Diese Präsentation wurde erfolgreich gemeldet.
Die SlideShare-Präsentation wird heruntergeladen. ×

The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week in Security.pdf

Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige

Hier ansehen

1 von 7 Anzeige

Weitere Verwandte Inhalte

Weitere von Lior Rotkovitch (12)

Aktuellste (20)

Anzeige

The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage - F5 SIRT This Week in Security.pdf

  1. 1.  Help   Technical Articles F5 SMEs share good practice. Turn on suggestions Topics with No Replies | Recent Solutions | Contact DevCentral Search all content  BIG-IP 13.1.x reaches EoSD on December 31, 2022. Upgrade to 14.1.x or later to ensure access to software patches beyond this date. See K5903 DevCentral  Technical Articles  F5 SIRT This Week in Security: The 1B Data Leak, T... Options  F5 SIRT This Week in Security: The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage Lior_Rotkovitch F5 SIRT ‎ 15-Jul-2022 20:01 - edited ‎ 17-Jul-2022 11:30  This Week in Security July 13 2022 "The 1B Data Leak, TrickBot Gang Shift and Cyber Espionage"
  2. 2. Your editor for this issue of This Week in Security is Lior Rotkovitch. Every now and then there is a major data leak. Those data leaks are ever increasing in size and the new record, according to security news sites, belongs to China with 1 billion peoples' data leaked. Reading the news, it feels like a full scale battle is underway where everyone attacks anything that can be attacked. It also seems that all known attack vectors are fully implemented against new technologies. A recent example is the NFT market phishing attack. But as always not all hope is lost and there are always people who will fight cyber-attacks. So, we will keep on fixing the damage, restoring the configurations, and patching our systems over and over because this is what security personnel do; this is the job, and we enjoy being the protector. Until next time, stay safe! The Worst Hacks and Breaches of 2022 So Far Sneaky Orbit Malware Backdoors Linux Devices Chinese Cyber Espionage Groups Increasingly Targeting Russia Popular NFT Marketplace Phished for $540M TrickBot Gang Shifted its Focus on "Systematically" Targeting Ukraine Chinese Police Exposed 1 Billion People's Data in Unprecedented Leak Researchers Detail Techniques LockBit Ransomware Using to Infect its Targets AstraLocker ransomware decryptors released by Emsisoft The Worst Hacks and Breaches of 2022 So Far “Whether the first six months of 2022 have felt interminable or fleeting—or both—massive hacks, data breaches, digital scams, and ransomware attacks continued apace throughout the first half of this complicated year.” Data Theft From Health Care Decentralized Finance Platform Hacks Lapsus$ Group's Extortion Russia/Ukraine Hacking Breach Telecoms and More The Worst Hacks and Breaches of 2022 So Far (Wired)
  3. 3. Sneaky Orbit Malware Backdoors Linux Devices “The malware, dubbed Orbit, is unlike other Linux threats in that it steals information from different commands and utilities and then stores them in specific files on the machine, researchers from security automation firm Intezer discovered. In fact, the malware’s name comes from one of the filenames it to temporarily store the output of executed commands.” “The malware implements advanced evasion techniques and gains persistence on the machine by hooking key functions, provides the threat actors with remote access capabilities over SSH, harvests credentials, and logs TTY commands.” Sneaky Orbit Malware Backdoors Linux Devices (Threatpost) Chinese Cyber Espionage Groups Increasingly Targeting Russia “The latest investigation indicated that a Chinese state-sponsored cyber espionage group launched a “cluster” of phishing emails to deliver remote access Trojan (RAT) malware, most commonly Bisonal, against Russian targets in recent weeks.” “Believes that these documents were built with the Royal Road builder and dropped the Bisonal backdoor, both of which are strongly associated with Chinese APT groups: Royal Road is a malicious document builder used widely by such groups, while Bisonal is a backdoor RAT unique to Chinese threat actors.” Chinese Cyber Espionage Groups Increasingly Targeting Russia (infoSecurity) Popular NFT Marketplace Phished for $540M “The report comes from the publication The Block, which said on March 23rd hackers took control of private keys tied to four validator nodes. Those nodes, according to the report, belong to the Ronin Network – which Axie runs on. The second node belongs to the Axie DAO – a decentralized organization that supports the game’s ecosystem.” "All evidence points to this attack being socially engineered, rather than a technical flaw.” The disclosure did not elaborate further. Now two anonymous sources have come forward who claim “direct knowledge of the matter” are share with reporters at The Block the unconfirmed inside story about what happened.”
