<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>watch - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/watch/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/watch/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Fri, 13 Jan 2023 10:58:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>watch - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/watch/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>CDT Watch – December 2022</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-december-2022/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-december-2022/#respond</comments>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Mon, 02 Jan 2023 10:48:00 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[BYOVKD]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[EDR]]></category>
		<category><![CDATA[emotet]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Redis]]></category>
		<category><![CDATA[watch]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=19444</guid>

					<description><![CDATA[<p>FOCUS TECH BRING YOUR OWN VULNERABLE KERNEL DRIVER (BYOVKD) Facing the EDR behavioral supervision, attacker develops techniques for successful attacks by staying under the radars. One of these techniques is called BYOVKD: Bring Your Own Vulnerable Kernel Driver. Even if...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-december-2022/">CDT Watch – December 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 style="text-align: center;">FOCUS TECH</h2>
<h3 style="text-align: center;">BRING YOUR OWN VULNERABLE KERNEL DRIVER (BYOVKD)</h3>
<p style="text-align: justify;">Facing the EDR behavioral supervision, attacker develops techniques for successful attacks by staying under the radars. One of these techniques is called BYOVKD: Bring Your Own Vulnerable Kernel Driver.</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-19447" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-1.png" alt="" width="1625" height="1091" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-1.png 1625w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-1-284x191.png 284w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-1-58x39.png 58w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-1-768x516.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-1-1536x1031.png 1536w" sizes="(max-width: 1625px) 100vw, 1625px" /></p>
<p style="text-align: justify;">Even if it does not raise an alert on the EDR console, the Defense team must <strong>be vigilant</strong> to any telemetry that would indicate the <strong>loading of an unusual driver on assets</strong>. Furthermore, <strong>prevention mechanisms</strong> exist for this type of case, some examples below:</p>
<ul>
<li style="text-align: justify;"><a href="https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-reference?view=o365-worldwide#block-abuse-of-exploited-vulnerable-signed-drivers">Block abuse of exploited vulnerable signed drivers</a></li>
<li style="text-align: justify;"><a style="font-size: revert;" href="https://learn.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules">Driver block rules</a></li>
</ul>
<h2> </h2>
<h2 style="text-align: center;"><strong>CERT-W: FROM THE FRONT LINE</strong></h2>
<h3 style="text-align: center;">THE FIRST RESPONDER WORD</h3>
<p><img decoding="async" class="aligncenter size-full wp-image-19449" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-2.png" alt="" width="770" height="414" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-2.png 770w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-2-355x191.png 355w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-2-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-2-768x413.png 768w" sizes="(max-width: 770px) 100vw, 770px" /></p>
<p> </p>
<p> </p>
<h2 style="text-align: center;"><strong>READING OF THE MONTH</strong></h2>
<h3 style="text-align: center;">EMOTET</h3>
<p><strong>What is Emotet 2022?</strong></p>
<p style="text-align: justify;"><strong>Emotet is a <em>Malware-as-a-Service</em></strong> (<em>MaaS</em>) relying on a botnet network which appeared in 2014. It was originally designed as a banking Trojan aiming to steal sensitive information related to bank accounts<em>.</em> In 2021, police forces arrested several people belonging to Emotet organization, which then <strong>reappeared with new features in 2022</strong>. The group behind Emotet seems to be <strong>opportunist</strong> and most of its victims are from US, UK, Japan, Germany, Italy, Spain, <strong>France</strong>, and Brazil.</p>
<p><strong>Why is it dangerous?</strong></p>
<p style="text-align: justify;">Emotet is a polymorphic malware whose code changes over time. Among the numerous new features of the 2022 version, searchers from the <a href="https://thedfirreport.com/2022/09/12/dead-or-alive-an-emotet-story/">DFIR Report</a> have identified an ability to <strong>bypass anti-malware detection</strong>. To do that, Emotet 2022 uses a 64 bits base code and various signatures to avoid pattern recognition. The malware is also able <strong>to keep itself up to date</strong> once downloaded by using <strong>Command &amp; Control servers</strong>, which send it updates the same as an Operating System. The <em>MaaS</em> is also <strong>able to release IcedID</strong>, which are modular banking Trojans able <strong>to drop other malwares</strong>. Doing so, Emotet helped to distribute ransomwares for impact, Cobalt Strike for initial access, XMRig for stealing wallet data…</p>
<p><strong>How does Emotet 2022 initial infection work?</strong></p>
