Sunday, June 13, 2021

Cyber Security Today, June 7, 2021 – Compromised password blamed for pipeline hack, a new phishing scam pushes fake updates and more ransomware groups emerge

Compromised password blamed for pipeline hack, a new phishing scam pushes fake updates and more ransomware groups emerge.

Welcome to Cyber Security Today. It’s Monday, June 7. I’m Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com.

 

 

This podcast is brought to you by Terranova Security, helping you discover how to build an effective security awareness training program and train the world’s cyber heroes from a lineup of cyber security experts. Register now for the 2021 Security Awareness Virtual Summit by clicking here.

Cyb er Security Today on Amazon Alexa Cyber Security Today on Google Podcasts Subscribe to Cyber Security Today on Apple Podcasts

Experts insist that following the basic principles of cyber security will go a long way to lowering the odds of being victimized by an attacker. The latest proof is last month’s ransomware attack on Colonial Pipeline in the U.S. Hackers got in by exploiting a compromised username and password, according to an official of FireEye’s Mandiant threat intelligence service. Mandiant was called in to investigate the breach. The executive told Bloomberg News the password for a virtual private network account was no longer in use, but was still valid. That password was posted on the dark web, which raises the possibility a current or former Colonial employee used the same password on another account that had been hacked.

This is another example of why multifactor authentication has to be used as extra protection for logins to all computer assets. It also shows why IT departments have to take greater responsibility for password management of changed accounts.

Crooks are taking advantage of increased worries sparked by the Colonial Pipeline attack. They are trying to trick employees into downloading malicious files pretending to be software updates. This warning comes from the cybersecurity firm I.N.K.Y. Targeted phishing messages are circulating that start with, “Given the recent ransomware attack against Colonial Pipelines and many other organizations” the employee is required to run a new update. The link to the update looks like it comes from a legitimate website. And the update page itself has the company’s logo, which also makes the scam convincing.

If your organization looks after software updates behind the scenes, report this kind of email. If your organization pushes updates that you have to install, make sure they are legitimate. Don’t be afraid to ask. Just make sure you don’t phone the number in a suspect email.

Three new ransomware groups have popped up. According to a U.S. incident response company called Speartip, one group is called Prometheus, and claims to have ties to the REvil ransomware gang. However, in most antivirus engines it will be detected as Thanos ransomware. Prometheus has published data it says has been stolen from several Mexican government departments, a gas company in Ghana, an Oklahoma cardiovascular centre and others. The other new group seen by Speartip is called Grief. It claims to have stolen data from five organizations, including a county in Alabama and a firm in Mexico. Meanwhile a U.S. threat intelligence company called Cyble has found a new gang it calls BlackCocaine. Its first victim appears to be a financial services company in India. Regardless of the number of ransomware groups IT departments have to increase their vigilance for signs of an intrusion and set up defences to protect against a successful attacker moving through their computer networks.

Finally, the U.S. continues to try to cripple malware gangs. In its latest move the Justice Department has charged a Latvian woman for her alleged role in creating and deploying the notorious malware suite called Trickbot. The woman was arrested in February in Miami. Trickbot has been stealing personal information, bank account logins and financial information from infected computers around the world since November, 2015. The allegation is the accused wrote code related to the deployment of and payments for ransomware.

That’s it for now Remember links to details about podcast stories are in the text version at ITWorldCanada.com. That’s where you’ll also find other stories of mine.

Follow Cyber Security Today on Apple Podcasts, Google Podcasts or add us to your Flash Briefing on your smart speaker. Thanks for listening. I’m Howard Solomon

Would you recommend this article?

+5
-1

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication. Click this link to send me a note →

Jim Love, Chief Content Officer, IT World Canada
Howard Solomon
Howard Solomon
Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for several of ITWC's sister publications including ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times. I can be reached at hsolomon [@] soloreporter.com

Follow this Podcast

More Cyber Security Today