SIDEBAR
»
S
I
D
E
B
A
R
«
Mitigating the Risk of Ransomware Attacks
Jun 14th, 2016 by aperio

In the first part of this series, we discussed the recent increase in ransomware attacks on hospitals, what ransomware is, and what features of hospitals and healthcare organizations make them especially tempting targets. In this final part, we’ll look at what organizations can do to protect themselves and their patients or clients from these attacks.

 

How to prevent attacks – or at least minimize damage

 

A recent study by SailPoint on security practices within organizations takes the stand that organizations should assume that data breaches are now a matter of “when” rather than “if.” That is, a wise organization should focus not only on preventing data breaches, but also on recovering successfully from them when they inevitably occur.

 

Since many ransomware attackers gain access from successful phishing attempts, organizations still need to focus on educating their employees to identify phishing. This means continuing to teach users how to identify suspicious emails and share them with their IT teams so those IT teams can keep track of possible attacks.

 

Phishing is a specific type of social engineering attack in which confidential information is acquired by fraudulent methods. These attacks often attempt to acquire user names, passwords, or other information useful to hackers. In the case of ransomware attacks, hackers are generally attempting to get information that will allow them access to an organization’s systems.

 

Potential phishing attempts can be identified by educated users. For instance, they often make use of link shorteners or embedded links in an effort to create links that appear legitimate. Then after these links are clicked, they take victims to websites specifically created for fraudulent purposes.

 

Phishing attempts also frequently use threats to create a sense of urgency and fear so victims will hurry and not think carefully about the potential effects of their actions. Emails that threaten to cancel accounts immediately, etc., should be considered highly suspicious.

 

Some of the other measures suggested by the Department of Homeland Security include:

 

  • Employing a data backup and recovery plan for all critical information.
  • Using application whitelisting to help prevent malicious software and unapproved programs from running.
  • Keeping operating systems and software up-to-date with the most recent patches.
  • Maintaining up-to-date anti-virus software.
  • Restricting user permissions to install and run software applications.
  • Instructing users not to follow unsolicited web links in emails.
  • Avoiding enabling macros from email attachments.

 

In the case of MedStar’s ransomware attack, data backups were a key part of their solution. The organization reported that they were able shut down their systems, isolating the damage, and later restore their data from backups without having to resort to paying a ransom.

 

Future security requirements and guidelines

 

It is possible that HIPAA requirements will be changed in the future in response to ransomware attacks. According to Bloomberg BNA, Rep. Ted Lieu (D-Calif.) is considering legislation “that would require hospitals and other health-care organizations to notify their patients when they’ve been the victim of a ransomware attack.” This would involve updating HIPAA’s current requirements regarding breach notification.

 

The FBI also offered guidance regarding the risks of ransomware in its podcast from May 25, 2016, “Ransomware on the Rise.”

 

Additional Links:

United States Computer Emergency Readiness Team, Alert TA16-091A: Ransomware and Recent Variants

Bloomberg BNA, Ted Lieu mulls ransomware attack requirements

 

 

 

Energy Companies Being Bombarded By Vicious Malware
Jun 10th, 2015 by aperio

A new malware program is being used to do reconnaissance for targeted attacks against companies in the energy sector.

The program, dubbed Trojan.Laziok by researchers from antivirus vendor Symantec, was used in spear-phishing attacks earlier this year against companies from the petroleum, gas and helium industries.

The attacks targeted companies from many countries in the Middle East, but also from the U.S., India, the U.K., and others, according to malware researchers from Symantec.

The Trojan is spread via emails with malicious documents that exploit a Microsoft Office vulnerability for which a patch has existed since April 2012.

“If the user opens the email attachment, which is typically an Excel file, then the exploit code is executed,” the Symantec researchers said Monday in a blog post. “If the exploit succeeds, it drops Trojan.Laziok, kicking off the infection process.”

Trojan.Laziok is mainly used to determine if a compromised system is worth further attention from the attackers. It collects information like the computer’s name, RAM size, hard disk size, GPU and CPU type, as well as a list of installed software, including running antivirus programs.

The information is sent back to the attackers, who then decide if they want to deploy additional malware that can provide them with remote access to the infected system. For this second stage of attack they use customized versions of Backdoor.Cyberat and Trojan.Zbot, two well known malware threats.

“The group behind the attack does not seem to be particularly advanced, as they exploited an old vulnerability and used their attack to distribute well-known threats that are available in the underground market,” the Symantec researchers said. “However, many people still fail to apply patches for vulnerabilities that are several years old, leaving themselves open to attacks of this kind.”

In a report released earlier this month, the U.S. Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) said that almost 80 percent of the 245 cyber incidents it handled last year involved companies from the energy sector.

“Of the total number of incidents reported to ICS-CERT, roughly 55 percent involved advanced persistent threats (APT) or sophisticated actors,” the organization said. “Other actor types included hacktivists, insider threats, and criminals.”

Original Article: http://www.computerworld.com/article/2904020/new-malware-used-to-attack-energy-companies.html

Photo Source: http://albumarium.com/

IT Spear Phishing Attacks – What Are They?
May 1st, 2015 by aperio

There have recently been a significant number of articles in the media relating to what are called “Spear Phishing Attacks”.

Although directed, for the moment, mainly at larger organisations, they are causing a degree of concern throughout all business sectors and technical computer support personnel.

What are they and are you vulnerable?

Phishing – a recap

To begin with, there is nothing new in this approach which is used by various forms of hackers and crooks to gain access to your confidential information.

It basically involves putting something on a screen in front of you, perhaps an e-mail or a website screen, that appears to be one thing when it is actually something else. You trust the screen in front of you and therefore obligingly enter things like your ID and password or follow the links it contains.

In fact, you are not communicating with anything legitimate and the people you have provided your password and ID to will make use of them for their own various nefarious purposes.

Although this has been around for a long time, there has recently been a variation developed which has earned the title Spear Phishing.

Spear Phishing

What happens here is that you will receive an e-mail from a friend or organisation that appears to be extremely credible in terms of its origin.

It will seem to be so because the crooks of the world have realised just how much public domain information is now freely available online relating to individuals and their business connections. For example, in facilities such as FACEBOOK and LINKEDIN, it may be comparatively easy to look at public information pages that give at least some details relating to you but also numbers of your business and personal contacts.

So, it is comparatively easy to craft an e-mail to you that appears to be coming from someone you know and trust. As a general rule, that e-mail will also invite you to send a note or look at something online, courtesy of a provided link. When you follow the link, you’ll be asked to enter your Microsoft Outlook ID and password.

From that point onwards, the tale will follow a gloomy pathway of allowing outside people access to some of your most personal and private communications.

Can you stop it?

The bad news about this type of attack is that it cannot be stopped through technical means.

It can be difficult or impossible for software, anti-virus systems or even online helpdesk support services to spot that an e-mail is not from the originator it claims to be from.

So, the ultimate weapon against it is common sense and public awareness. If you receive an e-mail from someone you know, you should really look at it and ask yourself a few questions:

1. Is the person’s phraseology exactly as you would normally expect to see it?

2. Does it contain minor grammatical errors and glitches in the English language?

3. Is that e-mail out of context? For example, are they asking you to send something or look at something which you have already previously discussed with them?

4. Is it referring to a subject matter that isn’t one you would normally expect them to be raising in an e-mail?

Two final stages:

1. Is the link it contains showing up with an “HTTPS” prefix? If it isn’t, that can be a warning sign.

2. Don’t hesitate to send a separate e-mail to the originator (NOT simply hitting the ‘REPLY’ button to the e-mail you are in doubt about), asking them if they sent it.

The bottom line is simple – vigilance is required.

SIDEBAR
»
S
I
D
E
B
A
R
«
»  Substance:WordPress   »  Style:Ahren Ahimsa