<p style="text-align: justify;">Using a <strong>phishing email with a malicious Office attachment</strong>, Emotet exploits a 2017 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-11882">Microsoft vulnerability</a> which allows remote code execution on vulnerable devices (CVE 2017-11882) to compromise its first victim.</p>
<p style="text-align: justify;">Once downloaded in memory, the malware executes a sequence of legitimate Windows commands to <strong>perform a recognition of its environment,</strong> then spreads in the local network and steals information.</p>
<p style="text-align: justify;">Emotet spreads through spam emails. According to <a href="https://www.deepinstinct.com/blog/emotet-malware-returns-in-2022"><em>Deep Instinct</em></a>, 45% of them are containing malicious Office attachment such as Spreadsheets or scripts in most of the cases. As those emails traduce the object and attachments names in the target’s local language and come from known senders, the phishing looks particularly realistic.<img decoding="async" class="aligncenter size-full wp-image-19451" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-3.png" alt="" width="1111" height="528" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-3.png 1111w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-3-402x191.png 402w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-3-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/01/Picture-3-768x365.png 768w" sizes="(max-width: 1111px) 100vw, 1111px" /></p>
<p style="text-align: center;"><a href="https://www.proofpoint.com/us/blog/threat-insight/comprehensive-look-emotets-fall-2022-return">Comprehensive look of EMOTET fall 2022</a></p>
<p style="text-align: left;"><strong>Why is this new version of the MaaS particularly tricky?</strong></p>
<p style="text-align: justify;">Emotet 2022 can identify whether it’s downloaded into a sandbox environment, or a device connected to a network. In the first configuration it won’t activate itself, but in the second it will rely <strong>on a password dictionary to spread</strong> thanks to brute-force.  Moreover, the November 2022 Excel files generally enclosed <strong>contains macros which no longer needs a user click to be authorized</strong>. The victim is only asked two things: <strong>copying the files into the Microsoft Office Template zone, which requires administrator privileges</strong>. Opening the file in this location will execute the macros without any warnings.</p>
<p style="text-align: justify;"><strong>How to protect from Emotet 2022?</strong></p>
<p>Since Emotet 2022 uses malicious spam and phishing is the most used technique for initial access, we highly advice you to consider these measures:</p>
<ul>
<li style="text-align: justify;">Provide your company a <strong>solution against phishing</strong>.</li>
<li style="text-align: justify;">Launch an <strong>awareness campaign</strong> for employees and stakeholders.</li>
<li style="text-align: justify;">Provide you company an <strong>Endpoint Detection and Response</strong> which complete the anti-virus by performing <strong>behavioural analysis</strong>, which helps visualize the virus kill chain to identify the action levers.</li>
</ul>
<p style="text-align: justify;">Give a local administrator account to an employee only in case of specific need.</p>
<p> </p>
<h2 style="text-align: center;">VULNERABILITY OF THE MONTH</h2>
<h3 style="text-align: center;">DEBIAN-SPECIFIC REDIS SERVER LUA SANDBOX ESCAPE VULNERABILITY &#8211; <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0543"><strong>CVE-2022-0543</strong></a></h3>
<p style="text-align: center;">Published by NVD: 18/02/2022</p>
<p style="text-align: center;"><strong>Products: </strong>Redis server for Debian and Debian-derived Linux distributions</p>
<p style="text-align: center;"><strong>Versions: </strong>less and equal to 5:5.0.14-1+deb10u2, 5:6.0.16-1+deb11u2, 5:7.0.5-1, 5:7.0.7-1</p>
<p style="text-align: center;"><strong>Score: </strong><strong>10 CRITICAL</strong></p>
<p style="text-align: center;"><a href="https://blog.aquasec.com/redigo-redis-backdoor-malware"><strong>Context</strong></a><strong>  </strong><a href="https://packetstormsecurity.com/files/166885/Redis-Lua-Sandbox-Escape.html"><strong>PoC</strong></a></p>
<p style="text-align: justify;"><a href="https://redis.io/">Redis</a> is an opensource NoSQL database management system. Redis includes an <strong>embedded Lua scripting engine</strong>, it allows client to run scripts. By design, the Lua engine must be <strong>sandboxed</strong>: it means that packages and APIs available are limited in an execution context. Redis clients <strong>are not allowed to execute arbitrary code</strong> on the Redis server.</p>
<p style="text-align: justify;">In some <strong>Debian and Debian-derived Linux packages</strong>, the Lua environment is <strong>not sufficiently regulated </strong>because the Lua Library is provided as a dynamic library. It can allow attackers to access arbitrary Lua functionalities and results in a Lua Sandbox escape.</p>
<p style="text-align: justify;">Early December, reports indicate that attackers are exploiting this vulnerability <strong>to deploy a new backdoor malware dubbed Redigo</strong> on Redis Server. The malware communicates with a server of command and control using <strong>port 6379 </strong>which is a legitimate port used by Redis for communication between client and server: the Redis server joins a botnet network.</p>
<p style="text-align: justify;">According to <a href="https://blog.aquasec.com/redigo-redis-backdoor-malware"><em>Aqua</em></a>, the malware has some functions specially written to the Redis server which may imply that the group behind this desired <strong>to build an adjusted attack that would target Redis servers</strong>.</p>
