi. In one, addressed to a top security chief by Mr Raisi’s chief of staff, the president raises clear concerns about ongoing protests in the country that began last year in response to the killing of a young woman in police custody over her supposedly improper headcovering.

“In these incidents, in addition to the initial intelligence surprise of the September 1st, in particular the events of October 26, as well as the strikes and riots on November 15, 16 and 17 no prediction and prevention [options] were [presented], and the analysis were based only on general and imprecise estimates and calls in the social media,” reads one letter in part.

“To correct this process and prevent repetition of these surprises in the future what has been done? As the failure and end point of the enemy’s project were not included on 7 and 8 of December reports of analyzes and predictions,” that letter continues, adding later: “Unfortunately, in recent months, the reports have mostly [been] describing the events of the streets and waiting to discover the surprising devices of the enemies.”

Other documents were equally unflattering. A second letter to an intelligence minister again signed by Mr Raisi’s chief of staff laid out known issues with Iran’s intelligence community including “incompetent and dependent managers”, “infiltration”, as well as “marginalisation and demoralisation of revolutionary forces”.

Passports belonging to top Iranian officials were previously posted online in early May by a group calling itself ‘Ghiam ta Sarnegoun’, or ‘uprising until overthrow’ (The Independent)

Passports belonging to top…

Source…

Learn how to stop hackers before they strike for $79


This content is made possible by our sponsor; it is not written by and does not necessarily reflect the views of Engadget’s editorial staff.

Cybercriminals never seem to sleep, and their targets aren’t just . Hackers can go after everyday internet users with social engineering methods like , and it’s up to cybersecurity professionals to prevent these agents from accessing critical company and personal data.

Cybersecurity professionals are hackers themselves, in a way. They utilize the same tools to find vulnerabilities in their organizations’ networks, but they’re also quick to address potential risks before malicious actors can take advantage of them. If you want to learn how to use these skills ethically, the , the best price on the web.

The courses are provided by , an e-learning platform specializing in IT certification training. Its “edutainers” present content in a talk-show format to keep your learning experience fresh and compelling.

If you want to land your first cybersecurity role, earning professional credentials can help your application stand out. The bundle offers prep material for several key certifications, including CompTIA CASP+, Cisco CCNP Security, ISACA CISM and more. On top of that, the collection features courses on individual skills, including mobile security, penetration testing and Python. You’ll even find lessons on GDPR compliance.

Course list:

  • Microsoft Azure Security Technologies (AZ-500)

  • Cisco CCNP Security SCOR (Exam 350-701)

  • CertNexus Cyber Secure Coder (CSC-110)

  • Python for Security

  • Linux Security Techniques

  • Microsoft 365 Security Administration (MS-500)

  • Microsoft MS-101: Microsoft 365 Mobility and Security

  • Hands-On Web App Pentesting

  • Penetration Testing

  • Mobile Security

  • General Data Protection Regulation (GDPR)

  • Practical Pentesting featuring Brad Stine

  • Cisco CCNP Security SNCF (300-710)

  • CompTIA PenTest+ (PT0-002)

  • Ethical Hacker Certification v11

  • NIST Cybersecurity & Risk Management Frameworks

  • CompTIA Security+ (SY0-601)

  • (ISC) CISSP

  • Palo Alto Networks Cybersecurity Fundamentals (PCCSA)

  • Hands-on Hacking

  • CompTIA CySA+ (CS0-002)

  • ISACA Certified Information Security Manager…

Source…

What the Tech? Malware Can Strike Your WiFi Router If You’re Not Careful


Posted:

The home WiFi router is one of those things we don’t think about until it stops working.

It’s responsible for making sure all of those devices in our homes can connect to the internet. You could even argue it’s the single most important device in your home.

The bad guys apparently think so, because they’re making WiFi routers their favorite target.

Cyber Security analysts at Black Lotus Lab discovered malware in routers used in small homes and home offices. Here’s how they say it works:

The malware is deployed, most often, when someone opens an email attachment or visits a rogue website. The malware gains access not just to the computer but to the network’s WiFi router.

If you never changed the default username and password, hackers can easily find the login information online and have access to the router’s administrator settings. Once logged on as an administrator they can upload and download files to any device that’s connected to your WiFi router.

Phones, computers, web cameras, TVs, doorbells, and locks. Everything.

The Black Lotus Lab analysts say so far this malware has primarily stolen personal information, financial information, and secure business info, but add, it’s very sophisticated and there’s no limit to the damage it can do.

How do you know if your router is compromised? If the computer is sluggish, not loading pages or running programs like before. Of you get unusual pop-ups on the screen or get taken to strange or spoofed websites.

To protect your router and everything connected to it, turn the router off, wait about 20 seconds and turn it on again. This will reset the router and install any updates, this will delete the malware from running on the WiFi network. Change the username and password in the router’s settings.

If your router is 5 years old or older and it hasn’t been updated, you’ll want to re-set the router soon. You may also want to get a new WiFi router. They’re much faster and more secure than they were 5 years ago.

 

Source…