All Articles (2242)

Sort by

10202124065?profile=RESIZE_400xActivity Summary - Week Ending on 11 March 2022:

  • Red Sky Alliance identified 20,047 connections from new IP’s checking in with our Sinkholes
  • Malicious Keylogger data is back with 22 Keylogged emails
  • Analysts identified 3,431 new IP addresses participating in various Botnets
  • Remote Utilities Software
  • Stone Panda
  • Slug & the Daxin Backdoor
  • Mitre ATT&CK - Sightings Ecosystem
  • Nvidia Attack
  • DDoS Annoyance?
  • Oil & Gas Saudi Arabia - Formbook Malware
  • DarkNet City

 

Full report: IR-22-070-001_weekly070.

10200055882?profile=RESIZE_400xThe US president signed an executive order (E.O.) on 9 March for “ensuring responsible innovation in digital assets.”  The E.O. is designed to, among other things, crack down on the use of cryptocurrency among cybercriminals.[1]

This long-awaited directive orders federal agencies, including the Department of Justice and the Treasury Department, to coordinate their approach to the booming cryptocurrency sector.  Although the order does not lay out specific policy suggestions, it takes aim at cons

10200049488?profile=RESIZE_400xAt the start of March, residents of Kyiv had been bracing themselves for a 40-mile-long convoy of Russian tanks, armored vehicles, and towed artillery to arrive for an assault on the Ukrainian capital.  Days later, they are still waiting.   Perhaps Russian men are too disinclined to ask for directions

On 03 March 2022, US intelligence suggested that the convoy was still stalled some distance from Kyiv, backing claims made by both the Ukrainian government and UK's defense ministry.  "We still ass

10199981459?profile=RESIZE_400xOur readers who are old enough to remember using walkie-talkies to talk with their friends or used them in the military will find this of interest.  A walkie-talkie, more formally known as a handheld transceiver, is a hand-held, portable, two-way radio transceiver.  It was developed during WW II to eliminate the need for wire connected combat (field) telephones.  Interesting enough that they are still being used on the precipice of WW III. 

Walkie-talkie communication app Zello https://zello.com

10184219479?profile=RESIZE_400xSince the beginning of phishing, fraudulent invoicing and purchasing schemes have been one of the most common lures, because they make money.  The usual modus operandi involves appealing to the recipient’s desire to avoid incurring a debt, especially where a business may be involved.  Researchers recently came across an interesting phishing e-mail masquerading as a purchase order addressed to a Ukrainian manufacturing organization that deals with raw materials and chemicals.  The e-mail containe

10178762480?profile=RESIZE_400xDuring 2022, cyber-attacks are increasing and evolving.  The attacks range from simple to complex and both are used by hackers to gain access, cloak their malware and execute their payload or exfiltrate data.  Like trained invaders, their attack will begin with reconnaissance. Cyber actors will do their best to uncover exposed assets and probe their target's attack surface for gaps that can be used as future entry points.  The first line of defense is to limit the potentially useful information

10178672901?profile=RESIZE_400xIn the last couple of years, cyber security has become a significant challenge for the maritime industry. Please join Jim McKee for The 2022 SMART4SEA Virtual Forum on a new era of cyberattacks. Every business and every individual can be subject to cyber threats. Cybercrime is a massive business; hackers are very well-organized, and they put a lot of time and effort before launching a cyber-attack. Please join Jim McKee, For Panel 3, https://youtu.be/b3ktJcPjJPE The 2022 SMART4SEA Virtual Forum

10177930093?profile=RESIZE_400xThe Russian government announced on 04 March 2011 that it will begin to “partially restrict” access to Facebook, according to an announcement from its internet regulatory agency Roskomnadzor.  Russia claimed that it would implement the measures, which were not specified after Facebook put its own restrictions on four Russian state-linked media outlets, the television network Zvezda, news agency RIA Novosti, and the websites Lenta.ru and Gazeta.ru.

“On 24 February 2022, Roskomnadzor sent requests

10176678281?profile=RESIZE_400x

Today, organizations face cyber security incidents across every sector. Data breaches are one of the most prevalent. If we were to define a data breach, it would be, “the intentional or unintentional release of secure information to an untrusted environment” (National Forum on Education Statistics). [1]

 A data breach can come from a variety of sources, including:

  • Internal threats—Actors within an organization.
  • External threats—Actors from outside an organization.
  • Intentional breaches—Breaches

10175695874?profile=RESIZE_400xLast week, Russia blocked access to BBC website and the media outlet resorted to broadcasting news bulletins over shortwave radio in the country.  According to a UK media report, the BBC said it was bringing back the WWII-era broadcasting technology in the region, just hours before its sites were banned.  "It's often said truth is the first casualty of war.  In a conflict where disinformation and propaganda is rife, there is a clear need for factual and independent news people can trust and in a

