• Skip to primary navigation
  • Skip to main content
nGuard

nGuard

Call us p. 704.583.4088
  • Solutions
    • Security Assessments
    • Compliance
    • Cyber Security Incidence Response
    • Penetration Testing
    • Managed Event Collection
    • Vulnerability Management
    • Red Teaming
    • Mobile Security
    • Cloud Security
  • Industries
    • Healthcare
    • Energy
    • Information Technology
    • Manufacturing
    • Defense
    • Banking
    • Insurance
    • Government
    • Transportation
    • Entertainment
    • Food & Beverage
  • About Us
    • Our Company
    • Careers
    • Blog
  • Contact
Client PortalSpeak to An Expert

Incident Response

Microsoft’s Patch Tuesday Addresses Actively Exploited Zero-Days

In the latest Patch Tuesday release from Microsoft, the tech giant has rolled out vital updates, fortifying a total of 67 vulnerabilities. This comprehensive security overhaul addresses actively exploited zero-days, critical flaws, and publicly disclosed vulnerabilities, urging swift action from administrators to bolster system defenses. This month’s update takes a focused approach to three actively exploited Windows zero-days, underscoring the necessity for immediate deployment. Let’s delve into the specifics of these vulnerabilities.

Actively Exploited Windows Zero-Days

  • CVE-2023-36033 (CVSS 7.8): Desktop Window Manager Core Library Elevation of Privilege
    • Impact: Allows attackers to gain SYSTEM privileges without user interaction.
    • Affected Systems: Windows 10, Windows 11, Windows Server 2016, and newer.
  • CVE-2023-36036 (CVSS 7.8): Cloud Files Mini Filter Driver Elevation of Privilege
    • Impact: Enables attackers to gain SYSTEM privileges without user interaction.
    • Affected Systems: Windows Server 2008 and later, including the latest Windows desktop and server versions.
  • CVE-2023-36025 (CVSS 8.8): SmartScreen Security Feature Bypass
    • Impact: Allows attackers to bypass Windows Defender SmartScreen checks by convincing users to click on a crafted URL.
    • Affected Systems: All Windows OS versions dating back to Server 2008.

Publicly Disclosed Vulnerabilities

  • CVE-2023-36038 (CVSS 8.2): ASP.NET Core Denial of Service
    • Impact: Could lead to a service disruption.
    • Affected Systems: .NET 8.0, Microsoft Visual Studio 2022, and ASP.NET Core 8.0.
  • CVE-2023-36413 (CVSS 6.5): Microsoft Office Security Feature Bypass
    • Impact: Exploitation more likely; requires user interaction for successful exploitation.

Exchange Server Fixes and Additional Updates

  • Microsoft has addressed four vulnerabilities in Exchange Server, including three spoofing issues and a critical remote-code execution flaw (CVE-2023-36439). Administrators are advised to update Exchange instances promptly due to the platform’s susceptibility to sophisticated attacks.

Curl Vulnerabilities Resolved

  • Addressing vulnerabilities in the open-source Curl tool, Microsoft distributed Curl version 8.4.0 to fix issues related to SOCKS5 heap buffer overflow (CVE-2023-38545) and HTTP headers consuming excessive memory (CVE-2023-38039).

Immediate Action Required

The severity of these vulnerabilities demand quick actions from administrators and organizations. Several steps can be taken to mitigate the risks associated with these vulnerabilities:

  1. Patch Systems: The most effective way to safeguard these vulnerabilities is to apply the Microsoft patches promptly.
  2. Conduct Vulnerability Scanning: Proactively identify and assess security weaknesses, like these vulnerabilities and more, in your systems, networks, and applications, allowing you to address these vulnerabilities before cybercriminals can exploit them.
  3. Routine Security Assessments: Routine security assessments, such as external and internal penetration testing, are crucial to identify vulnerabilities and weaknesses in an organization’s network and systems.  
  4. Inventory Assessment: Organizations should conduct a detailed inventory of all their enterprise assets. This can help identify vulnerable systems that require immediate attention.
  5. Log Collection and Correlation: By analyzing logs from various sources and identifying patterns or anomalies, you can respond to threats, mitigate risks, and improve overall security posture.
  6. Validate Incident Response Capabilities: Conduct tabletop exercises to simulate real-world scenarios, evaluate their preparedness, and refine response plans. Updating or creating an incident response policy and having an incident response team on retainer ensures a structured and efficient response to security incidents, reducing potential damage and minimizing downtime in the event of a breach.

Microsoft’s November Patch Tuesday is a critical update, emphasizing the ongoing threats faced by Windows systems. Administrators are strongly encouraged to prioritize these patches to protect their systems against potential exploits and enhance overall cybersecurity.

