Trends / en How Finance and Insurance Providers Can Respond To The Surge of Cyberattacks /resources/blog/february-2022/how-finance-and-insurance-providers-can-respond-surge-cyberattacks <span>How Finance and Insurance Providers Can Respond To The Surge of Cyberattacks</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Wed, 02/23/2022 - 11:41</span> <a href="/taxonomy/term/31" hreflang="en">Trends</a> <a href="/taxonomy/term/10" hreflang="en">ÇïżûÊÓƔɫ</a> <article><img src="/sites/default/files/2022-02/woman_at_computer_on_call.jpg" width="1079" height="488" alt="""" loading="lazy" typeof="foaf:Image" /></article><p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>Over the past two years working from home (WFH) has rapidly accelerated in many fields. Although the pandemic’s part in contributing to this shift is undeniable, much of this trend would be impossible without software developments supporting remote work. However, digital growth has increased the chances for cybercriminals to strike out and harm companies.</span></span></span></span></span></p> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>Smaller and mid-sized businesses </span></span><a href="https://appriver.com/blog/4-tips-to-protect-your-organization-from-ransomware" rel="nofollow"><span><span><span>are especially at risk</span></span></span></a><span lang="EN" xml:lang="EN" xml:lang="EN"><span> due to limited resources and budgets for cybersecurity. On the other hand, businesses that have had increased digital footprints have also given cyber insurance companies more information to assess risk profiles of policyholders. These data-driven insights help provide more accurate underwriting and ultimately protect the insured.</span></span></span></span></span></p> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>This article will discuss the ways WFH has altered the digital landscape and what, both financial and insurance, providers can do to respond to this increased growth.</span></span></span></span></span></p> <h2><span><span><span><span>Growing Digital Footprints</span></span></span></span></h2> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>As of 2020, </span></span><a href="https://www.statista.com/topics/2237/internet-usage-in-the-united-states/#topicHeader__wrapper" rel="nofollow"><span><span><span>over half of the world’s population</span></span></span></a><span lang="EN" xml:lang="EN" xml:lang="EN"><span> is connected to the Internet. In America, over 90% of Americans have access to the internet. These numbers stand in sharp contrast to 2007 (the year the first iPhone was released), when 47% of Americans had access to broadband Internet at home. Every year more and more people are coming online and signing up for the services and platforms that connect us in this digital age. Increasingly, our digital presence has become relied upon as a method for us to transact business and experience our lives.</span></span></span></span></span></p> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>More and more businesses require employees to leverage these types of digital systems, which is why we have seen a huge increase in vulnerabilities. The transition from an Internet of the wild west to a place where the vast majority of the world’s business takes place has been essential for WFH to become possible. Importantly, businesses should </span></span><a href="https://www.freshbooks.com/blog/rebuild-business-after-covid" rel="nofollow"><span><span><span>consider how to rebuild</span></span></span></a><span lang="EN" xml:lang="EN" xml:lang="EN"><span> after Covid.</span></span></span></span></span></p> <h2><span><span><span><span>Powered by the Cyberworld: Working From Home</span></span></span></span></h2> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>WFH, sometimes called remote work, or even more rarely, working from anywhere (WFA) has become key to how we do business today. The sudden shift to WFH dramatically altered the business landscape because overnight we suddenly found many workers, some of whom had never sent an email, were handed a laptop and told to sign up for Zoom.</span></span></span></span></span></p> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>Early in the pandemic Zoom went from </span></span><a href="https://www.cnbc.com/2021/07/15/heres-how-zoom-is-creating-the-new-world-of-hybrid-work-.html" rel="nofollow"><span><span><span>servicing 10 million people a day</span></span></span></a><span lang="EN" xml:lang="EN" xml:lang="EN"><span> to over 300 million. In short, the Internet got way bigger and way more crowded. Companies suddenly needed new services, like being able to encrypt your emails. This rush to cyberspace also created an open floodgate of information for cybercriminals to wade through.</span></span></span></span></span></p> <h2><span><span><span><span>Criminal Threats Online</span></span></span></span></h2> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>Cybercrime is nothing new, but the massive shift to remote work has made business data all that more vulnerable to hackers. Zoombombing, the practice of breaking into private Zoom meetings and disrupting them, although largely benign, underlines the importance of </span></span><a href="https://appriver.com/solutions/by-industry/information-technology" rel="nofollow"><span><span><span>securing your business’s online presence</span></span></span></a><span lang="EN" xml:lang="EN" xml:lang="EN"><span>.</span></span></span></span></span></p> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>Something important to keep in mind is the various types of groups that perpetrate these crimes, but also the angles from which they may attack businesses. This information is critical for financial and insurance providers because by understanding how cybercriminals behave you can determine how to better protect policy-holders.</span></span></span></span></span></p> <h3><span><span><span><span><span>Cybercrime Perpetrators</span></span></span></span></span></h3> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>Generally, there are three to four types of cybercriminals that can be identified based on their alignment. The first group would be government actors. These are hackers </span></span><a href="https://www.defense.gov/News/News-Stories/Article/Article/2618386/in-cyber-differentiating-between-state-actors-criminals-is-a-blur/" rel="nofollow"><span><span><span>employed by the government</span></span></span></a><span lang="EN" xml:lang="EN" xml:lang="EN"><span> of a nation and are frequently used to undermine the stability of other governments. Second, there are government-sponsored hackers. These groups are typically paid for by nations in order to separate themselves from the type of attack that is taking place. They attack all kinds of targets.</span></span></span></span></span></p> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>The third and fourth are hacking collectives and individual rogue hackers. Sometimes hacking collectives can be government-sponsored. Other times they act on their own. Frequently, these groups attack corporations of all sizes and harvest their data for sale on the dark web.</span></span></span></span></span></p> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>Consider how these groups might attack your clients and how your clients’ risk profile might change based on the groups that target them.</span></span></span></span></span></p> <h3><span><span><span><span><span>Crime Targets, Attack Vectors, and What They Mean for Financial and Insurance Providers</span></span></span></span></span></h3> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>What methods do these criminals use though? And what are their targets? Unfortunately, I cannot cover every single type of target and attack vector here, but I will cover the most common areas and discuss how these can impact your business.</span></span></span></span></span></p> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>To begin, many hackers target personal data -- at all levels. This means whether a business has 2 employees or 2,000, they are ripe for being attacked. Personal data does not just mean an employee’s data either, it means all the data that the business itself has collected.</span></span></span></span></span></p> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>For example, hospitals store all sorts of important data on patients, including their date of birth, social security number, address, and even vital records. Encrypting records is key to preventing these data breaches. Hospitals aren’t the only vulnerable industry, however, all business owners should consider some type of insurance to prevent loss when a data breach occurs.</span></span></span></span></span></p> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>Second, </span></span><a href="https://appriver.com/blog/emailed-bomb-threats-demanding-bitcoin" rel="nofollow"><span><span><span>a favorite target</span></span></span></a><span lang="EN" xml:lang="EN" xml:lang="EN"><span> of many hackers is cryptocurrencies and other financial assets. Today, more and more financial institutions sell cryptocurrency or invest in it themselves. Insurance providers may offer policies that cover the loss of cryptocurrency. There are many options </span></span><a href="https://cryptowallet.com/best-litecoin-ltc-wallets/" rel="nofollow"><span><span><span>for safely storing your crypto</span></span></span></a><span lang="EN" xml:lang="EN" xml:lang="EN"><span>, but it will definitely continue to be a major target along with all other types of assets.</span></span></span></span></span></p> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>When it comes to <em>how</em> attackers seek this information the most common methodology is phishing. Phishing involves posing as, or spoofing, a trustworthy identity. Once the hackers have gained your trust, through social engineering, they then send a file, link, or other pieces of malicious software to gobble up your information or take control over your system.