Daily NCSC-FI news followup 2021-03-26

German Parliament targeted again by Russian state hackers

www.bleepingcomputer.com/news/security/german-parliament-targeted-again-by-russian-state-hackers/ It is believed that the attackers were able to gain access to the email accounts of seven members of the German federal parliament (Bundestag) and 31 members of German regional parliaments. “The Ghostwriter campaign leverages traditional cyber threat activity and information operations tactics to promote narratives intended to chip away at NATO’s cohesion and undermine local support for the organization in Lithuania, Latvia, and Poland, ” FireEye said.

Kyberrikollisuus on poliisiasia uusi opas neuvoo yrityksiä kyberrikostilanteissa

www.epressi.com/tiedotteet/turvallisuus/kyberrikollisuus-on-poliisiasia-uusi-opas-neuvoo-yrityksia-kyberrikostilanteissa.html Kyberrikokset voivat aiheuttaa yrityksen toimintaan vakavia häiriöitä ja merkittävää taloudellista vahinkoa. Kyberrikoksen uhriksi joutuminen ei ole häpeä

SolarWinds patches critical code execution bug in Orion Platform

www.bleepingcomputer.com/news/security/solarwinds-patches-critical-code-execution-bug-in-orion-platform/

Apple fixes iOS zero-day vulnerability exploited in the wild

www.bleepingcomputer.com/news/security/apple-fixes-ios-zero-day-vulnerability-exploited-in-the-wild/ Apple has released security updates to address an iOS zero-day bug actively exploited in the wild and affecting iPhone, iPad, iPod, and Apple Watch devices. The zero-day was discovered in the Webkit browser engine and allows attackers to launch universal cross-site scripting attacks after tricking targets into opening maliciously crafted web content on their devices.

Insurance Giant CNA Hit with Novel Ransomware Attack

threatpost.com/cna-hit-novel-ransomware/165044/ The incident, which forced the company to disconnect its systems, caused significant business disruption. The attack occurred earlier this week and leveraged a new variant of the Phoenix CryptoLocker malware.

Hades ransomware operators are hunting big game in the US

www.zdnet.com/article/hades-ransomware-operators-are-hunting-big-game-in-the-us/ Accenture says that the threat actors are focused on hunting organizations that generate at least $1 billion in annual revenue. See also:

www.accenture.com/us-en/blogs/cyber-defense/unknown-threat-group-using-hades-ransomware

New Advanced Android Malware Posing as “System Update”

blog.zimperium.com/new-advanced-android-malware-posing-as-system-update/ The new malware disguises itself as a System Update application, and is stealing data, messages, images and taking control of Android phones. Once in control, hackers can record audio and phone calls, take photos, review browser history, access WhatsApp messages, and more

You might be interested in …

Daily NCSC-FI news followup 2021-05-29

Sophisticated Spearphishing Campaign Targets Government Organizations, IGOs, and NGOs us-cert.cisa.gov/ncas/alerts/aa21-148a The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) are engaged in addressing a spearphishing campaign targeting government organizations, intergovernmental organizations (IGOs), and non-governmental organizations (NGOs). CISA and FBI acknowledge open-source reporting attributing the activity discussed in the report to […]

Read More

Daily NCSC-FI news followup 2020-03-25

Updated protection for Microsoft Office 365 www.kaspersky.com/blog/office-365-protection-update/34412/ In the context of the coronavirus pandemic, there is a growing need to protect collaborative software. We updated Kaspersky Security for Microsoft Office 365 and extended the free license period to six months. US Government Sites Give Bad Security Advice krebsonsecurity.com/2020/03/us-government-sites-give-bad-security-advice/ Many U.S. government Web sites now carry […]

Read More

Daily NCSC-FI news followup 2020-06-09

CallStranger UPnP bug allows data theft, DDoS attacks, LAN scans www.bleepingcomputer.com/news/security/callstranger-upnp-bug-allows-data-theft-ddos-attacks-lan-scans/ A vulnerability in the Universal Plug and Play protocol implemented in billions of devices can be exploited to exfiltrate data, turn them into bots for distributed denial-of-service attacks (DDoS), and scan internal networks. US energy providers hit with new malware in targeted attacks www.bleepingcomputer.com/news/security/us-energy-providers-hit-with-new-malware-in-targeted-attacks/ […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.