10169770270?profile=RESIZE_400xActivity Summary - Week Ending on 4 March 2022:

  • Red Sky Alliance identified 5,761 connections from new IP’s checking in with our Sinkholes
  • Malicious Keylogger data is back
  • Analysts identified 5,700 new IP addresses participating in various Botnets
  • Kraken Botnet
  • TA2541 Part II
  • Russian Hackers
  • Indian Port hit with Malware
  • Anonymous: Good or Bad Guys?
  • Popular Journalist Hacked
  • Bridgestone Americas
  • US Banks on High Alert

Link to full report: IR-22-063-001_weekly063.pdf

10167514279?profile=RESIZE_400xAn army of volunteer hackers is rising up in cyberspace to defend Ukraine, though internet specialists are calling on geeks and other "hacktivists" to stay out of a potentially very dangerous computer war.  According to Livia Tibirna, an analyst at the European cyber security firm Sekoia www.sekoia.io, nearly 260,000 people have joined the "IT Army" of volunteer hackers, which was set up at the initiative of Ukraine's digital minister Mykhailo Fedorov.

The group, which can be accessed via the en

10167240466?profile=RESIZE_400xAs news continues to break about the ongoing crisis in Western Europe, Cyber Security professionals have been busy making sense of the role that presumably planned cyber-attacks have played in the conflict between Russia and Ukraine.  A number of Russian cyber-attacks have served as a prelude to a physical invasion of Ukraine.  There is a lot of information from the past two months to unpack and new events are continuing to be reported.

A quick review of the cyber events leading up to boots on t

10167245075?profile=RESIZE_400xThe common definition of Guerrilla Warfare is a form of ‘irregular’ warfare in which small groups of combatants, such as paramilitary personnel, armed civilians, or irregulars, use military tactics including ambushes, sabotage, raids, petty warfare, hit-and-run tactics, and mobility, to fight a larger and less-mobile traditional military.  Now enter cyber guerrilla warfare.  A Ukrainian cyber guerrilla warfare group is in the process of launching digital sabotage attacks against critical Russian

10165354056?profile=RESIZE_400xJapanese auto giant Toyota said it will restart US domestic production today, a day after all of its factories nationwide ground to a halt following a cyberattack at a parts supplier.  Production lines will be switched back on at its 14 factories across the US, Toyota said in a statement.  Yesterday’s suspension hit output of around 13,000 vehicles, sparking concern about the robustness of cybersecurity in Japan's extensive supply chain.

The issue has emerged as a key area of concern in Japan, w

10162881676?profile=RESIZE_400xWith geo-political events evolving minute by minute regarding the Russian/Ukraine conflict, cyber security has been pushed to one of the top concerns relating to baniking and business enterprises.  Almost every aspect of life, commerce, governments, and military operations are tied directly to cyber activity.  Insert the added dimension of private hacking groups getting involved with this new ‘cyber-war,’ only makes the situation even more volatile. 

It is common knowledge in the cyber security

10160746052?profile=RESIZE_400xA member of the Conti ransomware group, believed to be Ukrainian of origin, has leaked the gang’s internal chats after the group’s leaders posted an aggressive pro-Russian message on their official site, on February 25th, in the aftermath of Russia’s invasion of Ukraine.  The message appears to have rubbed Conti’s Ukrainian members the wrong way, and one of them has hacked the gang’s internal Jabber/XMPP server. Internal logs were leaked earlier today via an email sent to multiple journalists an

10158988062?profile=RESIZE_400xSeveral days ago, our friends at FortiGuard Labs shared a valuable check list considering the current Ukrainian crisis.  We would like to share with our readers and thank Fortinet.   With Russian military operations currently underway in Ukraine, the question of whether cyber warfare will also be employed remains unanswered.  While researchers have seen cases of destructive cyber actions focused on Ukraine, at this point specific attribution is not possible. 

As a result of these actions, there

10158720490?profile=RESIZE_400xElon Musk announced yesterday that his company SpaceX’s satellite broadband service, Starlink, has been activated in Ukraine, after the Internet was disrupted in the country due to Russia’s invasion.  “Starlink service is now active in Ukraine.  More terminals en route,” Musk wrote on Twitter in response to Ukrainian Vice Prime Minister Mykhailo Fedorov.

“[Elon Musk], while you try to colonize Mars—Russia try to occupy Ukraine! While your rockets successfully land from space—Russian rockets atta

10158457088?profile=RESIZE_400xThe Russian military continues to be active in Ukraine; movements that started on 23 February.  Of interest, the cyber conflict is mirroring the military conflict with Russian government websites going dark to some parts of the world after being targeted with a flood of web traffic via a distributed denial-of-service (DDoS) attack attempting to knock them offline.  It is unclear who directed the attack or if it was successful in disrupting the sites.  However, cybersecurity researchers say the R