</span></span></span></span></span></p> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>Email is one of the most common ways that phishing scams are employed, which is why it is so vital that your </span></span><a href="https://appriver.com/product/email-threat-protection" rel="nofollow"><span><span><span>email is secured</span></span></span></a><span lang="EN" xml:lang="EN" xml:lang="EN"><span> with the right software. Other times these scams can be employed on social media. A business may have employees on Facebook or TikTok, who subsequently, albeit unintentionally, expose their employer to threats.</span></span></span></span></span></p> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>Insurance companies should consider this in the underwriting process. Does the business you are insuring have a social media policy for employees? Does the business have </span></span><a href="https://www.policyme.com/blog/how-much-does-life-insurance-cost-in-canada" rel="nofollow"><span><span><span>other kinds of insurance policies</span></span></span></a><span lang="EN" xml:lang="EN" xml:lang="EN"><span> in place in the event of the worst happening? A training program to protect against phishing? These should be considerations in any process you undertake.</span></span></span></span></span></p> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>Brute force hacking is far less </span></span><a href="https://appriver.com/blog/avast-phishing-threatens-deadly-viruses" rel="nofollow"><span><span><span>common than phishing</span></span></span></a><span lang="EN" xml:lang="EN" xml:lang="EN"><span>, but it often requires more resources on the part of the hacker. Businesses and financial institutions can be particularly vulnerable to these types of intrusions because of corporate software that allows many employees to connect in the cloud. A hacker targeting the database of a large corporation could easily gain access to countless files.</span></span></span></span></span></p> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>These are just a handful of the areas that can potentially be impacted by cybercriminals, but they are the main areas to consider if you provide either financial or insurance products.</span></span></span></span></span></p> <h2><span><span><span><span>Big Opportunities for Financial and Insurance Providers</span></span></span></span></h2> <p><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>As you can see, the increase in cybercrime and expansion of cyber vulnerabilities are opportunities for both financial and insurance providers to tailor their services to their clients. By better understanding how working from home has expanded the marketplace for hackers, financial and insurance providers can both offer more complete coverage and better protect consumers.</span></span></span></span></span></p> <a href="/resources/blog/secure-modern-workplace" hreflang="en">Secure Modern Workplace</a> Wed, 23 Feb 2022 17:41:55 +0000 admin 520 at 10 IT Trends for 2022 that MSPs should know /resources/blog/february-2022/10-it-trends-2022-msps-should-know <span>10 IT Trends for 2022 that MSPs should know</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Thu, 02/10/2022 - 15:45</span> <a href="/taxonomy/term/31" hreflang="en">Trends</a> <a href="/taxonomy/term/10" hreflang="en">ÇïżûÊÓƔɫ</a> <article><img src="/sites/default/files/2022-02/shutterstock_2045737913.jpg" width="6640" height="4427" alt="laptop and smartphones with screens that read "2022 Trends"" loading="lazy" typeof="foaf:Image" /></article><p><span><span><span>For the last two years, uncertainty and unpredictability have reigned supreme in the IT world. The world of work was turned on its head by a global pandemic, and the message was clear: businesses that change too quickly to stay afloat would sink. </span></span></span></p> <p><span><span><span>But while many businesses have taken a reactive approach to IT changes, 2022 is ushering in a new era. It’s time to start planning again. Here are IT 10 trends <a href="https://connect.comptia.org/content/research/it-industry-trends-analysis" rel="nofollow"><span>CompTIA</span></a> predicts for 2022.</span></span></span></p> <h2><span><span><span><span>1 The definition of “workplace” will continue to change</span></span></span></span></h2> <p><span><span><span>If the pandemic taught us anything, it’s that work can happen anywhere—for better or worse. Working from home full-time has been a gift for some and a burden for others, and how employees want to move ahead is deeply personal for each person.</span></span></span></p> <p><span><span><span>It’s clear that companies will need to be flexible in how they accommodate their employees’ needs in the year ahead. Some employees may want to remain remote while others will want to hold onto a hybrid approach. </span></span></span></p> <p><span><span><span>Technologically speaking, being able to support remote work has encouraged most IT departments to reorganize their list of priorities, pushing them to formalize and legitimize band-aid solutions so that they can scale properly. For many organizations, this means a renewed commitment to digital transformation.</span></span></span></p> <h2><span><span><span><span>2 Travel for business will be more measured</span></span></span></span></h2> <p><span><span><span>For a long time and for many people, travel was part and parcel of working in the technology industry. When the pandemic ground things to a halt, however, businesses were forced to find new ways to connect. Video calls and virtual conferences became the norm, and rather than highlight why travel was so essential, changing things up actually proved that it was a lot less necessary than many had assumed.</span></span></span></p> <p><span><span><span>In 2022 and beyond, travel for work is going to look a lot different. Firstly, approved business travel will need to have a proven use case and ROI. Secondly, smaller regional conferences and hybrid/virtual conferences will be more common. Thirdly, more employees will be empowered to turn down travel requests, which is especially important now that younger generations of workers have cited virtual collaboration as sufficient for innovation, as well as concerns over climate change making them less enthusiastic about hopping on the next flight.</span></span></span></p> <h2><span><span><span><span>3 The never-ending quest for regulation continues</span></span></span></span></h2> <p><span><span><span>Regulation has long been a seemingly unsolvable puzzle in the tech industry, but the pressure to reduce monopolistic practices and protect consumer privacy has only increased in recent years. Creating laws around these issues hasn’t gotten any easier, though; antitrust concepts and business practices vary by country, and increased globalization makes it difficult to contain any one rule in a meaningful way.</span></span></span></p> <p><span><span><span>Going forward, the onus is shifting to tech companies rather than regulatory bodies. All tech companies will have to work to fully comprehend the unintended consequences of their output, and to try to build a framework that encourages responsible behavior. Tech firms need to help lawmakers understand the issues, examine their own operations, and practice transparency with their clients to address these concerns. </span></span></span></p> <h2><span><span><span><span>4 Technology budgets will grow—stealthily.</span></span></span></span></h2> <p><span><span><span>Over the last few years, CIOs have been expected to do more with less as IT budgets shrank. Today, though, businesses are moving away from the assumption that IT is a cost center that needs to be tightly controlled. </span></span></span></p> <p><span><span><span>Today, businesses are taking a more strategic point of view in how they approach their IT budgets, but this shift in perspective isn’t so obvious at first glance. Stealth IT, where business units procure their own technology, makes it hard to track overall technology budgets. </span></span></span></p> <p><span><span><span>Technology can also be an embedded component of business solutions, making it difficult to be explicitly defined. Take the example of a custom website built as part of a marketing campaign. The entire budget may be assigned to marketing, even though technology was built to meet the objective. </span></span></span></p> <p><span><span><span>Overall, even when tech spending grows, there may not be tech-specific line items to back it up in the books. Today’s technology opportunities are more than hardware installations and software licensing, and they’re more integrated into businesses’ long-term goals than ever.</span></span></span></p> <h2><span><span><span><span>5 Cybersecurity is getting more proactive</span></span></span></span></h2> <p><span><span><span>When it comes to cybersecurity, more has changed in the last five years than the decades that preceded them. For a long time, cybersecurity was planned out based on the idea that a firewall and antivirus software were enough to keep out the bad guys. However, the move to cloud services and mobile-first workforces has eroded the idea of the secure perimeter, and the idea of a defensive approach.</span></span></span></p> <p><span><span><span>Today’s security breaches can lay dormant and undetected within networks for a long time, and more businesses are becoming wise to the idea that a proactive approach is necessary to keep data and users truly safe. More organizations are starting to use their own resources or outside partners to probe systems and find any weak spots. </span></span></span></p> <p><span><span><span>Both offensive and defensive approaches are necessary to keep modern workplaces safe, which includes intentional strategy along with new investments in infrastructure.