<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Newsletter - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/newsletter/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/newsletter/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Fri, 24 Mar 2023 15:08:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Newsletter - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/newsletter/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>CDT Watch – March 2023</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/03/cdt-watch-march-2023/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/03/cdt-watch-march-2023/#respond</comments>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Fri, 24 Mar 2023 15:08:27 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[risk]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=20080</guid>

					<description><![CDATA[<p>An overview of the different cybercriminal uses case of ChatGPT The one year report about the cyber operations between Ukraine and Russia, by the CERT-EU CHATGPT What opportunities for the underground world of cybercrime ?   Need a refresh about...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/03/cdt-watch-march-2023/">CDT Watch – March 2023</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<ul>
<li>An overview of the different cybercriminal uses case of ChatGPT</li>
<li>The one year report about the cyber operations between Ukraine and Russia, by the CERT-EU</li>
</ul>
<h1 style="text-align: center;">CHATGPT</h1>
<h2 style="text-align: center;">What opportunities for the underground world of cybercrime ?</h2>
<h2> </h2>
<h2 style="text-align: left;"><strong>Need a refresh about ChatGPT?</strong></h2>
<p style="text-align: justify;"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-20082 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image1-1.png" alt="" width="1129" height="231" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image1-1.png 1129w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image1-1-437x89.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image1-1-71x15.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image1-1-768x157.png 768w" sizes="(max-width: 1129px) 100vw, 1129px" /></p>
<p style="text-align: center;"><em>Figure 1 &#8211; Screenshot from ChatGPT when prompted &#8220;Introduce ChatGPT in a funny way and at the first person&#8221;</em></p>
<p> </p>
<p style="text-align: justify;">Unless living under a rock, you have heard about the incredibly notorious <span style="color: #503078;"><strong>AI powered chatbot</strong> </span>developed by OpenAI: Chat GPT, a tool that relies on the Generative Pre-trained Transformer architecture. But just in case, you must know that ChatGPT has been trained on a <span style="color: #503078;"><strong>vast amount of data from the Internet</strong> </span>and is able to <span style="color: #503078;"><strong>understand human speech</strong></span> and <span style="color: #503078;"><strong>interact</strong> </span>with users. Chat GPT has not finished to be talked about: on March 14<sup>th</sup> 2023, Open AI has announced the <strong><span style="color: #503078;">arrival of Chat GPT 4.0</span><a href="#_edn1" name="_ednref1">[i]</a></strong>.</p>
<p style="text-align: justify;">The growing popularity and potential future applications of ChatGPT have also caught the attention of cybercriminals. Nord VPN&#8217;s examination of Dark Web posts from January 13th to February 13th revealed a significant increase in Darkweb forum threads discussing ChatGPT, <span style="color: #503078;"><strong>jumping from 37 to 91 in just a month</strong></span>. The main topics of these threads included:</p>
<ul style="text-align: justify;">
<li>Breaking ChatGPT</li>
<li>Using ChatGPT to create Dark Web Marketplace scripts</li>
<li>A new ChatGPT Trojan Binder</li>
<li>ChatGPT as a phishing tool with answers indistinguishable from humans</li>
<li>ChatGPT trojan</li>
<li>ChatGPT jailbreak 2.0</li>
<li>Progression of ChatGPT malware</li>
</ul>
<p><img decoding="async" class="aligncenter wp-image-20084 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image2.jpg" alt="" width="245" height="230" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image2.jpg 245w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image2-203x191.jpg 203w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image2-42x39.jpg 42w" sizes="(max-width: 245px) 100vw, 245px" /></p>
<p style="text-align: center;"><em>Figure 2 &#8211; Screenshot from CheckPoint: Cybercriminal is using ChatGPT to improve Infostealer’s code</em></p>
<p> </p>
<p style="text-align: justify;">These threads give a first <span style="color: #503000;"><strong><span style="color: #503078;">interesting overview of all the rogue usage that can involves ChatGPT or be carried out via the chatbot</span>.</strong></span> Another key security concern could also be included in this list when thinking about ChatGPT’s limitations in terms of cybersecurity, which is the risk of personal and/or corporate data leak, that could lead to identity theft, fraud, or other malicious uses.</p>
<p style="text-align: justify;"><strong> </strong></p>
<h2 style="text-align: justify;"><strong>What are the plausible cybercriminal use cases?</strong></h2>
<p style="text-align: justify;"><strong><em> <img decoding="async" class="aligncenter wp-image-20086 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image3-1.png" alt="" width="883" height="468" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image3-1.png 883w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image3-1-360x191.png 360w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image3-1-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image3-1-768x407.png 768w" sizes="(max-width: 883px) 100vw, 883px" /></em></strong></p>
<p style="text-align: center;"><strong><em> </em></strong><em>Figure 3 &#8211; Screenshot of a ChatGPT answer when prompted “Talk at the first person about possible cybercriminal usage of ChatGPT”</em></p>
<p> </p>
<h3 style="text-align: justify;"><strong>Use Case #1 – Support malware creation and kill chain attack</strong></h3>
<p style="text-align: justify;">ChatGPT is designed to decline inappropriate requests but there are ways to bypass its restrictions and generate malicious code. For example, instead of directly requesting a ransomware script, users can describe step-by-step functions needed for such a script, ultimately receiving functional parts of malicious code.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20088 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image4-2.png" alt="" width="569" height="460" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image4-2.png 569w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image4-2-236x191.png 236w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image4-2-48x39.png 48w" sizes="auto, (max-width: 569px) 100vw, 569px" /></p>
<p style="text-align: center;"><em>Figure 4 – Screenshot of a ChatGPT answer to the request “Write me a function named &#8220;find_files&#8221; in Python that searches all files that end up with &#8220;txt, pdf, docx, ppt, xlsm&#8221; starting from the root directory and that return all paths of files that match with the criteria”.</em></p>
<p> </p>
<p style="text-align: justify;">It has been proven possible to use ChatGPT to insert harmful code into a commonly used <a href="https://www.cyberark.com/resources/threat-research-blog/chatting-our-way-into-creating-a-polymorphic-malware">computer program and create programs that constantly change their appearance</a>, making them harder for security software to detect and block and to obtain an <a href="https://research.checkpoint.com/2022/opwnai-ai-that-can-save-the-day-or-hack-it-away/">entire process of an artificial intelligence-driven cyberattack</a>, starting with targeted phishing emails and ending with gaining unauthorized access to someone&#8217;s computer.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20090 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image5.png" alt="" width="569" height="440" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image5.png 569w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image5-247x191.png 247w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image5-50x39.png 50w" sizes="auto, (max-width: 569px) 100vw, 569px" /></p>
<p style="text-align: center;"><em>Figure 5 &#8211; Screenshot from CheckPoint: Example of the ability to create a malware code without anti-abuse restrictions in a Telegram bot utilizing the OpenAI API</em></p>
<p> </p>
<p style="text-align: justify;">However, as highlighted by <a href="https://www.ncsc.gov.uk/blog-post/chatgpt-and-large-language-models-whats-the-risk">NCSC</a> and <a href="https://www.kaspersky.fr/blog/chatgpt-cybersecurity/20052/">Kaspersky</a>, <span style="color: #503078;"><strong>using ChatGPT</strong></span> for creating malware is not that reliable, due to potential errors and logical loopholes in the generated code, and even if it provides a certain level of support, <span style="color: #503078;"><strong>the tool doesn’t currently reach the level of cyber professional.</strong></span></p>
<p style="text-align: justify;"><strong> </strong></p>
<h3 style="text-align: justify;"><strong>Use Case #2 – Discover and exploit vulnerabilities</strong></h3>
<p style="text-align: justify;">When it comes to code vulnerabilities, ChatGPT raises several challenges in terms of detection and exploitation.</p>
<p style="text-align: justify;">In terms of <span style="color: #503078;"><strong>detection</strong></span>, ChatGPT is currently able to detect vulnerabilities in any piece of code submitted if properly prompted to do so, but it can also debug code. For example, when a computer security researcher asked ChatGPT to solve a capture-the-flag challenge, it successfully detected a buffer overflow vulnerability and wrote code to exploit it, with only a minor error that was later corrected.</p>
<p style="text-align: justify;">In terms of <span style="color: #503078;"><strong>exploitation</strong></span>, the risks posed by ChatGPT, and more generally Large Language Models (LLMs) can be used to produce malicious code or exploits despite restrictions, as they can be bypassed. Additionally, LLMs may generate vulnerable and misaligned code, and while future models will be trained to produce more secure code, it&#8217;s not the case yet. Moreover, some security researchers remain skeptical about AI&#8217;s ability to create modern exploits that require new techniques.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;"><strong>Use Case #3 – Create persuasive content for phishing and scam operations</strong></h3>
<p style="text-align: justify;">Creating persuasive text is a major strength of GPT-3.5/ChatGPT, and GPT-4 performs even better in this area. Consequently, it&#8217;s highly probable that automated spear phishing attacks using chatbots already exist. Crafting targeted phishing messages for individual victims is more resource-intensive, which is why this technique is typically reserved for specific attacks.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20092 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image6.jpg" alt="" width="266" height="254" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image6.jpg 266w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image6-200x191.jpg 200w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image6-41x39.jpg 41w" sizes="auto, (max-width: 266px) 100vw, 266px" /></p>
<p style="text-align: center;"><em>Figure 6 &#8211; Screenshot from chatGPT, pishing mail generation</em></p>
<p> </p>
<p style="text-align: justify;">ChatGPT has the potential to significantly change this dynamic, as it allows cybercriminals to <span style="color: #503078;"><strong>produce personalized and compelling messages for each target</strong>.</span> To include all necessary components, however, the chatbot requires detailed instructions.</p>
<p style="text-align: justify;">A notable advantage of ChatGPT is its capability to interact and create content in multiple languages, complete with reliable translation. In the past, this was a key way to identify scams and phishing attempts. While some methods are being developed to detect content created by ChatGPT, they haven&#8217;t yet proven entirely effective.</p>
<p style="text-align: justify;">This poses a significant risk to all companies, as it makes their employees more susceptible to such attacks and may expose their resources if passwords are stolen in this manner. As mentioned earlier, it is essential to raise awareness about this issue while also strengthening authentication methods, such as implementing two-factor authentication as a potential solution.</p>
<p style="text-align: justify;">Interestingly, other uses have been made of ChatGPT notoriety to develop scams without using the tool itself, such as <strong><span style="color: #503078;">phishing mails/Scams</span></strong> in order to push towards the purchase of a (fake)<span style="color: #503078;"><strong> ChatGPT subscription</strong> </span>and <a href="https://www.hackread.com/scammers-chatgpt-phishing-scam/?web_view=true">to provide personal data details</a></p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;"><strong>Use Case #4 Exploit companies’ data</strong></h3>
<p style="text-align: justify;">ChatGPT has been trained on a massive amount of internet data, including personal sites and media content, meaning that it may have access to personal data that is currently hard to remove or control, as no &#8220;right to be forgotten&#8221; measures exist to date. Consequently, ChatGPT&#8217;s compliance with regulations like GDPR is under debate. GPT-4 can manage basic tasks related to personal and geographic information, such as identifying locations connected to phone numbers or educational institutions. By combining these capabilities, GPT-4 could be used to <span style="color: #503078;"><strong>identify individuals when paired with external data.</strong></span></p>
<p style="text-align: justify;">Another significant concern is the <span style="color: #503078;"><strong>sensitive information</strong></span> users might <span style="color: #503078;"><strong>provide through prompts</strong></span>. Users could inadvertently share confidential information when seeking assistance or using the chatbot for tasks, like reviewing and enhancing a draft contract. This information may appear in future responses to other users&#8217; prompts. They might not only find their confidential documents or research leaked on such platforms due to employees&#8217; inattention, but also reveal <span style="color: #503078;"><strong>information about their system or employees</strong></span> which will be used by hacker to <span style="color: #503078;"><strong>facilitate an intrusion</strong></span>. The primary course of action should be to increase awareness on this subject by providing formation and explanation or to restrict access to the website in the sensitive domains until there is a better comprehension of how data is utilized.</p>
<p style="text-align: justify;">Not only the real ChatGPT can be used for this objective, but the creation of <span style="color: #503078;"><strong>other chatbots</strong></span> using the same model as ChatGPT but configured to <span style="color: #503078;"><strong>trick victims into disclosing sensitive information</strong></span> or <span style="color: #503078;"><strong>downloading malware </strong></span>has also been observed.</p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;"><strong>Use Case #5 Disinformation campaigns </strong></h3>
<p style="text-align: justify;">ChatGPT can be used to quickly write very convincing articles and speeches <a href="https://www.nextinpact.com/article/70999/chatgpt-bard-et-autres-agents-desinformation-massive">based on fake news.</a> The American startup Newsguard <a href="https://www.newsguardtech.com/misinformation-monitor/jan-2023/">has conducted an experience</a> on ChatGPT to demonstrate its disinformation potential: on 100 fake information submitted to ChatGPT, the tool has produced fake detailed articles, essays and TV scripts for 80 of them, including significant topics such as Covid-19 and Ukraine<a href="#_edn2" name="_ednref2">[ii]</a>.</p>
<p style="text-align: justify;">As highlighted (again) by the war between Ukraine and Russia, <a href="https://www.nytimes.com/2023/02/08/technology/ai-chatbots-disinformation.html">the crucial role of information and disinformation</a> through cyber channels, can have significant consequences.</p>
<h3 style="text-align: justify;"><strong>Use Case #6 Create darknet marketplace</strong></h3>
<p style="text-align: justify;">Cybercriminals have also been observed using ChatGPT to support <span style="color: #503078;"><strong>the creation of DarkWeb marketplaces</strong>.</span> ChekPoint has illustrated this phenomenon with some examples<a href="#_edn3" name="_ednref3">[iii]</a>:</p>
<ul style="text-align: justify;">
<li>A cybercriminal post on a Darkweb forum showing how to code with ChatGPT a DarkWeb Market script that does not rely on Python or Java Script, using third-party API to get up-to-date cryptocurrency (Monero, Bitcoin and Etherium) prices as part of the Dark Web market payment system.</li>
<li>Dark web discussions threads linked to fraudulent usage of ChatGPT, such as how to generate an e-book or a short chapter using ChatGPT and then sell its content online.</li>
</ul>
<p> </p>
<p style="text-align: justify;"><strong> <img loading="lazy" decoding="async" class="aligncenter wp-image-20094 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image7.png" alt="" width="675" height="242" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image7.png 675w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image7-437x157.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image7-71x25.png 71w" sizes="auto, (max-width: 675px) 100vw, 675px" /></strong></p>
<p style="text-align: center;"><em>Figure 2 &#8211; Screenshot from CheckPoint: Multiple threads in the underground forums on how to use ChatGPT for fraud activity</em></p>
<p style="text-align: justify;"><strong> </strong></p>
<h2 style="text-align: justify;"><strong>What are the key take aways? </strong></h2>
<p style="text-align: justify;">Even if ChatGPT tends to lack of the necessary level of features, it can still be a useful tool to facilitate cyberattacks. Even if it is an obvious support tool mostly for script kiddies and unexperimented actors, ChatGPT &#8211; as any AI tool &#8211; can be a facilitator for any type of hackers, either to completely conceive a malware, to accelerate malicious actions such as phishing or to increase the sophistication level of cyberattacks.</p>
<p style="text-align: justify;">With the release of GPT-4, OpenAI has made efforts to counter inappropriate requests, however ChatGPT  still raise serious security issues and challenges for business security. It is important to keep in mind that the malicious use cases detailed in the previous section are only hypothetical scenarios: malicious use of ChatGPT has already been observed and it is essential to convey strong cybersecurity messages on the topic:</p>
<ul style="text-align: justify;">
<li>Don&#8217;t include sensitive info in queries to <a href="https://www.linkedin.com/feed/hashtag/?keywords=chatgpt&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7041697316570849280">#ChatGPT</a> : Avoid personal/sensitive information sharing while using ChatGPT</li>
<li>Stay informed and vigilant: AI-related topics are evolving quickly, it is central to stay put regarding tools evolution (e.g. release of Chat GPT 4.0), and new security topics that can emerged over time</li>
<li>Scams and phishing are likely to become more and more realistic in their crafting: continue raising awareness about this risk and train yourself and your ecosystem</li>
<li>Basic cybersecurity practices are still true: have a regular vulnerability management, set up doble authentication, train your teams and raise awareness…</li>
<li>ChatGPT opening the door to the possibility of creating realistic fake content, it is central to stay informed about tooling initiatives aiming at detecting machine-written text such as <a href="https://gptzero.me/">GPT Zero</a>, a tool developed by Princeton student (<em>Note: OpenAI is also working on a tool to detect machine-written text, but is for now far from being perfect since it </em><a href="https://www.nextinpact.com/article/70999/chatgpt-bard-et-autres-agents-desinformation-massive"><em>detect machine-written text only one in four times</em></a>)</li>
</ul>
<h1 style="text-align: center;">Reading of the Month</h1>
<h1 style="text-align: center;">CERT-EU : RUSSIA&#8217;S WAR ON UKRAINE: ONE YEAR OF CYBER OPERATIONS</h1>
<p style="text-align: justify;"><strong> <img loading="lazy" decoding="async" class="aligncenter wp-image-20096 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image8.png" alt="" width="233" height="190" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image8.png 233w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/03/Image8-48x39.png 48w" sizes="auto, (max-width: 233px) 100vw, 233px" /></strong></p>
<p style="text-align: center;"><a href="https://cert.europa.eu/static/MEMO/2023/TLP-CLEAR-CERT-EU-1YUA-CyberOps.pdf">https://cert.europa.eu/static/MEMO/2023/TLP-CLEAR-CERT-EU-1YUA-CyberOps.pdf</a></p>
<p style="text-align: justify;"><a href="#_ednref1" name="_edn1">[i]</a> <a href="https://cdn.openai.com/papers/gpt-4.pd">https://cdn.openai.com/papers/gpt-4.pd</a></p>
<p style="text-align: justify;"><a href="#_ednref2" name="_edn2">[ii]</a> <a href="https://www.newsguardtech.com/misinformation-monitor/jan-2023/">https://www.newsguardtech.com/misinformation-monitor/jan-2023/</a></p>
<p style="text-align: justify;"><a href="#_ednref3" name="_edn3">[iii]</a> <a href="https://research.checkpoint.com/2023/opwnai-cybercriminals-starting-to-use-chatgpt/">https://research.checkpoint.com/2023/opwnai-cybercriminals-starting-to-use-chatgpt/</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/03/cdt-watch-march-2023/">CDT Watch – March 2023</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/03/cdt-watch-march-2023/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CDT Watch – January 2023</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-january-2023/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-january-2023/#respond</comments>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Tue, 31 Jan 2023 15:35:54 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[ProxyNotShell]]></category>
		<category><![CDATA[sophos]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=19543</guid>

					<description><![CDATA[<p>FOCUS TECH BLINDSIDE Facing the EDR behavioral supervision, attackers develop techniques for successful attacks by staying under the radars. One of these techniques is called Blindside. This technique works on many EDRs relying on a hook and was revealed by...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-january-2023/">CDT Watch – January 2023</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 style="text-align: center;">FOCUS TECH</h2>
<h3 style="text-align: center;">BLINDSIDE</h3>
<p style="text-align: justify;"><span class="TextRun SCXW224371125 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun SCXW224371125 BCX0">Facing </span><span class="NormalTextRun SCXW224371125 BCX0">the EDR </span><span class="NormalTextRun SCXW224371125 BCX0">behavioral </span><span class="NormalTextRun SCXW224371125 BCX0">supervisio</span><span class="NormalTextRun SCXW224371125 BCX0">n</span><span class="NormalTextRun SCXW224371125 BCX0">, attacker</span><span class="NormalTextRun SCXW224371125 BCX0">s</span><span class="NormalTextRun SCXW224371125 BCX0"> develop techniques </span><span class="NormalTextRun SCXW224371125 BCX0">for successful attacks </span><span class="NormalTextRun SCXW224371125 BCX0">by staying under the radars</span><span class="NormalTextRun SCXW224371125 BCX0">. One of these techniques is </span><span class="NormalTextRun SCXW224371125 BCX0">called </span></span><span style="color: #56008c;"><strong><span class="TextRun SCXW224371125 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun SCXW224371125 BCX0">Blindside</span></span></strong></span><span class="TextRun SCXW224371125 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun SCXW224371125 BCX0">. This technique works on </span><span class="NormalTextRun SCXW224371125 BCX0">many </span><span class="NormalTextRun SCXW224371125 BCX0">EDRs</span> <span class="NormalTextRun SCXW224371125 BCX0">relying</span><span class="NormalTextRun SCXW224371125 BCX0"> on </span><span class="NormalTextRun SCXW224371125 BCX0">a </span><span class="NormalTextRun SCXW224371125 BCX0">hook</span><span class="NormalTextRun SCXW224371125 BCX0"> and was revealed by </span></span><a class="Hyperlink SCXW224371125 BCX0" href="https://cymulate.com/blog/blindside-a-new-technique-for-edr-evasion-with-hardware-breakpoints" target="_blank" rel="noreferrer noopener"><span class="FieldRange SCXW224371125 BCX0"><span class="TextRun Underlined SCXW224371125 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun SCXW224371125 BCX0" data-ccp-charstyle="Hyperlink">Cymulate</span></span></span></a><span class="TextRun SCXW224371125 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun SCXW224371125 BCX0">.</span></span><span class="EOP SCXW224371125 BCX0" data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:-57,&quot;335559738&quot;:360,&quot;335559739&quot;:40,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="aligncenter wp-image-19546 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture1.png" alt="" width="1216" height="827" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture1.png 1216w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture1-281x191.png 281w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture1-57x39.png 57w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture1-768x522.png 768w" sizes="auto, (max-width: 1216px) 100vw, 1216px" /></p>
<p style="text-align: justify;">According to <a href="https://cymulate.com/blog/blindside-a-new-technique-for-edr-evasion-with-hardware-breakpoints">Cymulate</a>, the author of Blindside, the technique is not immune to detection. Some mitigations can be implemented such as:</p>
<ul>
<li style="text-align: justify;"><span style="color: #56008c;"><strong>Monitor</strong></span><span style="color: initial;"> the use of the </span><span style="color: #1a7173;"><em>SetThreadContext</em></span><span style="color: initial;"> function: the function context can inform on breakpoint setting (write inside debug address registers)</span></li>
<li><span style="color: #56008c;"><strong>Monitor</strong></span> the presence of suspicious debug functions</li>
<li><span style="color: #56008c;"><strong>Edit EDR settings</strong> </span>for checking debug registers</li>
</ul>
<p style="text-align: justify;">It remains <span style="color: #56008c;"><strong style="font-size: revert; text-align: justify;">difficult to bypass EDR solutions</strong></span><span style="font-size: revert; text-align: justify; color: initial;"> as their detection methods vary between vendors. Nevertheless, it is important to remember that it is possible and </span><strong style="font-size: revert; text-align: justify; color: initial;"><span style="color: #56008c;">that the security should not rely solely on the solution</span>.</strong></p>
<p> </p>
<h2 style="text-align: center;">CERT-W: FROM THE FRONT LINE</h2>
<h3 style="text-align: center;">THE FIRST RESPONDER WORD</h3>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-19548" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture2.png" alt="" width="951" height="568" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture2.png 951w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture2-320x191.png 320w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture2-65x39.png 65w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture2-768x459.png 768w" sizes="auto, (max-width: 951px) 100vw, 951px" /></p>
<p> </p>
<p> </p>
<h2 style="text-align: center;">READING OF THE MONTH</h2>
<h3 style="text-align: center;">SOPHOS: MATURING CRIMINAL MARKETPLACES PRESENT NEW CHALLENGES TO DEFENDERS</h3>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-19550" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture3.png" alt="" width="378" height="236" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture3.png 378w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture3-306x191.png 306w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture3-62x39.png 62w" sizes="auto, (max-width: 378px) 100vw, 378px" /></p>
<p style="text-align: center;"><a href="https://www.sophos.com/en-us/content/security-threat-report"><em>Maturing criminal marketplaces present new challenges to defenders, Sophos 2023 Threat Report</em></a></p>
<p> </p>
<h2 style="text-align: center;">VULNERABILITY OF THE MONTH</h2>
<h3 style="text-align: center;">PROXYNOTSHELL: WHEN APPLYING MITIGATIONS KEEPS YOU VULNERABLE</h3>
<p style="text-align: center;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-41040">CVE-2022-41040</a> &amp; <a href="https://nvd.nist.gov/vuln/detail/cve-2022-41082">CVE-2022-41082</a></p>
<p style="text-align: center;">Published by NVD: 02/10/2022</p>
<p style="text-align: center;"><strong>Products: </strong>Microsoft Exchange server</p>
<p style="text-align: center;"><strong>Versions: </strong>on-site/on premise 2013, 2016 and 2019</p>
<p style="text-align: center;"><strong>Score: 8.8 HIGH</strong></p>
<p style="text-align: center;"><a href="https://www.logpoint.com/fr/blog/proxynotshell-detection-de-lexploitation-des-vulnerabilites-zero-day-dans-le-serveur-exchange/"><strong>Context</strong></a> <strong> </strong><strong> </strong><a href="https://github.com/balki97/OWASSRF-CVE-2022-41082-POC"><strong>PoC</strong></a></p>
<p style="text-align: justify;">Microsoft Exchange is a mailbox <span style="color: #56008c;"><strong>server</strong></span> exclusively running on the Windows operating système.</p>
<p style="text-align: justify;">In September 2022, a vulnerability to <span style="color: #56008c;"><strong>compromise the underlying Exchange server</strong></span> was discovered. It was named <span style="color: #1a7173;"><strong>ProxyNotShell</strong></span> after its similarities with the <span style="color: #1a7173;"><strong>ProxyShell</strong></span> vulnerability. To exploit <span style="color: #1a7173;"><strong>ProxyNotShell</strong></span>, attackers need to have an authentified access to the Microsoft Echange server. The exploitation of the vulnerability allows attacker to deploy a webshell on the targeted server, giving them an initial access.</p>
<p style="text-align: justify;">Around November, <span style="color: #56008c;"><strong>a number of mitigations (Hotfix) were released</strong></span> awaiting for a patch. As a result, some <span style="color: #56008c;"><strong>60 000 servers</strong></span> worldwide still are vulnerables <span style="color: #56008c;"><strong>since the few mitigations rules can be bypassed by attackers</strong></span>.</p>
<p style="text-align: justify;">According to <a href="https://www.crowdstrike.com/blog/owassrf-exploit-analysis-and-recommendations/">CrowdStrike</a>, <span style="color: #56008c;"><strong>Play ransomware group</strong></span>, which has been active since last June, took advantage of this in using a new exploit to bypass the URL rewrite mitigations for the <span style="color: #1a7173;">Autodiscover</span> endpoint. Early December the managed cloud hosting services company <span style="color: #1a7173;"><strong>Rackspace technology</strong></span> complies to having been attacked after a <span style="color: #56008c;"><strong>successful exploit of the vulnerability in Microsoft Exchange Server</strong></span>.</p>
<p style="text-align: justify;">The Microsoft Exchange server should have at least the <span style="color: #56008c;"><strong>KB5019758 patch</strong></span>. If not, the main action to perform is to <span style="color: #56008c;"><strong>immediately install the updates </strong></span>on the vulnerable servers. If some factors make the installation impossible, it is adviced to disable OWA until it can be applied. In addition, it is strongly recommended to disable remote <span style="color: #1a7173;">PowerShell</span> for non-admin users and use EDR tools to detect if web services are spawning PowerShell processes.</p>
<p style="text-align: justify;"> </p>
<p style="text-align: center;">SEE YOU NEXT MONTH!!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-january-2023/">CDT Watch – January 2023</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-january-2023/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CDT Watch – May 2022</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/05/cdt-watch-may-2022/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/05/cdt-watch-may-2022/#respond</comments>
		