Filed Under: Advisory, Breach, Compliance, Events, General, Products & Services, Travel, Vulnerabilities & Exploits Tagged With: ASP.NET Core, Cloud Files Mini Filter Driver, Curl, CVE-2023-36025, CVE-2023-36033, CVE-2023-36036, CVE-2023-36038, CVE-2023-36413, CVE-2023-36439, CVE-2023-38039, CVE-2023-38545, cybersecurity, Desktop Window Manager, Exchange Server, Incident Response, Microsoft, Microsoft Office, November Patch Tuesday, Patch Tuesday, Remote-Code Execution, Security Assessments, Security Features, Security Update, SmartScreen, Spoofing, System Defense, Update, Vulnerabilities, Vulnerability scanning, Windows 10, windows 11, Windows Security, Windows Server, Zero-Day Exploits

A Critical Alert: Organizations Must Respond to This Cisco Threat

In recent weeks, the cybersecurity community has been abuzz with discussions surrounding a critical vulnerability identified as CVE-2023-20198. This vulnerability, affecting Cisco’s Internetworking Operating System (IOS) XE Software Web User Interface (UI), has raised alarms due to its potential to compromise a vast number of devices. Here’s a comprehensive look at what we know so far and how organizations can safeguard themselves.

The Vulnerability Unpacked
CVE-2023-20198 is classified as a zero-day vulnerability, which means it was actively exploited in the wild before vendors became aware of it or had a chance to address it. This vulnerability specifically targets the web-based User Interface (UI) of Cisco’s IOS XE software, a highly versatile and widely used operating system for Cisco routers and switches.

The flaw lies in the authentication mechanisms of the web UI. Under normal circumstances, the web UI requires proper credentials for access. However, this vulnerability allows attackers to bypass these authentication measures. Once exploited, attackers can create accounts with the highest privileges, essentially giving them administrative rights over the device.

With such elevated privileges, attackers have the capability to make any changes they desire. This includes, but is not limited to, altering device configurations, rerouting traffic, or even shutting down the device entirely. More alarmingly, they can install backdoors or implants. These malicious tools can provide attackers with persistent access to the device, even after the original vulnerability has been patched. This poses a significant threat as these compromised devices can be used in larger coordinated attacks, data exfiltration, or as stepping stones to penetrate deeper into an organization’s network.

In a curious turn of events, just a day before Cisco made public the patches for this vulnerability, there was a notable drop in the number of compromised internet-facing Cisco devices. This sudden decline was observed by multiple cybersecurity entities and researchers. The cause behind this drop is not definitively known. Some speculate that the attackers, realizing that their activities might soon be detected or thwarted, decided to clean up their tracks. This could involve removing the implants or backdoors they had previously installed.

Another theory suggests that white-hat hackers or ethical cybersecurity professionals might have intervened. These individuals, upon discovering the vulnerability, could have taken measures to neutralize the threat on vulnerable devices. There’s also the possibility that law enforcement agencies, having gained intelligence about the exploitation, took covert actions to mitigate the threat.

The Importance of Penetration Testing and Vulnerability Management
Given the nature of this vulnerability, devices with administrative interfaces exposed to the internet are at a heightened risk. While it’s best practice to limit external access to these admin interfaces, the reality is that many organizations still have them openly accessible. This highlights the importance of regular penetration testing and vulnerability management to ensure that potential security gaps are identified and addressed promptly.

While external threats are a concern, internal threats can be just as damaging. Internal penetration testing can help identify vulnerabilities within your organization’s internal network. Additionally, both external and internal vulnerability management are crucial in ensuring that potential security loopholes are identified and addressed promptly.

Configuration Audits for Cisco Devices
Given that the vulnerability in question affects Cisco devices, it’s imperative for organizations to ensure that their Cisco equipment is up-to-date and receiving patches from the vendor. Conducting a configuration audit can help in this regard, ensuring that devices are configured correctly and are receiving timely updates.

Guidance from CISA & Cisco
The Cybersecurity & Infrastructure Security Agency (CISA) has also weighed in on the issue, releasing guidance addressing both CVE-2023-20198 and another vulnerability, CVE-2023-20273. CISA has emphasized the importance of reviewing their guidance and implementing the recommended mitigations, which include disabling the HTTP Server feature on internet-facing systems and monitoring for malicious activity. The latest guidance from Cisco can be found here:

Detailed Guide for Addressing Cisco IOS XE Web UI Vulnerabilities

Wrap Up
CVE-2023-20198 serves as a stark reminder of the ever-evolving threats in the cybersecurity landscape. Organizations must remain vigilant and proactive in their security measures, ensuring that both external and internal systems are regularly tested and updated. The vulnerability underscores the importance of timely patching, configuration audits, and adherence to guidance from authoritative bodies like CISA. In an era where cyber threats are becoming increasingly sophisticated, a robust and multi-faceted approach to security is not just recommended but essential. Organizations that prioritize and invest in their cybersecurity infrastructure will be better positioned to defend against and mitigate the impacts of such vulnerabilities in the future.