</span></span></span></p> <h2><span><span><span><span>6 Channel cybersecurity still has strides to make</span></span></span></span></h2> <p><span><span><span>CompTIA’s 2021 State of the Channel study, found that 36% of channel businesses are either only just beginning to formulate their cybersecurity strategies, are behind schedule, or not involved in cybersecurity at all. Of the 64% that are on target, only 28% of them consider cybersecurity a strategic specialty, meaning the majority do not offer more sophisticated tools and services beyond the basics of antivirus and firewall protection. </span></span></span></p> <p><span><span><span>While there are understandable risks and challenges that come with operating a successful cybersecurity practice, there’s really no excuse for not specializing in this space. Considering how much cyberattacks against MSPs have increased recently, these companies can’t afford to expose themselves and put their customers at risk. </span></span></span></p> <h2><span><span><span><span>7 More channel companies will take the consulting route</span></span></span></span></h2> <p><span><span><span>How customers buy technology has fundamentally changed. Product-centric, transactional business models no longer cut it for MSPs, and more channel providers have been moving to more of a consulting-based offering. The evidence is clear: helping customers run their businesses better with the right technology is a lucrative avenue that’s both profitable and in high demand. </span></span></span></p> <p><span><span><span>Consultants have the opportunity to play the role of expert for businesses that need that expertise. In 2022, more channel firms will realize that reselling products and services in a cloud marketplace era is fading—but there’s lots of opportunity to expand into the kind of consulting that’s so sorely needed.</span></span></span></p> <h2><span><span><span><span>8 Chip supply chain constraints will cause a wake-up call</span></span></span></span></h2> <p><span><span><span>Without a reliable supply chain, even the best-engineered product won’t get built or delivered on time. Today’s global semiconductor shortage has affected smartphone, PC, and other chip-dependent industries in the wake of COVID. </span></span></span></p> <p><span><span><span>For decades, just-in-time manufacturing has allowed suppliers and providers to stop stockpiling inventory and parts, and respond in as close to real-time as possible to demand. The chip shortage threw this method into question, however, with some now wondering if it might be wiser to keep inventory, parts, and components close to home, regardless of whether customer orders have been placed yet. </span></span></span></p> <p><span><span><span>Many channel firms will have a decision to make in 2022: do they want to start holding some inventory of their own in the event of backlogs?</span></span></span></p> <h2><span><span><span><span>9 Software development will get more granular</span></span></span></span></h2> <p><span><span><span>Software development used to be left to large companies who could afford the resources and infrastructure to participate. As the foundational computing platform has stabilized and technology has become democratized, however, more companies have started adding their own software development skills. </span></span></span></p> <p><span><span><span>Today’s companies have lowered the barrier to entry considerably by relying on open source and microservices. Cloud computing has also allowed companies to stand up multiple environments for development, testing, and production without needing capital investment. </span></span></span></p> <p><span><span><span>As capacity and capabilities have grown, however, skills supply has flagged. This has led to organizations trying to compensate by breaking applications down into bite-size pieces. These smaller functions can be refreshed more quickly and reused throughout a comprehensive software strategy. </span></span></span></p> <p><span><span><span>Whether this is an evolution of microservices or a new approach entirely, the trend of reusable pieces of software will simplify development but add challenges in integration and architecture management. To keep up, many companies will also accelerate their DevOps efforts, with more advanced companies exploring AIOps to further automate their established processes.</span></span></span></p> <h2><span><span><span><span>10 Data management will drive an analytics revolution</span></span></span></span></h2> <p><span><span><span>Today’s companies are aggressively pursuing analytics as a strategy in order to understand past transactions, improve operations, and predict future opportunities. But while data science is one of the fastest-growing roles, for most organizations managing data in-house is still a very early endeavor. </span></span></span></p> <p><span><span><span>In fact, many companies are struggling to build a structured foundation of corporate data, and will have to start with the basics. This requires an understanding of where data lives and how it is used, as well as a classification of all data to define requirements around usage and security. It also requires a strategy for data to outline goals and identify trade offs.</span></span></span></p> <p><span><span><span>Only organizations that have updated their storage schemes, or ensured that they are getting the most out of traditional tools like relational databases, will be ready to move on to tools that work with unstructured data, algorithms that leverage machine learning, or models that rely on real-time data streams.</span></span></span></p> <h2><span><span><span><span>Read the full report</span></span></span></span></h2> <p><span><span><span><a rel="nofollow">If you want to get more in-depth on CompTIA’s predictions for 2022, you can read the<u><span> full</span></u> <span>CompTIA IT Industry Outlook 2022 </span></a><a href="https://connect.comptia.org/content/research/it-industry-trends-analysis" rel="nofollow"><u><span>here.</span></u></a></span></span></span></p> <a href="/resources/blog/future-of-msp" hreflang="en">The Future of MSP</a> Thu, 10 Feb 2022 21:45:33 +0000 admin 517 at IP Spoofing Attacks: What are they and how can you prevent them? /resources/blog/IP-spoofing-attacks <span>IP Spoofing Attacks: What are they and how can you prevent them?</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Fri, 12/17/2021 - 15:45</span> <a href="/taxonomy/term/31" hreflang="en">Trends</a> <a href="/taxonomy/term/10" hreflang="en">ÇïżûÊÓƔɫ</a> <article><img src="/sites/default/files/2022-01/IP%20Spoofing%202.png" width="2240" height="1260" alt="IP spoofing attacks 101 IP animation representation" loading="lazy" typeof="foaf:Image" /></article><p><span><span><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>There are dozens of techniques hackers can use to try to infiltrate your company's sensitive data, though some are more sophisticated than others. IP spoofing attacks are used by bad threat actors to “get a foot-in-the-door" of your network. They’re growing in popularity and frequency, and have the potential to wreak havoc on your organization if gone unnoticed. In this article, we will dive deeper into what IP spoofing is, how it’s commonly used, and what you can do to protect your organization for these types of attacks.</span></span></span></span></span></span></span></p> <h3><span><span><span><span><span><strong><span lang="EN" xml:lang="EN" xml:lang="EN"><span>What Are IP Spoofing Attacks?</span></span></strong></span></span></span></span></span></h3> <p><span><span><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>When</span></span><u><span><a href="/products/secure-file-share" rel="nofollow"> </a></span></u><span><u><span lang="EN" xml:lang="EN" xml:lang="EN"><span><u><span><a href="/products/secure-file-share" rel="nofollow">data is transferred</a></span></u></span></span></u></span><span lang="EN" xml:lang="EN" xml:lang="EN"><span> over the internet, it gets broken up into packets before being reassembled upon arrival.  Each and every packet comes with source information, including the IP address of the sender and receiver. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>IP spoofing is an entry point for attackers, used to bypass systems that are set up on a model of trust, or used to enter networks that aren’t secured with the right systems. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>When attackers use IP spoofing, they impersonate a legitimate entity by changing their IP (Internet Protocol) source information to make the receiving computer system believe the data is coming from a trusted source. In systems that are configured to work between a set of trusted networked devices, IP spoofing can be used to circumvent the IP authentication process by appearing as a trusted entity on the network... getting past the moat and into the castle.</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>IP spoofing can be used to carry out “Man-in-the-Middle" (MitM) or “denial-of-service" (DoS) attacks. These methods allow hackers to obtain sensitive data, such as credit card information or social security numbers by interfering with communication between other networked computers. In the case of DoS, the hacker leverages devices they’ve compromised, i.e. “zombie” devices to carry out the attack. Often, hackers will even have a large network of these compromised devices, that they will use to </span></span><a href="/resources/blog/november-2021/record-setting-ddos-attack-highlights-malicious-actors-strategic" rel="nofollow"><span><span>flood or completely shut down websites and servers</span></span></a><span lang="EN" xml:lang="EN" xml:lang="EN"><span>, and the IP source information is falsified to create confusion and prevent mitigation. This is similar to someone sending a dangerous item in the mail, but placing a false return address on the package (or even putting the recipient address on the package as the return address). This method makes it difficult for businesses to trace the source of the attack. </span></span></span></span></span></span></span></p> <h3><span><span><span><span><span><span><span><strong><span lang="EN" xml:lang="EN" xml:lang="EN"><span><span>How Can My Organization Prevent IP Spoofing?</span></span></span></strong></span></span></span></span></span></span></span></h3> <p><span><span><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>Although there are many things to worry about in the world of cyber security, there are also many ways to keep yourself and your organization safe from attacks like these. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>Your users will be highly unlikely to detect IP spoofing, that’s why it’s important to ensure the organization’s IT security measures are up-to-date and configured properly. Some recommendations are to enable multi-factor-authentication (MFA) for your employees to access critical data in your network. Validating devices inside the organization with MFA is a strong option to provide an extra protection layer. It’s also recommended to place your network behind a firewall, and to implement additional security measures beyond IP authentication alone. Perhaps it’s time to implement packet-filtering for incoming traffic (ingress filtering), and external network traffic (egress filtering) to bulk up your IP authentication process, for example. Members of your web development team can also ensure they’re using the most up-to-date internet protocol, as old versions are more vulnerable to attacks.</span></span></span></span></span></span></span></p> <h3><span><span><span><span><span><span><span><strong><span lang="EN" xml:lang="EN" xml:lang="EN"><span><span>How Can My Organization Recover From an Attack?</span></span></span></strong></span></span></span></span></span></span></span></h3> <p><span><span><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>If your organization has been the victim of attacks carried out after IP spoofing, you know how jarring it is to discover that your network has been infiltrated. If you notice a device (or multiple devices) in your organization has been infiltrated, the first step is to disconnect it from the network as soon as possible. This can prevent the spread of the attack and give you a chance to perform data backups if they aren't done</span></span><a href="/products/backup-recovery" rel="nofollow"> </a><a href="/products/backup-recovery" rel="nofollow"><span><span>automatically in the cloud</span></span></a><span lang="EN" xml:lang="EN" xml:lang="EN"><span>. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>Next, affected users should change their login credentials and avoid using the same password for multiple accounts. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>At this stage, you should have your cybersecurity team scan your system for viruses or malware, or reach out to a professional local IT security team (such as a Managed Service Provider in your area) that can help you with the process.</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>Finally, run an audit and see where the vulnerabilities were that allowed a hacker to gain access to your network or data. Once you know how the attacker got in, you can change your cybersecurity policies and procedures to prevent attacks like this from happening ever again, and begin implementing some of the recommendations we provided above.</span></span></span></span></span></span></span></p> <h2> </h2> <h4><span><span><span><span><span><span><strong><span lang="EN" xml:lang="EN" xml:lang="EN"><span><span>Connect With A ÇïżûÊÓƔɫ Partner Today to Help Prevent Cybersecurity Attacks</span></span></span></strong></span></span></span></span></span></span></h4> <p><span><span><span><span><span><span><span lang="EN" xml:lang="EN" xml:lang="EN"><span>ÇïżûÊÓƔɫ is partnered with thousands of Managed Service Providers who can help you get to the root of your most common security vulnerabilities and offer their top choices for the tools you need to properly patch up any gaps. You can connect with </span></span><a href="/partners/find-a-partner" rel="nofollow"><span><span>a local IT partner in our network</span></span></a><span lang="EN" xml:lang="EN" xml:lang="EN"><span> to help with network security.</span></span><a href="/request-demo" rel="nofollow"> </a></span></span></span></span></span></span></p> <a href="/resources/blog/secure-modern-workplace" hreflang="en">Secure Modern Workplace</a> Fri, 17 Dec 2021 21:45:22 +0000 admin 503 at 3 Recent Attacks Where Phishers Abused Google’s Services /resources/blog/november-2021/3-recent-attacks-where-phishers-abused-googles-services <span>3 Recent Attacks Where Phishers Abused Google’s Services</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Wed, 11/03/2021 - 15:14</span> <a href="/taxonomy/term/31" hreflang="en">Trends</a> <a href="/taxonomy/term/5" hreflang="en">David Bisson</a> <article><img src="/sites/default/files/2021-11/google_tablet_keyboard.jpg" width="1400" height="700" alt="""" loading="lazy" typeof="foaf:Image" /></article><p><span><span>In a <a href="/resources/blog/september-2021/7-attacks-where-phishers-abused-legitimate-microsoft-services" rel="nofollow">recent blog post</a>, I discussed seven instances in which digital attackers abused Microsoft to launch phishing campaigns in recent years. The reality is that Microsoft is just one of the many companies targeted by phishers. Email attackers misuse the services of others, too. </span></span></p> <h2><span><span><span><span><span>Take Google as an Example</span></span></span></span></span></h2> <p><span><span>Attackers have a history of abusing Google’s services. Back in May 2020, for instance, <a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/phishing-in-a-bucket-utilizing-google-firebase-storage/" rel="nofollow">Trustwave SpiderLabs</a> detected multiple phishing attempts abusing Google Firebase, a mobile and web application development platform which provides secure uploads and downloads for supported apps. Some of those attack attempts used the pandemic and Internet banking as lures to trick victims into clicking on a fake vendor payment form that redirected them to a phishing page hosted on Firebase Storage. Others used an Office 365 phishing lure to redirect victims to an Office 365 phishing page hosted on Firebase.</span></span></p> <p><span><span>Several months after that, <a href="https://threatpost.com/google-forms-abused-to-phish-att-credentials/160957/" rel="nofollow">Threatpost</a> reported on a campaign in which digital attackers used Google Forms to create phishing landing pages masquerading as the login pages for more than 25 different entities. Security researchers detected a total of more than 250 different pages created using Google Forms as part of the campaign. More than 70% of those fake login pages impersonated AT&T, while the others claimed to belong to various financial organizations, collaboration apps, and government agencies.</span></span></p> <p><span><span>It was about a month later when <a href="/resources/blog/december-2020/attackers-sending-out-phishing-emails-universities-official-edu" rel="nofollow">ÇïżûÊÓƔɫ | AppRiver</a> detected an email that came from someone named “Diana.” Using the subject line “Re-validation,” the message claimed to be official correspondence from Microsoft Exchange requiring recipients to upgrade to the “latest e-mail Outlook Web Apps 2020.” The email contained an “UPGRADE” link that, when clicked, redirected victims to a file hosted via Google Docs and disguised as an OWA login portal. </span></span></p> <h2><span><span><span><span><span>Google’s Upcoming 2SV Auto-Enroll Drive</span></span></span></span></span></h2> <p><span><span>In response to the attacks discussed above, among others, Google is taking steps to protect its users. One of its most recent initiatives involves an effort to auto-enroll 150 million users accounts into its two-step verification (2SV) feature. As part of that drive, the tech giant announced its intention to require two million YouTube creators to turn on the feature, as well.</span></span></p> <p><span><span>“We also recognize that today’s 2SV options aren’t suitable for everyone, so we are working on technologies that provide a convenient, secure authentication experience and reduce the reliance on passwords in the long-term,” Google explained in a <a href="https://blog.google/technology/safety-security/making-sign-safer-and-more-convenient/" rel="nofollow">blog post</a>. “Right now we are auto-enrolling Google accounts that have the proper backup mechanisms in place to make a seamless transition to 2SV. To make sure your account has the right settings in place, take our quick <a href="https://myaccount.google.com/security-checkup/3" rel="nofollow">Security Checkup</a>.”</span></span></p> <h2><span><span><span><span><span>How to Defend Against Email Attacks Abusing Google</span></span></span></span></span></h2> <p><span><span>Organizations can take several steps to defend themselves against email attacks abusing the services of Google and other tech providers. First, they can use security awareness training to educate their users about new email attacks. They can also highlight the point that Google intends to “auto-enroll” users into its 2SV feature, which means they won’t have to do anything on their end. As such, organizations can educate employees to be wary of emails that disguise themselves as Google informing recipients that they need to activate 2FA on their accounts.</span></span></p> <p><span><span>That’s not all organizations can do. They can also emphasize the importance of users logging into their web accounts by visiting a website directly, suggest that employees proactively enroll in 2FA schemes on whichever accounts they can, and avoid clicking on links embedded in emails. Finally, they can use a <a href="/products/email-threat-protection" rel="nofollow">security solution to scan incoming emails on multiple layers</a>. </span></span></p> <a href="/resources/blog/secure-modern-workplace" hreflang="en">Secure Modern Workplace</a> Wed, 03 Nov 2021 20:14:58 +0000 admin 484 at Understanding Digital Attackers’ Appropriation of the “As a Service” Model /resources/blog/october-2021/understanding-digital-attackers-appropriation-service-model <span>Understanding Digital Attackers’ Appropriation of the “As a Service” Model </span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Fri, 10/22/2021 - 13:00</span> <a href="/taxonomy/term/31" hreflang="en">Trends</a> <a href="/taxonomy/term/5" hreflang="en">David Bisson</a> <article><img src="/sites/default/files/2021-10/thumb_white.jpg" width="1400" height="700" alt="""" loading="lazy" typeof="foaf:Image" /></article><p><span><span>Recently, I wrote about Microsoft’s discovery of a new phishing-as-a-service (PhaaS) offering called “<a href="/resources/blog/october-2021/bulletprooflink-phishing-service-came-100-built-templates" rel="nofollow">BulletProofLink</a>.” PhaaS functions similarly to <a href="/resources/blog/july-2021/raas-what-it-and-why-it-making-ransomware-more-prevalent" rel="nofollow">Ransomware-as-a-Service</a> (RaaS), the tech giant explained, in that it follows the Software-as-a-Service (SaaS) model. Someone needs to develop infrastructure that buyers can use to stage their own attacks. In the case of PhaaS attacks, malicious actors pay for hosted phishing links and pages so that they can receive the stolen credentials later. That stands in contrast to RaaS operations where attackers gain direct access to compromised devices.