Posts

Week 11: The latest mass ransomware attack has been unfolding for nearly two months

This year, hackers have been targeting big brands. A mass ransomware attack has been going on for about two months. The attacks have been adding new victims such as Procter & Gamble and a U.K. pension fund acknowledging.  The ransomware gang called Clop is responsible for the attack. This group claimed to have attacked 130 victims by exploiting the "zero-day vulnerability in popular file-transfer software. This group is targeting specific targets and was identified on February 1st by Fortra. This is the second mass ransomware of this year. As ransomware gangs look for new vulnerabilities, victims have become unwilling to report or pay for the data and the unlocking of their systems. On February 7th, Fortra released a fix for the vulnerability.   Even though Fortra informed their customers that their data was safe, victims later learned that this wasn't true as they were targeted for ransomware. Just the past week, there have been 4 big corporations victims of a breach. The...

Week 10: Most mid-sized businesses lack cybersecurity experts, incident response plans

According to a Hunteress analysis, 99% of all companies dealing with cybersecurity issues in the United States and in Canada are mid-sized companies. According to the analysis, 49% of mid-sized businesses will raise their cybersecurity budget.  For 61% of mid-sized businesses, there are no professional cybersecurity experts in their companies. In addition as 47% of them don't have an incident response plan, 24% of those mid-sized companies are unsure if they have been the victim of a cyber attack. 27% of medium-sized enterprises stated they lacked cyber insurance.  Despite lacking security measures, mid-sized businesses also have difficulty in putting basic training procedures, while just 9% of the surveyed indicated that their employees follow the security best practices. This disparity can lead to more opportunities for cybercriminals. In addition, 69% stated that they have the requisite to have some form of cyber insurance and about 30% report not having one.  Those nu...

Week 9: Acer Confirms Breach After Hacker Offers to Sell Stolen Data

One of the largest electronics manufacturers, Acer, has been hacked. The hacker of this breach is offering to sell 160 Gb of data stolen from their systems, however, there is still no sign that consumer data was leaked from the breached server.  The hacker claimed the data was stolen in mid-February, and he also informed the potential buyers that the sale of the data will be on a well-known cybercrime forum for Monero cryptocurrency.  Those files are said to contain confidential slides, staff manuals, confidential product documentation, binary files, information on backend infrastructure, disk images, replacement digital product keys, and BIOS-related information. Breaches like this one are unfortunately not unusual for Acer. In 2021, the servers in India and Taiwan were targeted and breached. The hackers stole more than 60 Gb of data from the company's systems. Big companies being targeted and breached is nothing new, but the fact that this happened multiple times makes me be...

Week 8: Dish Network confirms network outage was a cybersecurity breach

Dish Network, one of the largest TV providers in the United States, revealed that the "network outage" that happened on Tuesday was the result of a cybersecurity breach. This breach troubled the workers of Dish Network and its clients.  The impact of this data breach also led to a drop in their stock value. Data were stolen and the company had to reach out to professionals for help. The trespassing happened on February 23rd through an internal outage. While the company encounters network servers and IT telephony problems, customers also couldn't log into their accounts.   The impact of this cybersecurity breach is unexpected because the whole company network went through an outage, and even though it has been almost a week, the company is still trying to recover from the situation. Unfortunately, such a breach couldn't go unnoticed because of the size of the company.   Reference: https://www.cnbc.com/2023/02/28/dish-network-confirms-network-outage-was-a-cybersec...

Week 7: Cybersecurity Burnout – Human vs Machine

As cyber threats continue to grow in numbers, targeting databases and companies' digital assets, security experts constantly develop security measures to undermine those threats. As a result, analysts in today's SOCs are highly pressured to perform well as they are expected to protect companies' data, regardless of its location, while navigating the complexity of the modern hybrid organization. In a Twitter poll, 63% of the participants pointed out the importance of data security as being of high importance. The survey also stated that 6 in 10 organizations received more than 500 cloud security alerts per day. The mental fatigue of those constant threats caused companies to miss critical alerts weekly or even daily. 55% of companies admit to it. Therefore, security experts' fear of missing incidents (FOMI) increases because data breaches will affect the company's credibility and will result in monetary damages, and fines. 35% of cyber professionals also reveal they ...

Week 6: Pepsi Bottling Ventures suffers data breach after malware attack

Pepsi Bottling Ventures LLC is one of the largest beverages company in the US and has 18 bottling operations.  The company became the victim of network intrusion, leading to a data breach. The information-stealing malware was installed and was able to extract data from the IT systems.  Unfortunately, the breach was only discovered on January 10th 2023 as there was a trace of access from an unknown party who had downloaded information from the system. This breach was discovered 18 days after the malware infiltration, and the malware remediation took a long time.  The data was exposed for a period of 27 days. Numerous sensitive pieces of information were stolen such as full names, home addresses, financial account information, SSNs, and so on.  In order to countermeasure this breach, the company decided to reset all company passwords, notified law enforcement, and reinforced network security. In addition, the company compromised systems were suspended in order to asses...

Week 5: FormBook Malware Spreads via Malvertising Using MalVirt Loader to Evade Detection

A wave of ad fraud is spreading throughout virtualized .NET loaders, which will install Formbook information-stealer malware to the device. Fraud ads use malicious engines in order to make users download well-known applications, but instead of downloading the desired application, they will get a trojanized malware into their device. In addition, the loader will disguise itself as a legal Microsoft Process Explorer driver, and try to have elevated permission. By gaining access to those privileges, they can terminate applications that could detect its presence in the system.  For instance, the loaders MalVirt use obfuscated virtualization for anti-analysis and evasion with the Windows Process Exploder driver to terminate processes. This one uses the KoiVM virtualizing protector for .NET applications in order to disguise itself and spread the FormBook malware Since Microsoft revealed they want to prohibit the execution of macros in Office by default from files obtained from the intern...