Filed Under: Advisory, Breach, Compliance, Events, Financial, General, Products & Services, Vulnerabilities & Exploits Tagged With: Alpine Linux, Buffer Overflow, Common Vulnerability Scoring System, CVE-2023-4911, Cybersecurity Threats, Data Theft, Debian, Dynamic Loader, Exploitation, Fedora, GLIBC_TUNABLES, GNU C Library, Incident Response, Inventory Assessment, IoT Devices, Linux Distributions, Linux Vulnerability, Log Collection, Looney Tunables, Mitigations, Patching, Proactive Measures, Proof of Concept, Root Privileges, Security Assessments, Security Risk, System Manipulation, System Takeover, Ubuntu, Unauthorized Access, Vulnerability scanning

PATCH NOW! Linux “Looney Tunables” Vulnerability

The world of cybersecurity has been shaken by the discovery of a significant vulnerability in Linux systems, known as “Looney Tunables” (CVE-2023-4911). This vulnerability, categorized with a Common Vulnerability Scoring System (CVSS) score of 7.8, poses a substantial risk to Linux-based operating systems. It allows attackers to gain root privileges, potentially leading to unauthorized access, system manipulation, data theft, and even complete system takeover.

The “Looney Tunables” Vulnerability

Looney Tunables is a buffer overflow vulnerability located in the GNU C Library’s (glibc) dynamic loader, specifically in how it processes the GLIBC_TUNABLES environment variable. Glibc, a critical component of Linux systems, defines system calls and essential functions required for typical program execution.

The dynamic loader’s role is to prepare and execute programs, including loading shared libraries into memory and linking them at runtime. Importantly, this loader operates with elevated privileges, making it a high-value target for attackers.

When malicious actors manipulate the GLIBC_TUNABLES environment variable, they can trigger a buffer overflow, a well-known and dangerous type of vulnerability. Successful exploitation of this vulnerability grants the attacker root privileges, essentially giving them full control over the compromised system.

Widespread Impact

Looney Tunables affects a broad range of Linux distributions, making it a serious concern for the Linux community. There has already been a proof-of-concept exploit released to the public. It has been successfully exploited on default installations of various major distributions, including Fedora 37 and 38, Ubuntu 22.04 and 23.04, and Debian 12 and 13. Other distributions are also likely to be vulnerable, with a few exceptions like Alpine Linux, which uses musl libc instead of glibc.

Given the extensive use of glibc across Linux distributions, the risk is significant. Attackers can exploit this vulnerability to target a wide range of systems, from personal computers to servers and even Internet of Things (IoT) devices. IoT devices are highly vulnerable due to their use of Linux kernels within custom operating systems.

Immediate Action Required

The severity of this vulnerability demands swift action from Linux users, administrators, and organizations. Several steps can be taken to mitigate the risks associated with Looney Tunables:

  1. Patch Systems: The most effective way to safeguard against this vulnerability is to apply patches promptly. Various Linux distribution vendors, including Red Hat, Ubuntu, Debian, Fedora, and Gentoo, have released updates to address this issue. Ensure that your system is running a non-vulnerable version of the glibc library.
  2. Implement Temporary Mitigations: If patching is not immediately possible, implement temporary mitigations. Red Hat offers scripts that can help protect systems by terminating any setuid program invoked with GLIBC_TUNABLES in the environment.
  3. Conduct Vulnerability Scanning: Proactively identify and assess security weaknesses, such as the Looney Tunables, in your systems, networks, and applications, allowing you to address these vulnerabilities before cybercriminals can exploit them.
  4. Routine Security Assessments: Routine security assessments such as external and internal penetration testing are crucial to identify vulnerabilities and weaknesses in an organization’s network and systems, helping to proactively address them before exploitation by malicious actors.
  5. Inventory Assessment: Organizations should conduct a detailed inventory of all their assets, including IT infrastructure, IoT devices, and applications. This can help identify vulnerable systems that require immediate attention.
  6. Log Collection and Correlation: By analyzing logs from various sources and identifying patterns or anomalies, you can swiftly respond to threats, mitigate risks, and improve overall security posture.
  7. Validate Incident Response Capabilities: Conduct tabletop exercises to simulate real-world scenarios, evaluate their preparedness, and refine response plans. Updating or creating an incident response policy and having an incident response team on retainer ensures a structured and efficient response to security incidents, reducing potential damage and minimizing downtime in the event of a breach.