</span></span></p> <h2><span><span><span><span><span>Why Digital Crime Is Turning to SaaS</span></span></span></span></span></h2> <p><span><span>According to <a href="https://www.ibm.com/cloud/blog/top-5-advantages-of-software-as-a-service" rel="nofollow">IBM</a>, the SaaS model brings several benefits to customers—even those that have nefarious ends in mind. Those advantages are as follows:</span></span></p> <ul><li><span><span><strong>Reduced time to benefit</strong>: It’s not the customer’s responsibility to install and configure the software on their own. All they need to do is provision the server for an instance in the cloud. This saves customers time that they would otherwise need to spend on deploying the software. That also goes for attackers, who can just start using the software to ensure a higher success rate of their attacks.</span></span></li> <li><span><span><strong>Lower costs</strong>: Software sits within a shared or multi-tenant environment, which brings down the associated software and hardware costs as well as the maintenance fees. These savings trickle down to the customer. If criminals can just rent out access to ransomware or a phishing service, they can save more of their funds for conducting attacks. </span></span></li> <li><span><span><strong>Scalability and integration</strong>: Customers don’t need to buy additional servers or software to scale their solutions. All they need to do is enable a new SaaS offering that’s owned by the provider as their needs evolve. It’s therefore easy for attackers to scale up their malicious activity without consuming more of their monetary resources.</span></span></li> <li><span><span><strong>New releases (upgrades)</strong>: The SaaS provider is responsible for upgrading their solution, at which point a new version becomes available to their customers. It’s not the responsibility of the customers to purchase upgrade packages and/or support services so that they can install it. As such, attackers get the best and brightest features that they can use to evade organizations’ defenses. </span></span></li> <li><span><span><strong>Easy to use and perform proof-of-concepts</strong>: SaaS offerings give customers the option of testing new functionality or release features in advance. They can also have one instance with different versions. These possibilities allow attackers to customize their efforts, making it possible for even those with limited technical experience to launch their own attack campaigns.</span></span></li> </ul><p><span><span>These benefits help to explain why attackers are embracing Cybercrime-as-a-Service offerings like RaaS and PhaaS operations. There’s also Malware-as-a-Service (MaaS) where attackers gain access to malware strains on a pay-as-you-go basis. In late September, for instance, <a href="https://www.forbes.com/sites/leemathews/2021/09/28/new-malware-as-a-service-targets-gamers-accounts-and-banking-info/?sh=6bbb2e2174ed" rel="nofollow">Forbes</a> reported that Russian-speaking underground hacking forums were offering a new MaaS operation at $10 per month or $40 for a lifetime subscription. The threat is specifically designed to harvest user data and session information from major PC gaming platforms so that they can sell in-game loot on the dark web. </span></span></p> <p><span><span>Then there’s Fraud-as-a-Service (FaaS). These types of offerings can take on various forms. As an example, <a href="https://www.welivesecurity.com/2021/08/11/iiserpent-malware-driven-seo-fraud-service/" rel="nofollow">WeLiveSecurity</a> discovered a malware-driven FaaS platform called “IISerpent” in August 2021. The threat leveraged SEO fraud techniques on compromised IIS servers to augment the page ranking for third-party websites by preying on a compromised site’s ranking. </span></span></p> <h2><span><span><span><span><span>Defending Against Crimeware as a Service</span></span></span></span></span></h2> <p><span><span>The types of offerings discussed above highlight the need for organizations to defend themselves using multiple layers of protection. That principle applies across all levels of an organization’s infrastructure including their email. <a href="/products/email-threat-protection" rel="nofollow">Learn how ÇïżûÊÓƔɫ | AppRiver can help</a>.</span></span></p> <a href="/resources/blog/secure-modern-workplace" hreflang="en">Secure Modern Workplace</a> Fri, 22 Oct 2021 18:00:46 +0000 admin 477 at Bill Would Require Victims to Disclose Ransomware Payments in 48 Hours /resources/blog/october-2021/bill-would-require-victims-disclose-ransomware-payments-48-hours <span>Bill Would Require Victims to Disclose Ransomware Payments in 48 Hours</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Fri, 10/15/2021 - 11:16</span> <a href="/taxonomy/term/31" hreflang="en">Trends</a> <a href="/taxonomy/term/5" hreflang="en">David Bisson</a> <article><img src="/sites/default/files/2021-10/office_book_and_scales.jpg" width="1400" height="700" alt="""" loading="lazy" typeof="foaf:Image" /></article><p><span><span>A proposed bill would require victims of ransomware to disclose that they had paid a ransom within a 48-hour window.</span></span></p> <h2><span><span><span><span><span>Inside the Details of the Bill</span></span></span></span></span></h2> <p><span><span>On October 5, 2021, United States Senator Elizabeth Warren (D-Mass.) announced that she and Representative Deborah Ross (D-N.C.) had introduced the Ransom Disclosure Act.</span></span></p> <p><span><span>“Ransomware attacks are skyrocketing, yet we lack critical data to go after cybercriminals,” <strong>Senator Warren said, as quoted in a </strong><a href="https://www.warren.senate.gov/newsroom/press-releases/warren-and-ross-introduce-bill-to-require-disclosures-of-ransomware-payments" rel="nofollow">press release</a><strong>.</strong> “My bill with Congresswoman Ross would set disclosure requirements when ransoms are paid and allow us to learn how much money cybercriminals are siphoning from American entities to finance criminal enterprises -- and help us go after them.”</span></span></p> <p><span><span>The <a href="https://www.warren.senate.gov/download/dun21766" rel="nofollow">bill itself</a> consists of four main provisions. These are as follows:</span></span></p> <ol><li><span><span>Ransomware victims (not including individuals) would need to disclose information about ransom payments within 48 hours after having fulfilled those demands. Such information would need to include the amount of the ransom demanded by the attackers, the date when they paid the ransom, the type of currency they used to pay the ransom, whether the victim was receiving funding from the federal government at the time of payment, and any details they might know about the entity that demanded the ransom.</span></span></li> <li><span><span>The U.S. Department of Homeland Security (DHS) would create a website through which individuals could voluntarily report the payment of ransom demands.</span></span></li> <li><span><span>DHS would make ransom payment information reported in the previous year available to the public. Before doing so, it would remove any information that someone could use to identify the reporting victims.</span></span></li> <li><span><span>The DHS Secretary would review the ransom payment information and use it to analyze ransomware attacks for commonalities such as the extent to which cryptocurrency helped to facilitate payment in the disclosed attacks. They would then submit a report proposing recommendations on how the U.S. government could help to protect information systems and strengthen the nation’s cybersecurity.</span></span></li> </ol><h2><span><span><span><span><span>Other Counter-Ransomware Efforts at the Federal Level</span></span></span></span></span></h2> <p><span><span>The Ransom Disclosure Act isn’t the first counter-ransomware effort announced by federal officials in recent weeks. On September 21, for instance, the Office of Foreign Assets Control (OFAC) at the U.S. Department of the Treasury <a href="/resources/blog/october-2021/cryptocurrency-exchange-suex-sanctioned-us-treasury-department" rel="nofollow">designated cryptocurrency exchange SUEX</a> for its role in helping to facilitate ransomware payments. That same day, OFAC updated its advisory on the sanctions risks that come with paying ransomware attackers. The new version discouraged organizations and users from giving into ransomware actors’ demands, and it urged them to contact law enforcement in the event they suffered an infection.</span></span></p> <p><span><span>Less than two weeks later, the Biden Administration revealed that it was planning to convene a meeting of 30 countries at the White House to cooperate on addressing the ransomware threat. The Administration said that the resulting alliance would specifically work “to accelerate our cooperation in combatting cybercrime, improving law enforcement collaboration, stemming the illicit use of cryptocurrency, and engaging on these issues diplomatically,” as quoted by <a href="https://www.cnn.com/2021/10/01/politics/blinken-cybersecurity-alliance/index.html" rel="nofollow">CNN</a> at the time of the announcement.</span></span></p> <h2><span><span><span><span><span>Defending Against Ransomware</span></span></span></span></span></h2> <p><span><span>It’s unclear what impact the Ransom Disclosure Act could have on compliant ransomware victims if passed. As pointed out by <a href="https://www.bleepingcomputer.com/news/legal/ransom-disclosure-act-would-give-victims-48-hours-to-report-payments/" rel="nofollow">Bleeping Computer</a>, for example, many believe that efforts at forcing victims to disclose ransom payments “would merely result in making ransomware attack repercussions more severe.”  Acknowledging that viewpoint, it’s important for organizations to focus on preventing a ransomware infection from occurring in the first place. They can do that by investing in an email security solution that uses multiple layers of analysis to scan incoming messages for indicators of ransomware and other digital threats. </span></span></p> <p><span><span><span>Step up your organization’s anti-ransomware efforts with ÇïżûÊÓƔɫ | AppRiver. We offer <a href="/products/email-threat-protection" rel="nofollow">Email Threat Protection</a> to prevent infiltration through email, one of the top ransomware threat vectors.  It’s also a good time to get proactive with your resilience strategy by implementing <a href="/products/backup-recovery" rel="nofollow">Cloud-to-Cloud Backup</a> – so you have access to a clean copy of your data and point-in-time recovery capability in the event of a ransomware attack.  </span></span></span></p> <a href="/resources/blog/secure-modern-workplace" hreflang="en">Secure Modern Workplace</a> Fri, 15 Oct 2021 16:16:42 +0000 admin 474 at Cryptocurrency Exchange SUEX Sanctioned by U.S. Treasury Department for Facilitating Ransomware Transactions /resources/blog/october-2021/cryptocurrency-exchange-suex-sanctioned-us-treasury-department <span>Cryptocurrency Exchange SUEX Sanctioned by U.S. Treasury Department for Facilitating Ransomware Transactions </span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Mon, 10/04/2021 - 16:39</span> <a href="/taxonomy/term/31" hreflang="en">Trends</a> <a href="/taxonomy/term/5" hreflang="en">David Bisson</a> <article><img src="/sites/default/files/2021-10/bitcoin_thumb_2.jpg" width="1400" height="700" alt="""" loading="lazy" typeof="foaf:Image" /></article><p><span><span>The U.S. Department of the Treasury announced that it has sanctioned a cryptocurrency exchange for helping to facilitate the financial transactions of ransomware actors.</span></span></p> <h2><span><span><span><span><span>Understanding the Decision to Sanction</span></span></span></span></span></h2> <p><span><span>On September 21, the Treasury Department’s Office of Foreign Assets Control’s (OFAC) designated virtual currency exchange SUEX under malicious cyber actor sanctions program for its involvement in ransomware activities.</span></span></p> <p><span><span>“SUEX has facilitated transactions involving illicit proceeds from at least eight ransomware variants,” OFAC explained in a <a href="https://home.treasury.gov/news/press-releases/jy0364" rel="nofollow">press release</a>. “Analysis of known SUEX transactions shows that over 40% of SUEX’s known transaction history is associated with illicit actors.”</span></span></p> <p><span><span>By designating SUEX, OFAC blocked all the platform’s property and interests in property subject to U.S. jurisdiction. It also prohibited U.S. individuals from engaging in business with the target, blocked entities owned 50% or more by the target, and exposed persons and/or entities that engage in certain transactions with the cryptocurrency exchange to the threat of sanctions.</span></span></p> <p><span><span>OFAC did not implicate a specific <a href="/resources/blog/july-2021/raas-what-it-and-why-it-making-ransomware-more-prevalent" rel="nofollow">Ransomware-as-a-Service</a> (RaaS) operation or another ransomware variant in its designation, which it made pursuant to <a href="https://www.federalregister.gov/documents/2015/04/02/2015-07788/blocking-the-property-of-certain-persons-engaging-in-significant-malicious-cyber-enabled-activities#h-1" rel="nofollow">Executive Order 13694</a>.</span></span></p> <h2><span><span><span><span><span>The First-of-Its-Kind Designation</span></span></span></span></span></h2> <p><span><span>In its press release, OFAC explained that its decision involving SUEX was its first sanctions designation against a cryptocurrency exchange.</span></span></p> <p><span><span>That’s not to say SUEX is the only virtual currency exchange that have contributed to the profitability of ransomware attacks. Indeed, ransomware actors commonly abuse those platforms to maintain their anonymity while they collect ransom payments from their victims.</span></span></p> <p><span><span>The case of SUEX is unique, however, in that the cryptocurrency exchange “facilitate[d] illicit activities for their own illicit gains,” per OFAC’s own words.</span></span></p> <h2><span><span><span><span><span>Ongoing Sanctions Risks for Facilitating Ransomware Payments </span></span></span></span></span></h2> <p><span><span>On the same day that it designated SUEX, OFAC released an <a href="https://home.treasury.gov/system/files/126/ofac_ransomware_advisory.pdf" rel="nofollow">updated version of its advisory</a> on the sanctions risks surrounding activities that help to facilitate ransomware payments.</span></span></p> <p><span><span>The advisory discouraged organizations and users from giving into ransomware actors’ demands, and it urged them to contact law enforcement if they ended up suffering an infection.</span></span></p> <p><span><span>That’s the last thing attackers want their victims to do. The Ragnar Locker gang went so far as to threaten to publish their victims’ data online if they contacted the FBI or the police, wrote <a href="https://www.bleepingcomputer.com/news/security/ransomware-gang-threatens-to-leak-data-if-victim-contacts-fbi-police/" rel="nofollow">Bleeping Computer</a>. About a <a href="https://www.bleepingcomputer.com/news/security/ransomware-gang-threatens-to-wipe-decryption-key-if-negotiator-hired/" rel="nofollow">week later</a>, the computer self-help website reported that the Grief ransomware gang had begun threatening to delete victims’ decryption keys if they hired a negotiation firm to help them recover their encrypted files.</span></span></p> <p><span><span>The fear is that ransomware groups will end up the target of law enforcement. If that happens, attackers may find themselves in a similar fate as the <a href="/resources/blog/may-2021/colonial-pipeline-disrupted-now-defunct-darkside-operation" rel="nofollow">one that befell the DarkSide ransomware gang following the Colonial Pipeline attack</a>. Worse, they could end up getting arrested—a position that makes it difficult to <a href="/resources/blog/september-2021/why-ransomware-groups-are-rebranding-their-operations" rel="nofollow">rebrand operations</a> under a different name to evade sanctions. (Arrests don’t mean the end of operations, however. Take <a href="https://www.bleepingcomputer.com/news/security/clop-ransomware-is-back-in-business-after-recent-arrests/" rel="nofollow">Clop</a> as an example.)</span></span></p> <h2><span><span><span><span><span>Defending Against Ransomware Attacks</span></span></span></span></span></h2> <p><span><span>OFAC’s updated advisory came with recommendations for how organizations can defend themselves against ransomware.</span></span></p> <p><span><span>One of those suggestions is to implement a risk-based compliance program for the purpose of mitigating an organization’s exposure to sanctions-related violations.</span></span></p> <p><span><span>Organizations can also look to augment their email security posture. They can do this by investing in an email security solution that’s capable of scanning incoming messages for campaign patterns, malware signatures, IP addresses, and other known threat indicators associated with ransomware attacks. This tool should perform that analysis in real time, thus allowing legitimate correspondence to reach its intended destination.</span></span></p> <p><span><span><a href="/amplify/smb/" rel="nofollow">Learn how to use a multi-layered email security approach to protect your email and ensure continuity in the event of a ransomware attack.</a>.</span></span></p> <a href="/resources/blog/secure-modern-workplace" hreflang="en">Secure Modern Workplace</a> Mon, 04 Oct 2021 21:39:56 +0000 admin 461 at NFTs – How Safe Are They? /resources/blog/july-2021/nfts-how-safe-are-they <span>NFTs – How Safe Are They?</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Tue, 07/27/2021 - 22:58</span> <a href="/taxonomy/term/31" hreflang="en">Trends</a> <a href="/taxonomy/term/58" hreflang="en">David Pickett</a> <article><img src="/sites/default/files/2021-07/NFT_thumbnail_0.jpg" width="1400" height="637" alt="Phone with NFT marketplace screen showing" loading="lazy" typeof="foaf:Image" /></article><p><span><span><span>Just this March, Christie’s Auction House sold a non-fungible token (NFT) based art for more than $69 thousand dollars. Since then, NFTs continue to capture the attention of consumers, celebrities, and businesses around the world, but the security risks associated are very real. </span></span></span></p> <p><span><span><span>While discovering new and inventive ways to exchange currency is par for the course in the digital age we live in, being aware of the security risks and taking actions to mitigate those risks will be imperative both in the short and long term.</span></span></span></p> <p><span><span><span><strong>What are NFTs?</strong></span></span></span></p> <p><span><span><span>NFTs are pieces of digital content that are stored on a blockchain, which is the same foundation for other cryptocurrencies, such as Bitcoin or Ethereum. What sets NFTs apart from other cryptocurrencies like Bitcoin and Ethereum is that each token is completely unique, so, unlike its predecessors, they cannot be traded or replicated.</span></span></span></p> <p><span><span><span><strong>How safe are NFTs?</strong></span></span></span></p> <p><span><span><span>NFTs are a burgeoning industry with a lack of regulations and oversight by design as it is blockchain-based, like cryptocurrencies. As such, the security implications will exponentially increase as user adoption grows with new attack vectors continuously discovered. It’s no secret threat actors are motivated opportunists who will attempt to pilfer any asset, physical or digital, that holds value. There have been many high-profile wallet storage attacks in the cryptocurrency industry over the years. Likewise, NFT wallets are an unregulated industry with private companies utilizing varying degrees of cybersecurity defense techniques to prevent attacks. So in short – they aren’t very secure. </span></span></span></p> <p><span><span><span>Also in March, attackers compromised multiple Nifty Gateway NFT user accounts and were able to transfer the previously purchased NFTs from their account and purchase new ones to transfer with their payment cards on file. While the users’ cash was recovered, the NFTs were lost to the attackers who promptly sold them to another NFT purchaser located on a different platform since the platform itself, like Nifty Gateway, holds the private keys associated with the NFT and they weren’t recoverable after being transferred.</span></span></span></p> <p><span><span><span><strong>How can you stay safe when handling NFTs?</strong></span></span></span></p> <p><span><span><span>The most important things users can do to protect their NFTs are simple but important actions to take on all online accounts, which include:</span></span></span></p> <ul><li><span><span><span><strong>Multi-factor authentication (MFA)</strong>: While it’s not a failsafe, this simple step makes it exponentially more difficult for threat actors to gain access to your account. By connecting your logins with a phone number or an alternate email account, you can get a notification if someone is attempting to access your account.</span></span></span></li> <li><span><span><span><strong>Password hygiene</strong>: his may seem like another no-brainer, but both consumers and businesses have trouble taking necessary steps to ensure the safety of the passwords themselves. To have good password hygiene, you must use (1) lower and uppercase, (2) numbers, (3) special characters and (4) different and unique passwords for every account. While it takes more effort to remember all the different passwords you use on which sites, there are tools out there that can securely store your passwords, like Keeper or LastPass.</span></span></span></li> <li><span><span><span><strong>Secure Storage</strong>: For both users and companies, when applicable and done properly, cold storage of digital assets (meaning not stored in an online environment) offers the best security from Internet-connected thieves. But even then, cold storage solutions, whether it be hardware, paper or desktop wallets, still must be physically secured to protect against loss, damage or theft.</span></span></span></li> </ul><p><span><span><span>Because the NFT industry has a lack of regulations and oversight, it’s no secret among threat actors that there are legal loopholes that exist in the industry, which will allow some to operate with impunity in certain scenarios. If you are a current owner of NFTs or are thinking about buying, the best way to proceed is to educate yourself on the vulnerabilities and take the above steps to secure your environment. </span></span></span></p> <p><span><span><span><a rel="nofollow">For more information on how ÇïżûÊÓƔɫ can protect your financial data including NFTs, check out our </a><a href="/solutions/industry/financial-services" rel="nofollow">Financial Services page</a>. </span></span></span></p> <a href="/resources/blog/secure-modern-workplace" hreflang="en">Secure Modern Workplace</a> Wed, 28 Jul 2021 03:58:49 +0000 admin 422 at Ransomware on the Rise /resources/blog/july-2021/ransomware-rise <span>Ransomware on the Rise</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Sat, 07/17/2021 - 23:10</span> <a href="/taxonomy/term/31" hreflang="en">Trends</a> <a href="/taxonomy/term/45" hreflang="en">Noah Webster</a> <article><img src="/sites/default/files/2021-08/shutterstock_381764248.png" width="1400" height="700" alt="dollar bill in the shape of an upward arrow" loading="lazy" typeof="foaf:Image" /></article><p><span><span><span>Ransomware cripples the target company’s operations, making it much different from an attack that steals data.  The implication of this became clear as I developed a contingency plan to pay a ransom.  Before thinking through the issue, I pictured the payment as a get-out-of-jail-free-card.  My team does all it can to secure our systems; if we get hit, we can pay and continue operations.  But that simply isn’t the case.  You need a better plan.  </span></span></span></p> <h2><span><span><span><strong>Ransomware on the Rise</strong></span></span></span></h2> <p><span><span><span>Ransomware blocks access to systems or data until you pay.  It takes what would once result in a breach or data loss through phishing email or an exposed security vulnerability, and systematizes how the attacker monetizes the attack.  After the attacker gains control, they threaten to keep you locked out or to disclose your data unless you pay.  </span></span></span></p> <p><span><span><span>A recent attack on Kaseya shows how ransomware presents a threat to both a Managed Service Provider (MSP) <em>and</em> the end customer.  The attacker uses the MSP to gain access to the customers.</span></span></span></p> <p><span><span><span>Given the financial incentive, everything about ransomware has exploded.  In 2020, ransomware attacks increased by approximately 400% in developed nations, with a reported <a href="https://www.nytimes.com/2021/06/03/us/politics/ransomware-cybersecurity-infrastructure.html">65,000 successful</a> attacks which is an average of one every eight minutes.  The <a href="https://www.youtube.com/watch?v=UvrvImxxjNc&t=1s">FBI observes</a> that, in 2013, ransomware focused on one PC at a time, now it targets entire networks or industries.  A ransom demand had been hundreds of dollars, then thousands, now millions.  Where previously a gang often worked alone, Ransomware attackers now coordinate as larger cartels, sharing information and techniques more broadly.  </span></span></span></p> <p><span><span><span>The threat has become so serious that the U.S. government now offers a <a href="https://www.nytimes.com/2021/07/15/us/biden-reward-ransomware.html">bounty</a> up to $10M for information that leads to the arrest of a ransomware gang.  The government has also established a <a href="https://www.cisa.gov/stopransomware">stopransomware site</a> to keep you informed and encourage victims to report attacks.  </span></span></span></p> <h3><span><span><span><strong>Paying the Ransom, Not a Good Option</strong></span></span></span></h3> <p><span><span><span>There are several reasons why you cannot depend on being able to pay your way out of a ransomware incident:</span></span></span></p> <ul><li><span><span><span><u>No guarantee of honesty</u>.  Despite stories about the illicit dark web running like the Amazon store, where even the bad guys must maintain a reputation for honoring commitments, you can’t be sure that your system will be restored after you make payment.  Even if your attacker wants to restore your system, the restoration process may not work or the attack may have been irreversibly destructive.  You can also have no expectation that any restoration will happen immediately.  </span></span></span></li> <li><span><span><span><u>Government prohibitions</u>.  On October 1, 2020, the Department of Treasury’s Office of Foreign Assets Control (OFAC) issued <a href="https://home.treasury.gov/system/files/126/ofac_ransomware_advisory_10012020_1.pdf">an advisory</a> that ransomware payments encourage malicious activity, and could thus threaten national security.  On this basis, OFAC can impose penalties for making ransomware payments.</span></span></span><br /><br /><span><span><span>In a development that may hit closer to home for an MSP, states are in the process of passing laws that draw this same line.  Specifically, states are evaluating bills that prohibit ransomware payments and require reporting of ransomware attacks.  MSPs that serve state and local government customers will be directly impacted.  Louisiana is first, with its law effective February 1, 2021.  </span></span></span></li> </ul><h4 style="padding-left:60px;"><span><span><span><em>Effective Law</em></span></span></span></h4> <ul style="padding-left:90px;"><li><span><span><span><a href="https://legis.la.gov/legis/BillInfo.aspx?s=20RS&b=SB273&sbi=y">Louisiana</a> (Requires registration of MSPs that service Louisiana government entities and for registered MSPs to report cyber incidents and ransomware payments) </span></span></span></li> </ul><h4 style="padding-left:60px;"><span><span><span><em>Bills</em></span></span></span></h4> <ul style="padding-left:90px;"><li><span><span><span><a href="https://www.nysenate.gov/legislation/bills/2021/s6806">New York</a> (Bans the payments of ransom in cyber-incidents by a New York government entity or by another entity on their behalf.  Requires reporting.)</span></span></span></li> <li><span><span><span><a href="https://www.ncleg.gov/BillLookUp/2021/H813">North Carolina</a> (Prohibits government entities from making ransomware payments.  Requires reporting.)</span></span></span></li> <li><span><span><span><a href="https://www.legis.state.pa.us/CFDOCS/Legis/PN/Public/btCheck.cfm?txtType=PDF&sessYr=2021&sessInd=0&billBody=S&billTyp=B&billNbr=0726&pn=0829">Pennsylvania</a> (Requires an MSP “in the service” of Pennsylvania to report “discovery of ransomware or of an extortion attempt involving ransomware within one hour of the discovery.”  Taxpayer money must not be used to make a ransomware payment, except in circumstances of a declared emergency.)</span></span></span></li> </ul><p> </p> <ul><li><span><span><span><u>Reputation</u>.  Ransomware payments can become public, and your reputation may suffer.  Moreover, the bad guys will know you pay, putting you on the radar for subsequent attacks. </span></span></span></li> </ul><p><span><span><span>As you consider whether to pay, your operations and those of your customers are at a standstill.  Rather than be left in a no-win situation of choosing between watching your business perish or making a desperate payment that may only make things worse—have a backup plan.</span></span></span></p> <h3><span><span><span><strong>Establish a Backup Plan</strong></span></span></span></h3> <p><span><span><span>First off, implement appropriate safeguards to secure yourself against and detect cyberattacks (e.g., two-factor authentication, phishing training, access management etc.).  </span></span></span></p> <p><span><span><span>Then for Plan B, establish a ransomware response plan that includes backup and restore capabilities.  Such capabilities assist not only in a ransomware situation, but apply in the case of any destructive event that effects your data or systems, events such as malicious insider activity, an honest mistake, or natural disaster. As an MSP, your plans should account for customers, as well as your own systems.  </span></span></span></p> <ul><li><span><span><span><span><u>Backup and Restore</u>.  If you have a working backup, you can sidestep the ransomware attack and get back to work as soon as you restore. So create backups for your systems and data, focusing on high value data.  </span></span></span></span></li> <li><span><span><span><span><u>Segregation</u>.  Segregate the backups so an attacker can’t access them after compromising your systems. </span></span></span></span><br /><br /><span><span><span>Segregate parts of your systems.  This enables you to pull-the-plug on an infected area, protecting the rest of your systems. </span></span></span></li> <li><span><span><span><span><u>Know where the copies are</u>.  Review your systems to locate where distinct copies of data reside, even if it isn’t a formal backup copy.  You can make use of such copies during a crisis. </span></span></span></span></li> <li><span><span><span><span><u>Have a plan</u>.  Have an incident response plan, specific to ransomware, and periodically test it. Table-top exercises with your principal executive decision-makers are helpful, and so is testing of your backup and restore capabilities.</span></span></span></span></li> <li><span><span><span><span><u>More tips</u>.  Here are suggestions for what your plan can cover:</span></span></span></span> <ul><li><span><span><span><span>Replacing infected hardware, like employee laptops.  </span></span></span></span></li> <li><span><span><span><span>Claiming insurance.  Check your coverage. </span></span></span></span></li> <li><span><span><span><span>Following applicable law.  Monitor the changing legal landscape.  </span></span></span></span></li> <li><span><span><span><span>Cooperating with the government.  Consider whether, and under what circumstances, you will report a ransomware attack to the government or seek assistance.  The <a href="https://home.treasury.gov/system/files/126/ofac_ransomware_advisory_10012020_1.pdf">OFAC advisory</a> and <a href="https://www.cisa.gov/stopransomware">stopransomware site</a> provide contact information.  OFAC may show you leniency for cooperative reporting, if you end up making a prohibited ransomware payment.</span></span></span></span></li> <li><span><span><span><span>Renewing your commitment to security, especially closing the specific vulnerabilities that were exploited.  </span></span></span></span></li> </ul></li> </ul><p><span><span><span>After you implement these steps, you’ll have another layer beyond cybersecurity to protect you and your customers’ business operations.  You won’t need to consider making the payment, because back-up and restore will be your get-out-of-jail-free card.  </span></span></span></p> <a href="/resources/blog/secure-modern-workplace" hreflang="en">Secure Modern Workplace</a> Sun, 18 Jul 2021 04:10:43 +0000 admin 417 at Biden Executive Order Takes Aims at Software Supply Chain, Federal Cybersecurity /resources/blog/june-2021/biden-executive-order-takes-aims-software-supply-chain-federal <span>Biden Executive Order Takes Aims at Software Supply Chain, Federal Cybersecurity</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Thu, 06/17/2021 - 13:46</span> <a href="/taxonomy/term/31" hreflang="en">Trends</a> <a href="/taxonomy/term/5" hreflang="en">David Bisson</a> <article><img src="/sites/default/files/2021-06/EO_image.jpg" width="1400" height="691" alt="Executive Order stamp" loading="lazy" typeof="foaf:Image" /></article><p><span><span>Supply chain attacks made quite a few headlines in the first half of 2021. It all started when the NOBELIUM threat actor <a href="/resources/blog/january-2021/security-recommendations-wake-solarwinds-supply-chain-attack" rel="nofollow">compromised the distribution systems for SolarWinds’ Orion IT network management platform</a> to push out malware. Researchers discovered many more malware strains associated with the attack in the <a href="/resources/blog/february-2021/solarwinds-supply-chain-attack-update-what-weve-learned-so-far" rel="nofollow">weeks and months that followed</a>. As they did, the list of victims expanded to include tech firms, government entities, and security companies.</span></span></p> <p><span><span>Then came news of <a href="/resources/blog/march-2021/least-30k-us-orgs-affected-threat-actors-targeting-exchange-bugs" rel="nofollow">HAFNIUM</a> at the beginning of March. Microsoft found that this threat actor was misusing four vulnerabilities in Microsoft’s Exchange Server software to exfiltrate sensitive information from affected organizations. Other threat actors <a href="/resources/blog/march-2021/hafnium-just-first-many-threat-actors-exploit-proxylogon" rel="nofollow">eventually caught on</a> and leveraged the weaknesses to distribute new ransomware strains, malicious cryptominers, and other threats. </span></span></p> <h3><span><span><span><span><span>Hardening the Federal Software Supply Chain</span></span></span></span></span></h3> <p><span><span>It didn’t take long for the Biden Administration to respond to the attacks discussed above. In mid-May, they released an “<a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/" rel="nofollow">Executive Order on Improving the Nation’s Cybersecurity</a>.” The directive arrived with language for the purpose of securing the U.S. federal government’s software supply chain.</span></span></p> <p><span><span>“The security of software used by the Federal Government is vital to the Federal Government’s ability to perform its critical functions,” the Executive Order (E.O.) notes. “The development of commercial software often lacks transparency, sufficient focus on the ability of the software to resist attack, and adequate controls to prevent tampering by malicious actors. There is a pressing need to implement more rigorous and predictable mechanisms for ensuring that products function securely, and as intended. The security and integrity of ‘critical software’ — software that performs functions critical to trust (such as affording or requiring elevated system privileges or direct access to networking and computing resources) — is a particular concern.”</span></span></p> <p><span><span>Acknowledging this necessity, the White House ordered the Secretary of Commerce, the Director of NIST, and others to collaborate around developing an official definition for “critical software.” Those individuals will make a list of software and software products that adhere to the definition as well as guidance outlining security measures for those software products. It will then be up to federal agencies to comply with the best practices of encryption, network segmentation, least privilege, and other principles encapsulated in those guidelines.</span></span></p> <p><span><span>Federal agency heads won’t be the only ones to help to develop those security recommendations. Indeed, the E.O. ordered the Secretary of Commerce and the Director of NIST to solicit input from the private sector, academia, and other actors on crafting new criteria for evaluating the security practices used by developers and suppliers. The Director of NIST will then publish preliminary guidelines on standards, procedures, and criteria as they relate to encrypting sensitive data and auditing trust relationships, among other supply chain security best practices. Six months later, the Director of NIST will be responsible for publishing additional guidelines around conducting periodic reviews of the preliminary guidelines.</span></span></p> <h3><span><span><span><span><span>Improving the Nation’s Cybersecurity</span></span></span></span></span></h3> <p><span><span>Biden’s E.O. isn’t focus only on hardening the software supply chain. Rather, it leverages supply chain security as part of a broader effort to modernize the U.S. federal government’s cybersecurity. Towards that end, the Executive Order requires that federal agencies adopt zero-trust architecture and uphold this new security model by implementing security best practices such as encryption and MFA. </span></span></p> <p><span><span>Federal organizations don’t need to make those shifts on their own; they can adopt new technologies that help them to complete their shift to those security controls. Agencies bound by the E.O. might specifically consider investing in a solution that can protect their email communications with encryption. Such a solution should be capable of scanning emails and attachments automatically so that it doesn’t affect employee workflows—all while keeping any and all information contained in employees’ inboxes safe and secure.</span></span></p> <p><span><span><a href="/products/email-encryption" rel="nofollow">Use ÇïżûÊÓƔɫ’s email encryption solution to strengthen your security posture in line with the Biden Administration’s Executive Order</a>.   </span></span></p> <a href="/resources/blog/secure-modern-workplace" hreflang="en">Secure Modern Workplace</a> Thu, 17 Jun 2021 18:46:34 +0000 admin 403 at