  4. 4. Popular NFT Marketplace Phished for $540M (Threatpost) TrickBot Gang Shifted its Focus on "Systematically" Targeting Ukraine “The group is believed to have orchestrated at least six phishing campaigns aimed at targets that align with Russian state interests, with the emails acting as lures for delivering malicious software such as IcedID, CobaltStrike, AnchorMail, and Meterpreter.” TrickBot Gang Shifted its Focus on "Systematically" Targeting Ukraine (The Hacker News) Chinese Police Exposed 1 Billion People's Data in Unprecedented Leak "In one of the most expansive and impactful breaches of personal data of all time, attackers grabbed data of almost 1 billion Chinese citizens from a Shanghai police database and attempted to extort the department for about $200,000. The trove of data contains names, phone numbers, government ID numbers, and police reports. Researchers found that the database itself was secure, but that a management dashboard was publicly accessible from the open internet, allowing anyone with basic technical skills to grab the information without needing a password.“ Chinese Police Exposed 1 Billion People's Data in Unprecedented Leak (Wired) Researchers Detail Techniques LockBit Ransomware Using to Infect its Targets "LockBit ransomware attacks are known to employ several avenues for initial infection: Exploiting publicly- exposed RDP ports, relying on phishing emails to download malicious payloads, or leveraging unpatched server flaws that allow the affiliates to gain remote access to the targeted network." "Following this step are reconnaissance and credential theft activities, which enable the actors to move laterally across the network, establish persistence, escalate privileges, and launch the ransomware. This is also accompanied by running commands to delete backups and subvert detection by firewalls and antivirus software." Researchers Detail Techniques LockBit Ransomware Using to Infect its Targets (The Hacker News)
  5. 5. AstraLocker ransomware decryptors released by Emsisoft “Malware protection specialist Emsisoft has released free decryption tools for the AstraLocker and Yashma ransomware variants. By default, the AstraLocker decryptor pre-populates locations selected for decryption from network and connected drives, but users can add other locations before initiating the decryption process. The decryptor also defaults to leaving encrypted files in place, although users can enable automatic deletion if disk space is an issue. “Since the ransomware does not save any information about the unencrypted files, the decryptor can’t guarantee that the decrypted data is identical to the one that was previously encrypted,” the guide warns. “ AstraLocker ransomware decryptors released by Emsisoft (The Daily Swig) Lior Rotkovitch | Senior Security Engineer – F5 SIRT Twitter: @rotkovitch Security  F5 SIRT series-F5SIRT-this-week-in-security TWIS Add tags 5 Kudos  Edit Comment Comment PREVIEW Paragraph                          
  6. 6.  Hint: @ links to members, content Email me when someone replies Post Your Comment Cancel Version history View Article History Last update: ‎ 17-Jul-2022 11:30 Updated by: Lior_Rotkovitch Contributors Lior_Rotkovitch ABOUT DEVCENTRAL Devcentral News Technical Forum Technical Articles F5 RESOURCES Product Documentation White Papers Glossary F5 SUPPORT Manage Subscriptions Support Portal Professional Services   
  7. 7. CrowdSRC Community Guidelines DevCentral EULA Get a Developer Lab License Become a DevCentral MVP Customer Stories Webinars Free Online Courses F5 Certification LearnF5 Training Create a Service Request Software Downloads F5 PARTNERS Find a Reseller Partner Technology Alliances Become an F5 Partner Login to Partner Central CONNECT WITH DEVCENTRAL ©2022 F5, Inc. All rights reserved. Trademarks Policies Privacy California Privacy Do Not Sell My Personal Information Cookie Preferences 

×