		<dc:creator><![CDATA[Margaux Nedelec]]></dc:creator>
		<pubDate>Mon, 30 May 2022 12:53:00 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[marketplace]]></category>
		<category><![CDATA[Newsletter]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=18045</guid>

					<description><![CDATA[<p>DECRYPTION The marketplaces of stolen data Which type of data are sold? The different platforms of marketplaces sell different types of data. While some platforms are really focused on selling one specific “product” (eg. hacking forums where Initial Access to...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/05/cdt-watch-may-2022/">CDT Watch – May 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: center;"><strong>DECRYPTION</strong></h1>
<h2 style="text-align: center;">The marketplaces of stolen data</h2>
<p><img loading="lazy" decoding="async" class="wp-image-18145 alignnone" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/21-437x121.png" alt="" width="867" height="240" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/21-437x121.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/21-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/21-768x212.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/21.png 1392w" sizes="auto, (max-width: 867px) 100vw, 867px" /></p>
<p><img loading="lazy" decoding="async" class="wp-image-18143 alignnone" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/22-437x118.png" alt="" width="844" height="228" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/22-437x118.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/22-71x19.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/22-768x207.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/22.png 1386w" sizes="auto, (max-width: 844px) 100vw, 844px" /></p>
<p><img loading="lazy" decoding="async" class="wp-image-18141 alignnone" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/23-437x122.png" alt="" width="874" height="244" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/23-437x122.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/23-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/23-768x214.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/23.png 1387w" sizes="auto, (max-width: 874px) 100vw, 874px" /></p>
<p><img loading="lazy" decoding="async" class=" wp-image-18139 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/24-437x120.png" alt="" width="841" height="231" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/24-437x120.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/24-71x19.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/24-768x211.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/24.png 1384w" sizes="auto, (max-width: 841px) 100vw, 841px" /></p>
<p><img loading="lazy" decoding="async" class=" wp-image-18137 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/25-437x122.png" alt="" width="860" height="240" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/25-437x122.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/25-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/25-768x214.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/25.png 1387w" sizes="auto, (max-width: 860px) 100vw, 860px" /></p>
<p><img loading="lazy" decoding="async" class=" wp-image-18135 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/26-437x119.png" alt="" width="914" height="249" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/26-437x119.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/26-71x19.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/26-768x210.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/26.png 1392w" sizes="auto, (max-width: 914px) 100vw, 914px" /></p>
<p><img loading="lazy" decoding="async" class=" wp-image-18133 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/27-1-437x121.png" alt="" width="943" height="261" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/27-1-437x121.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/27-1-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/27-1-768x213.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/27-1.png 1389w" sizes="auto, (max-width: 943px) 100vw, 943px" /></p>
<p><img loading="lazy" decoding="async" class=" wp-image-18131 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/28-437x119.png" alt="" width="943" height="257" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/28-437x119.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/28-71x19.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/28-768x209.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/28.png 1384w" sizes="auto, (max-width: 943px) 100vw, 943px" /></p>
<p><strong>Which type of data are sold?</strong></p>
<p>The different platforms of marketplaces sell different types of data. <strong>While some platforms are really focused on selling one specific “product”</strong> (eg. hacking forums where <a href="https://www.proofpoint.com/us/blog/threat-insight/first-step-initial-access-leads-ransomware">Initial Access to companies is sold</a>, as well as auction sites to sell stolen data <a href="https://www.zdnet.com/article/revil-ransomware-gang-launches-auction-site-to-sell-stolen-data/">eg. REvil and its auction site</a> back in 2020), <strong>other platforms thrive with a very wide panel of goods,</strong> ranging from various weapons to “fullz” (full data about people: Social Security numbers, Bank account numbers, ID,…) without forgetting per-install malware service and financial information about a company. Overall, personal data is one of the most common types one can find on these marketplaces, as well as organization initial access, and non-financial or financial accounts/credentials.</p>
<p>When it comes to prices, <strong>whereas the number and variety of data items sold are increasing, </strong><a href="https://www.privacyaffairs.com/dark-web-price-index-2022/">the prices are declining as the market grows.</a></p>
<p>The price of an Initial Access depends on its quality, but it ranges <a href="https://www.zdnet.com/article/ransomware-operators-love-them-key-trends-in-the-initial-access-broker-space/">from a couple of hundred USD for a small company to hundreds of thousands of dollars for the bigger ones.</a> The average price is <u>$7,100 in 2021</u>. Patricia Ruffio listed <a href="https://www.privacyaffairs.com/dark-web-price-index-2022/">here the prices found per type of data</a>, from credit card data with account balance up to 5K ($120) to social media account ($65 for a gmail account), going through PayPal account logins ($150 for 50 accounts) and European Passport ($3,800). In comparison, DDOSing an unprotected website for a month now costs $850 on average and installing malware on a thousand devices ranges from $45 to $5500 depending on its quality and success rate.</p>
<p>Last but not least, some ransomware groups <a href="https://unit42.paloaltonetworks.com/blackbyte-ransomware/">such as BlackByte</a> go as far as selling stolen data on dedicated auction sites, not only as a means of pressure on victim companies, but also as a very juicy second revenue stream, <a href="https://www.telekom.com/en/blog/group/article/lockdata-auction-631300">with starting bids reaching up to $500,000</a><u>. </u></p>
<p> </p>
<p><strong>What’s the selling process?</strong></p>
<p>Besides a classical strategy of competitivity between the different marketplaces, based on discounts or fidelity points, the platforms are fighting over a security aspect in order to gain the buyer’s trust.</p>
<p>With the growth of marketplaces comes a strong trend for the sellers to strengthen their client’s trust. Taking advantage of legal uncertainty, these websites or events like the <a href="https://www.theguardian.com/technology/2015/mar/18/bitcoin-deep-web-evolution-exit-scam-12-million-dollars">Evolution Marketplace exit scam with over $12 million in Bitcoin</a> have greatly tarnished their reputation and taken its toll on customer and vendor trust.</p>
<p>As a result, along with the numerous DDOS protection, layers marketplaces now hide behind to prevent attacks from rivals, the quality of vendors and their items is now more thoroughly assessed and monitored. Direct scams are supposedly prevented by using the marketplace platform as an intermediate deposit for payment so that a client may be refunded in case of deception by the vendor. All transactions are currently mainly in Bitcoin and Monero for anonymity purposes.  Some auction and IAB platforms even sometimes use <a href="https://www.telekom.com/en/blog/group/article/lockdata-auction-631300">mandatory referral systems to shield themselves from outsiders &amp; untrustworthy members</a><u>. </u></p>
<p><strong>Consequently, dark web marketplaces seem more reliable and stolen data is more prone to be sold quickly.</strong></p>
<p> </p>
<p><strong>Once sold, what are the stolen data used for?</strong></p>
<p>The financial reason is undoubtedly the main aspect for many actors in the market: most of these data can be used directly for blackmail of course, or to launch another cyberattack with a bigger impact…and more gains. It can be “standard” attacks such as personal data simply used as a basis for phishing operations and for compromising, for example, bank accounts, or it can be larger attacks. In fact, the average ransom paid by companies rose up to $541k <a href="https://www.paloaltonetworks.com/company/press/2022/ransomware-payments-hit-new-records-in-2021-as-dark-web-leaks-climbed--according-to-new-report-from-palo-alto-networks-unit-42#:~:text=The%20average%20ransom%20demand%20in,Unit%2042%20Ransomware%20Threat%20Report.">according to the 2022 Unit 42 Ransomware Threat Report</a>, highlighting the high profitability of simple ransom and blackmail with the stolen data. While not as straightforward, leveraging stolen Social Security Numbers, IDs, Credit cards are other ways to generate profit or to gain access to companies using identity theft.</p>
<p>However, stolen data may be used for more varied purposes. Corporate espionage is one of them: should a competitor be informed of a potential data leak, and what prevents it from looking at your deepest hidden secrets? It can also be a political matter: for example when <a href="https://securityaffairs.co/wordpress/127267/cyber-crime/ministry-of-justice-of-france-lockbit.html">Lockbit2.0 hits the French ministry of Justice</a><u>,</u> the main concerns shift to who laid their hands on such potentially sensitive pieces of information and what their intentions are. Another example of societal impact would be the <a href="https://www.fiercepharma.com/pharma/hackers-breach-pfizer-biontech-covid-19-vaccine-data-cyberattack-targeting-ema">data breach of Pfizer/BioNTech vaccines data in 2020</a><u>, </u>which led to attackers modifying the stolen data on the vaccine and publishing them with the headline &#8220;Vaccines are malicious&#8221;.</p>
<p> </p>
<p><strong>What are the impacts on my organization?</strong></p>
<p>As mentioned, the collected data such as initial access can be the essential vector to compromise an organization’s SI and lead to even more impacting attacks. Besides, the main victim’s perimeter is not the only one compromised: the whole ecosystem of partners, clients, and providers… can be affected. If the ransomware is the first type of attack coming to mind after a data breach, one should not underestimate the impacts of identity impersonation and fraud, targeted DDoS…</p>
<p>As it has often been proven and discussed these last years, <strong>the financial impact</strong> of such compromission can be colossal and even led organizations to their end. Besides, <strong>the cost of the attack itself is not the only one to be taken into account.</strong> Other components must be considered: <strong>loss of customer&#8217;s trust</strong>, loss due to potential system&#8217;s unavailability, <strong>cost of intervention </strong>from experts to investigate, but also <strong>cost of new customer acquisition</strong> to win back those that have been lost. Just as an example, <a href="https://www.csoonline.com/article/3444488/equifax-data-breach-faq-what-happened-who-was-affected-what-was-the-impact.html">Equifax announced</a> that the data breach it faced in 2017 cost around $1.5 billion dollars if not more.</p>
<p><strong>The financial and reputational impacts are intrinsically linked.</strong> Indeed, upon facing a data breach, a company is very likely to get customer or partner disengagement. <a href="https://www.ibm.com/downloads/cas/OJDVQGRY">According to a report from IBM</a><u>, the </u>lost business contributes to 38% of data breach costs. Companies also handle PII (Personally Identifiable Information) which, if stolen, can lead to additional legal costs, class-action settlements, or fines from public institutions.</p>
<p>The total cost of a data breach could be deadly for some companies and must be acknowledged. <a href="https://www.ftc.gov/enforcement/refunds/equifax-data-breach-settlement">Equifax spent several million</a> in fines and settlements after dealing with its massive data breach in 2017.</p>
<p>Last but not least, the social and political aspects must not be neglected. Last year, the Labour Party suffered a data breach through a ransomware attack on a third-party supplier. This kind of attack can lead to disinformation campaigns or even interferences in the election process.</p>
<p>In order to prevent a data breach, beyond cybersecurity basic actions, companies must enhance their maturity level when it comes to data security. Evaluating the value of the data is one of the key: the more attractive the data is, the greater chance an attacker will try to steal it. Storage and network security, Identity and Access Management, Cyber Resilience are some of the topics to be addressed at first. On top of this, companies should also focus on creating a strong watch on cybersecurity events and implement, even small, Cyber Threat Intelligence programs. Looking at the cybercrime ecosystem as well as spotting potential attack vectors and modus operandi is never a bad idea to anticipate a cyberattack.</p>
<p> </p>
<h1 style="text-align: center;"><strong>CERT-W: FROM THE FRONT LINE</strong></h1>
<h2 style="text-align: center;">The First Responder Word</h2>
<p><img loading="lazy" decoding="async" class="wp-image-18150 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/First-responder-360x191.png" alt="" width="1012" height="537" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/First-responder-360x191.png 360w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/First-responder-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/First-responder-768x407.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/First-responder.png 1437w" sizes="auto, (max-width: 1012px) 100vw, 1012px" /></p>
<p> </p>
<h1 style="text-align: center;"><strong>Reading Of The Month</strong></h1>
<p style="text-align: center;">We recommend the Citalid overview of the</p>
<p style="text-align: center;">Russio-Ukrainien conflit’s cyber aspect</p>
<p style="text-align: center;">(click on the picture)</p>
<p><a href="https://citalid.com/blog/dynamiques-cyber-et-geopolitique-de-la-guerre-russo-ukrainienne-partie-2/"><img loading="lazy" decoding="async" class="aligncenter wp-image-18153 size-medium" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/citalid-338x191.png" alt="" width="338" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/citalid-338x191.png 338w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/citalid-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/citalid-768x434.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/citalid-800x450.png 800w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/06/citalid.png 1083w" sizes="auto, (max-width: 338px) 100vw, 338px" /></a></p>
<p style="text-align: center;">SEE YOU NEXT MONTH!!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/05/cdt-watch-may-2022/">CDT Watch – May 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/05/cdt-watch-may-2022/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CDT Watch – March 2022</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/03/cdt-watch-march-2022/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/03/cdt-watch-march-2022/#respond</comments>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Thu, 31 Mar 2022 08:11:00 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[front]]></category>
		<category><![CDATA[Newsletter]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17670</guid>

					<description><![CDATA[<p>FOCUS TECH Conti Kill Chain SOURCES : CERT-W: FROM THE FRONT LINE The First Responder Word   READING OF THE MONTH We recommend the interview of Pompompurin, a cyber activist who’s work ranges from leaking the data of thousands of...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/03/cdt-watch-march-2022/">CDT Watch – March 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: center;"><strong>FOCUS TECH</strong></h1>
<h2 style="text-align: center;">Conti Kill Chain</h2>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17672" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/1.jpg" alt="" width="944" height="650" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/1.jpg 944w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/1-277x191.jpg 277w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/1-57x39.jpg 57w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/1-768x529.jpg 768w" sizes="auto, (max-width: 944px) 100vw, 944px" /></p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17674" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/2.jpg" alt="" width="945" height="654" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/2.jpg 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/2-276x191.jpg 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/2-56x39.jpg 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/2-768x532.jpg 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /></p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17676" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/3.jpg" alt="" width="945" height="648" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/3.jpg 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/3-279x191.jpg 279w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/3-57x39.jpg 57w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/3-768x527.jpg 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /></p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17678" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/4.jpg" alt="" width="945" height="645" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/4.jpg 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/4-280x191.jpg 280w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/4-57x39.jpg 57w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/4-768x524.jpg 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /></p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17680" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/5.jpg" alt="" width="945" height="645" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/5.jpg 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/5-280x191.jpg 280w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/5-57x39.jpg 57w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/5-768x524.jpg 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /></p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17682" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/6.jpg" alt="" width="946" height="651" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/6.jpg 946w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/6-278x191.jpg 278w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/6-57x39.jpg 57w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/6-768x529.jpg 768w" sizes="auto, (max-width: 946px) 100vw, 946px" /></p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17684" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/7.jpg" alt="" width="945" height="646" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/7.jpg 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/7-279x191.jpg 279w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/7-57x39.jpg 57w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/7-768x525.jpg 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /></p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17686" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/8.jpg" alt="" width="944" height="654" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/8.jpg 944w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/8-276x191.jpg 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/8-56x39.jpg 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/8-768x532.jpg 768w" sizes="auto, (max-width: 944px) 100vw, 944px" /></p>
<p style="text-align: center;"><strong>SOURCES :</strong></p>
<p><a href="https://adversary.crowdstrike.com/en-US/adversary/wizard-spider/"><img loading="lazy" decoding="async" class="aligncenter wp-image-17688 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/10.jpg" alt="" width="270" height="154" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/10.jpg 270w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/10-68x39.jpg 68w" sizes="auto, (max-width: 270px) 100vw, 270px" /></a></p>
<p><a href="https://github.com/tsale/translated_conti_leaked_comms"><img loading="lazy" decoding="async" class="aligncenter wp-image-17690 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/11.jpg" alt="" width="316" height="150" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/11.jpg 316w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/11-71x34.jpg 71w" sizes="auto, (max-width: 316px) 100vw, 316px" /></a></p>
<figure id="post-16217 media-16217" class="align-center"></figure>
<figure id="post-16210 media-16210" class="align-center">
<figure id="post-16367 media-16367" class="align-center"></figure>
</figure>
<h1 style="text-align: center;"><strong>CERT-W: FROM THE FRONT LINE</strong></h1>
<h2 style="text-align: center;">The First Responder Word</h2>
<figure id="post-16221 media-16221" class="align-center">
<figure id="post-16228 media-16228" class="align-center"></figure>
</figure>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17693" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/15.jpg" alt="" width="783" height="530" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/15.jpg 783w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/15-282x191.jpg 282w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/15-58x39.jpg 58w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/15-768x520.jpg 768w" sizes="auto, (max-width: 783px) 100vw, 783px" /></p>
<p> </p>
<h1 style="text-align: center;"><strong>READING OF THE MONTH</strong></h1>
<p style="text-align: center;">We recommend the interview of Pompompurin, a cyber activist who’s work ranges from leaking the data of thousands of WeLeakInfo Users to abusing the FBI&#8217;s Servers to send thousands of false emails.</p>
<figure id="post-16219 media-16219" class="align-center">
<figure id="post-16387 media-16387" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17695" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/20.jpg" alt="" width="244" height="145" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/20.jpg 244w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/20-66x39.jpg 66w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/04/20-120x70.jpg 120w" sizes="auto, (max-width: 244px) 100vw, 244px" /></figure>
<p style="text-align: center;"><a href="https://dataknight.org/exclusive-interview-with-pompompurin/">The interview by Data Knight</a></p>
</figure>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/03/cdt-watch-march-2022/">CDT Watch – March 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/03/cdt-watch-march-2022/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CDT Watch &#8211; January 2022</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/01/cdt-watch-january-2022/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/01/cdt-watch-january-2022/#respond</comments>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Fri, 28 Jan 2022 09:47:35 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[sysjoker]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17540</guid>

					<description><![CDATA[<p>TECH FOCUS SysJoker: Windows Version To produce this tech focus, we used data from: New SysJoker Backdoor Targets Windows, Linux, and macOS &#8211; Intezer CERT-W: FROM THE FRONT LINE The First Responder Word Reading Of The Month To learn more about...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/01/cdt-watch-january-2022/">CDT Watch &#8211; January 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: center;"><strong>TECH FOCUS</strong></h1>
<h2 style="text-align: center;">SysJoker: Windows Version</h2>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17542" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/10.png" alt="" width="945" height="268" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/10.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/10-437x124.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/10-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/10-768x218.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /></p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17554" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/17.png" alt="" width="945" height="275" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/17.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/17-437x127.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/17-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/17-768x223.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /></p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17548" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/14.png" alt="" width="945" height="268" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/14.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/14-437x124.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/14-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/14-768x218.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17550" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/15.png" alt="" width="945" height="307" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/15.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/15-437x142.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/15-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/15-768x249.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17552" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/16.png" alt="" width="945" height="276" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/16.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/16-437x128.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/16-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/16-768x224.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17554" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/17.png" alt="" width="945" height="275" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/17.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/17-437x127.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/17-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/17-768x223.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/18.png" alt="" width="945" height="271" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/18.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/18-437x125.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/18-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/18-768x220.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17558" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/19.png" alt="" width="945" height="269" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/19.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/19-437x124.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/19-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/19-768x219.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17560" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/20.png" alt="" width="945" height="267" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/20.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/20-437x123.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/20-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/20-768x217.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17562" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/21.png" alt="" width="945" height="292" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/21.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/21-437x135.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/21-71x22.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/21-768x237.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17564" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/22.png" alt="" width="945" height="321" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/22.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/22-437x148.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/22-71x24.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/22-768x261.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17566" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/23.png" alt="" width="945" height="54" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/23.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/23-437x25.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/23-71x4.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/23-768x44.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17568" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/24.png" alt="" width="945" height="266" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/24.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/24-437x123.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/24-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/24-768x216.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17570" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/25.png" alt="" width="945" height="276" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/25.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/25-437x128.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/25-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/25-768x224.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17572" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/26.png" alt="" width="945" height="280" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/26.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/26-437x129.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/26-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/26-768x228.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /></p>
<p style="text-align: center;"><em>To produce this tech focus, we used data from:</em></p>
<p style="text-align: center;"><a href="https://www.intezer.com/blog/malware-analysis/new-backdoor-sysjoker/"><em>New SysJoker Backdoor Targets Windows, Linux, and macOS &#8211; Intezer</em></a></p>
<figure id="post-16217 media-16217" class="align-center"></figure>
<figure id="post-16210 media-16210" class="align-center">
<figure id="post-16367 media-16367" class="align-center"></figure>
</figure>
<h1 style="text-align: center;"><strong>CERT-W: FROM THE FRONT LINE</strong></h1>
<h2 style="text-align: center;">The First Responder Word</h2>
<figure id="post-16221 media-16221" class="align-center">
<figure id="post-16228 media-16228" class="align-center"></figure>
</figure>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17577" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/cert-1.jpg" alt="" width="783" height="552" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/cert-1.jpg 783w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/cert-1-271x191.jpg 271w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/cert-1-55x39.jpg 55w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/cert-1-768x541.jpg 768w" sizes="auto, (max-width: 783px) 100vw, 783px" /></p>
<h1 style="text-align: center;"><strong>Reading Of The Month</strong></h1>
<p style="text-align: center;">To learn more about the main trends anticipated by Sophos for cybersecurity in 2022, it is here:</p>
<figure id="post-16219 media-16219" class="align-center">
<figure id="post-16387 media-16387" class="align-center"><img loading="lazy" decoding="async" class="aligncenter  wp-image-17579" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/sophros.jpg" alt="" width="205" height="154" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/sophros.jpg 412w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/sophros-255x191.jpg 255w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/sophros-52x39.jpg 52w" sizes="auto, (max-width: 205px) 100vw, 205px" /></figure>
<p style="text-align: center;"><a href="https://www.sophos.com/fr-fr/medialibrary/pdfs/technical-papers/sophos-2022-threat-report.pdf">Interrelated</a><a href="http://Interrelated threats target an interdependent world, Sophos" data-wplink-url-error="true"> threats target an interdependent world, Sophos</a></p>
</figure>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/01/cdt-watch-january-2022/">CDT Watch &#8211; January 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/01/cdt-watch-january-2022/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CDT Watch &#8211; December 2021</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/12/cdt-watch-december-2021/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2021/12/cdt-watch-december-2021/#respond</comments>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Thu, 30 Dec 2021 16:46:00 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[CDT]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[log4shell]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17506</guid>