The “Looney Tunables” Linux vulnerability serves as a reminder of the ever-present cybersecurity threats facing the Linux community. Prompt action, including patching systems and implementing mitigations, is essential to protect against potential exploitation. As vulnerabilities continues to evolve, proactive measures remain crucial to ensure the integrity and security of not just Linux-based systems, but all enterprise assets.

Filed Under: Advisory, Breach, Compliance, Events, Financial, General, Products & Services, Vulnerabilities & Exploits Tagged With: Alpine Linux, Buffer Overflow, Common Vulnerability Scoring System, CVE-2023-4911, Cybersecurity Threats, Data Theft, Debian, Dynamic Loader, Exploitation, Fedora, GLIBC_TUNABLES, GNU C Library, Incident Response, Inventory Assessment, IoT Devices, Linux Distributions, Linux Vulnerability, Log Collection, Looney Tunables, Mitigations, Patching, Proactive Measures, Proof of Concept, Root Privileges, Security Assessments, Security Risk, System Manipulation, System Takeover, Ubuntu, Unauthorized Access, Vulnerability scanning

MGM’s Cyber Gamble: How One Phone Call Broke the Bank!

In today’s digital age, cyber threats loom large, and even industry stalwarts like MGM Resorts can find themselves under siege. The recent cyberattacks on MGM Resorts serve as a stark reminder of the vulnerabilities that exist and the importance of robust cybersecurity measures.

The Initial Attack
The cyber onslaught on MGM Resorts began subtly but had far-reaching consequences. As detailed by Gizmodo, the notorious ransomware group ALPHV, also known as BlackCat, employed a tactic that many would consider benign: a phone call. Leveraging information from LinkedIn, they identified an MGM employee and initiated a 10-minute conversation with the company’s Help Desk. This was not a routine call. The hackers used sophisticated social engineering techniques, manipulating the employee into providing critical access information.

This breach was not just a technical failure; it was a human one. It underscores the importance of training employees to recognize and resist manipulative tactics. At nGuard, we understand this all too well. Our social engineering simulations are designed to help businesses train their staff to identify and counteract these tactics, ensuring that they don’t become the weak link in the security chain.

The Aftermath and Resolution
The ramifications of the breach were immediate and severe. As reported by Fox Business, MGM Resorts faced daily losses of approximately $8.4 million. For ten agonizing days, a wide array of MGM’s systems, from hotel reservations to credit card processing, were in disarray. The total estimated financial impact reached a staggering $80 million.

But the financial losses were just the tip of the iceberg. The breach affected MGM’s reputation, customer trust, and operational integrity. Systems across its Aria, Bellagio, and MGM Grand locations were compromised, impacting corporate emails, restaurant reservations, hotel bookings, and even digital key card access. Even after the company announced a return to normalcy, several users reported issues with MGM’s mobile app, indicating lingering challenges.

Furthermore, as highlighted by Business Insider, MGM wasn’t the sole target. Rival casino Caesars Entertainment also disclosed a cyberattack, emphasizing the industry-wide risk.

In such dire situations, having a robust incident response strategy is paramount. nGuard’s incident response services ensure that businesses are equipped to handle such crises, minimizing damage and expediting recovery. Additionally, nGuard emphasizes the importance of security awareness training, empowering employees with the knowledge and skills to prevent potential threats and breaches.

To further bolster defenses, continuous monitoring is essential. nGuard’s managed event collection provides businesses with real-time surveillance, ensuring threats are identified and neutralized promptly.

Conclusion
The MGM Resorts cyberattack is a testament to the multifaceted nature of cyber threats. While technology plays a pivotal role, human factors are equally consequential. Comprehensive training, proactive monitoring, and partnering with cybersecurity experts like nGuard can help businesses fortify their defenses and navigate the challenging cyber landscape with confidence.

Filed Under: Advisory, Breach, Compliance, Events, Financial, General, Products & Services, Vulnerabilities & Exploits Tagged With: Class Action Lawsuits, Cloud security, Comprehensive Security Audits, Customer Data Protection, Cyber Threats, cybersecurity, Data Breaches, Data Encryption, Data Privacy, Data Security, Employee Training, Financial Institutions, Financial Services, Framework Alignment, Incident Response, Legal Actions, Log Collection, Log Correlation, MOVEit Breach, network security, