by Dawn Dunkerley
Contributing Editor

Honda Shuts Down Factories After Cyberattack – Popular Mechanics

  • Based on samples posted online, cybersecurity researchers at MalwareBytes believe the attack fits into a family of file-encrypting ransomware variously referred to as Snake or Ekans.
  • While cybersecurity researchers say a ransomware attack is most likely to blame, it’s unclear whether the attack targeted information technology systems or industrial control systems themselves.

READ MORE

Honda Ransomware Confirms Findings of Industrial Honeypot Research- SecurityWeek

  • This year the researchers “identified multiple attackers executing ransomware operations involving data theft, the stealing of user credentials, and lateral movement across the victim’s network to compromise as many endpoints as possible.” Combined, the research indicates that cybercriminals are increasingly targeting critical infrastructure companies with increasingly dangerous attacks.
  • An analysis of a honeypot-captured attack demonstrates the three basic stages of intrusion, persistence and lateral movement, and simultaneous detonation on as many systems as possible.

READ MORE

Editor’s Note: Including two stories for the price of one here to reiterate the fact that attackers are increasingly – and successfully – targeting industrial companies with malware meant to halt operations. I am sure most of these companies “assumed” their networks were segmented to prevent an impact to their operational systems, and the worst way to find out you were mistaken is after business grinds to a stop. There is a practical path to vastly improving your chances against ransomware, but it’s neither a shiny tool nor insurance. 

Misconfigured Databases Targeted Hours After Deployment- Dark Reading

  • Misconfigured Databases Targeted Hours After Deployment researchers left a poorly configured database open on the Internet to learn who would connect to it and what they would steal.
  • Cybersecurity expert Bob Diachenko, who led the Comparitech research team in this project, says an uptick in Elasticsearch attacks led them to pursue it.

Editor’s Note: A really cool project here. For those who aren’t “geeks”, a honeypot is designed to entice attackers in order to learn about their tactics, techniques, and procedures in a simulated, but very realistic environment. What this particular honeypot learned is that a misconfigured database that was Internet-connected began receiving attacks approximately 8.5 hours after it was put in place. That’s only one business day to a potential disaster, as these attacks can steal the data from the database or be used to move further into your network.

READ MORE

When Your Biggest Security and Privacy Threats Come From the Ones You Love- Dark Reading

  • Written by Karen Levy, a lawyer and sociologist, and information security luminary Bruce Schneier, the paper examines how the dynamics of different intimate relationships break the security model in a lot of systems.
  • The use of technology in intimate relationships can quickly turn dark with very little recourse from the victim 

Editor’s Note: A sobering reminder that many online authentication methods that ask questions such as hometown, mother’s maiden name, or first car assume that only you know that information. That doesn’t take into account current and former intimate relationships that likely know those answers as well. Another great example of why strong, unique passwords stored in a password manager never goes out of style.

READ MORE

Microsoft squishes 129 bugs with Patch Tuesday updates- Naked Security

Patch Tuesday was this week and software giant Microsoft released patches to fix 129 CVEs, 11 of which are rated critical.

Editor’s Note: Ah yes, just what we all needed: Microsoft’s largest Patch Tuesday ever. Some pretty gnarly vulnerabilities here, so stop hitting that “ignore” button and patch your systems!

READ MORE

Babylon Health app leaked patients’ video consultations- Graham Cluley

Babylon Health, makers of a smartphone app that allows Brits to have consultations with NHS doctors, has admitted that a “software error” resulted in some users being able to access other patients’ private video chats with GPs.

Editor’s Note: COVID-19 has spurred the rise of teleconsultations and app-based solutions. I believe this is the wave of the future, and we’ll see more of these growing pains, just as we did here in the U.S. when medical records became digital. Couple this with the above article discussing former intimate partner violations of digital security and privacy, and your Editor reaches for the headache medicine.

READ MORE

Crooks hijack “Black Lives Matter” to spread zombie malware- Naked Security, Sophos

Sophos Home protects every Mac and PC in your home.

Editor’s Note: I would be remiss not to address the attacks attaching themselves to the Black Lives Matter movement. Just as with COVID-19, there is nothing off-limits to cyber attackers. Even with such a vital and urgent subject, follow phishing protocols and assume that if you didn’t solicit it, you shouldn’t click it.

READ MORE

Leave a Reply

Your email address will not be published. Required fields are marked *