					<description><![CDATA[<p>THE ROLE OF DECRYPTION TOOL AGAINST THE RANSOMWARE THREAT The ransomware threat is increasing continuously and is now considered a national threat for countries, such as the US, France, or the UK.  Last summer, the Virtual System Administrator (VSA) edited...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/12/cdt-watch-december-2021/">CDT Watch &#8211; December 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 style="text-align: center;"><strong>THE ROLE OF DECRYPTION TOOL AGAINST THE RANSOMWARE THREAT</strong></h2>
<table>
<tbody>
<tr>
<td width="627">
<p>The ransomware threat is increasing continuously and is <a href="https://searchsecurity.techtarget.com/news/252507290/Ransomware-Has-the-US-reached-a-tipping-point">now considered a national threat for countries</a>, such as the <a href="https://www.europol.europa.eu/newsroom/news/13-countries-join-global-fight-against-ransomware-0">US, France, or the UK.</a> </p>
<p>Last summer, the Virtual System Administrator (VSA) edited by KASEYA in the US has been exploited by REvil, impacting the company and many of its international clients. In this case, <a href="https://www.washingtonpost.com/national-security/ransomware-fbi-revil-decryption-key/2021/09/21/4a9417d0-f15f-11eb-a452-4da5fe48582d_story.html">the FBI kept secret the decryption key for three weeks from the victims,</a> in order to protect their operation against REvil.  </p>
<p> </p>
<p><strong>What’s the purpose of a decryption tool? </strong></p>
<p>As the name suggests, decryption tools are designed to decrypt encrypted data. Often based on previous ransomware analysis, those tools use decryption keys like a password to access blocked data. Today many decryption tools are proposed online, <a href="https://www.nomoreransom.org/fr/decryption-tools.html">sometimes even for free, providing a quick solution in case of known ransomware</a>.</p>
<p>Let’s consider a company ransomed. Following the criticality of the encrypted data, the company will have to choose between paying the ransom or, in case they are prepared, launching their recovery plan. This will imply rebuilding their infrastructure based on previous saves if they are still accessible which is never a trivial assumption. Paying the ransom represents an even less reliable solution to recover a safe and complete information system.</p>
<p>The decryption tool could be an alternative option to recover the data, with advantages such as being a widely available, affordable, and quick solution. The No More Ransom project launched by the National High Tech Crime Unit of the Netherlands&#8217; police, Europol&#8217;s European Cybercrime Centre, Kaspersky, and McAfee now make available 121 free ransomware decryption tools that can decrypt 151 ransomware families. <a href="https://blog.barracuda.com/2021/10/05/decryption-tool-controversy-erupts/">More than six million ransomware victims have used those tools to recover encrypted files.</a></p>
<p>However, a decryption tool can be developed only for the ransomware containing vulnerabilities. If a ransomware is 100% correctly coded, there is no vulnerability to exploit and no decryption key to be developed. Therefore, the decryption tool is a solution only for a certain type of ransomware. </p>
<p>Moreover, this option is safe only when proposed by a reliable editor. Many fake decryption tools used as scamming vectors are proposed for free online. Besides, the ransomware being in constant evolution, the decryption tools have to follow the updates to not be rapidly irrelevant.</p>
<p> </p>
<p><strong>The controversy of the decryption tools publication </strong></p>
<p>Decryption keys can be seen as ransomware vulnerabilities. In the same way that vulnerabilities are patched when discovered, when a decryption key is found, criminals patch their ransomware to make it more effective. The decryption key becomes irrelevant for the next victims. </p>
<p>Months before the Colonial Pipelines attacks, two searchers had found a decryption key to help DarkSide victims to recover and chose to not share it. But BitDefender discovered the key as well and published it online, alerting the victims, as well as the attackers. The day after this publication, DarkSide publicly informed they have corrected the problem and <a href="https://www.technologyreview.com/2021/05/24/1025195/colonial-pipeline-ransomware-bitdefender/">even address its “Special thanks to BitDefender for helping fix our issues. This will make us even better</a>”. </p>
<p>This is not an isolated case. Earlier this year, a Spanish searcher found and developed a decryption tool for the Avaddon ransomware. He published it online on GitHub with an explanation about how to use its tool. As in the case of DarkSide, <a href="https://www.lemondeinformatique.fr/actualites/lire-quand-la-publication-d-un-decrypteur-renforce-le-ransomware-avaddon-81965.html">this information was shared publicly, available for the victims as well as the ransomware developers, who corrected the vulnerabilities.</a> </p>
<p>In the KASEYA case, this decryption key was kept by the FIB because its publication would hinder an offensive cyber operation against the REvil gang. This implied letting victims such as schools and hospitals deal with the problem without sharing with them a solution, in order to reach the attackers. The operation didn&#8217;t happen immediately, as, in the same month, websites run by the REvil ransomware gang suddenly became inaccessible. </p>
<p>BreachQuest CTO Jake Williams called the situation a classic case of an intelligence gain/loss assessment. He pointed out that the direct financial damage was almost certainly larger than the FBI believed, but <a href="https://www.zdnet.com/article/fbi-decision-to-withhold-kaseya-ransomware-decryption-keys-stirs-debate/">“on the other hand, releasing the key solves an immediate need without addressing the larger issue of disrupting future ransomware operations</a>”. </p>
<p> </p>
<p><strong>Decryption tools: a partial solution</strong></p>
<p>Outside of the debate on the necessity to publish them, the crisis management interventions of the W-CERT pointed out that, even if helpful, the decryption tools are not the ultimate and perfect solution in a ransomware attack. </p>
<p>Indeed, decryption tools are only usable for a limited subset of existing ransomware, where encryption mechanisms were not created using state-of-the-art security. Even if the related ransomware attack falls under this case, which would mean the affected data will be able to get recovered safely, the attacked company still has to tackle the biggest issue of such an attack, meaning rebuilding at the very least the core of the information system that got compromised. Relying on decryption tools only to face the ransomware threat is far from being a complete and reliable solution.</p>
</td>
</tr>
</tbody>
</table>
<figure id="post-16217 media-16217" class="align-center">
<p style="text-align: center;"> </p>
</figure>
<figure id="post-16210 media-16210" class="align-center">
<figure id="post-16367 media-16367" class="align-center"></figure>
</figure>
<h1 style="text-align: center;"><strong>CERT-W: FROM THE FRONT LINE</strong></h1>
<h2 style="text-align: center;">The First Responder Word</h2>
<figure id="post-16221 media-16221" class="align-center">
<figure id="post-16228 media-16228" class="align-center">
<figure id="post-16369 media-16369" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17508" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/first-respond.jpg" alt="" width="783" height="486" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/first-respond.jpg 783w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/first-respond-308x191.jpg 308w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/first-respond-63x39.jpg 63w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/first-respond-768x477.jpg 768w" sizes="auto, (max-width: 783px) 100vw, 783px" /></figure>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17510" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/first.jpg" alt="" width="783" height="425" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/first.jpg 783w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/first-352x191.jpg 352w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/first-71x39.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/first-768x417.jpg 768w" sizes="auto, (max-width: 783px) 100vw, 783px" /></p>
<p style="text-align: center;">For more information for vulnerability detection and remediation, contact Wavestone CERT-W!</p>
</figure>
</figure>
<p> </p>
<h1 style="text-align: center;"><strong>Reading Of The Month</strong></h1>
<p style="text-align: center;">To learn more about the evolution of cybercrime, we recommend reading the <em>Internet Organized Crime Threat Assessment 2021</em> of Europol. This report focuses on changes and developments of cybercrime threats during the last 12 months.</p>
<figure id="post-16219 media-16219" class="align-center">
<figure id="post-16387 media-16387" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-17512 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/lock.jpg" alt="" width="325" height="152" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/lock.jpg 325w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/01/lock-71x33.jpg 71w" sizes="auto, (max-width: 325px) 100vw, 325px" /></figure>
<p style="text-align: center;"><a href="https://www.europol.europa.eu/cms/sites/default/files/documents/internet_organised_crime_threat_assessment_iocta_2021.pdf">Internet Organized Crime Threat Assessment 2021, Europol</a></p>
</figure>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/12/cdt-watch-december-2021/">CDT Watch &#8211; December 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2021/12/cdt-watch-december-2021/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CDT Watch &#8211; November 2021</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/11/cdt-watch-november-2021/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2021/11/cdt-watch-november-2021/#respond</comments>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Tue, 30 Nov 2021 08:50:00 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[CDT]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[watch]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17399</guid>

					<description><![CDATA[<p>FOCUS TECH File Obfuscation Discover Cobalt Strike capabilities with the technical zoom of the month: To learn more about the given malwares: Cobalt Strike Training videos CERT-W: FROM THE FRONT LINE The First Responder Word We recommend the 2021 Benchmark...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/11/cdt-watch-november-2021/">CDT Watch &#8211; November 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: center;"><strong>FOCUS TECH</strong></h1>
<h2 style="text-align: center;">File Obfuscation</h2>
<p style="text-align: center;">Discover Cobalt Strike capabilities with the technical zoom of the month:</p>
<figure id="post-16383 media-16383" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17400" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-1.png" alt="" width="771" height="456" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-1.png 771w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-1-323x191.png 323w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-1-66x39.png 66w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-1-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-1-768x454.png 768w" sizes="auto, (max-width: 771px) 100vw, 771px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17402" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-2.png" alt="" width="770" height="442" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-2.png 770w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-2-333x191.png 333w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-2-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-2-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-2-768x441.png 768w" sizes="auto, (max-width: 770px) 100vw, 770px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17404" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-3.png" alt="" width="772" height="442" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-3.png 772w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-3-334x191.png 334w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-3-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-3-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-3-768x440.png 768w" sizes="auto, (max-width: 772px) 100vw, 772px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17406" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-4.jpg" alt="" width="776" height="451" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-4.jpg 776w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-4-329x191.jpg 329w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-4-67x39.jpg 67w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-4-120x70.jpg 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-4-768x446.jpg 768w" sizes="auto, (max-width: 776px) 100vw, 776px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17408" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-5.jpg" alt="" width="777" height="458" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-5.jpg 777w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-5-324x191.jpg 324w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-5-66x39.jpg 66w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-5-120x70.jpg 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-5-768x453.jpg 768w" sizes="auto, (max-width: 777px) 100vw, 777px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17410" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-6.png" alt="" width="781" height="447" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-6.png 781w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-6-334x191.png 334w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-6-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-6-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-6-768x440.png 768w" sizes="auto, (max-width: 781px) 100vw, 781px" /></figure>
<figure id="post-16383 media-16383" class="align-center"></figure>
<p style="text-align: center;"><strong>To learn more about the given malwares:</strong></p>
<figure id="post-16217 media-16217" class="align-center">
<figure id="post-16385 media-16385" class="align-center"><img loading="lazy" decoding="async" class="aligncenter  wp-image-17412" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/learn-more.png" alt="" width="289" height="158" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/learn-more.png 223w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/learn-more-71x39.png 71w" sizes="auto, (max-width: 289px) 100vw, 289px" /></figure>
<p style="text-align: center;"><a href="https://www.cobaltstrike.com/training">Cobalt Strike Training videos</a></p>
</figure>
<figure id="post-16210 media-16210" class="align-center">
<figure id="post-16367 media-16367" class="align-center"></figure>
</figure>
<h1 style="text-align: center;"><strong>CERT-W: FROM THE FRONT LINE</strong></h1>
<h2 style="text-align: center;">The First Responder Word</h2>
<figure id="post-16221 media-16221" class="align-center">
<figure id="post-16228 media-16228" class="align-center">
<figure id="post-16369 media-16369" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17420" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-10.jpg" alt="" width="781" height="523" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-10.jpg 781w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-10-285x191.jpg 285w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-10-58x39.jpg 58w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-10-768x514.jpg 768w" sizes="auto, (max-width: 781px) 100vw, 781px" /></figure>
<p style="text-align: center;">We recommend the <em>2021 Benchmark on cybersecurity incidents</em> which reviews the interventions of the CERT-W carried out between September 2020 and October 2021. This Benchmark provides keys to understanding the security issues and a snapshot of current cybersecurity threats in France.</p>
</figure>
</figure>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17416" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-8.png" alt="" width="222" height="122" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-8.png 222w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-8-71x39.png 71w" sizes="auto, (max-width: 222px) 100vw, 222px" /></p>
<p style="text-align: center;"><u><a href="https://uk.wavestone.com/en/insight/cyberattacks-in-2021-ransomwares-still-threat-n1/">CERT-W’s 2021 Benchmark on cybersecurity incidents </a></u></p>
<p> </p>
<h1 style="text-align: center;"><strong>Reading Of The Month</strong></h1>
<p style="text-align: center;">To learn more about Conti, one of the most dangerous Ransomware, we recommend reading the <em>Conti Ransomware Group In-Depth Analysis </em>of Prodaft. According to Prodaft, this report will show you how the gang works with details obtained by their team who accessed Conti’s infrastructure.</p>
<figure id="post-16219 media-16219" class="align-center">
<figure id="post-16387 media-16387" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17418" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-9.png" alt="" width="222" height="122" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-9.png 222w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-9-71x39.png 71w" sizes="auto, (max-width: 222px) 100vw, 222px" /></figure>
<p style="text-align: center;"><a href="https://www.prodaft.com/m/reports/Conti_TLPWHITE_v1.6_WVcSEtc.pdf">Conti Ransomware Group In-Depth Analysis by Prodaft</a></p>
</figure>
<p> </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/11/cdt-watch-november-2021/">CDT Watch &#8211; November 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2021/11/cdt-watch-november-2021/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Newsletter CERT-W, from the front line &#8211; June 2021</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/06/newsletter-cert-w-june-2021/</link>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Thu, 24 Jun 2021 13:39:44 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[CDT]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[emotet]]></category>
		<category><![CDATA[front line]]></category>
		<category><![CDATA[indicators]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[watch]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=16204</guid>

					<description><![CDATA[<p>DECRYPTION CYBER CRIMINAL NETWORK DISMANTELING The last 6 months, large-scale coordinated international actions have dismantled several of the biggest cybercriminal networks such as Emotet, Netwalker, Egregor or even Cl0p. Let’s have a closer look at some of them. What is&#160;Emotet?...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/06/newsletter-cert-w-june-2021/">Newsletter CERT-W, from the front line &#8211; June 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="post-16207 media-16207" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16207" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH.png" alt="" width="1621" height="455" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH.png 1621w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH-437x123.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH-768x216.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH-1536x431.png 1536w" sizes="auto, (max-width: 1621px) 100vw, 1621px" /></figure>
<h1 style="text-align: center;"><strong>DECRYPTION</strong></h1>
<h2 style="text-align: center;">CYBER CRIMINAL NETWORK DISMANTELING</h2>
<p><strong>The last 6 months, large-scale coordinated international actions have dismantled several of the biggest cybercriminal networks such as Emotet, Netwalker, Egregor or even Cl0p. Let’s have a closer look at some of them.</strong></p>
<p><strong>What is&nbsp;Emotet?</strong></p>
<p>Emotet&nbsp;was originally a&nbsp;<strong>banking trojan,</strong> stealing emails and contact list, retrieving&nbsp;passwords on navigators and systems, spreading within the infected network.&nbsp;In&nbsp;2019,&nbsp;Emotet&nbsp;lost its banking module and became a&nbsp;<strong>dropper</strong> of malwares. The trojan used&nbsp;a&nbsp;<a href="https://www.justice.gov/opa/pr/emotet-botnet-disrupted-international-cyber-operation"><strong>botnet of 1.6 million machines</strong></a>&nbsp; to realize phishing campaign and install itself on victims’ machines.</p>
<p><strong>Why is&nbsp;Emotet called the “king of malware”?</strong></p>
<p>At the end of 2020,&nbsp;Emotet&nbsp;was identified as&nbsp;<a href="https://www.europol.europa.eu/newsroom/news/world%E2%80%99s-most-dangerous-malware-emotet-disrupted-through-global-action"><strong>one of the most dangerous&nbsp;malwares</strong></a>. Additionally, being a dropper as well as a botnet,&nbsp;Emotet&nbsp;also&nbsp;served&nbsp;as a&nbsp;<strong>front&nbsp;door</strong>&nbsp;to many other malwares.&nbsp;It&nbsp;was used to drop malicious payloads directly onto the victims’ assets: for example,&nbsp;TrickBot&nbsp;was dropped onto the targeted machine which in turn, would drop&nbsp;<strong>Ryuk&nbsp;or Conti ransomware</strong>. According to Checkpoint Research,&nbsp;Emotet&nbsp;was at the top of the Global Threat Index in October 2020 and was linked to a&nbsp;<a href="https://blog.checkpoint.com/2021/01/07/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat/"><strong>wave of ransomware attacks</strong></a>.&nbsp;According to CISA, the U.S. Cybersecurity &amp; Infrastructure Security Agency,&nbsp;Emotet&nbsp;infections cost is estimated at&nbsp;<a href="https://www.kaspersky.com/resource-center/threats/emotet"><strong>$1 million per incident</strong></a><strong>.</strong></p>
<p>&nbsp;</p>
<figure id="post-16210 media-16210" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16210" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/emotet.png" alt="" width="877" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/emotet.png 877w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/emotet-233x191.png 233w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/emotet-48x39.png 48w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/emotet-768x631.png 768w" sizes="auto, (max-width: 877px) 100vw, 877px" /></figure>
<p style="text-align: center;"><em>Main TA542’s customer base, “The Malware As a Service EMOTET”, ANSSI 2021</em></p>
<p>&nbsp;</p>
<p>During several months, Europol used the help of Eurojust, France, Germany, United States of America and announced their successful dismantle of the Emotet network in January 2021.</p>
<p><strong>Does this dismantling&nbsp;mean&nbsp;the end of the&nbsp;malware?</strong></p>
<p>The end of one botnet actually <a href="https://info.phishlabs.com/blog/emotet-dismantled-trickbot-zloader-and-bazarloader-step-in"><strong>led to&nbsp;the rise of several others</strong></a>, such as&nbsp;TrickBot, which even though existed since 2016, replaced Emotet as one of the most well-established&nbsp;MaaS&nbsp;(Malware as a Service) not long after the events on January.</p>
<p>This turn of events might not be so surprising, as threat actors often pivot and change their tools along the way, whether by choice or by necessity as it was the case here. Taking one malware down would only force them to use another one. Yet, what is interesting is that&nbsp;<a href="https://blogs.microsoft.com/on-the-issues/2020/10/12/trickbot-ransomware-cyberthreat-us-elections/"><strong>TrickBot&nbsp;also suffered a dismantlement of its own</strong></a>, back in October 2020. In an attempt to disrupt one of the most used distributors of ransomware, Microsoft joined forces with other security teams to take down&nbsp;TrickBot&nbsp;servers. As you may have noticed, this was months before law-enforcement took down&nbsp;Emotet, and now&nbsp;<a href="https://securityintelligence.com/posts/trickbot-survival-instinct-trickboot-version/"><strong>TrickBot&nbsp;or other versions of this malware, still lives on</strong></a>. These actions only disrupted&nbsp;TrickBot&nbsp;activities for a few days, before going back to what&nbsp;it was and even&nbsp;<strong>overtaking&nbsp;Emotet&nbsp;dominance</strong>.</p>
<p>Moreover, TrickBot&nbsp;seems to be somehow connected to the&nbsp;<strong><a href="https://www.cybereason.com/threat-alert-new-trickbot-variants">Bazar</a></strong>&nbsp;malware (BazarLoader&nbsp;and&nbsp;BazarBackdoor), as some part of its infrastructure is shared with&nbsp;TrickBot&nbsp;and both show code similarities. This new toolset is now the most seen malware used to deploy&nbsp;Ryuk&nbsp;ransomware instead of the previous&nbsp;Emotet-TrickBot-Ryuk&nbsp;or&nbsp;TrickBot-Ryuk&nbsp;chain of infection. These changes might have to do with the previously mentioned&nbsp;dismantlements, or due to a new collaboration between threat actors.</p>
<p><strong>What about the people behind these groups?</strong></p>
<p>More recently, on June 4th,&nbsp;<a href="https://www.justice.gov/opa/pr/latvian-national-charged-alleged-role-transnational-cybercrime-organization"><strong>Alla&nbsp;Witte was charged on multiple counts</strong></a> for participating in&nbsp;TrickBot&nbsp;criminal activities. Is this arrest, serving as a warning with several hundreds of years of prison if convicted, going to change cybercriminals’ operations? A few months before that, the Ukrainian authorities cooperated with the French law enforcement to conduct&nbsp;<a href="https://blog.malwarebytes.com/ransomware/2021/02/egregor-ransomware-hit-by-arrests/"><strong>an arrest against Egregor members</strong></a>, while&nbsp;<a href="https://threatpost.com/netwalker-ransomware-suspect-charged/163405/"><strong>a Canadian tied to&nbsp;Netwalker&nbsp;ransomware was charged</strong>&nbsp;</a>by the police for distributing the malware. Last year was also marked by several other arrests of cybercriminals around the world. For instance,&nbsp;<a href="https://www.zdnet.com/article/europol-arrests-hackers-behind-infinity-black-hacker-group/"><strong>the arrest of members of the Infinity Black website&nbsp;</strong></a>selling user credentials, lead to the end of the website and the group altogether. On the other hand, the arrests mentioned regarding&nbsp;Netwalker&nbsp;and Egregor seem to concern ransomware affiliates. And as the operators are still free and collaborate with other affiliates, their ransomware continues being deployed around the world.&nbsp;Alla&nbsp;Witte’s case is different since she is suspected to be a malware developer for the&nbsp;TrickBot&nbsp;Group. While her possible conviction might slightly disrupt&nbsp;TrickBot, it seems like their operations still go on, as according to <a href="https://any.run/malware-trends/trickbot">the&nbsp;any.run&nbsp;website and its malware trend tracker, the trojan was last seen on June 16th, 2021</a>. Last but not least, <a href="https://www.bleepingcomputer.com/news/security/ukraine-arrests-clop-ransomware-gang-members-seizes-servers/">some mid-tier members of the Cl0p gang may have been arrested</a> mid-June in Ukraine even though it seems no core actor behind Cl0p were apprehended.</p>
<p><strong>What could be the long-term consequences of these takedown for the cybercriminal activities?</strong></p>
<p>It’s still early to draw meaningful conclusions on the consequences for cybercriminal activities with the recent arrests. Yesterday, June 16th, at the Geneva summit, U.S. <a href="https://www.zdnet.com/article/biden-and-putin-spar-over-cybersecurity-ransomware-at-geneva-summit/"><strong>President Joe Biden met with Russian President Vladimir Putin</strong></a>. One of the hot topics of discussions was the <strong>ransomware attacks on U.S. entities from Russian soil</strong>. Biden warned Putin that United States would not tolerate any other cyber-attacks, especially on 16 critical sectors. The <a href="https://www.zdnet.com/article/ransomware-russia-told-to-tackle-cyber-criminals-operating-from-within-its-borders/"><strong>G7</strong></a> and the <a href="https://www.zdnet.com/article/nato-series-of-cyberattacks-could-be-seen-as-the-same-threat-as-an-armed-attack/"><strong>NATO</strong></a> also stated that in order not to consider cyber-attacks as armed attacks, Russia should try to identify and disrupt ransomware organizations within its borders.</p>
<p>Even with the arrests of criminal gang members and cybersecurity talks at the presidential levels, <strong>some experts say there would be no or little impact on ransomware groups that will still operate with impunity</strong>. The near future will give hints about the possible evolution of the cyber-attacks landscape. On one hand, the rising of a broader international collaboration against cyber-criminal gangs which could lead to less opportunistic and lucrative attacks. On the other hand, growing tensions between two blocks: U.S.-Europe and Russia-China with possible sanctions from either side and more cyber espionage, supply-chain or state-sponsored attacks.</p>
<p>&nbsp;</p>
<h1 style="text-align: center;"><strong>CERT-W: FROM THE FRONT LINE</strong></h1>
<h2 style="text-align: center;">The First Responder Word</h2>
<figure id="post-16221 media-16221" class="align-center">
<figure id="post-16228 media-16228" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16228" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/ng.jpg" alt="" width="936" height="638" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/ng.jpg 936w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/ng-280x191.jpg 280w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/ng-57x39.jpg 57w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/ng-768x523.jpg 768w" sizes="auto, (max-width: 936px) 100vw, 936px" /></figure>
</figure>
<h1></h1>
<p>&nbsp;</p>
<h1 style="text-align: center;"><strong>FOCUS TECH</strong></h1>
<h2 style="text-align: center;">Phishing</h2>
<p>Think like a cybercriminal and understand how a spear phishing campaign is built to avoid them!</p>
<p>The technical zoom of the month:</p>
<figure id="post-16215 media-16215" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16215" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image.png" alt="" width="973" height="1849" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image.png 973w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image-101x191.png 101w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image-21x39.png 21w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image-768x1459.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image-808x1536.png 808w" sizes="auto, (max-width: 973px) 100vw, 973px" /></figure>
<p>&nbsp;</p>
<p style="text-align: center;"><strong>To learn more about this:</strong></p>
<figure id="post-16217 media-16217" class="align-center"><a href="https://www.proofpoint.com/us/resources/threat-reports/state-of-phish-infographic"><img loading="lazy" decoding="async" class="aligncenter wp-image-16217" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/learn.png" alt="" width="235" height="197" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/learn.png 462w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/learn-227x191.png 227w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/learn-46x39.png 46w" sizes="auto, (max-width: 235px) 100vw, 235px" /></a></figure>
<p>&nbsp;</p>
<h1 style="text-align: center;"><strong>Reading Of The Month</strong></h1>
<p style="text-align: center;">We recommend the short report “APT trends report Q1 2021”, which reviews the highlight events and findings observed by the Global Research and Analysis Team at Kaspersky during the Q1 2021 around the world.</p>
<figure id="post-16219 media-16219" class="align-center"><a href="https://securelist.com/apt-trends-report-q1-2021/101967/"><img loading="lazy" decoding="async" class="aligncenter wp-image-16219" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/read.jpg" alt="" width="248" height="154" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/read.jpg 415w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/read-308x191.jpg 308w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/read-63x39.jpg 63w" sizes="auto, (max-width: 248px) 100vw, 248px" /></a></figure>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/06/newsletter-cert-w-june-2021/">Newsletter CERT-W, from the front line &#8211; June 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CERT-W Newsletter February 2021</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/03/cert-w-newsletter-february-2021/</link>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Tue, 16 Mar 2021 15:00:24 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[incident response CERT-W]]></category>
		<category><![CDATA[indicators]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15372</guid>

					<description><![CDATA[<p>Monthly indicators TOP ATTACK Two French hospital under ransomware attacks Ransomware attacks struck two French hospital groups in less than a week, prompting the transfer of some patients to other facilities but not affecting care for Covid-19 patients or virus...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/03/cert-w-newsletter-february-2021/">CERT-W Newsletter February 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="post-14786 media-14786" class="align-center">
<figure id="post-14983 media-14983" class="align-center">
<figure id="post-15176 media-15176" class="align-center">
<figure id="post-15373 media-15373" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-15373" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/23.png" alt="" width="761" height="239" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/23.png 1498w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/23-437x137.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/23-71x22.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/23-768x241.png 768w" sizes="auto, (max-width: 761px) 100vw, 761px" /></figure>
</figure>
</figure>
</figure>
<table style="width: 0%; height: 294px;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 20.027%; height: 89px; border: 0px solid #21a6a6; text-align: left;" colspan="2">
<h1><strong>Monthly indicators</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 48px; border: 4px solid #21a6a6; text-align: center;"><strong>TOP ATTACK</strong></td>
<td style="width: 79.973%; height: 48px; border-color: #ffffff; text-align: left;"><a href="https://www.euronews.com/2021/02/16/several-french-hospitals-crippled-by-cyberattacks"><span style="text-decoration: underline; color: #21a6a6;"><strong>Two French hospital under ransomware attacks</strong></span></a></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 10px; border-color: #ffffff; text-align: left;" colspan="2">Ransomware attacks struck <strong style="font-family: inherit; font-size: inherit;">two French hospital groups in less than a week</strong><span style="font-family: inherit; font-size: inherit;">, prompting the transfer of some patients to other facilities but not affecting care for Covid-19 patients or virus vaccinations. </span>The two French hospitals were stricken with <strong style="font-family: inherit; font-size: inherit;">ransomware attacks,</strong><span style="font-family: inherit; font-size: inherit;"> and a third pre-emptively </span><strong style="font-family: inherit; font-size: inherit;">cut connections with an IT provider</strong><span style="font-family: inherit; font-size: inherit;">. </span>The Villefranche-sur-Saône hospital complex in France’s eastern Rhone département (administrative area) announced Monday that a cyber-attack had been detected at 4:30am local time. The attack by the crypto-virus RYUK, a kind of ransomware, &#8220;strongly impacts&#8221; the Villefranche, Tarare and Trévoux sites of the North-West Hospital.</td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><span style="color: #333333;"><strong>TOP EXPLOIT</strong></span></td>
<td style="width: 79.973%; height: 21px; border-color: #ffffff; text-align: left;"><a href="https://abcnews.go.com/US/outdated-computer-system-exploited-florida-water-treatment-plant/story?id=75805550"><span style="text-decoration: underline; color: #21a6a6;"><strong>An outdated version of Windows and a weak cybersecurity network allowed hackers to poison the Florida water treatment</strong></span></a></td>
</tr>
<tr style="height: 40px;">
<td style="width: 100%; border-color: #ffffff; height: 37px; text-align: left;" colspan="2"><span style="font-family: inherit; font-size: inherit;"><span style="font-family: inherit; font-size: inherit;"><span style="font-family: inherit; font-size: inherit;">The hacker was able to <strong style="font-family: inherit; font-size: inherit;">use remote access software to raise the levels of sodium hydroxide</strong><span style="font-family: inherit; font-size: inherit;"> in the water from about 100 parts per million to 11,100 parts per million for a few minutes, according to investigators. The FBI&#8217;s Cyber Division on Tuesday notified law enforcement agencies and businesses to warn them about the computer vulnerabilities, which led to the Bruce T. Haddock </span><strong style="font-family: inherit; font-size: inherit;">Water Treatment Plant</strong><span style="font-family: inherit; font-size: inherit;"> in Oldsmar being hacked on Feb. 5.</span><br />
</span></span></span><span style="font-family: inherit; font-size: inherit;"><span style="font-family: inherit; font-size: inherit;">The plant&#8217;s computer systems were using Windows 7, which hasn&#8217;t received support or updates from Microsoft in over a year, according to the FBI.</span></span></td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><strong>TOP LEAK</strong></td>
<td style="width: 79.973%; border-color: #ffffff; height: 21px; text-align: left;"><a href="https://cybernews.com/news/largest-compilation-of-emails-and-passwords-leaked-free/"><span style="text-decoration: underline; color: #21a6a6;"><strong>COMB: more than 3 billion of Gmail, Hotmail, Netflix passwords have leaked</strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="width: 100%; border-color: #ffffff; height: 35px; text-align: left;" colspan="2">It’s being called <strong>the biggest breach of all time</strong> and <strong>the mother of all breaches</strong>: COMB, or the Compilation of Many Breaches, contains more than 3.2 billion unique pairs of cleartext emails and passwords. While many data breaches and leaks have plagued the internet in the past, this one is exceptional in the sheer size of it. To wit, the entire population of the planet is at roughly 7.8 billion, and this is about 40% of that.</td>
</tr>
</tbody>
</table>
<table style="width: 100%; height: 212px;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 1.00503%; height: 89px; border: 0px solid #21a6a6; text-align: left;" colspan="2">
<h1><strong>Cybercrime watch</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 1.00503%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://www.europol.europa.eu/newsroom/news/ten-hackers-arrested-for-string-of-sim-swapping-attacks-against-celebrities"><span style="text-decoration: underline; color: #21a6a6;"><strong>Arrest,Ten hackers arrested after stealing over USD 100 million in cryptocurrencies by hijacking phone numbers</strong></span></a></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 1.00503%; height: 23px; border-color: #ffffff; text-align: left;" colspan="2">Around 10 criminals have been <strong>arrested</strong> as a result of an <strong>international investigation into a series of sim swapping attacks</strong> targeting high-profile victims in the United States. The attacks orchestrated by this criminal gang targeted thousands of victims throughout 2020, including famous internet influencers, sport stars, musicians and their families. The criminals are believed to have <strong>stolen</strong> from them over <strong>USD 100 million in cryptocurrencies</strong> after illegally gaining access to their phones.</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 1.00503%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://www.cert.ssi.gouv.fr/cti/CERTFR-2021-CTI-005/"><span style="text-decoration: underline;"><strong><span style="color: #21a6a6; text-decoration: underline;">Sandworm intrusion set campaign targeting Centreon systems, impacting several French entities</span></strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; border-color: #ffffff; text-align: left; width: 1.00503%;" colspan="2">ANSSI has been informed of <strong style="font-family: inherit; font-size: inherit;">an intrusion campaign targeting the monitoring software Centreon</strong><span style="font-family: inherit; font-size: inherit;"> distributed by the French company CENTREON which resulted in the </span><strong style="font-family: inherit; font-size: inherit;">breach of several French entities</strong><span style="font-family: inherit; font-size: inherit;">. This campaign mostly affected information technology providers, especially web hosting providers.</span><br />
On compromised systems, ANSSI discovered the presence of a backdoor in the form of a webshell dropped on several Centreon servers exposed to the internet. This campaign bears several similarities with previous campaigns attributed to the <strong>intrusion set named Sandworm.</strong></td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 1.00503%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://www.zdnet.com/article/dutch-covid-19-patient-data-sold-on-the-criminal-underground/"><span style="text-decoration: underline; color: #21a6a6;"><strong>Following Emotet and Netwalker arrest, groups of cybercriminal publicity released victim&#8217;s decrytption keys</strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; border-color: #ffffff; text-align: left; width: 1.00503%;" colspan="2">Less than one month after the arrest of <strong style="font-family: inherit; font-size: inherit;">Emotet and Netwalker</strong><span style="font-family: inherit; font-size: inherit;"> networks, two cybercriminal groups known as Ziggy and Fonix announced that they were shutting down their ransomware operations and would be releasing all of the </span><strong style="font-family: inherit; font-size: inherit;">decryption keys</strong><span style="font-family: inherit; font-size: inherit;">. The groups mentioned concerns about recent law enforcement activity and guilt for encrypting victims. Ziggy ransomware admin indeed </span><strong style="font-family: inherit; font-size: inherit;">posted a SQL file</strong><span style="font-family: inherit; font-size: inherit;"> containing 922 decryption keys for encrypted victims. For each victim, the SQL file lists three keys needed to decrypt their encrypted files.</span></td>
</tr>
</tbody>
</table>
<table style="width: 100%;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 89px; text-align: left; border: 0px solid #21a6a6;" colspan="2">
<h1><strong>Vulnerability watch</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1300"><strong>CVE-2021-1300</strong></a></td>
<td style="width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;"><span style="text-decoration: underline; color: #21a6a6;"><strong>Cisco SD-WAN Vulnerability</strong></span></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 23px; border-color: #ffffff; text-align: left;" colspan="2"><strong>CVSS score: 9.8 CRITICAL</strong></p>
<p>Cisco is warning of multiple, critical vulnerabilities in its software-defined networking for wide-area networks (<a href="https://threatpost.com/cisco-zero-day-anyconnect-secure-patch/160988/">SD-WAN</a>) solutions for business users. One of them is this buffer-overflow flaw stems from incorrect handling of IP traffic; an attacker could exploit the flaw by sending crafted IP traffic through an affected device, which may cause a buffer overflow when the traffic is processed. Ultimately, this allows an attacker to execute arbitrary code on the underlying operating system with root privileges.</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1257"><strong>CVE-2021-1257</strong></a></td>
<td style="width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;"><span style="color: #21a6a6;"><b><u><strong>Cisco Digital Network Architecture CSRF Vulnerability</strong></u></b></span></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; width: 100%; border-color: #ffffff; text-align: left;" colspan="2"><strong>CVSS score : 8.8 HIGH</strong></p>
<p>The flaw exists in the web-based management interface of the Cisco DNA Center, which is a centralized network-management and orchestration platform for Cisco DNA. An attacker could exploit the vulnerability by socially engineering a web-based management user into following a specially crafted link, say via a phishing email or chat. If the user clicks on the link, the attacker can then perform arbitrary actions on the device with the privileges of the authenticated user.</td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1647"><strong>CVE-2021-1647</strong></a></td>
<td style="width: 79.973%; height: 21px; border-color: #ffffff; text-align: left;"><span style="text-decoration: underline; color: #21a6a6;"><strong>Microsoft Defender Remote Code Execution Vulnerability</strong></span></td>
</tr>
<tr style="height: 40px;">
<td style="width: 100%; border-color: #ffffff; height: 119px; text-align: left;" colspan="2"><strong>CVSS score : 7.8 HIGH</strong></p>
<p>It could allow an authenticated user to execute arbitrary .NET code on an affected server in the context of the SharePoint Web Application service account. In its default configuration, authenticated SharePoint users are able to create sites that provide all of the necessary permissions that are prerequisites for launching an attack.</td>
</tr>
</tbody>
</table>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/03/cert-w-newsletter-february-2021/">CERT-W Newsletter February 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CERT-W Newsletter January 2021</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/02/cert-w-newsletter-january-2021/</link>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Wed, 17 Feb 2021 08:00:15 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[incident response CERT-W]]></category>
		<category><![CDATA[indicators]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15175</guid>

					<description><![CDATA[<p>Monthly indicators TOP ATTACK SolarWinds aftermaths On the 11th of January, a website presumably owned by the actors behind the SolarWinds breach has surfaced, claiming to be selling data obtained using the SolarWinds backdoor. The site, using the domain solarleaks.net,...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/cert-w-newsletter-january-2021/">CERT-W Newsletter January 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="post-14786 media-14786" class="align-center">
<figure id="post-14983 media-14983" class="align-center">
<figure id="post-15176 media-15176" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-15176" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/january.png" alt="" width="862" height="275" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/january.png 1358w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/january-437x139.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/january-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/january-768x245.png 768w" sizes="auto, (max-width: 862px) 100vw, 862px" /></figure>
</figure>
</figure>
<table style="width: 0%; height: 294px;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 20.027%; height: 89px; border: 0px solid #21a6a6; text-align: left;" colspan="2">
<h1><strong>Monthly indicators</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 48px; border: 4px solid #21a6a6; text-align: center;"><strong>TOP ATTACK</strong></td>
<td style="width: 79.973%; height: 48px; border-color: #ffffff; text-align: left;"><a href="https://securityboulevard.com/2021/01/solarwinds-aftermath-continues-with-solarleaks/"><span style="text-decoration: underline; color: #21a6a6;"><strong>SolarWinds aftermaths</strong></span></a></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 10px; border-color: #ffffff; text-align: left;" colspan="2">On the 11<sup style="font-family: inherit;">th</sup><span style="font-family: inherit; font-size: inherit;"> of January, a website presumably owned by the actors behind the SolarWinds breach has surfaced, claiming to be selling data obtained using the SolarWinds backdoor. The site, using the domain </span><strong style="font-family: inherit; font-size: inherit;">solarleaks.net</strong><span style="font-family: inherit; font-size: inherit;">, displays only a pgp signed message, in which the actors share the links to download the stolen information, which has already been encrypted. The domain solarwinds.net has a sister domain located in the dark web, presumably to provide access in case of a takedown.<br />
</span>Simultaneously, a growing number of cybersecurity vendors like <a href="https://www.crowdstrike.com/blog/sunspot-malware-technical-analysis/"><strong>CrowdStrike</strong></a>, <a href="https://fidelissecurity.com/threatgeek/data-protection/ongoing-analysis-solarwinds-impact/"><strong>Fidelis</strong></a>, FireEye, <a href="https://threatpost.com/malwarebytes-solarwinds-attackers/163190/"><strong>Malwarebytes</strong></a>, Palo Alto Networks and <a href="https://threatpost.com/mimecast-solarwinds-hack-security-vendor-victims/163431/"><strong>Mimecast</strong></a> are confirming being targeted in the espionage attack. “What started out as the SolarWinds attack is slowly turning out to be perhaps the most sophisticated and wide-reaching cyber-campaign we have ever seen,” Ami Luttwak, CTO and co-founder of Wiz “It encompasses multiple companies used as backdoors to other companies, numerous tools and novel attack methods. This is far more than SolarWinds.”</td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><span style="color: #333333;"><strong>TOP EXPLOIT</strong></span></td>
<td style="width: 79.973%; height: 21px; border-color: #ffffff; text-align: left;"><a href="https://www.theregister.com/2021/01/21/dept_education_school_laptops_malware/"><span style="text-decoration: underline; color: #21a6a6;"><strong>Laptops given to British schools came preloaded with remote-access worm</strong></span></a></td>
</tr>
<tr style="height: 40px;">
<td style="width: 100%; border-color: #ffffff; height: 37px; text-align: left;" colspan="2"><span style="font-family: inherit; font-size: inherit;">A shipment of laptops supplied to British schools by the Department for Education to help kids learn under lockdown came preloaded with <strong>Gamarue</strong> – an old remote-access worm from the 2010s. This software nasty doesn&#8217;t just spread from computer to computer, it also tries to connect to outside servers for instructions to carry out. From what we know a batch of <strong>23,000 computers</strong>, the GeoBook 1E running Windows 10, made by Shenzhen-headquartered Tactus Group, contained the units that were loaded with malware.</span></td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><strong>TOP LEAK</strong></td>
<td style="width: 79.973%; border-color: #ffffff; height: 21px; text-align: left;"><a href="https://threatpost.com/meetmindful-daters-compromised-data-breach/163313/"><span style="text-decoration: underline; color: #21a6a6;"><strong>Hacker leaks data of 2.28 million dating site user</strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="width: 100%; border-color: #ffffff; height: 35px; text-align: left;" colspan="2">The dating site&#8217;s data has been shared as a free download on a publicly accessible hacking forum known for its trade in hacked databases. The leaked data, a <strong>1.2 GB</strong> file, appears to be a dump of the site&#8217;s <strong>users database</strong>. Some of the most sensitive data points included in the file include: Real names; Email addresses; City, state, and ZIP details; Body details; Dating preferences; Marital status; Birth dates; Latitude and longitude; IP addresses; Bcrypt-hashed account passwords; Facebook user IDs; and Facebook authentication tokens. Messages exchanged by users were not included in the leaked file; however, this does not make the entire incident less sensitive.</td>
</tr>
</tbody>
</table>
<table style="width: 100%; height: 212px;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 1.00503%; height: 89px; border: 0px solid #21a6a6; text-align: left;" colspan="2">
<h1><strong>Cybercrime watch</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 1.00503%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://krebsonsecurity.com/2021/01/arrest-seizures-tied-to-netwalker-ransomware/"><span style="text-decoration: underline; color: #21a6a6;"><strong>Arrest, seizure tied to NetWalker ransomware</strong></span></a></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 1.00503%; height: 23px; border-color: #ffffff; text-align: left;" colspan="2">U.S. and Bulgarian authorities this week seized the dark web site used by the <strong>NetWalker</strong> ransomware cybercrime group to publish data stolen from its victims. NetWalker is a ransomware-as-a-service crimeware product in which affiliates rent access to the continuously updated malware code in exchange for a percentage of any funds extorted from victims. In connection with the seizure, a Canadian national suspected of extorting more than <strong>$27 million</strong> through the spreading of NetWalker was charged in a Florida court.</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 1.00503%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://krebsonsecurity.com/2021/01/international-action-targets-emotet-crimeware/"><span style="text-decoration: underline;"><strong><span style="color: #21a6a6; text-decoration: underline;">International action targets Emotet crimeware</span></strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; border-color: #ffffff; text-align: left; width: 1.00503%;" colspan="2">Authorities across Europe said they’d seized control over <strong>Emotet</strong>, a prolific malware strain and cybercrime-as-service operation. Investigators say the action could help quarantine more than <strong>a million Microsoft Windows systems currently compromised</strong> with malware tied to Emotet infections. The law enforcement action included the arrest of several suspects in Europe thought to be connected to the crimeware gang and the take down of various servers that communicate with infected systems.</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 1.00503%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://www.zdnet.com/article/dutch-covid-19-patient-data-sold-on-the-criminal-underground/"><span style="text-decoration: underline; color: #21a6a6;"><strong>Duch insider attack on Covid-19 data</strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; border-color: #ffffff; text-align: left; width: 1.00503%;" colspan="2">Dutch police have arrested <strong>two individuals</strong> in Amsterdam for allegedly selling data from the Dutch health ministry’s COVID-19 systems on the criminal underground. The arrests came after an investigation by RTL Nieuws reporter Daniel Verlaan who discovered ads for Dutch citizen data online, advertised on instant messaging apps like Telegram, Snapchat, and Wickr. According to Verlaan, <strong>the two suspects worked in DDG call centers</strong>, where they had access to official Dutch government COVID-19 systems and databases, and as they were working from home, they could easily take photos of their screens.</td>
</tr>
</tbody>
</table>
<table style="width: 100%;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 89px; text-align: left; border: 0px solid #21a6a6;" colspan="2">
<h1><strong>Vulnerability watch</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1300"><strong>CVE-2021-1300</strong></a></td>
<td style="width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;"><span style="text-decoration: underline; color: #21a6a6;"><strong>Cisco SD-WAN Vulnerability</strong></span></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 23px; border-color: #ffffff; text-align: left;" colspan="2"><strong>CVSS score: 9.8 CRITICAL</strong></p>
<p>Cisco is warning of multiple, critical vulnerabilities in its software-defined networking for wide-area networks (<a href="https://threatpost.com/cisco-zero-day-anyconnect-secure-patch/160988/">SD-WAN</a>) solutions for business users. One of them is this buffer-overflow flaw stems from incorrect handling of IP traffic; an attacker could exploit the flaw by sending crafted IP traffic through an affected device, which may cause a buffer overflow when the traffic is processed. Ultimately, this allows an attacker to execute arbitrary code on the underlying operating system with root privileges.</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1257"><strong>CVE-2021-1257</strong></a></td>
<td style="width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;"><span style="color: #21a6a6;"><b><u><strong>Cisco Digital Network Architecture CSRF Vulnerability</strong></u></b></span></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; width: 100%; border-color: #ffffff; text-align: left;" colspan="2"><strong>CVSS score : 8.8 HIGH</strong></p>
<p>The flaw exists in the web-based management interface of the Cisco DNA Center, which is a centralized network-management and orchestration platform for Cisco DNA. An attacker could exploit the vulnerability by socially engineering a web-based management user into following a specially crafted link, say via a phishing email or chat. If the user clicks on the link, the attacker can then perform arbitrary actions on the device with the privileges of the authenticated user.</td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1647"><strong>CVE-2021-1647</strong></a></td>
<td style="width: 79.973%; height: 21px; border-color: #ffffff; text-align: left;"><span style="text-decoration: underline; color: #21a6a6;"><strong>Microsoft Defender Remote Code Execution Vulnerability</strong></span></td>
</tr>
<tr style="height: 40px;">
<td style="width: 100%; border-color: #ffffff; height: 119px; text-align: left;" colspan="2"><strong>CVSS score : 7.8 HIGH</strong></p>
<p>It could allow an authenticated user to execute arbitrary .NET code on an affected server in the context of the SharePoint Web Application service account. In its default configuration, authenticated SharePoint users are able to create sites that provide all of the necessary permissions that are prerequisites for launching an attack.</td>
</tr>
</tbody>
</table>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/cert-w-newsletter-january-2021/">CERT-W Newsletter January 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CERT-W Newsletter December 2020</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/01/cert-w-newsletter-december-2020-risk-insight/</link>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Fri, 15 Jan 2021 08:00:46 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[incident response CERT-W]]></category>
		<category><![CDATA[indicators]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14972</guid>

					<description><![CDATA[<p>Monthly indicators TOP ATTACK The massive SolarWind hack Russian SVR Hackers have been romping through some 18,000 of SolarsWinds&#8217; Origin customer servers using the SUNBURST malware installed via a backdoored update server. FireEye, Microsoft and GoDaddy believe the avsvmcloud domain...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/01/cert-w-newsletter-december-2020-risk-insight/">CERT-W Newsletter December 2020</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="post-14786 media-14786" class="align-center">
<figure id="post-14983 media-14983" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-14983" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/DECEMBER.png" alt="" width="1512" height="482" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/DECEMBER.png 1512w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/DECEMBER-437x139.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/DECEMBER-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/DECEMBER-768x245.png 768w" sizes="auto, (max-width: 1512px) 100vw, 1512px" /></figure>
</figure>
<table style="width: 0%; height: 294px;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 20.027%; height: 89px; border: 0px solid #21a6a6; text-align: left;" colspan="2">
<h1><strong>Monthly indicators</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 48px; border: 4px solid #21a6a6; text-align: center;"><strong>TOP ATTACK</strong></td>
<td style="width: 79.973%; height: 48px; border-color: #ffffff; text-align: left;"><a href="https://www.theregister.com/2020/12/21/in_brief_security/"><span style="text-decoration: underline; color: #21a6a6;"><strong>The massive SolarWind hack</strong></span></a></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 10px; border-color: #ffffff; text-align: left;" colspan="2">Russian SVR Hackers have been romping through some 18,000 of SolarsWinds&#8217; Origin customer servers using the SUNBURST malware installed via a backdoored update server. FireEye, Microsoft and GoDaddy believe the avsvmcloud domain has been used to coordinate attacks. We do not know yet how the hackers hacked into SolarWinds but last year the company’s server was protected by the password “solarwinds123” (<a style="font-family: inherit; font-size: inherit;" href="https://www.theregister.com/2020/12/16/solarwinds_github_password/">link</a><span style="font-family: inherit; font-size: inherit;"> for more details).</span></td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><span style="color: #333333;"><strong>TOP EXPLOIT</strong></span></td>
<td style="width: 79.973%; height: 21px; border-color: #ffffff; text-align: left;"><a href="https://arstechnica.com/gadgets/2020/12/iphone-zero-click-wi-fi-exploit-is-one-of-the-most-breathtaking-hacks-ever/"><span style="text-decoration: underline; color: #21a6a6;"><strong>iPhone zero click Wi-Fi exploit</strong></span></a></td>
</tr>
<tr style="height: 40px;">
<td style="width: 100%; border-color: #ffffff; height: 37px; text-align: left;" colspan="2">Before Apple patch, Wi-Fi packets could steal photos. No interaction needed. Over the air. This Wi-Fi packet of death exploit was devised by Ian Beer, a researcher at Project Zero, Google’s vulnerability research arm. In this post (<a href="https://googleprojectzero.blogspot.com/2020/12/an-ios-zero-click-radio-proximity.html">link</a>), Beer covers the entire process to successfully exploiting this vulnerability in order to run arbitrary code on any nearby iOS device and steal all the user data.</td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><strong>TOP LEAK</strong></td>
<td style="width: 79.973%; border-color: #ffffff; height: 21px; text-align: left;"><a href="https://www.theregister.com/2020/12/07/data_breach_in_hackathon_data/"><span style="text-decoration: underline; color: #21a6a6;"><strong>Travel agency leaked customer data by giving away in a hackaton</strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="width: 100%; border-color: #ffffff; height: 35px; text-align: left;" colspan="2">When running a hackathon in 2017, the Australian travel agency, Flight Centre, provided a dataset containing 106 million rows of data and containing 6,121,565 individual customer records. Unfortunately, credit card records and passport numbers belonging to close to 7,000 people were in free text fields. An investigation showed that the agency:</p>
<ul>
<li>Did not implement a way to prevent its employees to fill out those fields with personal information.</li>
<li>Did not carry out the necessary checks, only reviewing a top 1,000 row sample for each data file within the dataset.</li>
</ul>
</td>
</tr>
</tbody>
</table>
<table style="width: 100%; height: 212px;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 1.00503%; height: 89px; border: 0px solid #21a6a6; text-align: left;" colspan="2">
<h1><strong>Cybercrime watch</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 1.00503%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://www.zdnet.com/article/a-hacker-is-selling-access-to-the-email-accounts-of-hundreds-of-c-level-executives/"><span style="text-decoration: underline; color: #21a6a6;"><strong>A hacker is selling access to the email accounts of hundreds of C-Level Executives</strong></span></a></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 1.00503%; height: 23px; border-color: #ffffff; text-align: left;" colspan="2">The data (email and password combinations for Office 365 and Microsoft accounts) is being sold on a closed-access underground forum for Russian-speaking hackers named Exploit.in. Access to any of these accounts is sold for prices ranging from $100 to $1,500, depending on the company size and user&#8217;s role. The validity of the data has been confirmed and the seller refused to share how he obtained the login credentials but said he had hundreds more to sell.</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 1.00503%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://www.theregister.com/2020/12/01/scam_call_prison/"><span style="text-decoration: underline;"><strong><span style="color: #21a6a6; text-decoration: underline;">A tax scam ringleader impersonating the IRS just got sent down for 20 years</span></strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; border-color: #ffffff; text-align: left; width: 1.00503%;" colspan="2">The man who headed an international criminal call center racket that conned Americans into handing over tens of millions of dollars in the belief they were being chased for money by the US government has been jailed for 20 years. The con artists ran a complex scheme in which employees from call centers in Ahmedabad, India, impersonated officials from the IRS and US Citizenship and Immigration Services (USCIS). Their victims were threatened with arrest, imprisonment, fines or deportation if they did not pay money allegedly owed to the government.</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 1.00503%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://www.europol.europa.eu/newsroom/news/cybercriminals%E2%80%99-favourite-vpn-taken-down-in-global-action#:~:text=The%20virtual%20private%20network%20(VPN,agencies%20from%20around%20the%20world."><span style="text-decoration: underline; color: #21a6a6;"><strong>Cybercriminal&#8217;s favourite VPN taken down in global action</strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; border-color: #ffffff; text-align: left; width: 1.00503%;" colspan="2">The virtual private network (VPN) Safe-Inet used by the world’s foremost cybercriminals has been taken down in a coordinated law enforcement action led by Europol and the FBI. Its infrastructure was seized in Germany, the Netherlands, Switzerland, France and the United States. The servers were taken down, and a splash page was put up online after the domain seizures.</td>
</tr>
</tbody>
</table>
<table style="width: 100%;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 89px; text-align: left; border: 0px solid #21a6a6;" colspan="2">
<h1><strong>Vulnerability watch</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-17095"><strong>CVE-2020-17095</strong></a></td>
<td style="width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;"><span style="text-decoration: underline; color: #21a6a6;"><strong>Hyper-V Remote Code Execution Vulnerability</strong></span></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 23px; border-color: #ffffff; text-align: left;" colspan="2"><strong>CVSS score: 9.9 CRITICAL</strong></p>
<p>It is a bug that could allow an attacker to escalate privileges from code execution in a Hyper-V guest to code execution on the Hyper-V host by passing invalid vSMB packet data. It appears that no special permissions are needed on the guest OS to exploit this vulnerability.</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-17132"><strong>CVE-2020-17132</strong></a></td>
<td style="width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;"><span style="color: #21a6a6;"><b><u><strong>Microsoft Exchange Remote Code Execution Vulnerability</strong></u></b></span></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; width: 100%; border-color: #ffffff; text-align: left;" colspan="2"><strong>CVSS score : 9.1 CRITICAL</strong></p>
<p>Microsoft doesn’t provide an attack scenario here but does note that the attacker needs to be authenticated. This indicates that if you take over someone’s mailbox, you can take over the entire Exchange server.</td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-17121"><strong>CVE-2020-17121</strong></a></td>
<td style="width: 79.973%; height: 21px; border-color: #ffffff; text-align: left;"><span style="text-decoration: underline; color: #21a6a6;"><strong>Microsoft SharePoint Remote Code Execution Vulnerability</strong></span></td>
</tr>
<tr style="height: 40px;">
<td style="width: 100%; border-color: #ffffff; height: 119px; text-align: left;" colspan="2"><strong>CVSS score : 8.8 HIGH</strong></p>
<p>It could allow an authenticated user to execute arbitrary .NET code on an affected server in the context of the SharePoint Web Application service account. In its default configuration, authenticated SharePoint users are able to create sites that provide all of the necessary permissions that are prerequisites for launching an attack.</td>
</tr>
</tbody>
</table>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/01/cert-w-newsletter-december-2020-risk-insight/">CERT-W Newsletter December 2020</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CERT-W Newsletter November 2020</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/12/cert-w-newsletter-november-2020-risk-insight/</link>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Wed, 16 Dec 2020 08:00:54 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[incident response CERT-W]]></category>
		<category><![CDATA[indicators]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14783</guid>

					<description><![CDATA[<p>Monthly indicators TOP ATTACK Brazilian government recovers from &#8220;worst-ever&#8221; cyberattack After suffering the most severe cyberattack ever orchestrated against a Brazilian public sector institution on the 3rd , the Superior Electoral Court (STJ, in the Portuguese acronym) has managed to...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/12/cert-w-newsletter-november-2020-risk-insight/">CERT-W Newsletter November 2020</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="post-14786 media-14786" class="align-center"><img loading="lazy" decoding="async" class="wp-image-14786 alignnone" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/nov.png" alt="" width="981" height="311" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/nov.png 1269w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/nov-437x139.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/nov-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/12/nov-768x244.png 768w" sizes="auto, (max-width: 981px) 100vw, 981px" /></figure>
<table style="width: 0%; height: 294px;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 20.027%; height: 89px; border: 0px solid #21a6a6; text-align: left;" colspan="2">
<h1><strong>Monthly indicators</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 48px; border: 4px solid #21a6a6; text-align: center;"><strong>TOP ATTACK</strong></td>
<td style="width: 79.973%; height: 48px; border-color: #ffffff; text-align: left;"><a href="https://www.zdnet.com/article/brazilian-government-recovers-from-worst-ever-cyberattack/"><span style="text-decoration: underline; color: #21a6a6;"><strong>Brazilian government recovers from &#8220;worst-ever&#8221; cyberattack</strong></span></a></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 10px; border-color: #ffffff; text-align: left;" colspan="2">After suffering the most severe cyberattack ever orchestrated against a Brazilian public sector institution on the 3<sup style="font-family: inherit;">rd</sup><span style="font-family: inherit; font-size: inherit;"> , the </span><strong style="font-family: inherit; font-size: inherit;">Superior Electoral Court</strong><span style="font-family: inherit; font-size: inherit;"> (STJ, in the Portuguese acronym) has managed to get its systems back up and running. The Court had to suspend all STJ sessions for a few days and then operate with limited functionality for urgent cases until the systems were fully re-established in November 20. The ransomware would have relied on a vulnerability discovered during a </span><a style="font-family: inherit; font-size: inherit;" href="https://www.theregister.com/2020/11/09/tianfu_cup/">Chinese hacking competition</a><span style="font-family: inherit; font-size: inherit;">.</span></td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;"><strong>TOP ATTACK</strong></td>
<td style="width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;"><a href="https://www.lemagit.fr/actualites/252492731/Ransomware-le-groupe-Egregor-revendique-la-cyberattaque-sur-Ouest-France"><span style="text-decoration: underline;"><strong><span style="color: #21a6a6; text-decoration: underline;">The Egregor ransomware disrupts the distribution of the daily &#8220;Ouest France&#8221;</span></strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="height: 10px; width: 100%; border-color: #ffffff; text-align: left;" colspan="2">Ouest-France, <strong>the leading French daily</strong> by its distribution, will publish only one edition of its Sunday newspaper, against ten usually, after being the victim of the <strong>Egregor ransomware</strong> in the night from 20th to 21st of November.</td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><span style="color: #333333;"><strong>TOP EXPLOIT</strong></span></td>
<td style="width: 79.973%; height: 21px; border-color: #ffffff; text-align: left;"><a href="https://www.darkreading.com/threat-intelligence/new-gitpaste-12-botnet-exploits-12-known-vulnerabilities/d/d-id/1339401?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple"><span style="text-decoration: underline; color: #21a6a6;"><strong>GitPaste-12 worm targets Linux servers, IoT devices</strong></span></a></td>
</tr>
<tr style="height: 40px;">
<td style="width: 100%; border-color: #ffffff; height: 37px; text-align: left;" colspan="2">Security researchers have discovered a new worm and botnet dubbed Gitpaste-12, named for <strong>its usage of GitHub and Pastebin </strong>to host component code and the <strong>12 known vulnerabilities</strong> it exploits to compromise systems.</td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><strong>TOP LEAK</strong></td>
<td style="width: 79.973%; border-color: #ffffff; height: 21px; text-align: left;"><a href="https://threatpost.com/millions-hotel-guests-worldwide-data-leak/161044/"><span style="text-decoration: underline; color: #21a6a6;"><strong>Millions of hotel worldwide caught up in mass data leak</strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="width: 100%; border-color: #ffffff; height: 35px; text-align: left;" colspan="2">Widely used hotel reservation platforms (including Booking.com and Expedia) has <strong style="font-family: inherit; font-size: inherit;">exposed 10 million files</strong><span style="font-family: inherit; font-size: inherit;"> related to guests at various hotels around the world, thanks to </span><strong style="font-family: inherit; font-size: inherit;">a misconfigured Amazon Web Services S3 bucket</strong><span style="font-family: inherit; font-size: inherit;">. The incident has affected </span><strong style="font-family: inherit; font-size: inherit;">24.4 GB worth of data in total</strong><span style="font-family: inherit; font-size: inherit;">, threating travellers with identity theft, scams, credit-card fraud and vacation-stealing, according to the security team at Website Planet, which uncovered the bucket. </span></td>
</tr>
</tbody>
</table>
<table style="width: 100%; height: 212px;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 1.00503%; height: 89px; border: 0px solid #21a6a6; text-align: left;" colspan="2">
<h1><strong>Cybercrime watch</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 1.00503%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://krebsonsecurity.com/2020/11/two-charged-in-sim-swapping-vishing-scams/"><span style="text-decoration: underline; color: #21a6a6;"><strong>Two charged in SIM swapping, vishing scams</strong></span></a></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 1.00503%; height: 23px; border-color: #ffffff; text-align: left;" colspan="2">Two young men from the eastern united states have been hit <strong>with identity theft and conspiracy charges</strong> for allegedly stealing bitcoin and social media accounts by tricking employees at wireless phone companies into giving away credentials needed to remotely access and modify customer account information.</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 1.00503%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://blog.malwarebytes.com/ransomware/2020/11/regretlocker-new-ransomware-can-encrypt-windows-virtual-hard-disks/"><span style="text-decoration: underline;"><strong><span style="color: #21a6a6; text-decoration: underline;">New Regret Locker ransomware targets Windows Virtual Machines</span></strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; border-color: #ffffff; text-align: left; width: 1.00503%;" colspan="2">A new ransomware called Regret Locker was discovered in October. It may be a simple ransomware in terms of appearance, but it makes up for in advanced features. In fact, Regret Locker uses an <strong>interesting technique of mounting a virtual disk file</strong> so each of its files can be encrypted individually.</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 1.00503%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://threatpost.com/ragnar-locker-ransomware-facebook-ads/161133/"><span style="text-decoration: underline; color: #21a6a6;"><strong>Ragnar Locker ransomware gang takes out Facebook ads in key tactic</strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; border-color: #ffffff; text-align: left; width: 1.00503%;" colspan="2">The Ragnar Locker ransomware group has decided to ratchet up the pressure on its latest high-profile victim, Italian liquor conglomerate <strong>Campari</strong>, by taking out Facebook ads threatening to release the <strong>2TB</strong> of sensitive data it stole in a Nov. 3 attack – unless <strong>a $15 million ransom is paid in Bitcoin.</strong></td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 1.00503%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://us-cert.cisa.gov/sites/default/files/publications/AA20-302A_Ransomware _Activity_Targeting_the_Healthcare_and_Public_Health_Sector.pdf"><span style="text-decoration: underline; color: #21a6a6;"><strong>Ransomware Activity targeting the Healthcare and Public Health Sector</strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; border-color: #ffffff; text-align: left; width: 1.00503%;" colspan="2">CISA, FBI, and HHS have credible information of an <strong>increased and imminent cybercrime threat to U.S. hospitals and healthcare providers</strong>. CISA, FBI, and HHS are sharing this information to provide warning to healthcare providers to ensure that they take timely and reasonable precautions to protect their networks from these threats.</td>
</tr>
</tbody>
</table>
<table style="width: 100%;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 89px; text-align: left; border: 0px solid #21a6a6;" colspan="2">
<h1><strong>Vulnerability watch</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-17051"><strong>CVE-2020-17051</strong></a></td>
<td style="width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;"><span style="text-decoration: underline; color: #21a6a6;"><strong>Remote kernel heap overflow in NFSv3 Windows Server</strong></span></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 23px; border-color: #ffffff; text-align: left;" colspan="2"><strong>CVSS score: 9.8 CRITICAL</strong></p>
<p>A critical vulnerability in the Windows NFSv3 (Network File System) server. NFS is typically used in heterogenous environments of Windows and Unix/Linux for file sharing. The vulnerability can be reproduced to cause an immediate BSOD (Blue Screen of Death) within the nfssvr.sys driver.</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-17087"><strong>CVE-2020-17087</strong></a></td>
<td style="width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;"><span style="color: #21a6a6;"><b><u><strong>Windows Kernel Local Elevation of Privilege Vulnerability</strong></u></b></span></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; width: 100%; border-color: #ffffff; text-align: left;" colspan="2"><strong>CVSS score : 7.8 HIGH</strong></p>
<p>A privilege escalation flaw that would allow an attacker who has already compromised a less powerful user account on a system to gain administrative control. In essence, it would have to be chained with another exploit.</td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-3556"><strong>CVE-2020-3556</strong></a></td>
<td style="width: 79.973%; height: 21px; border-color: #ffffff; text-align: left;"><span style="text-decoration: underline; color: #21a6a6;"><strong>CISCO AnyConnect VPN Zero-Day</strong></span></td>
</tr>
<tr style="height: 40px;">
<td style="width: 100%; border-color: #ffffff; height: 119px; text-align: left;" colspan="2"><strong>CVSS score : 7.3 HIGH</strong></p>
<p>A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client Software could allow an authenticated, local attacker to cause a targeted AnyConnect user to execute a malicious script. The vulnerability is due to a lack of authentication to the IPC listener. An attacker could exploit this vulnerability by sending crafted IPC messages to the AnyConnect client IPC listener.</td>
</tr>
</tbody>
</table>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/12/cert-w-newsletter-november-2020-risk-insight/">CERT-W Newsletter November 2020</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CERT-W Newsletter October 2020</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/11/cert-w-newsletter-october-2020/</link>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Thu, 12 Nov 2020 08:00:41 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[incident response CERT-W]]></category>
		<category><![CDATA[indicators]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14591</guid>

					<description><![CDATA[<p>Monthly indicators TOP ATTACK SOPRA STERIA HIT BY NEW VERSION OF RYUK RANSOMWARE French IT giant Sopra Steria was hit with a cyber-attack that disrupted the business of the firm. The virus has been identified: it is a new version...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/cert-w-newsletter-october-2020/">CERT-W Newsletter October 2020</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-14582" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-4.png" alt="" width="1263" height="395" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-4.png 1263w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-4-437x137.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-4-71x22.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/11/Image-1-4-768x240.png 768w" sizes="auto, (max-width: 1263px) 100vw, 1263px" /></p>
<table style="width: 0%; height: 294px;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 20.027%; height: 89px; border: 0px solid #21a6a6; text-align: left;" colspan="2">
<h1><strong>Monthly indicators</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 48px; border: 4px solid #21a6a6; text-align: center;"><strong>TOP ATTACK</strong></td>
<td style="width: 79.973%; height: 48px; border-color: #ffffff; text-align: left;"><a href="https://www.soprasteria.com/newsroom/press-releases/details/cyberattack-information-update"><span style="text-decoration: underline; color: #21a6a6;"><strong>SOPRA STERIA HIT BY NEW VERSION OF RYUK RANSOMWARE</strong></span></a></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 10px; border-color: #ffffff; text-align: left;" colspan="2">French IT giant Sopra Steria was hit with a cyber-attack that disrupted the business of the firm. The virus has been identified: it is a new version of the Ryuk ransomware, previously unknown to antivirus software providers and security agencies. Fortunately, according to Guillaume POUPARD, ANSSI’s managing director, the attack was foiled.</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;"><strong>TOP RANSOM</strong></td>
<td style="width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;"><a href="https://threatpost.com/software-ag-data-clop-ransomware/160042/"><span style="text-decoration: underline;"><strong><span style="color: #21a6a6; text-decoration: underline;">SOFTWARE AG DATA RELEASED AFTER CLOP RANSOMWARE STRIKE</span></strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="height: 10px; width: 100%; border-color: #ffffff; text-align: left;" colspan="2">The <strong>Clop</strong> group attacked Software AG, a German conglomerate with operations in more than <strong>70 countries</strong>, threatening to dump stolen data if the whopping <strong>$23 million ransom</strong> isn’t paid.</td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><span style="color: #333333;"><strong>TOP EXPLOIT</strong></span></td>
<td style="width: 79.973%; height: 21px; border-color: #ffffff; text-align: left;"><a href="https://threatpost.com/3-month-apple-hack-vulnerabilities-critical/159988/"><span style="text-decoration: underline; color: #21a6a6;"><strong>WORMABLE APPLE ICLOUD BUG ALLOWS AUTOMATIC PHOTO THEFT</strong></span></a></td>
</tr>
<tr style="height: 40px;">
<td style="width: 100%; border-color: #ffffff; height: 37px; text-align: left;" colspan="2">As part of Apple’s Security Bounty, a group of ethical hackers discovered <strong>55 vulnerabilities</strong>, earning <strong>$300,000</strong>. Some of the more interesting vulnerabilities abled wormable stored <strong>Cross-Site Scripting</strong> and <strong>command injection</strong>. Here is the <a href="https://samcurry.net/hacking-apple/"><strong>link</strong></a> to an extensive blog post detailing the team’s findings.</td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><strong>TOP LEAK</strong></td>
<td style="width: 79.973%; border-color: #ffffff; height: 21px; text-align: left;"><a href="https://www.darkreading.com/attacks-breaches/cybercriminals-extort-psychotherapy-patients-following-vastaamo-breach/d/d-id/1339280?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple"><span style="text-decoration: underline; color: #21a6a6;"><strong>VASTAAMO BREACH: HACKERS BLACKMAILING PSYCHOTHERAPY PATIENTS</strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="width: 100%; border-color: #ffffff; height: 35px; text-align: left;" colspan="2">Cybercriminals have hacked the systems of psychotherapy giant <strong>Vastaamo</strong>, and are now reaching out to therapy patients, threatening to dump their patient files if they do not pay a ransom. They have already reportedly posted <strong>the details of 300 Vastaamo patients</strong>.</td>
</tr>
</tbody>
</table>
<table style="width: 100%; height: 212px;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 0.947867%; height: 89px; border: 0px solid #21a6a6; text-align: left;" colspan="2">
<h1><strong>Cybercrime watch</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 0.947867%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://www.darkreading.com/attacks-breaches/us-treasury-sanctions-russian-institution-linked-to-triton-malware/d/d-id/1339265?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple"><span style="text-decoration: underline; color: #21a6a6;"><strong>US TREASURY SANCTIONS RUSSIAN INSTITUTION LINKED TO TRITON MALWARE</strong></span></a></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 0.947867%; height: 23px; border-color: #ffffff; text-align: left;" colspan="2">Triton, also known as TRISIS and HatMan, was developed to target and <strong>manipulate industrial control systems</strong>, the US Treasury reports<strong>.</strong> The US Department of the Treasury&#8217;s Office of Foreign Assets Control has sanctioned a Russian government research institution connected to the Triton malware.</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 0.947867%; height: 23px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://threatpost.com/doj-charges-6-sandworm-apt-members-in-notpetya-cyberattacks/160304/"><span style="text-decoration: underline;"><strong><span style="color: #21a6a6; text-decoration: underline;">US DOJ CHARGES 6 SANDWORM APT MEMBERS IN NOTPETYA CYBERATTACK</span></strong></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; width: 0.947867%; border-color: #ffffff; text-align: left;" colspan="2">The Department of Justice (DOJ) announced charges against <strong>six Russian nationals</strong> who are allegedly tied to the Sandworm APT. The threat group is believed to have launched several high-profile cyberattacks over the past few years – including the destructive NotPetya cyberattack that <a href="https://threatpost.com/notpetya-linked-to-industroyer-attack-on-ukraine-energy-grid/138287/">targeted hundreds of firms and hospitals worldwide in 2017.</a></td>
</tr>
<tr style="height: 48px;">
<td style="width: 0.947867%; height: 21px; border: 4px solid #21a6a6; text-align: left;" colspan="2"><a href="https://thedfirreport.com/2020/11/05/ryuk-speed-run-2-hours-to-ransom/"><span style="text-decoration: underline; color: #21a6a6;"><strong>RYUK RANSOMWARE GANG USES ZEROLOGON BUG FOR LIGHTNING-FAST ATTACK</strong></span></a></td>
</tr>
<tr style="height: 40px;">
<td style="width: 0.947867%; border-color: #ffffff; height: 10px; text-align: left;" colspan="2">The gang behind the Ryuk ransomware has added a new tool to their arsenal, which allowed them to significantly <strong>decrease the time needed to fully encrypt the target system to 2 hours</strong>. For more information concerning exploits of the <strong>Zerologon</strong> vulnerability click <a href="https://msrc-blog.microsoft.com/2020/10/29/attacks-exploiting-netlogon-vulnerability-cve-2020-1472/">here</a>.</td>
</tr>
</tbody>
</table>
<table style="width: 100%;">
<tbody>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 89px; text-align: left; border: 0px solid #21a6a6;" colspan="2">
<h1><strong>Vulnerability watch</strong></h1>
</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;"><strong>CVE-2020-5135</strong></td>
<td style="width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-5135"><span style="text-decoration: underline; color: #21a6a6;"><strong>CRITICAL VULNERABILITY ALLOWS HACKERS TO DISRUPT SONICWALL FIREWALLS</strong></span></a></td>
</tr>
<tr style="border-color: #ffffff;">
<td style="width: 100%; height: 23px; border-color: #ffffff; text-align: left;" colspan="2"><strong>CVSS score : 9.8 CRITICAL</strong></p>
<p>A buffer overflow vulnerability in SonicOS allows a remote attacker to cause Denial of Service (DoS) and potentially execute arbitrary code by sending a malicious request to the firewall.</td>
</tr>
<tr style="border-color: #ffffff; height: 48px;">
<td style="width: 20.027%; height: 23px; border: 4px solid #21a6a6; text-align: center;"><strong>CVE-2020-16898</strong></td>
<td style="width: 79.973%; height: 23px; border-color: #ffffff; text-align: left;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-5135"><span style="color: #21a6a6;"><b><u>WINDOWS TCP/IP REMOTE CODE EXECUTION VULNERABILITY</u></b></span></a></td>
</tr>
<tr style="height: 60px;">
<td style="height: 23px; width: 100%; border-color: #ffffff; text-align: left;" colspan="2"><strong>CVSS score : 8.8 HIGH</strong></p>
<p>A remote code execution vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets. An attacker who successfully exploited this vulnerability could gain the ability to execute code on the target server or client.</td>
</tr>
<tr style="height: 48px;">
<td style="width: 20.027%; height: 21px; border: 4px solid #21a6a6; text-align: center;"><strong>CVE-2020-16947</strong></td>
<td style="width: 79.973%; height: 21px; border-color: #ffffff; text-align: left;"><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-5135"><span style="text-decoration: underline; color: #21a6a6;"><strong>MICROSOFT OUTLOOK REMOTE CODE EXECUTION VULNERABILITY</strong></span></a></td>
</tr>
<tr style="height: 40px;">
<td style="width: 100%; border-color: #ffffff; height: 119px; text-align: left;" colspan="2"><strong>CVSS score : 8.8 HIGH</strong></p>
<p>A remote code execution vulnerability exists in Microsoft Outlook software when the software fails to properly handle objects in memory, aka &#8216;Microsoft Outlook Remote Code Execution Vulnerability&#8217;.</td>
</tr>
</tbody>
</table>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/11/cert-w-newsletter-october-2020/">CERT-W Newsletter October 2020</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Review of the current news by CERT-W &#8211; September 2020</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/10/review-of-the-current-news-by-cert-w-september-2020/</link>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Fri, 09 Oct 2020 07:43:43 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[cybercriminality]]></category>
		<category><![CDATA[incident response CERT-W]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14354</guid>

					<description><![CDATA[<p>Indicators of the month Top attack &#8211; French shipping giant CMA CGM hit by ransomware cyber attack CMA CGM announces that it has been affected by a ransomware attack, which disabled its reservation system and affected some of its Chinese...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/10/review-of-the-current-news-by-cert-w-september-2020/">Review of the current news by CERT-W &#8211; September 2020</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-12838" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/WATCH-1.png" alt="" width="1021" height="295" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/WATCH-1.png 1021w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/WATCH-1-437x126.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/WATCH-1-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/WATCH-1-768x222.png 768w" sizes="auto, (max-width: 1021px) 100vw, 1021px" /></p>
<h2>Indicators of the month</h2>
<h3>Top attack &#8211; <a href="https://www.porttechnology.org/news/cma-cgm-emerges-from-cyber-attack/">French shipping giant CMA CGM hit by ransomware cyber attack</a></h3>
<p>CMA CGM announces that it has been affected by a ransomware attack, which <strong>disabled its reservation system</strong> and affected some of its <strong>Chinese offices. The RagnarLocker gang</strong> reportedly asked the company to contact them within two days &#8220;via a live chat and pay for a special decryption key&#8221;. In a statement, the company said it had shut all external accesses to their network and computer applications as a precautionary measure and that <strong>the group’s information system was gradually resuming.</strong></p>
<h3>Top exploit &#8211; <a href="https://arstechnica.com/information-technology/2020/09/new-windows-exploit-lets-you-instantly-become-admin-have-you-patched/">Microsoft warns of attackers now exploiting “Zerologon”</a><a href="https://arstechnica.com/information-technology/2020/09/new-windows-exploit-lets-you-instantly-become-admin-have-you-patched/"> flaw</a></h3>
<p>Microsoft&#8217;s Security Intelligence team says it&#8217;s monitoring new attacks that employ public exploits of the recently patched CVE-2020-1472 Netlogon EoP vulnerability, aka Zerologon. The vulnerability carries a <strong>critical severity rating</strong> from Microsoft as well as a maximum of 10 under the Common Vulnerability Scoring System as it lets anyone with a network toehold obtain domain-controller password.</p>
<h3>Top leak &#8211; <a href="https://www.theregister.com/2020/09/23/microsoft_leaks_over_65tb_bing/">Microsoft leaks 6.5TB in Bing search data via unsecured elastic server</a></h3>
<p>Microsoft earlier this month exposed a 6.5TB Elastic server to the world <strong>that included search terms, location coordinates, device ID data, and a partial list of which URLs were visited.</strong> According to a report from cyber-security outfit WizCase, the server was password-protected until around 10 September, when “the authentication was removed”.</p>
<p>&nbsp;</p>
<h2>Cybercrime watch</h2>
<h3><a href="https://us-cert.cisa.gov/ncas/analysis-reports/ar20-259a">US CISA report shares details on web shells used by iranian</a><a href="https://us-cert.cisa.gov/ncas/analysis-reports/ar20-259a"> hackers</a></h3>
<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released a malware analysis report (MAR) that includes technical details about web shells employed by Iranian hackers. According to the CISA’s report, Iranian hackers from an unnamed APT group are employing several known web shells, in <strong>attacks on IT, government, healthcare, financial, and insurance organizations</strong> across the United States. The malware used by the threat actors includes the <strong>ChunkyTuna, Tiny, and China Chopper</strong> web shells.</p>
<h3><a href="https://krebsonsecurity.com/2020/09/two-russians-charged-in-17m-cryptocurrency-phishing-spree/">Two Russians charged in $17m cryptocurrency phishing</a><a href="https://krebsonsecurity.com/2020/09/two-russians-charged-in-17m-cryptocurrency-phishing-spree/"> spree</a></h3>
<p>U.S. authorities today announced criminal charges and financial sanctions against two Russian men <strong>accused of stealing nearly $17 million worth of virtual currencies</strong> in a series of phishing attacks throughout 2017 and 2018 that spoofed websites for some of the most popular cryptocurrency exchanges.</p>
<h3><a href="https://threatpost.com/google-chrome-attack/159466/">Google Chrome bugs open browsers to attack</a></h3>
<p>Google’s release of Chrome 85.0.4183.121 for Windows, Mac and Linux fixed <strong>10 vulnerabilities</strong>. The successful exploitation of the most severe of these could <strong>allow an attacker to execute arbitrary code</strong> in the context of the browser, according to Google. Google Chrome versions prior to 85.0.4183.121 are affected.</p>
<p>&nbsp;</p>
<h2>Vulnerabilities watch</h2>
<h3><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472">CVE-2020-1472 – Netlogon Elevation of Privilege Vulnerability</a></h3>
<p><strong>CVSS score: 10.0 CRITICAL</strong></p>
<p>An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network.</p>
<h3><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0922">CVE-2020-0922 – Microsoft COM* for Windows Remote Code Execution Vulnerability</a></h3>
<p><strong>CVSS score: 8.8 HIGH</strong></p>
<p>A remote code execution vulnerability exists in the way that Microsoft COM for Windows handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system.</p>
<p><em>*The Microsoft Component Object Model (COM) is a platform-independent, distributed, object-oriented system for creating binary software components that can interact. COM is the foundation technology for Microsoft&#8217;s OLE (compound documents), ActiveX (Internet-enabled components), as well as others.</em></p>
<h3><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1380">CVE-2020-1380 – Scripting Engine Memory Corruption Vulnerability</a></h3>
<p><strong>CVSS score: 7.5 HIGH</strong></p>
<p>A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/10/review-of-the-current-news-by-cert-w-september-2020/">Review of the current news by CERT-W &#8211; September 2020</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Review of the current news by CERT-W &#8211; March 2020</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/04/review-of-the-current-news-by-cert-w-march-2020/</link>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Tue, 07 Apr 2020 09:30:22 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cybercriminality]]></category>
		<category><![CDATA[incident response CERT-W]]></category>
		<category><![CDATA[indicators]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=12914</guid>

					<description><![CDATA[<p>Cybercrime watch The most consequent Patch Tuesday in the history of Patch Tuesday On March, Tuesday 10th, Microsoft has released updates no less than security vulnerabilities, targeting either the Windows operating systems or associated software. 26 of these vulnerabilities are...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/04/review-of-the-current-news-by-cert-w-march-2020/">Review of the current news by CERT-W &#8211; March 2020</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="post-12838 media-12838" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-12838" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/WATCH-1.png" alt="" width="1021" height="295" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/WATCH-1.png 1021w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/WATCH-1-437x126.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/WATCH-1-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/WATCH-1-768x222.png 768w" sizes="auto, (max-width: 1021px) 100vw, 1021px" /></figure>
<h2>Cybercrime watch</h2>
<h3><a href="https://www.zdnet.com/article/microsoft-march-2020-patch-tuesday-fixes-115-vulnerabilities/">The most consequent Patch Tuesday in the history of Patch Tuesday</a></h3>
<p style="font-weight: 400;">On March, Tuesday 10th, Microsoft has released updates no less than security vulnerabilities, targeting either the Windows operating systems or associated software. 26 of these vulnerabilities are considered &#8220;critical&#8221;, which is the highest level of severity. The exploit of some of them allow remote code execution and takeover of vulnerable assets without user interaction.</p>
<h3><a href="https://threatpost.com/new-mirai-variant-mukashi-targets-zyxel-nas-devices/153982/">Mukashi: the new variant of the famous Mirai botnet is targeting Zyxel NAS</a></h3>
<p>The Mukashi botnet has been found performing bruteforce attacks on random hosts. The botnet is using various combinations of credentials in an attemps to log in and seize control of the asset. It is now targeting the Network Access Storage (NAS) from the Zyxel brand by using the recent CVE-2020-9054, which allows for remote code execution on the 5.21 version of the firmware.</p>
<h3><a href="https://www.darkreading.com/attacks-breaches/fbi-warns-of-fake-cdc-emails-in-covid-19-phishing-alert/d/d-id/1337381">Coronavirus is now the most used decoy of all times</a></h3>
<p>During the sanitary crisis linked to COVID-19, the coronavirus has become the most used decoy of all times in phishing attacks. The FBI Internet Crime Complaint Center (IC3) mentions that it can either be email pretending to offer information on the virus itself, test kits, vaccines. Attackers even go to such length like posing as charities asking for donations.</p>
<p>&nbsp;</p>
<h2>Vulnerability watch</h2>
<h3><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0684">CVE-2020-0684 &#8211; Remote code execution in Microsoft Windows</a></h3>
<p>A new remote code execution vulnerability has been found in the Windows operating system that is triggered when a .LNK file is processed (analyzed or executed). An attacker could gain the same privileges as the local user by exploiting this vulnerability.</p>
<h3><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3947">CVE-2020-3946 &#8211; Denial of Service in Vmware Workstation</a></h3>
<p>Some versions of Vmware Workstation and Fusion are exposed to a &#8220;use-after-free&#8221; vulnerability in the vmnetdhcp service. The successful exploit of this vulnerability currently leads to denial of service but could be used in theory to execute arbitrary code.</p>
<h3><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10887">CVE-2020-10887 &#8211; Firewall bypass in TP-Link routers</a></h3>
<p>A version of the TP-Link firmware is exposed to firewall bypass. This vulnerability originates from an insufficiant filtering when handling IPv6 SSH connections. It can be exploited without authentication and can even be used to peform privilege escalation and code execution, up to root.</p>
<p>&nbsp;</p>
<h2>Weekly top</h2>
<h3>The top leak &#8211; <a href="https://threatpost.com/millions-guests-marriott-data-breach-again/154300/">A 5-million record leak of Mariott&#8217;s clients</a></h3>
<p>Cybercriminals have succeeded in obtaining the credentials of two employees on a third-party piece of software used in Mariott resort to provide clients with various services. They used them to access numerous information on Mariott&#8217;s clients, including names, email addresses, phone numbers, etc.<br />
It is the second data leak in 24 months for the brand!</p>
<h3>The top exploit &#8211; <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0796">CVE-2020-0796 &#8211; Remote code execution vulnerability in the SMB protocol</a></h3>
<p>SMB is a network protocol used for file sharing, printers, and for other network purposes. The Microsoft SMB 3.1.1 (SMBv3) is suject to a vulnerability in the way it handles some requests. Unauthenticated attackers can use this vulnerability to remotely execute code on SMB servers as well as clients.</p>
<h3>The top attack &#8211; <a href="https://www.zdnet.com/article/czech-hospital-hit-by-cyber-attack-while-in-the-midst-of-a-covid-19-outbreak/">One of the largest Czech hospital hit by a cyberattack</a></h3>
<p>The Brno university hospital in Czech Republic has been hit by a major cyberattack in the midst of the COVID-19 outbreak. It has been forced to shut down all IT equipment and information system. Consequently, surgical procedures have been rescheduled and newly infected patients transferred to other hospitals.</p>
<p>&nbsp;</p>
<h2>Software version watch</h2>
<table style="border-style: solid; border-color: #000000;" border="1">
<tbody>
<tr>
<td><strong>Software</strong></td>
<td><strong>Current version</strong></td>
</tr>
<tr>
<td>Adobe Flash Player</td>
<td><a href="https://get.adobe.com/fr/flashplayer/">32.0.0.344</a></td>
</tr>
<tr>
<td>Adobe Acrobat Reader DC</td>
<td><a href="https://get.adobe.com/fr/reader/">2020.006.20042</a></td>
</tr>
<tr>
<td>Java</td>
<td><a href="https://java.com/fr/download/">Version 8 Update 241</a></td>
</tr>
<tr>
<td>Mozilla Firefox</td>
<td><a href="https://www.mozilla.org/fr/firefox/new/">74.0</a></td>
</tr>
<tr>
<td>Google Chrome</td>
<td><a href="https://www.google.com/chrome/browser/desktop/index.html">80.0.3987.163</a></td>
</tr>
<tr>
<td>VirtualBox</td>
<td><a href="https://www.virtualbox.org/wiki/Downloads">6.1.4</a></td>
</tr>
<tr>
<td>CCleaner</td>
<td><a href="https://www.piriform.com/ccleaner/download/standard">5.65.7632</a></td>
</tr>
</tbody>
</table>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/04/review-of-the-current-news-by-cert-w-march-2020/">Review of the current news by CERT-W &#8211; March 2020</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Review of the current news by CERT-W &#8211; February 2020</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/03/review-of-the-current-news-by-cert-w-february-2020/</link>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Wed, 04 Mar 2020 16:02:59 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[indicators]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=12819</guid>

					<description><![CDATA[<p>Cybercrime watch Google Chrome&#8217;s update fight against Cybercrime Google Chrome version 80 now supports AES-256 to user data stored locally. The change has made an impact on AZORult&#8217;s ability to steal user&#8217;s information. AZORult is a user profile malware that...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/03/review-of-the-current-news-by-cert-w-february-2020/">Review of the current news by CERT-W &#8211; February 2020</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="post-12832 media-12832" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-12832" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/WATCH.png" alt="" width="1021" height="295" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/WATCH.png 1021w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/WATCH-437x126.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/WATCH-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/WATCH-768x222.png 768w" sizes="auto, (max-width: 1021px) 100vw, 1021px" /></figure>
<h2>Cybercrime watch</h2>
<h3><a href="https://www.zdnet.com/article/chrome-80-update-cripples-top-cybercrime-marketplace/">Google Chrome&#8217;s update fight against Cybercrime</a></h3>
<p>Google Chrome version 80 now supports <strong>AES-256</strong> to user data stored locally. The change has made an impact on AZORult&#8217;s ability to steal user&#8217;s information. <strong>AZORult</strong> is a <strong>user profile malware</strong> that appeared in 2016 thieving big amounts of information including passwords, web browsing history, cookies, etc.</p>
<h3><a href="https://www.zdnet.com/article/bouygues-construction-falls-victim-to-ransomware/">Bouygues Construction another&#8217;s ransomware victim</a></h3>
<p>Bouygues Construction was victim of <strong>a ransomware attack</strong>. First detected on January 30, the company announced the attack in Twitter only few days before the <strong>MAZE</strong>&#8216;s group expressed to be behind the attack.</p>
<h3><a href="https://www.forbes.com/sites/daveywinder/2020/02/13/the-fbi-issues-a-powerful-35-billion-cybercrime-warning/">Internet Complain Center reporting (FBI IC3 report)</a></h3>
<p>The Federal Bureau of Investigation (FBI) released the Internet Complaint Center (IC3) reporting an increment up to 1300 complaints every single day. The report shows how the <strong>Business email compromise (BEC) cost organizations $1.7 billion in 2019</strong>. Since companies have implemented “volume spam” campaigns, attackers are becoming more sophisticated targeting high-value individuals such as CEOs and finance employees.</p>
<p>&nbsp;</p>
<h2>Vulnerability watch</h2>
<h3><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0688">CVE-2020-0688</a> &#8211; Remote code execution vulnerability in Microsoft Exchange software</h3>
<p>A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka &#8216;Microsoft Exchange Memory Corruption Vulnerability&#8217;.</p>
<h3><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15126">CVE-2019-15126</a> &#8211; All-zero encryption key to encrypt part of the user’s communication</h3>
<p>An issue was discovered on Broadcom Wi-Fi client devices. Specifically, timed and handcrafted traffic can cause internal errors (related to state transitions) in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic.</p>
<h3><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0022">CVE-2020-0022</a> &#8211; Critical Bluetooth vulnerability in Android</h3>
<p>Android Bluetooth stack that lets attackers silently deliver malware to and steal data from nearby phones simply knowing the Bluetooth MAC address of the target. As result, possibility to Deny of Service (DoS), if the device is running Android 8.0, 8.1 or 9.0 then Remote Code Execution (RCE)</p>
<p>&nbsp;</p>
<h2>Weekly top</h2>
<h3>Top leak: <a href="https://www.infosecurity-magazine.com/news/sports-giant-decathlon-leaks-123/">Decathlon leaks 123 Million records</a></h3>
<p>A database misconfiguration let a vpnMentor team to reveal 123 million records including customer and employee information. Over 9GB database was found from an unsecured Elasticsearch server, exposing information from Decathlon &#8211; Spain.</p>
<h3>Top exploit: <a href="https://blog.exodusintel.com/wp-content/uploads/2020/02/exp.zip">CVE-2020-6418</a> &#8211; Confusion flaw in V8, Google Chrome</h3>
<p>Confusion flaw in V8 (JavaScript engine used by Google Chrome) letting to arbitrary code execution within the browser sandbox.</p>
<h3>Top attack: <a href="https://www.abc.net.au/news/rural/2020-02-27/ransomware-cyber-attack-cripples-australian-wool-sales/12007912">Cyber-attack cripples’ wool sales across Australia</a></h3>
<p>A ransomware attack affected more than 75 per cent of the wool industry across Australia. Secretary of National Auction Selling Committee (NASC) confirmed the compromising of Talman. Talman is the major software supplier to the industry.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/03/review-of-the-current-news-by-cert-w-february-2020/">Review of the current news by CERT-W &#8211; February 2020</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Industrial Control Systems Cybersecurity News #2 &#8211; Radiology of the cybersecurity level of the healthcare sector</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/06/ics-news-2-en/</link>
		
		<dc:creator><![CDATA[Ilias Sidqui]]></dc:creator>
		<pubDate>Tue, 05 Jun 2018 13:18:33 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[manuf & industry 4.0]]></category>
		<category><![CDATA[Newsletter]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=10822/</guid>