<p style="text-align: justify;"><strong>A successful attack implies that attacker could execute arbitrary commands and access to sensitive information.</strong></p>
<p style="text-align: justify;">A group of attackers is behind the Redigo malware which is an emerging threat. Furthermore, the <strong>exploit of the CVE-2022-0543 is public</strong> and is <strong>used in the wild</strong> to deploy the malware. <strong>Vulnerable Redis Server must be patched and up to date</strong>.</p>
<p> </p>
<p style="text-align: center;">SEE YOU NEXT MONTH!!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-december-2022/">CDT Watch – December 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/01/cdt-watch-december-2022/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CDT Watch – November 2022</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/12/cdt-watch-november-2022/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/12/cdt-watch-november-2022/#respond</comments>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Thu, 01 Dec 2022 15:54:26 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ENISA]]></category>
		<category><![CDATA[SUPPLY CHAIN]]></category>
		<category><![CDATA[threat]]></category>
		<category><![CDATA[watch]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=19173</guid>

					<description><![CDATA[<p>EDITO What are the supply chain threats? What’s a picture of the current situation? Since 2019, there has been a growing focus on third-party attacks. With good reason: CyberArck estimates in a study from 2022 that 71% of organizations suffered...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/12/cdt-watch-november-2022/">CDT Watch – November 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: center;"><strong>EDITO</strong></h1>
<h2 style="text-align: center;">What are the supply chain threats?</h2>
<p><strong>What’s a picture of the current situation? </strong></p>
<p>Since 2019, there has been a growing focus on third-party attacks. With good reason: CyberArck estimates in a study from 2022 that <a href="http://www.cyberview.com.tw/wp-content/uploads/2022/05/cyberark-2022-identity-security-threat-landscape-report.pdf">71% of organizations</a> suffered a successful</p>
<p>software supply chain-related attack that resulted in data loss or asset compromise. According to Argon Security – recently acquired by Aqua Security – published the latest edition of its annual Software Supply Chain Security Review this week. The Software Supply Chain Security Review from Argon’s report that software supply chain attacks grew by <a href="https://www.developer-tech.com/news/2022/jan/20/software-supply-chain-attacks-increased-over-300-percent-in-2021/">more than 300% in 2021</a> compared to 2020.</p>
<p>In terms of maturity, in 2022: a survey of 1,000 CIOs found that 82% said their organization is vulnerable to cyber-attacks targeting software supply chains <a href="https://www.venafi.com/sites/default/files/2022-05/Venafi_WhitePaper_CIOStudy_SoftwareBuildPipelinesAttackSurfaceExpanding_2022_f%20.pdf">(Venafi)</a>. From our own Cyberbenchmark, we can see that 50% of our interviewee don’t control their security requirements with their third party and 15% conduct audits on their most critical suppliers in 2022.</p>
<p> </p>
<p><strong>What kind of attacks are we talking about?  </strong></p>
<p>Attacks on the supply chain are related to threats around third parties. <a href="https://www.enisa.europa.eu/publications/threat-landscape-for-supply-chain-attacks">ENISA</a> defines this type of attack as follows: “ A supply chain attack is a combination of at least two attacks. The first attack is on a supplier that is then used to attack the target to gain access to its assets. The target can be the final customer or another supplier. Therefore, for an attack to be classified as a supply chain one, both the supplier and the customer have to be targets.”</p>
<p>As a reminder the supply chain involves a wide range of resources (hardware and software), storage (cloud or local), distribution mechanisms (web applications, online stores), and management software</p>
<ul>
<li><strong>Indirect or bounce attack:</strong> An attack on one or more intermediate information systems. The attacker uses the supplier as an entry vector to retrieve the information needed to access the final target.</li>
<li><strong>Supply chain attack:</strong> the attacker relies on a software production chain to infect a legitimate program and distribute it to third parties.</li>
</ul>
<p> </p>
<p><strong>Why is it serious?</strong></p>
<p>First because these attacks are <strong>complicated to detect:</strong> originally used for espionage, these are attacks where the attacker aims to remain discreet until the attack is launched. Second because it is a <strong>one-to-</strong><strong>many kind of attack</strong>. A small change in software source code can affect the entire supply chain (plus, the chains are increasingly interconnected). The most known example is Kaseya and its 800 and 1,500 total businesses affected victims. Thirdly, many enterprises don’t have <strong>enough visibility on their ecosystem</strong> to anticipate or even detect the flaws in their IS. As we have seen, the security maturity in this field is currently quite low.</p>
<p><strong>There are some aggravating factors:</strong></p>
<ul>
<li>The cyber criminal’s ecosystem has matured and industrialized, allowing more sophisticated attacks to target matured victims. ​They can therefore afford this kind of sophisticated attack which used to take time, financial investment, and expertise&#8230;</li>
<li>Expansion of the attack surface: The IS ecosystem is increasingly large, and increasingly interconnected, and more and more third parties are involved. They have potentially less control of the IS and less visibility, therefore potentially less control of the security of all these third parties, particularly in IAM management: who has very privileged access rights to its IS&#8230;</li>
<li>The risk is to give access to third parties who can represent entry points for attackers: to one&#8217;s IS and to one&#8217;s sensitive data since one shares them with third parties</li>
<li>In 2021, in an analysis conducted with 1200 CISOs (in America, Europe and Singapore), about 38% of respondents said that they had no way of knowing when or whether an issue arises with a third-party supplier&#8217;s cybersecurity (in 2020, it was 31%) <a href="https://www.bluevoyant.com/press-releases/bluevoyant-research-reveals-rise-in-supply-chain-cybersecurity-breaches-as-firms-struggle-to-effectively-monitor-third-party-cyber-risk">(BlueVoyant66)</a></li>
<li>Github estimates that there is 203 dependencies on an average software project in 2022.  If a popular app includes one compromised dependency, every business that downloads from the vendor is compromised as well, so the number of victims can grow exponentially.</li>
</ul>
<p> </p>
<p><strong>Examples of attacks</strong></p>
<ul>
<li><strong>Compromise intermediate elements of the supply chain​</strong> (i.e. source code tools) ​</li>
</ul>
<p>Midstream attacks target intermediate elements such as software development tools, manipulating the build process of the artifact​</p>
<ul>
<li>Ex: SolarWinds</li>
<li><strong>Compromise upstream software </strong>​(i.e. compromising the source code)​</li>
</ul>
<p>Infects a system that is &#8216;upstream&#8217; of users, for example through a malicious update, which then infects all &#8216;downstream&#8217; users who download it. ​</p>
<ul>
<li>One of the biggest was the compromise of CCleaner 2017 update  with 2.3 million users impacted</li>
</ul>
<ul>
<li><strong>Compromise project interdependencies​</strong></li>
</ul>
<p>Compromise third-party components, such as an open-source package​</p>
<p>Dependencies confusion: the attackers provide a fake “new” upgrade of a software’s project needed component for the targeted software to automatically download it and implement it in the project. ​</p>
<ul>
<li>Ex: Apple, Microsoft, Uber, Paypal (BugBounty 2020)</li>
</ul>
<p>Within these strategies, one of the most impactful methods is <strong>to target the CI/CD pipeline</strong>. If the infrastructure is not secured enough and there is a poor access management (our audit teams often see this), it can be easily targeted. Once compromised, the attacker has access to a part of the critical &#8216;linfra, to the source code of the application and the infrastructure and can generally do what he wants</p>
<p><strong>The impacts are high: </strong></p>
<ul>
<li>Attackers have access to critical IT infrastructure, development processes, source code, libraries, and applications: ​</li>
<li>Modify the code or inject malicious code during the build process and alter the application ​</li>
<li>Deploy malware via the orchestrator directly on production environments</li>
</ul>
<p> </p>
<p> </p>
<h1 style="text-align: center;"><strong>CERT-W: FROM THE FRONT LINE</strong></h1>
<h2 style="text-align: center;">The First Responder Word</h2>
<p><img loading="lazy" decoding="async" class="alignnone  wp-image-19175" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/image-366x191.png" alt="" width="863" height="450" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/image-366x191.png 366w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/image-71x37.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/image-768x401.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/image.png 1486w" sizes="auto, (max-width: 863px) 100vw, 863px" /></p>
<p> </p>
<p> </p>
<h1 style="text-align: center;"><strong>READING OF THE MONTH</strong></h1>
<h2 style="text-align: center;">ENISA</h2>
<p style="text-align: center;">This is the tenth edition of the ENISA Threat Landscape (ETL) report, an annual report on the status of the cybersecurity threat landscape. It identifies the top threats, major trends observed with respect to threats, threat actors and attack techniques, as well as impact and motivation analysis.</p>
<p><img loading="lazy" decoding="async" class="wp-image-19177 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/image-2-315x191.png" alt="" width="400" height="243" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/image-2-315x191.png 315w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/image-2-64x39.png 64w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/image-2-768x466.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/12/image-2.png 963w" sizes="auto, (max-width: 400px) 100vw, 400px" /></p>
<p style="text-align: center;"><a href="https://www.enisa.europa.eu/publications/enisa-threat-landscape-2022">Link to the report</a></p>
<p style="text-align: center;">SEE YOU NEXT MONTH!!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/12/cdt-watch-november-2022/">CDT Watch – November 2022</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/12/cdt-watch-november-2022/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CDT Watch &#8211; November 2021</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/11/cdt-watch-november-2021/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2021/11/cdt-watch-november-2021/#respond</comments>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Tue, 30 Nov 2021 08:50:00 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[CDT]]></category>
		<category><![CDATA[CERT]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[watch]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17399</guid>

					<description><![CDATA[<p>FOCUS TECH File Obfuscation Discover Cobalt Strike capabilities with the technical zoom of the month: To learn more about the given malwares: Cobalt Strike Training videos CERT-W: FROM THE FRONT LINE The First Responder Word We recommend the 2021 Benchmark...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/11/cdt-watch-november-2021/">CDT Watch &#8211; November 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1 style="text-align: center;"><strong>FOCUS TECH</strong></h1>
<h2 style="text-align: center;">File Obfuscation</h2>
<p style="text-align: center;">Discover Cobalt Strike capabilities with the technical zoom of the month:</p>
<figure id="post-16383 media-16383" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17400" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-1.png" alt="" width="771" height="456" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-1.png 771w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-1-323x191.png 323w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-1-66x39.png 66w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-1-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-1-768x454.png 768w" sizes="auto, (max-width: 771px) 100vw, 771px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17402" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-2.png" alt="" width="770" height="442" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-2.png 770w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-2-333x191.png 333w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-2-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-2-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-2-768x441.png 768w" sizes="auto, (max-width: 770px) 100vw, 770px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17404" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-3.png" alt="" width="772" height="442" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-3.png 772w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-3-334x191.png 334w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-3-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-3-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-3-768x440.png 768w" sizes="auto, (max-width: 772px) 100vw, 772px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17406" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-4.jpg" alt="" width="776" height="451" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-4.jpg 776w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-4-329x191.jpg 329w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-4-67x39.jpg 67w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-4-120x70.jpg 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-4-768x446.jpg 768w" sizes="auto, (max-width: 776px) 100vw, 776px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17408" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-5.jpg" alt="" width="777" height="458" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-5.jpg 777w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-5-324x191.jpg 324w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-5-66x39.jpg 66w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-5-120x70.jpg 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-5-768x453.jpg 768w" sizes="auto, (max-width: 777px) 100vw, 777px" /> <img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17410" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-6.png" alt="" width="781" height="447" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-6.png 781w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-6-334x191.png 334w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-6-68x39.png 68w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-6-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-6-768x440.png 768w" sizes="auto, (max-width: 781px) 100vw, 781px" /></figure>
<figure id="post-16383 media-16383" class="align-center"></figure>
<p style="text-align: center;"><strong>To learn more about the given malwares:</strong></p>
<figure id="post-16217 media-16217" class="align-center">
<figure id="post-16385 media-16385" class="align-center"><img loading="lazy" decoding="async" class="aligncenter  wp-image-17412" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/learn-more.png" alt="" width="289" height="158" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/learn-more.png 223w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/learn-more-71x39.png 71w" sizes="auto, (max-width: 289px) 100vw, 289px" /></figure>
<p style="text-align: center;"><a href="https://www.cobaltstrike.com/training">Cobalt Strike Training videos</a></p>
</figure>
<figure id="post-16210 media-16210" class="align-center">
<figure id="post-16367 media-16367" class="align-center"></figure>
</figure>
<h1 style="text-align: center;"><strong>CERT-W: FROM THE FRONT LINE</strong></h1>
<h2 style="text-align: center;">The First Responder Word</h2>
<figure id="post-16221 media-16221" class="align-center">
<figure id="post-16228 media-16228" class="align-center">
<figure id="post-16369 media-16369" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17420" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-10.jpg" alt="" width="781" height="523" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-10.jpg 781w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-10-285x191.jpg 285w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-10-58x39.jpg 58w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-10-768x514.jpg 768w" sizes="auto, (max-width: 781px) 100vw, 781px" /></figure>
<p style="text-align: center;">We recommend the <em>2021 Benchmark on cybersecurity incidents</em> which reviews the interventions of the CERT-W carried out between September 2020 and October 2021. This Benchmark provides keys to understanding the security issues and a snapshot of current cybersecurity threats in France.</p>
</figure>
</figure>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17416" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-8.png" alt="" width="222" height="122" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-8.png 222w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-8-71x39.png 71w" sizes="auto, (max-width: 222px) 100vw, 222px" /></p>
<p style="text-align: center;"><u><a href="https://uk.wavestone.com/en/insight/cyberattacks-in-2021-ransomwares-still-threat-n1/">CERT-W’s 2021 Benchmark on cybersecurity incidents </a></u></p>
<p> </p>
<h1 style="text-align: center;"><strong>Reading Of The Month</strong></h1>
<p style="text-align: center;">To learn more about Conti, one of the most dangerous Ransomware, we recommend reading the <em>Conti Ransomware Group In-Depth Analysis </em>of Prodaft. According to Prodaft, this report will show you how the gang works with details obtained by their team who accessed Conti’s infrastructure.</p>
<figure id="post-16219 media-16219" class="align-center">
<figure id="post-16387 media-16387" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-17418" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-9.png" alt="" width="222" height="122" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-9.png 222w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/12/image-9-71x39.png 71w" sizes="auto, (max-width: 222px) 100vw, 222px" /></figure>
<p style="text-align: center;"><a href="https://www.prodaft.com/m/reports/Conti_TLPWHITE_v1.6_WVcSEtc.pdf">Conti Ransomware Group In-Depth Analysis by Prodaft</a></p>
</figure>
<p> </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/11/cdt-watch-november-2021/">CDT Watch &#8211; November 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2021/11/cdt-watch-november-2021/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Newsletter CERT-W, from the front line &#8211; June 2021</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/06/newsletter-cert-w-june-2021/</link>
		
		<dc:creator><![CDATA[CERT-W]]></dc:creator>
		<pubDate>Thu, 24 Jun 2021 13:39:44 +0000</pubDate>
				<category><![CDATA[CERT Newsletter]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[CDT]]></category>
		<category><![CDATA[CERT-W]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[emotet]]></category>
		<category><![CDATA[front line]]></category>
		<category><![CDATA[indicators]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[watch]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=16204</guid>

					<description><![CDATA[<p>DECRYPTION CYBER CRIMINAL NETWORK DISMANTELING The last 6 months, large-scale coordinated international actions have dismantled several of the biggest cybercriminal networks such as Emotet, Netwalker, Egregor or even Cl0p. Let’s have a closer look at some of them. What is&#160;Emotet?...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/06/newsletter-cert-w-june-2021/">Newsletter CERT-W, from the front line &#8211; June 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<figure id="post-16207 media-16207" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16207" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH.png" alt="" width="1621" height="455" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH.png 1621w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH-437x123.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH-768x216.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/CDT-WATCH-1536x431.png 1536w" sizes="auto, (max-width: 1621px) 100vw, 1621px" /></figure>
<h1 style="text-align: center;"><strong>DECRYPTION</strong></h1>
<h2 style="text-align: center;">CYBER CRIMINAL NETWORK DISMANTELING</h2>
<p><strong>The last 6 months, large-scale coordinated international actions have dismantled several of the biggest cybercriminal networks such as Emotet, Netwalker, Egregor or even Cl0p. Let’s have a closer look at some of them.</strong></p>
<p><strong>What is&nbsp;Emotet?</strong></p>
<p>Emotet&nbsp;was originally a&nbsp;<strong>banking trojan,</strong> stealing emails and contact list, retrieving&nbsp;passwords on navigators and systems, spreading within the infected network.&nbsp;In&nbsp;2019,&nbsp;Emotet&nbsp;lost its banking module and became a&nbsp;<strong>dropper</strong> of malwares. The trojan used&nbsp;a&nbsp;<a href="https://www.justice.gov/opa/pr/emotet-botnet-disrupted-international-cyber-operation"><strong>botnet of 1.6 million machines</strong></a>&nbsp; to realize phishing campaign and install itself on victims’ machines.</p>
<p><strong>Why is&nbsp;Emotet called the “king of malware”?</strong></p>
<p>At the end of 2020,&nbsp;Emotet&nbsp;was identified as&nbsp;<a href="https://www.europol.europa.eu/newsroom/news/world%E2%80%99s-most-dangerous-malware-emotet-disrupted-through-global-action"><strong>one of the most dangerous&nbsp;malwares</strong></a>. Additionally, being a dropper as well as a botnet,&nbsp;Emotet&nbsp;also&nbsp;served&nbsp;as a&nbsp;<strong>front&nbsp;door</strong>&nbsp;to many other malwares.&nbsp;It&nbsp;was used to drop malicious payloads directly onto the victims’ assets: for example,&nbsp;TrickBot&nbsp;was dropped onto the targeted machine which in turn, would drop&nbsp;<strong>Ryuk&nbsp;or Conti ransomware</strong>. According to Checkpoint Research,&nbsp;Emotet&nbsp;was at the top of the Global Threat Index in October 2020 and was linked to a&nbsp;<a href="https://blog.checkpoint.com/2021/01/07/december-2020s-most-wanted-malware-emotet-returns-as-top-malware-threat/"><strong>wave of ransomware attacks</strong></a>.&nbsp;According to CISA, the U.S. Cybersecurity &amp; Infrastructure Security Agency,&nbsp;Emotet&nbsp;infections cost is estimated at&nbsp;<a href="https://www.kaspersky.com/resource-center/threats/emotet"><strong>$1 million per incident</strong></a><strong>.</strong></p>
<p>&nbsp;</p>
<figure id="post-16210 media-16210" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16210" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/emotet.png" alt="" width="877" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/emotet.png 877w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/emotet-233x191.png 233w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/emotet-48x39.png 48w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/emotet-768x631.png 768w" sizes="auto, (max-width: 877px) 100vw, 877px" /></figure>
<p style="text-align: center;"><em>Main TA542’s customer base, “The Malware As a Service EMOTET”, ANSSI 2021</em></p>
<p>&nbsp;</p>
<p>During several months, Europol used the help of Eurojust, France, Germany, United States of America and announced their successful dismantle of the Emotet network in January 2021.</p>
<p><strong>Does this dismantling&nbsp;mean&nbsp;the end of the&nbsp;malware?</strong></p>
<p>The end of one botnet actually <a href="https://info.phishlabs.com/blog/emotet-dismantled-trickbot-zloader-and-bazarloader-step-in"><strong>led to&nbsp;the rise of several others</strong></a>, such as&nbsp;TrickBot, which even though existed since 2016, replaced Emotet as one of the most well-established&nbsp;MaaS&nbsp;(Malware as a Service) not long after the events on January.</p>
<p>This turn of events might not be so surprising, as threat actors often pivot and change their tools along the way, whether by choice or by necessity as it was the case here. Taking one malware down would only force them to use another one. Yet, what is interesting is that&nbsp;<a href="https://blogs.microsoft.com/on-the-issues/2020/10/12/trickbot-ransomware-cyberthreat-us-elections/"><strong>TrickBot&nbsp;also suffered a dismantlement of its own</strong></a>, back in October 2020. In an attempt to disrupt one of the most used distributors of ransomware, Microsoft joined forces with other security teams to take down&nbsp;TrickBot&nbsp;servers. As you may have noticed, this was months before law-enforcement took down&nbsp;Emotet, and now&nbsp;<a href="https://securityintelligence.com/posts/trickbot-survival-instinct-trickboot-version/"><strong>TrickBot&nbsp;or other versions of this malware, still lives on</strong></a>. These actions only disrupted&nbsp;TrickBot&nbsp;activities for a few days, before going back to what&nbsp;it was and even&nbsp;<strong>overtaking&nbsp;Emotet&nbsp;dominance</strong>.</p>
<p>Moreover, TrickBot&nbsp;seems to be somehow connected to the&nbsp;<strong><a href="https://www.cybereason.com/threat-alert-new-trickbot-variants">Bazar</a></strong>&nbsp;malware (BazarLoader&nbsp;and&nbsp;BazarBackdoor), as some part of its infrastructure is shared with&nbsp;TrickBot&nbsp;and both show code similarities. This new toolset is now the most seen malware used to deploy&nbsp;Ryuk&nbsp;ransomware instead of the previous&nbsp;Emotet-TrickBot-Ryuk&nbsp;or&nbsp;TrickBot-Ryuk&nbsp;chain of infection. These changes might have to do with the previously mentioned&nbsp;dismantlements, or due to a new collaboration between threat actors.</p>
<p><strong>What about the people behind these groups?</strong></p>
<p>More recently, on June 4th,&nbsp;<a href="https://www.justice.gov/opa/pr/latvian-national-charged-alleged-role-transnational-cybercrime-organization"><strong>Alla&nbsp;Witte was charged on multiple counts</strong></a> for participating in&nbsp;TrickBot&nbsp;criminal activities. Is this arrest, serving as a warning with several hundreds of years of prison if convicted, going to change cybercriminals’ operations? A few months before that, the Ukrainian authorities cooperated with the French law enforcement to conduct&nbsp;<a href="https://blog.malwarebytes.com/ransomware/2021/02/egregor-ransomware-hit-by-arrests/"><strong>an arrest against Egregor members</strong></a>, while&nbsp;<a href="https://threatpost.com/netwalker-ransomware-suspect-charged/163405/"><strong>a Canadian tied to&nbsp;Netwalker&nbsp;ransomware was charged</strong>&nbsp;</a>by the police for distributing the malware. Last year was also marked by several other arrests of cybercriminals around the world. For instance,&nbsp;<a href="https://www.zdnet.com/article/europol-arrests-hackers-behind-infinity-black-hacker-group/"><strong>the arrest of members of the Infinity Black website&nbsp;</strong></a>selling user credentials, lead to the end of the website and the group altogether. On the other hand, the arrests mentioned regarding&nbsp;Netwalker&nbsp;and Egregor seem to concern ransomware affiliates. And as the operators are still free and collaborate with other affiliates, their ransomware continues being deployed around the world.&nbsp;Alla&nbsp;Witte’s case is different since she is suspected to be a malware developer for the&nbsp;TrickBot&nbsp;Group. While her possible conviction might slightly disrupt&nbsp;TrickBot, it seems like their operations still go on, as according to <a href="https://any.run/malware-trends/trickbot">the&nbsp;any.run&nbsp;website and its malware trend tracker, the trojan was last seen on June 16th, 2021</a>. Last but not least, <a href="https://www.bleepingcomputer.com/news/security/ukraine-arrests-clop-ransomware-gang-members-seizes-servers/">some mid-tier members of the Cl0p gang may have been arrested</a> mid-June in Ukraine even though it seems no core actor behind Cl0p were apprehended.</p>
<p><strong>What could be the long-term consequences of these takedown for the cybercriminal activities?</strong></p>
<p>It’s still early to draw meaningful conclusions on the consequences for cybercriminal activities with the recent arrests. Yesterday, June 16th, at the Geneva summit, U.S. <a href="https://www.zdnet.com/article/biden-and-putin-spar-over-cybersecurity-ransomware-at-geneva-summit/"><strong>President Joe Biden met with Russian President Vladimir Putin</strong></a>. One of the hot topics of discussions was the <strong>ransomware attacks on U.S. entities from Russian soil</strong>. Biden warned Putin that United States would not tolerate any other cyber-attacks, especially on 16 critical sectors. The <a href="https://www.zdnet.com/article/ransomware-russia-told-to-tackle-cyber-criminals-operating-from-within-its-borders/"><strong>G7</strong></a> and the <a href="https://www.zdnet.com/article/nato-series-of-cyberattacks-could-be-seen-as-the-same-threat-as-an-armed-attack/"><strong>NATO</strong></a> also stated that in order not to consider cyber-attacks as armed attacks, Russia should try to identify and disrupt ransomware organizations within its borders.</p>
<p>Even with the arrests of criminal gang members and cybersecurity talks at the presidential levels, <strong>some experts say there would be no or little impact on ransomware groups that will still operate with impunity</strong>. The near future will give hints about the possible evolution of the cyber-attacks landscape. On one hand, the rising of a broader international collaboration against cyber-criminal gangs which could lead to less opportunistic and lucrative attacks. On the other hand, growing tensions between two blocks: U.S.-Europe and Russia-China with possible sanctions from either side and more cyber espionage, supply-chain or state-sponsored attacks.</p>
<p>&nbsp;</p>
<h1 style="text-align: center;"><strong>CERT-W: FROM THE FRONT LINE</strong></h1>
<h2 style="text-align: center;">The First Responder Word</h2>
<figure id="post-16221 media-16221" class="align-center">
<figure id="post-16228 media-16228" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16228" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/ng.jpg" alt="" width="936" height="638" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/ng.jpg 936w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/ng-280x191.jpg 280w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/ng-57x39.jpg 57w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/ng-768x523.jpg 768w" sizes="auto, (max-width: 936px) 100vw, 936px" /></figure>
</figure>
<h1></h1>
<p>&nbsp;</p>
<h1 style="text-align: center;"><strong>FOCUS TECH</strong></h1>
<h2 style="text-align: center;">Phishing</h2>
<p>Think like a cybercriminal and understand how a spear phishing campaign is built to avoid them!</p>
<p>The technical zoom of the month:</p>
<figure id="post-16215 media-16215" class="align-center"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-16215" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image.png" alt="" width="973" height="1849" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image.png 973w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image-101x191.png 101w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image-21x39.png 21w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image-768x1459.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/image-808x1536.png 808w" sizes="auto, (max-width: 973px) 100vw, 973px" /></figure>
<p>&nbsp;</p>
<p style="text-align: center;"><strong>To learn more about this:</strong></p>
<figure id="post-16217 media-16217" class="align-center"><a href="https://www.proofpoint.com/us/resources/threat-reports/state-of-phish-infographic"><img loading="lazy" decoding="async" class="aligncenter wp-image-16217" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/learn.png" alt="" width="235" height="197" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/learn.png 462w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/learn-227x191.png 227w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/learn-46x39.png 46w" sizes="auto, (max-width: 235px) 100vw, 235px" /></a></figure>
<p>&nbsp;</p>
<h1 style="text-align: center;"><strong>Reading Of The Month</strong></h1>
<p style="text-align: center;">We recommend the short report “APT trends report Q1 2021”, which reviews the highlight events and findings observed by the Global Research and Analysis Team at Kaspersky during the Q1 2021 around the world.</p>
<figure id="post-16219 media-16219" class="align-center"><a href="https://securelist.com/apt-trends-report-q1-2021/101967/"><img loading="lazy" decoding="async" class="aligncenter wp-image-16219" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/read.jpg" alt="" width="248" height="154" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/read.jpg 415w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/read-308x191.jpg 308w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/06/read-63x39.jpg 63w" sizes="auto, (max-width: 248px) 100vw, 248px" /></a></figure>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/06/newsletter-cert-w-june-2021/">Newsletter CERT-W, from the front line &#8211; June 2021</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