					<description><![CDATA[<p>&#62;&#62;FOCUS Last year, the National Health Service England (NHS) faced its most important cybersecurity crisis due to the Wannacry ransomware attack. In October 2017, the National Audit Office (NAO) published a report showing that at least 34% of trusts in...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/06/ics-news-2-en/">Industrial Control Systems Cybersecurity News #2 &#8211; Radiology of the cybersecurity level of the healthcare sector</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>&gt;&gt;FOCUS</h2>
<p>Last year, the National Health Service England (NHS) faced its most important cybersecurity crisis due to the Wannacry ransomware attack. In October 2017, the National Audit Office (NAO) published a <a href="https://www.nao.org.uk/report/investigation-wannacry-cyber-attack-and-the-nhs/">report</a> showing that at least 34% of trusts in England were disrupted, and around 19,494 patient appointments canceled including canceled patient operations. This was mainly due to the fact that the information system managing the appointments, the patients’ records or test results were infected by the ransomware.</p>
<p>However, the report points out that medical devices such as MRI scanners (that have Windows XP embedded within them) were also locked by the ransomware. Only 1,220 devices were infected representing 1% of the overall amount, because several equipments were disconnected to avoid the ransomware propagation. So why the healthcare sector suffered from such an attack and how come the ransomware spread that easily?</p>
<h3>Healthcare cybersecurity: Low maturity level</h3>
<p>The NAO report highlighted the challenges that the NHS had to face to tackle the attack. These challenges seem similar to the ones that several industries and manufacturers have been facing showing that an analogy of the healthcare information systems and the industrial control systems (ICS) have the same weaknesses.</p>
<p>Indeed, both ICS and Health Information Systems (HIS)face the same cybersecurity challenges, among them:</p>
<ul>
<li>The wide use of legacy devices and operating systems (such as Windows XP);</li>
<li>The length of the window of exposure of these systems (the window of exposure is the time between the vulnerability disclosure and the patching of the system): the vendors support or the quality guidelines and regulations may represent obstacles for a fast patching (a recent <a href="https://www.hipaajournal.com/study-reveals-poor-patching-practices-in-healthcare/">survey</a> conducted on 3000 security professionals working for healthcare and pharmaceutical organizations, show that 57% of the respondents had experienced at least a data breach which was conducted after the exploitation of a vulnerability for which a patch had been previously released);</li>
<li>Critical and unsecure devices directly connected to the Internet exposing the medical network. For example, McAfee published a <a href="https://securingtomorrow.mcafee.com/mcafee-labs/mcafee-researchers-find-poor-security-exposes-medical-data-to-cybercriminals/">report</a> explaining how they exploited an unsecure and connected Picture Archiving and Communication System (PACS – device that stores and shares images coming from imaging devices such as scanners) to use personal medical data;</li>
<li>Lack of security by design: several organizations and researchers have been alerting on several flows affecting medical devices such as pacemakers (<a href="http://www.bbc.com/news/technology-41099867">Cyber-flaw affects 745,000 pacemakers – BBC</a>), insulin pumps (<a href="https://www.reuters.com/article/us-johnson-johnson-cyber-insulin-pumps-e-idUSKCN12411L">J&amp;J warns diabetic patients: Insulin pump vulnerable to hacking – Reuters</a>) or infusion pumps (<a href="https://www.blackhat.com/docs/eu-17/materials/eu-17-Harit-Breaking-Bad-Stealing-Patient-Data-Through-Medical-Devices.pdf">Black hat conference [PDF]</a>)</li>
</ul>
<figure id="post-10823 media-10823" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-10823 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-1.png" alt="" width="809" height="511" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-1.png 809w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-1-302x191.png 302w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-1-768x485.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-1-62x39.png 62w" sizes="auto, (max-width: 809px) 100vw, 809px" /></figure>
<h3>A growing threat on the healthcare sector</h3>
<p>The low cybersecurity maturity level of the healthcare sector combined with the continuous interest of some actors on personal data or life threatening made the threat skyrocket these past few years. Indeed, several cybersecurity companies have been alerting on a growing number of cyber threat actors who are targeting healthcare sector, for example:</p>
<ul>
<li>In the last newsletter was reported that a US hospital was hit by Samsam ransomware in January 2018. Samsam is only one of the numerous ransomware that targeted hospitals among them Locky;</li>
<li>In March 2018, <a href="https://www.kaspersky.com/about/press-releases/2018_chinese-speaking-apt-actor-caught-spying-on-pharmaceutical-organizations">Kaspersky researchers</a> discovered that a Chinese-speaking group used PlugX malware (remote access tool which has been used previously by several groups since 2012) in pharmaceutical organizations for stealing information;</li>
<li>In April 2018, <a href="https://www.symantec.com/blogs/threat-intelligence/orangeworm-targets-healthcare-us-europe-asia">Symantec</a> identified a new attack group named Orangeworm. This group has been targeting healthcare sector companies (equipments manufactures, pharmaceutical, health organizations) for several years. Orangeworm has been using a backdoor called Kwampirs which collects data in the infected systems. This malware propagates easily in Windows XP devices.</li>
</ul>
<figure id="post-10825 media-10825" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-10825 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-2.png.jpg" alt="" width="721" height="437" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-2.png.jpg 721w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-2.png-315x191.jpg 315w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-2.png-64x39.jpg 64w" sizes="auto, (max-width: 721px) 100vw, 721px" /></figure>
<h3 class="align-none">Protecting against</h3>
<p>In order to curb the number of security incidents in the healthcare sector, several measures can be, and in some cases have already been, implemented among them:</p>
<ul>
<li>Design of a global cybersecurity governance by implementing a cybersecurity policy;</li>
<li>Conduction of awareness campaigns towards the hospital staff on the cybersecurity threats;</li>
<li>Implementation of patch management procedure in order to reduce the window of exposure of the system (a combined work with the vendors and the regulation organizations may be required so the patching covers the largest amount of device as possible);</li>
<li>Network segregation into several levels of protection matching the level of criticality (medical devices should be highly protected).</li>
</ul>
<figure id="post-10827 media-10827" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-10827 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3.png" alt="" width="565" height="9" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3.png 565w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3-437x7.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3-71x1.png 71w" sizes="auto, (max-width: 565px) 100vw, 565px" /><em>Several governmental agencies and institutions have been publishing reports and guidelines in order to help healthcare organizations and the medical devices suppliers in securing their network or providing more secure medical devices. You will find here after some of the documents:</em></figure>
<ul>
<li><a href="https://www.enisa.europa.eu/publications/cyber-security-and-resilience-for-smart-hospitals">Cyber security and resilience for Smart Hospitals &#8211; ENISA</a></li>
<li><a href="https://www.enisa.europa.eu/publications/security-and-resilience-in-ehealth-infrastructures-and-services">Security and Resilience in eHealth Infrastructures and Services &#8211; ENISA</a></li>
<li><a href="http://esante.gouv.fr/sites/default/files/Guide_Pratique_Dispositif_Connecte.pdf">Guide Pratique : Règles pour les dispositifs connectés d’un Système d’Information de Santé &#8211; Agence des systèmes d’information partagés de santé [PDF]</a></li>
<li><a href="https://www.fda.gov/RegulatoryInformation/Guidances/ucm070634.htm">Information for Healthcare Organizations about FDA&#8217;s &#8220;Guidance for Industry: Cybersecurity for Networked Medical Devices Containing Off-The-Shelf (OTS) Software&#8221; &#8211; FDA</a></li>
<li><a href="https://www.fda.gov/AboutFDA/CentersOffices/OfficeofMedicalProductsandTobacco/CDRH/CDRHReports/ucm604500.htm">The U.S Food &amp; Drug Administration released its Medical Device Safety Action Plan in April 2018</a></li>
</ul>
<figure id="post-10827 media-10827" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-10827 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3.png" alt="" width="565" height="9" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3.png 565w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3-437x7.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3-71x1.png 71w" sizes="auto, (max-width: 565px) 100vw, 565px" /></figure>
<h2>&gt;&gt;Latest news</h2>
<table width="0">
<tbody>
<tr>
<td width="206">
<figure id="post-10862 media-10862" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10862" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-4.png-4.jpg" alt="" width="187" height="105" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-4.png-4.jpg 187w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-4.png-4-69x39.jpg 69w" sizes="auto, (max-width: 187px) 100vw, 187px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>Aerial tramway with security holes</strong></p>
<p><em>Golem.de, April 19t<sup>h</sup></em></p>
<p>Two white hackers found the control system of a new aerial tramway in the internet without any security measures. According to them, the commands were sent unencrypted, the authentication wasn’t provided and the web application was vulnerable to cross-site scritping and HTTP header injection attacks. <a href="https://www.golem.de/news/patscherkofel-gondelbahn-mit-sicherheitsluecken-1804-133930.html">Link to the article</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10864 media-10864" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10864" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-5.png-1.jpg" alt="" width="184" height="41" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-5.png-1.jpg 184w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-5.png-1-71x16.jpg 71w" sizes="auto, (max-width: 184px) 100vw, 184px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>Patch Plugs More Than a Dozen Vulnerabilities Affecting Industrial Secure Router Series</strong></p>
<p><em>Tripwire, April 16<sup>th</sup></em></p>
<p>Cisco Talos published a report revealing several vulnerabilities affecting the Moxa EDR-810 industrial secure router with firewall/NAT/VPN and manager layer 2 switch functions. This router sets perimetric security for critical assets such as pumping/treatment systems in water stations, Distributed Control Systems (DCS) in oil and gas stations … Many of the flaws received a CVSS score of 8.8. Moxa released an updated version of the firmware. <a href="https://www.tripwire.com/state-of-security/latest-security-news/patch-plugs-more-than-a-dozen-vulnerabilities-affecting-industrial-secure-router-series/">Link to the article</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10866 media-10866" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10866" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-6.png-1.jpg" alt="" width="185" height="60" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-6.png-1.jpg 185w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-6.png-1-71x23.jpg 71w" sizes="auto, (max-width: 185px) 100vw, 185px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>Advisory: Hostile state actors compromising UK organisations with focus on engineering and industrial control companies</strong></p>
<p><em>NCSC, April 5th</em></p>
<p>The National Cyber Security Centre (NCSC) published an advisory revealing that several ongoing attacks have been targeting mainly engineering and industrial control companies since March 2017. The attacks are involving the harvesting of credentials using strategic web compromises and spear-phishing. The advisory also refers to the Department of Homeland Security (DHS) and FBI joint Technical Alert (see below for more information). <a href="https://www.ncsc.gov.uk/alerts/hostile-state-actors-compromising-uk-organisations-focus-engineering-and-industrial-control">Link to the advisory</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10868 media-10868" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10868" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-7-1.png" alt="" width="175" height="37" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-7-1.png 175w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-7-1-71x15.png 71w" sizes="auto, (max-width: 175px) 100vw, 175px" /></figure>
<figure id="post-10870 media-10870" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10870" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-72.png" alt="" width="387" height="48" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-72.png 387w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-72-71x9.png 71w" sizes="auto, (max-width: 387px) 100vw, 387px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>Sentryo Provides Anomaly Detection Technology to Siemens to Address the Cybersecurity Challenges of industrial infrastructures</strong></p>
<p><em>Sentryo, April</em></p>
<p>Siemens and Sentryo signed an agreement in which Siemens AG will provide Sentryo ICS CyberVision solution to its clients among Siemens products and services. Sentryo’s solution is an asset management and anomaly detection tool designed for Industrial Control Systems. <a href="https://www.sentryo.net/wp-content/uploads/2018/04/CP_Partenariat-Sentryo-Siemens_FR.pdf">Link to the press release [FR][PDF]</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10872 media-10872" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10872" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-8-1.png" alt="" width="191" height="181" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-8-1.png 191w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-8-1-41x39.png 41w" sizes="auto, (max-width: 191px) 100vw, 191px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>ISA announces newly published ISA/IEC 62443-4-1-2018 security standard</strong></p>
<p><em>Automation.com, March 28<sup>th</sup></em></p>
<p>The international Society of Automation released the Part 4-1 of the ISA/IEC 62443 standard. This part tackles the Product Security Development Life-Cycle Requirements. “It defines a secure development life-cycle for developing and maintaining secure products.” This includes several concepts such as security by design, patch management and product end-of-life. <a href="https://www.automation.com/automation-news/industry/isa-announces-newly-published-isaiec-62443-4-1-2018-security-standard">Link to the article</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10874 media-10874" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10874" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-9-1.png" alt="" width="187" height="75" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-9-1.png 187w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-9-1-71x28.png 71w" sizes="auto, (max-width: 187px) 100vw, 187px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>Schneider Electric Launches Cybersecurity Virtual Academy</strong></p>
<p><em>ISS Source, March 27<sup>th</sup></em></p>
<p>Schneider Electric launched the Cybersecurity Virtual Academy which is a website that provides several materials to raise the awareness of the cybersecurity risks in the industrial control systems. <a href="http://www.isssource.com/schneider-electrics-cybersecurity-virtual-academy/">Link to the article</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10876 media-10876" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10876" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-10-1.png" alt="" width="192" height="104" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-10-1.png 192w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-10-1-71x39.png 71w" sizes="auto, (max-width: 192px) 100vw, 192px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>Threat landscape for industrial automation systems in H2 2017</strong></p>
<p><em>Kaspersky lab, March 26<sup>th</sup></em></p>
<p>Kaspersky has published a report on the threat landscape over the industrial control systems during the second semester of 2017. In the report, Kaspersky analyses the vulnerabilities discovered by the ICS-CERT and the ones identified by Kaspersky Lab ICS Cert. Here are some figures given in the report:</p>
<ul style="list-style-type: disc;">
<li>322 vulnerabilities were identified by ICS-CERT and more than 50% of them are impacting the energy sector;</li>
<li>3,3% of industrial automation system computers were attacked by cryptocurrency mining programs during the period from February 2017 to January 2018;</li>
<li>10,8% of all ICS systems were attacked by botnet agents during 2017. The mains sources of botnet agent attacks on ICS systems in 2017 were internet, removable media and email messages;</li>
</ul>
<p>The Kaspersky figures show also a certain decrease on the number of attacks on ICS systems between 2016 and 2017. This can be explained by the fact that more and more companies are training their employees and began implementing simple cybersecurity measures. <a href="https://ics-cert.kaspersky.com/reports/2018/03/26/threat-landscape-for-industrial-automation-systems-in-h2-2017/">Link to the report</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10878 media-10878" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10878" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-11-1.png" alt="" width="176" height="46" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-11-1.png 176w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-11-1-71x19.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-11-1-175x46.png 175w" sizes="auto, (max-width: 176px) 100vw, 176px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>Draft NIST Special Publication 800-160 Volume 2, Systems Security Engineering: Cyber Resiliency Considerations for the Engineering of Trustworthy Secure Systems</strong></p>
<p><em>NIST, March 21<sup>st</sup></em></p>
<p>The National Institute of Standards and Technology (NIST) released a public draft of the NIST SP 800-160 Volume 2, Systems Security Engineering: Cyber Resiliency Considerations for the engineering of Trustworthy Secure Systems. This document aims to provide guidelines to organizations on how to apply cyber resiliency concepts during the engineering of systems. These guidelines may be applied on new systems, modification of systems, Critical infrastructure systems … <a href="https://csrc.nist.gov/news/2018/draft-sp-800-160-vol-2-released">Link to the release</a> | <a href="https://csrc.nist.gov/CSRC/media/Publications/sp/800-160/vol-2/draft/documents/sp800-160-vol2-draft.pdf">Link to the document</a> [PDF]</td>
</tr>
<tr>
<td width="206">
<figure id="post-10880 media-10880" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10880" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-12.png-1.jpg" alt="" width="190" height="159" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-12.png-1.jpg 190w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-12.png-1-47x39.jpg 47w" sizes="auto, (max-width: 190px) 100vw, 190px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors</strong></p>
<p><em>US-CERT, March 15<sup>th</sup></em></p>
<p>The Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) published a joint Technical Alert in which give details on how the Russian government targeted several American organizations operating in the energy, nuclear, water, commercial facilities aviation and critical manufacturing sectors (DHS and FBI have already warned about this threat in another alert published in <a href="https://www.us-cert.gov/ncas/alerts/TA17-293A">October</a>). The alert analyzed the attacks using the <a href="https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html">Lockheed Cyber Kill Chain</a> (stage1:reconnaissance, stage 2: weaponization, stage 3: delivery, stage 4: exploitation, stage 5: installation, stage 6: command &amp; control, stage 7: actions and objectives). The threat actors after gaining access to their victims information system, they conducted reconnaissance operations within the network. They mainly focused on identifying and browsing file servers. They viewed information and files regarding Industrial Control Systems (ICS) or Supervisory Control And Data Acquisition (SCADA) systems. <a href="https://www.us-cert.gov/ncas/alerts/TA17-293A">Link to the alert</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10882 media-10882" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10882" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-13.png-1.jpg" alt="" width="130" height="184" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-13.png-1.jpg 130w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-13.png-1-28x39.jpg 28w" sizes="auto, (max-width: 130px) 100vw, 130px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>‘Cyber event’ disrupts power in Mich. – but don’t blame hackers</strong></p>
<p><em>E&amp;E News, March 8<sup>th</sup></em></p>
<p>An employee of a public utility that provides electricity in Michigan (Consumers Energy) inadvertently cut the electricity to about 15000 consumers. During an “internal testing” the employee overstepped his authority in a control center leading to the outage. The utility the event as a “cyber event” and reported it to the department of Energy even tought the outage had nothing to do with a malware or cyber attack. Since the event, the company adjusted the access controls. <a href="https://www.eenews.net/energywire/stories/1060075765/print">Link to the news</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10884 media-10884" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10884" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-14.png-1.jpg" alt="" width="187" height="141" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-14.png-1.jpg 187w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-14.png-1-52x39.jpg 52w" sizes="auto, (max-width: 187px) 100vw, 187px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>A Qualitative View of 2017 Across vulnerabilities, threats, and lessons learned in hunting and incident response</strong></p>
<p><em>Dragos, March</em></p>
<p>Dragos published 3 reports in which they reveal their findings and analysis regarding the industrial control systems vulnerabilities during 2017, the industrial threat landscape incident response and hunting lessons. Some of the results of these reports are the following:</p>
<ul style="list-style-type: disc;">
<li> “64% of 2017 ICS-related vulnerability patches don’t fully eliminate the risk because the components were insecure by design”;</li>
<li>5 activity groups are working on developing tools and malwares (as Crashoverride that attacked the Ukrainian electric grid in 2016);</li>
<li>The main infection vectors are: unprotected interconnectivity with IT systems, removable media, unprotected interfacility connection and phishing.</li>
</ul>
<p><a href="https://dragos.com/media/2017-Review-Industrial-Control-Vulnerabilities.pdf">Link to the Vulnerabilities report [PDF]</a></p>
<p><a href="https://dragos.com/media/2017-Review-Industrial-Control-System-Threats.pdf">Link to the threat activity groups report [PDF]</a></p>
<p><a href="https://dragos.com/media/2017-Review-Hunting-and-Responding-to-Industrial-Intrusions.pdf">Link to the hunting and responding report [PDF]</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10886 media-10886" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10886" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-15-1.png" alt="" width="175" height="37" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-15-1.png 175w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-15-1-71x15.png 71w" sizes="auto, (max-width: 175px) 100vw, 175px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>Siemens report: Mideast’s oil and gas sector needs readiness boost as cyber risk grows</strong></p>
<p><em>Siemens, March</em></p>
<p>A recent report published by Siemens shows that the Middle East facing more and more attacks targeting Operational Technology (OT) (according to the report 30% of the attacks are targeting OT). The report gives the results of a survey on 176 individuals working in the Middle East who are responsible for overseeing the cybersecurity of their organisations. Here are some figures:</p>
<ul style="list-style-type: disc;">
<li>“75% of organizations have suffered at least one security compromise that resulted in the loss of confidential information or disruption to operations in the OT environment over the past 12 months”;</li>
<li>“68% of respondents say the top cyber security threat is the negligent of careless insider”;</li>
<li>“31% of respondents say their organization’s industrial control systems” protection and security are adequate”.</li>
</ul>
<p><a href="http://www.middleeast.siemens.com/me/en/news_events/news/news_2018/siemens-report-mideasts-oil-and-gas-sector-needs-readiness-boost-as-cyber-risk-grows.htm">Link to the press release</a></td>
</tr>
<tr>
<td width="206">
<figure id="post-10888 media-10888" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10888" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-16.png-1.jpg" alt="" width="192" height="54" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-16.png-1.jpg 192w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-16.png-1-71x20.jpg 71w" sizes="auto, (max-width: 192px) 100vw, 192px" /></figure>
</td>
<td style="text-align: left;" width="367"><strong>NERC Full Notice of Penalty regarding Unidentified Registered Entity</strong></p>
<p><em>NERC, February 28<sup>th</sup></em></p>
<p>The North American Electric Reliability Corporation (NERC) files a Notice of Penalty of two million seven hundred thousand dollars ($ 2,700,000), in accordance with the Federal Energy Regulatory Commission (FERC), regarding noncompliance by an Unidentified Registered Entity (URE).</p>
<p>Indeed, a third-party URE contractor failed to comply with the information protection program and copied very sensitive data, including records associated with Critical Computer Assets (CCA), from the URE environment on its own unsecured environment. While the data was on the contractor&#8217;s network, a subset of data was available online without the need to enter a username or password for a total of 70 days.</p>
<p>This exposed information increases the risk of a malicious</p>
<p>attacker gaining both physical and remote access to URE&#8217;s systems and access to internal CCAs. <a href="https://www.nerc.com/pa/comp/CE/Enforcement%20Actions%20DL/Public_CIP_NOC-2569%20Full%20NOP.pdf">Link to the article</a></td>
</tr>
</tbody>
</table>
<figure id="post-10828 media-10828" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10828" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3.png" alt="" width="565" height="9" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3.png 565w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3-437x7.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3-71x1.png 71w" sizes="auto, (max-width: 565px) 100vw, 565px" /></figure>
<h2>&gt;&gt;Main ICS vulnerabilities</h2>
<table width="100%">
<tbody>
<tr>
<td style="text-align: center;" width="7%"><strong>Date</strong></td>
<td style="text-align: center;" width="13%"><strong>CVSS v3 score</strong></td>
<td style="text-align: center;" width="27%"><strong>Equipment</strong></td>
<td style="text-align: center;" width="34%"><strong>Vulnerability</strong></td>
<td style="text-align: center;" width="16%"><strong>Link to the advisory</strong></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Apr. 17<sup>th</sup></td>
<td style="text-align: center;" width="13%">9.8</td>
<td style="text-align: center;" width="27%">Schneider Electric InduSoft Web Studio and InTouch Machine Edition</td>
<td style="text-align: center;" width="34%">Stack-based Buffer Overflow</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-107-01">Link</a></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Apr. 17<sup>th</sup></td>
<td style="text-align: center;" width="13%">10.0</td>
<td style="text-align: center;" width="27%">Schneider Electric Triconex Tricon</td>
<td style="text-align: center;" width="34%">Improper Restriction of Operations within the Bounds of a Memory Buffer</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-107-02">Link</a></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Apr. 17<sup>th</sup></td>
<td style="text-align: center;" width="13%">9.8</td>
<td style="text-align: center;" width="27%">Rockwell Automation Stratix Services Router</td>
<td style="text-align: center;" width="34%">Improper Input Validation, Improper Restriction of Operations within the Bounds of a Memory Buffer, Use of Externally-Controlled Format String</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-107-03">Link</a></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Apr. 17<sup>th</sup></td>
<td style="text-align: center;" width="13%">9.8</td>
<td style="text-align: center;" width="27%">Rockwell Automation Stratix and ArmorStratix Switches</td>
<td style="text-align: center;" width="34%">Improper Input Validation, Resource Management Errors, Improper Restriction of Operations within the Bounds of a Memory Buffer, Use of Externally-Controlled Format String</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04">Link</a></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Apr. 17<sup>th</sup></td>
<td style="text-align: center;" width="13%">9.8</td>
<td style="text-align: center;" width="27%">Rockwell Automation Stratix Industrial Managed Ethernet Switch</td>
<td style="text-align: center;" width="34%">Improper Input Validation, Resource Management Errors, 7PK – Errors, Improper Restriction of Operations within the Bounds of a Memory Buffer, Use of Externally-Controlled Format String</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05">Link</a></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Apr. 5<sup>th</sup></p>
<p>&nbsp;</td>
<td style="text-align: center;" width="13%">10.0</td>
<td style="text-align: center;" width="27%">Rockwell Automation MicroLogix</td>
<td style="text-align: center;" width="34%">Improper Authentication</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-095-01">Link</a></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Apr. 3<sup>rd</sup></p>
<p>&nbsp;</td>
<td style="text-align: center;" width="13%">9.8</td>
<td style="text-align: center;" width="27%">Siemens Building Technologies Products (Update A)</td>
<td style="text-align: center;" width="34%">Stack-based Buffer Overflows, Security Features, Improper Restriction of Operations within the Bounds of a Memory Buffer, NULL Pointer Dereference, XML Entity Expansion, Heap-based Buffer Overflow, Improper Access Control</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-093-01">Link</a></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Mar. 29<sup>th</sup></p>
<p>&nbsp;</td>
<td style="text-align: center;" width="13%">9.8</td>
<td style="text-align: center;" width="27%">Siemens TIM 1531 IRC</td>
<td style="text-align: center;" width="34%">Missing Authentication for Critical Function</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-088-02">Link</a></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Mar. 20<sup>th</sup></p>
<p>&nbsp;</td>
<td style="text-align: center;" width="13%">9.8</td>
<td style="text-align: center;" width="27%">Geutebruck IP Cameras</td>
<td style="text-align: center;" width="34%">Improper Authentication, SQL Injection, Cross-Site Request Forgery, Improper Access Control, Server-Side Request Forgery, Cross-site Scripting</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-079-01">Link</a></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Mar. 13<sup>th</sup></p>
<p>&nbsp;</td>
<td style="text-align: center;" width="13%">9.3</td>
<td style="text-align: center;" width="27%">OSIsoft PI Web API</td>
<td style="text-align: center;" width="34%">Permissions, Privileges, and Access Controls; Cross-site Scripting</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-072-04">Link</a></td>
</tr>
<tr>
<td style="text-align: center;" width="7%">Mar. 1<sup>st</sup></td>
<td style="text-align: center;" width="13%">9.8</td>
<td style="text-align: center;" width="27%">Moxa OnCell G3100-HSPA Series</td>
<td style="text-align: center;" width="34%">Reliance on Cookies without Validation and Integrity Checking, Improper Handling of Length Parameter Inconsistency, NULL Pointer Dereference</td>
<td style="text-align: center;" width="16%"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-060-02">Link</a></td>
</tr>
</tbody>
</table>
<figure id="post-10828 media-10828" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10828" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3.png" alt="" width="565" height="9" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3.png 565w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3-437x7.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3-71x1.png 71w" sizes="auto, (max-width: 565px) 100vw, 565px" /></figure>
<h2>&gt;&gt;Upcoming ICS events</h2>
<table style="width: 600px;">
<tbody>
<tr>
<td style="width: 161px; text-align: center;">
<figure id="post-10556 media-10556" class="align-none"><img loading="lazy" decoding="async" class="alignnone wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date.png" alt="" width="50" height="49" /></figure>
<p>Jun. 30-1</td>
<td style="width: 431px; text-align: center;"><a href="https://nuitduhack.com/en/?utm_source=infosec-conferences-com&amp;utm_medium=directory&amp;utm_campaign=free-listing">Nuit du Hack</a></p>
<p>Paris, France</td>
</tr>
<tr>
<td style="width: 161px; text-align: center;">
<figure id="post-10556 media-10556" class="align-none"><img loading="lazy" decoding="async" class="alignnone wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862.png" alt="" width="50" height="49" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862.png 99w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-39x39.png 39w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-32x32.png 32w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-64x64.png 64w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-96x96.png 96w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-70x70.png 70w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-30x30.png 30w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-50x50.png 50w" sizes="auto, (max-width: 50px) 100vw, 50px" /></figure>
<p>Jun. 18</td>
<td style="width: 431px; text-align: center;"><a href="https://weblab.ing.unimore.it/smartindustries/18/?utm_source=infosec-conferences-com&amp;utm_medium=directory&amp;utm_campaign=free-listing">IEEE Workshop on Smart Industries (IEEE SIW)</a></p>
<p>Taormina, Italy</td>
</tr>
<tr>
<td style="width: 161px; text-align: center;">
<figure id="post-10556 media-10556" class="align-none"><img loading="lazy" decoding="async" class="alignnone wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862.png" alt="" width="50" height="49" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862.png 99w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-39x39.png 39w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-32x32.png 32w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-64x64.png 64w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-96x96.png 96w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-70x70.png 70w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-30x30.png 30w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-50x50.png 50w" sizes="auto, (max-width: 50px) 100vw, 50px" /></figure>
<p>Jun. 15</td>
<td style="width: 431px; text-align: center;"><a href="http://www.shipcybersecurity.com/index.htm">European Maritime Cyber Risk Management Summit</a></p>
<p>London, UK</td>
</tr>
<tr>
<td style="width: 161px; text-align: center;">
<figure id="post-10556 media-10556" class="align-none"><img loading="lazy" decoding="async" class="alignnone wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862.png" alt="" width="50" height="49" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862.png 99w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-39x39.png 39w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-32x32.png 32w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-64x64.png 64w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-96x96.png 96w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-70x70.png 70w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-30x30.png 30w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-50x50.png 50w" sizes="auto, (max-width: 50px) 100vw, 50px" /></figure>
<p>May. 22-23</td>
<td style="width: 431px; text-align: center;"><a href="http://industrialcontrolsecuritynuclear.com/?utm_source=infosec-conferences-com&amp;utm_medium=directory&amp;utm_campaign=free-listing">Annual Nuclear Industrial Control Cybersecurity and Resilience Conference (ICCS)</a></p>
<p>Warrington, UK</td>
</tr>
<tr>
<td style="width: 161px; text-align: center;">
<figure id="post-10556 media-10556" class="align-none"><img loading="lazy" decoding="async" class="alignnone wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862.png" alt="" width="50" height="49" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862.png 99w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-39x39.png 39w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-32x32.png 32w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-64x64.png 64w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-96x96.png 96w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-70x70.png 70w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-30x30.png 30w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date-e1528203742862-50x50.png 50w" sizes="auto, (max-width: 50px) 100vw, 50px" /></figure>
<p>May. 3-4</td>
<td style="width: 431px; text-align: center;"><a href="http://www.global-engage.com/event/cyber-security-summit/?utm_source=infosec-conferences-com&amp;utm_medium=directory&amp;utm_campaign=free-listing">Global Cyber Security in Healthcare &amp; Pharma Summit</a></p>
<p>London, UK</td>
</tr>
</tbody>
</table>
<figure id="post-10828 media-10828" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10828" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3.png" alt="" width="565" height="9" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3.png 565w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3-437x7.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/06/ICS2-3-71x1.png 71w" sizes="auto, (max-width: 565px) 100vw, 565px" /></figure>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/06/ics-news-2-en/">Industrial Control Systems Cybersecurity News #2 &#8211; Radiology of the cybersecurity level of the healthcare sector</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Industrial Control System Cybersecurity News #1 &#8211; What to remember from 2017?</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/03/ics-news-1-en/</link>
		
		<dc:creator><![CDATA[Ilias Sidqui]]></dc:creator>
		<pubDate>Mon, 26 Mar 2018 16:47:21 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[manuf & industry 4.0]]></category>
		<category><![CDATA[Newsletter]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=10498/</guid>

					<description><![CDATA[<p>&#62;&#62;Editorial: What to remember from 2017? Industrial Control Systems (ICS) are complex systems that aim to control industrial processes. ICS can be found in several sectors: energy, nuclear, transport, chemistry… In brief these systems control many of the critical productive assets...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/03/ics-news-1-en/">Industrial Control System Cybersecurity News #1 &#8211; What to remember from 2017?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>&gt;&gt;Editorial: What to remember from 2017?</h2>
<p><em>Industrial Control Systems (ICS) are complex systems that aim to control industrial processes. ICS can be found in several sectors: energy, nuclear, transport, chemistry… In brief these systems control many of the critical productive assets of companies or states making their compromise by adversaries a high risk on the environment or people’s lives.</em></p>
<p>Thus, the <strong>cybersecurity of these systems is crucial</strong>. Moreover, securing these systems may be challenging due to their complexity (mainly because ICS are a mix of technologies and their lifetime is longer than usual information systems’).</p>
<p>In order to meet our clients’ needs and answer to their future concerns, Wavestone has been conducting an <strong>ICS cybersecurity watch where every recent study</strong>, attack or incident and report regarding the security of Industrial Control Systems are studied. In 2017, more than <strong>80 news</strong> were reported from which we can retrieve a lot of teachings.</p>
<h3>So, what did we notice this year?</h3>
<p>First of all, <strong>ICS had its share of attacks</strong>. However, this year’s attacks, more than the other years’, had an unusual worldwide impact. Indeed, while ICS attacks were usually localized on a device (for instance on health devices), factory (for example a cryptomining malware found in a water utility – for more information see below) or a region (Dallas emergency sirens ignition in April 2017), 2017’s attacks started locally and spread quickly impacting several production lines in the world (WannaCry and NotPetya).</p>
<figure id="post-10499 media-10499" class="align-none">
<figure id="post-10573 media-10573" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-10573" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/Slide-newsletter.png" alt="" width="912" height="539" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/Slide-newsletter.png 1272w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/Slide-newsletter-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/Slide-newsletter-323x191.png 323w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/Slide-newsletter-768x454.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/Slide-newsletter-66x39.png 66w" sizes="auto, (max-width: 912px) 100vw, 912px" /></figure>
</figure>
<p>&nbsp;</p>
<p>During 2017, many attacks have been reported in the news. Moreover, we noticed that several national agencies, governments or political figures alerted on ongoing attacks or attempts on critical infrastructure. The sector that was the most targeted seems to be the Energy sector. Indeed, several news were reported from Turkey (in January), USA (in March, July), Baltic States (in May), UK (in July) and Ireland (in July) showing that this sector was a privileged target by hackers (state sponsored or not).</p>
<p>The <strong>energy sector wasn’t the only hot topic of the year</strong>, as a matter of fact, <strong>autonomous cars</strong> cybersecurity hit many times the headlines (even if that topic may or may not be considered as related to industrial control systems). This is mainly due to the fact that cars’ cybersecurity is a new market. Therefore, cybersecurity experts and researchers try to find vulnerabilities and exploits (for example vulnerability found in airbag control units), while car manufacturers launch partnerships and initiatives showing that cybersecurity is now one of their main concerns (for example GM invited ethical hackers to try and hack its cars).</p>
<p>Finally, the ICS cybersecurity market tends to grow as demonstrated by the several fundraisings and partnerships signed during this year. In a broader perspective, we can notice t<strong>hree kinds of actors</strong> in the ICS cybersecurity market:</p>
<ul>
<li><strong>ICS cybersecurity companies</strong>: usually small-sized companies or start-ups. They are pure-players that develop and put in the market ICS-dedicated solutions (Sentryo, CyberX, Nozomi …);</li>
<li><strong>ICS vendors</strong>: we noticed last year, some vendors that conceive ICS launched partnerships with ICS cybersecurity companies to improve their systems’ security (for example Siemens-PAS partnership in September, Schneider-Claroty partnership in August);</li>
<li><strong>IT security companies</strong>: these companies (well known in the IT world) tailor their solutions for industrial context. They show a growing interest for ICS by publishing reports and attack analysis (for example Kaspersky, McAfee).*</li>
</ul>
<h3>So, what is coming next?</h3>
<p>It may be easy to say that the ICS cybersecurity will still (unfortunately) hit the headlines. Especially with alerts of attacks targeting life threatening system such as the safety instrumented systems controllers. But, we may see more and more news on specific sectors such as maritime, transport, health… that weren’t somehow as exposed in the media as the energy or nuclear sector. The ICS cybersecurity market may continue to grow especially with partnerships and acquisitions. Industrial Control Systems will continue to face new threats, challenges and changes.</p>
<h2>&gt;&gt;Latest news:</h2>
<figure id="post-10532 media-10532" class="align-none"></figure>
<table style="width: 701px; height: 3639px; border-color: #ffffff; border-right-color: #ffffff;" border="1" cellpadding="10">
<tbody>
<tr>
<td style="width: 156.91px;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10506" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image1-1.png" alt="" width="326" height="138" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image1-1.png 326w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image1-1-71x30.png 71w" sizes="auto, (max-width: 326px) 100vw, 326px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>CyberX raises $18 million in series B funding to combat rising threats to IIoT and critical infrastructure, bringing total funding to $30 million (CyberX, February 27<sup>th</sup>)</strong></p>
<p>CyberX announced that the company raised $18 million dollars to develop threat detection in the Industrial Internet of Things (IIoT) and critical infrastructures. The company develops a threat monitoring and risk mitigation platform that includes ICS-specific threat intelligence. <a href="https://cyberx-labs.com/en/press-releases/cyberx-raises-18-million-series-b-funding-combat-rising-threats-iiot-critical-infrastructure-bringing-total-funding-30-million/">Link to the press release</a></td>
</tr>
<tr>
<td style="width: 156.91px;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10510" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image2.png-437x114.jpg" alt="" width="437" height="114" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image2.png-437x114.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image2.png-71x19.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image2.png.jpg 447w" sizes="auto, (max-width: 437px) 100vw, 437px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>Fun with Modbus 0x5A (<em>Security Insider, February 9th</em>)</strong></p>
<p>During the last edition of Defcon in Las Vegas, Wavestone presented its latest study regarding the ModBus protocol cybersecurity and specifically the function 90. An attacker may thanks to this function start, stop a controller or force it to send a determined output value,  <a href="http://www.securityinsider-wavestone.com/2018/02/fun-with-modbus-0x5a.html">Link to the article</a></td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10512" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image3-268x191.jpg" alt="" width="268" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image3-268x191.jpg 268w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image3-55x39.jpg 55w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image3-345x245.jpg 345w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image3.jpg 409w" sizes="auto, (max-width: 268px) 100vw, 268px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>ICS detection challenge results (<em>Dale Peterson, February 7th</em>)</strong></p>
<p>At the S4x18 in January, took place the ICS Detection Challenge. The 4 companies that completed the challenge are: Claroty, Gravwell, Nozomi Networks and Security Matters. The first part of the challenge consists on evaluating the ICS Detection class of 3 products which are: Claroty, Nozomi Networks and Security Matters. It was won by Claroty over Nozomi Networks and Security Matters. The competitors&#8217; products had to detect cyber-attacks and incidents occurring on an oil&amp;gas company. <a href="https://dale-peterson.com/2018/02/11/ics-detection-challenge-results-part-1/">Link to the results</a></p>
<p>The second part which consists in the asset detection phase was also won by Claroty even though Nozomi provided the most details in their asset inventory. <a href="https://dale-peterson.com/2018/02/13/ics-detection-challenge-part-ii/?utm_content=buffer46f44&amp;utm_medium=social&amp;utm_source=twitter.com&amp;utm_campaign=buffer">Link to the results</a></td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10514" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image4-287x191.jpg" alt="" width="287" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image4-287x191.jpg 287w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image4-59x39.jpg 59w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image4.jpg 720w" sizes="auto, (max-width: 287px) 100vw, 287px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>Water utility in Europe hit by cryptocurrency malware mining attack (<em>eWeek, February 7th</em>)</strong></p>
<p>The security firm Radiflow discovered a cryptocurrency mining malware in the network of a water service provider in Europe. The malware was downloaded from a malicious advertising site infecting the Human Machine Interface and then spread to the SCADA network that was still running Microsoft Windows XP OS. The malware degraded the system performance. Tough the degradation wasn’t noticed by the operators. <a href="http://www.eweek.com/security/water-utility-in-europe-hit-by-cryptocurrency-malware-mining-attack">Link to the article</a></td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10516" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image5-323x191.jpg" alt="" width="323" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image5-323x191.jpg 323w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image5-120x70.jpg 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image5-66x39.jpg 66w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image5.jpg 436w" sizes="auto, (max-width: 323px) 100vw, 323px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>Ukraine power distributor plans cyber defense system for $20 million (<em>Reuters, February 6th</em>)</strong></p>
<p>Ukraine’s state-run power distributor Ukrenergo, which was a target for cyber-attacks in the past two years (December 2016 and December 2017), will invest up to $20 million in a new cyber defense system. The acting head of Ukrainian state power distributor Ukrenergo, told that the company and international consultants had identified about 20 threats that would be eliminated with the new system. The main goal of this system is to make “physically impossible for external threats to affect the Ukrainian energy system”. <a href="https://www.reuters.com/article/us-ukraine-cyber-ukrenergo/ukraine-power-distributor-plans-cyber-defense-system-for-20-million-idUSKBN1FQ1TD">Link to the article</a></td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10518" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image6.jpg" alt="" width="297" height="178" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image6.jpg 297w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image6-65x39.jpg 65w" sizes="auto, (max-width: 297px) 100vw, 297px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>Increasing number of industrial systems accessible from web (<em>study Security Week, February 2nd</em>)</strong></p>
<p>According to a new report published by Positive Technologies, the number of industrial control systems (ICS) accessible from the Internet has increased significantly during the past year. Most of vulnerabilities of these systems could be exploited remotely without needing to obtain any privileges in advance. The most common types of vulnerabilities were remote code execution (24%), information disclosure (17%), and buffer overflows (12%).Most of these systems are accessible via HTTP, followed by the Fox building automation protocol associated with Honeywell’s Niagara framework, Ethernet/IP, BACnet, and the Lantronix discovery protocol. <a href="https://www.securityweek.com/increasing-number-industrial-systems-accessible-web-study">Link to the article</a> | <a href="https://www.securityweek.com/increasing-number-industrial-systems-accessible-web-study">Link to the report</a> [PDF]</td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10520" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image7-337x191.jpg" alt="" width="337" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image7-337x191.jpg 337w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image7-69x39.jpg 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image7.jpg 454w" sizes="auto, (max-width: 337px) 100vw, 337px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>Flaws in gas station software let hackers change prices, steal fuel, erase evidence (<em>Motherboard, January 31st</em>)</strong></p>
<p>Security researchers were able to connect to a web interface that manages gas station thanks to Shodan (search engine of connected devices). After using the default admin login and password, and then a hardcoded username and password, the researchers were able to shut down fuel pumps, hijack credit card payments, and steal card numbers. <a href="https://motherboard.vice.com/en_us/article/43qkgb/flaws-in-gas-station-software-let-hackers-change-prices-steal-fuel-erase-evidence">Link to the article</a></td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10522" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image8-340x191.jpg" alt="" width="340" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image8-340x191.jpg 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image8-69x39.jpg 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image8.jpg 433w" sizes="auto, (max-width: 340px) 100vw, 340px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>Government warns critical industry firms to prepare for cyberattacks (<em>Sky news, January 29th</em>)</strong></p>
<p>All companies which are involved in critical industry and essential services, such as energy, transport, water, health and digital infrastructure, have been warned by the British government that they face sanctions if they do not include cybersecurity rules in their systems.The fines come as the government implements the Network and Information Systems (NIS) Directive, which would cover events such as the WannaCry attack. <a href="https://news.sky.com/story/government-warns-critical-industry-firms-to-prepare-for-cyberattacks-11226555">Link to the article</a></td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10524" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image10-148x191.png" alt="" width="148" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image10-148x191.png 148w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image10-30x39.png 30w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image10.png 311w" sizes="auto, (max-width: 148px) 100vw, 148px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>Gemalto licensing tool exposes ICS, corporate systems to attacks (<em>Security week, January 22nd</em>)</strong></p>
<p>Kaspersky Lab researchers found 14 vulnerabilities in Gemalto Sentinel LDK (software) and the associated USB Dongle (SafeNet). The USB dongle is used to activate the software. When connected, drivers are installed and the port 1947 is added to the list of exceptions in the Windows firewall. This port can be exploited to identify remotely accessible devices. <a href="https://www.securityweek.com/gemalto-licensing-tool-exposes-ics-corporate-systems-attacks">Link to the article</a></td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10526" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image11-316x191.png" alt="" width="316" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image11-316x191.png 316w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image11-768x464.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image11-65x39.png 65w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image11.png 1046w" sizes="auto, (max-width: 316px) 100vw, 316px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>SamSam ransomware hits hospitals, city councils, ICS firms (<em>Bleeping Computer, January 19th</em>)</strong></p>
<p>Samsam ransomware hit several hospitals, city councils and an ICS firm. Hancock Health admitted paying the ransom ($55.000) even though they had backups. The Samsam ransomware spread by brute forcing RDP connections. <a href="https://www.bleepingcomputer.com/news/security/samsam-ransomware-hits-hospitals-city-councils-ics-firms/?utm_source=dlvr.it&amp;utm_medium=twitter">Link to the article</a></td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10528" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image12.jpg" alt="" width="376" height="169" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image12.jpg 376w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image12-71x32.jpg 71w" sizes="auto, (max-width: 376px) 100vw, 376px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>Industrial systems scrambling to catch up with Meltdown, Spectre (<em>The Register, January 18th</em>)</strong></p>
<p>Meltdown and Spectre vulnerabilities also had an impact on industrial control systems. Some vendors decided to publicly communicate about their vulnerable products (OSISoft for example), other vendors like Emerson and General electric keep the information only for their customers and finally some vendors are still investigating if their products are vulnerable to Meltdown and Spectre. <a href="https://www.theregister.co.uk/2018/01/18/ics_cert_meltdown_responses/">Link to the article</a><br />
<em>For more information on Meltdown and Spectre vulnerabilities, you can read this <a href="http://www.securityinsider-wavestone.com/2018/01/meltdown-spectre-attaques-par-canaux-auxilliaires.html">post by Wavestone on Security Insider</a> [French]</em></td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10530" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image13-287x191.jpg" alt="" width="287" height="191" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image13-287x191.jpg 287w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image13-59x39.jpg 59w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image13.jpg 350w" sizes="auto, (max-width: 287px) 100vw, 287px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>Researchers find 147 vulnerabilities in 34 SCADA mobile applications (<em>SC Magazine, January 11th</em>)</strong></p>
<p>IoActive and Embedi researchers found 147 vulnerabilities in 34 mobile applications used in tandem with Supervisory Control and Data Acquisition (SCADA) systems. The top vulnerabilities were: code tampering flaws, insecure authorization, insecure data storage&#8230; This security weaknesses could allow an attacker to compromise industrial network infrastructure by exploiting the vulnerable applications. <a href="https://www.scmagazine.com/the-top-security-weaknesses-were-code-tampering-flaws-which-were-found-in-94-percent-of-apps/article/736656/">Link to the article</a></td>
</tr>
<tr>
<td style="width: 156.91px; text-align: center;"> <img loading="lazy" decoding="async" class="alignnone size-medium wp-image-10532" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image14.png" alt="" width="246" height="72" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image14.png 246w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image14-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/image14-245x72.png 245w" sizes="auto, (max-width: 246px) 100vw, 246px" /></td>
<td style="width: 495.799px; text-align: left;"><strong>Industrial Cybersecurity Firm Nozomi Networks Raises $15 Million (<em>Security Week, January 10th</em>)</strong></p>
<p>Nozomi is an industrial cybersecurity firm that has recently raised $23.8 million. Nozomi’s offering which is “SCADAguardian”, consists on using machine learning and behavioral analysis to detect zero-day attacks in real-time. This technology allows rapid response to alerts by ICS incident alerting and notification systems. The company said the additional funding will be used to support worldwide expansion of marketing, sales, support and product innovation. <a href="https://www.securityweek.com/industrial-cybersecurity-firm-nozomi-networks-raises-15-million">Link to the article</a></td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<h2>&gt;&gt;Main ICS vulnerabilities</h2>
<table style="height: 705px; width: 701px; border-color: #ffffff;" cellpadding="3">
<tbody>
<tr style="height: 26px; background-color: #d1cdcd;">
<td style="width: 67.6042px; height: 26px; text-align: center;"><strong>Date</strong></td>
<td style="width: 66.4931px; height: 26px; text-align: center;"><strong>CVSS v3</strong></td>
<td style="width: 128.715px; height: 26px; text-align: center;"><strong>Equipment</strong></td>
<td style="width: 308.715px; height: 26px; text-align: center;"><strong>Vulnerability</strong></td>
<td style="width: 82.0486px; height: 26px; text-align: center;"><strong>Advisory</strong></td>
</tr>
<tr style="height: 53px;">
<td style="width: 67.6042px; height: 53px; text-align: center;">Feb. 15<sup>th</sup></td>
<td style="width: 66.4931px; height: 53px; text-align: center;">9.8</td>
<td style="width: 128.715px; height: 53px;">Nortek Linear eMerge E3 Series</td>
<td style="width: 308.715px; height: 53px;">Command Injection</td>
<td style="width: 82.0486px; height: 53px; text-align: center;"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-046-02">Link</a></td>
</tr>
<tr style="height: 74px;">
<td style="width: 67.6042px; height: 74px; text-align: center;">Feb. 15<sup>th</sup></td>
<td style="width: 66.4931px; height: 74px; text-align: center;">9.8</td>
<td style="width: 128.715px; height: 74px;">GE D60 Line Distance Relay</td>
<td style="width: 308.715px; height: 74px;">Stack-based Buffer Overflow, Improper Restriction of Operations within the Bounds of a Memory Buffer</td>
<td style="width: 82.0486px; height: 74px; text-align: center;"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-046-02">Link</a></td>
</tr>
<tr style="height: 98px;">
<td style="width: 67.6042px; height: 98px; text-align: center;">Feb. 13<sup>th</sup></td>
<td style="width: 66.4931px; height: 98px; text-align: center;">9.8</td>
<td style="width: 128.715px; height: 98px;">Wago PFC200 Series</td>
<td style="width: 308.715px; height: 98px;">Execution of some unauthenticated commands such as reading, writing, or deleting arbitrary files, or manipulate the PLC application during runtime.</td>
<td style="width: 82.0486px; height: 98px; text-align: center;"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-044-01">Link</a></td>
</tr>
<tr style="height: 54px;">
<td style="width: 67.6042px; height: 54px; text-align: center;">Feb. 8<sup>th</sup></td>
<td style="width: 66.4931px; height: 54px; text-align: center;">9.9</td>
<td style="width: 128.715px; height: 54px;">Gemalto Sentinel License Manager</td>
<td style="width: 308.715px; height: 54px;">Null Pointer Dereference, Buffer Overflows, Improper Access Control.</td>
<td style="width: 82.0486px; height: 54px; text-align: center;"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-032-03">Link</a></td>
</tr>
<tr style="height: 74px;">
<td style="width: 67.6042px; height: 74px; text-align: center;">Feb. 1<sup>st</sup></td>
<td style="width: 66.4931px; height: 74px; text-align: center;">9.8</td>
<td style="width: 128.715px; height: 74px;">3S-Smart Software Solutions GmbH Codesys Web Server</td>
<td style="width: 308.715px; height: 74px;">Stack-based Buffer Overflow.</td>
<td style="width: 82.0486px; height: 74px; text-align: center;"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-032-02">Link</a></td>
</tr>
<tr style="height: 12.042px;">
<td style="width: 67.6042px; height: 12.042px; text-align: center;">Jan. 25<sup>th</sup></td>
<td style="width: 66.4931px; height: 12.042px; text-align: center;">9.8</td>
<td style="width: 128.715px; height: 12.042px;">Nari PCS-9611</td>
<td style="width: 308.715px; height: 12.042px;">Improper Input Validation.</td>
<td style="width: 82.0486px; height: 12.042px; text-align: center;"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-025-01">Link</a></td>
</tr>
<tr style="height: 54px;">
<td style="width: 67.6042px; height: 54px; text-align: center;">Jan. 11<sup>th</sup></td>
<td style="width: 66.4931px; height: 54px; text-align: center;">9.8</td>
<td style="width: 128.715px; height: 54px;">Phoenix Contact FL Switch</td>
<td style="width: 308.715px; height: 54px;">Improper Authorization, Information Exposure.</td>
<td style="width: 82.0486px; height: 54px; text-align: center;"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03">Link</a></td>
</tr>
<tr style="height: 74px;">
<td style="width: 67.6042px; height: 74px; text-align: center;">Jan. 9<sup>th</sup></td>
<td style="width: 66.4931px; height: 74px; text-align: center;">9.8</td>
<td style="width: 128.715px; height: 74px;">General Motors and Shanghai OnStar (SOS) iOS Client.</td>
<td style="width: 308.715px; height: 74px;">Cleartext Storage of Sensitive Information, Man-in-the-Middle, Improper Authentication.</td>
<td style="width: 82.0486px; height: 74px; text-align: center;"><a href="https://ics-cert.us-cert.gov/advisories/ICSA-17-234-04">Link</a></td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<h2>&gt;&gt;Recent and upcoming ICS events</h2>
<figure id="post-10532 media-10532" class="align-none"></figure>
<table style="height: 679px; width: 701px;" border="1" cellpadding="10">
<tbody>
<tr>
<td style="width: 104.688px; text-align: center;">
<figure id="post-10556 media-10556" class="align-center"><img loading="lazy" decoding="async" class="aligncenter wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date.png" alt="" width="50" height="49" /></figure>
<p>Apr. 24-26</td>
<td style="width: 558.021px;"><a href="https://icscybersecurity.iqpc.co.uk/">ICS Cyber security</a></p>
<p>London, UK</td>
</tr>
<tr>
<td style="width: 104.688px; text-align: center;"><img loading="lazy" decoding="async" class="aligncenter wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date.png" alt="" width="50" height="49" /></p>
<p>Apr. 24-26</td>
<td style="width: 558.021px;"><a href="https://www.industrialiotseries.com/europe/">Industrial control systems (ICS) Cyber Security Conference</a></p>
<p>Singapore</td>
</tr>
<tr>
<td style="width: 104.688px; text-align: center;"><img loading="lazy" decoding="async" class="aligncenter wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date.png" alt="" width="50" height="49" /></p>
<p>Apr. 9-10</td>
<td style="width: 558.021px;"><a href="https://www.cs4ca.com/mena/">Cyber Security for critical assets MENA</a></p>
<p>Dubai, UAE</td>
</tr>
<tr>
<td style="width: 104.688px; text-align: center;"><img loading="lazy" decoding="async" class="aligncenter wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date.png" alt="" width="50" height="49" /></p>
<p>Mar. 27-29</td>
<td style="width: 558.021px;"><a href="https://cybersecurityme.iqpc.ae/">Cyber Security for Energy &amp; Utilities</a></p>
<p>Abu Dhabi, UAE</td>
</tr>
<tr>
<td style="width: 104.688px; text-align: center;"><img loading="lazy" decoding="async" class="aligncenter wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date.png" alt="" width="50" height="49" /></p>
<p>Mar. 13-14</td>
<td style="width: 558.021px;"><a href="https://www.maritimecybersec.com/">Maritime Cyber Security</a></p>
<p>London, U.K</td>
</tr>
<tr>
<td style="width: 104.688px; text-align: center;"><img loading="lazy" decoding="async" class="aligncenter wp-image-10556" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/03/flat-icon-date.png" alt="" width="50" height="49" /></p>
<p>Mar. 6-7</td>
<td style="width: 558.021px;"><a href="https://www.cs4ca.com/usa/">Cyber Security for critical assets USA</a></p>
<p>Houston, USA</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/03/ics-news-1-en/">Industrial Control System Cybersecurity News #1 &#8211; What to remember from 2017?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
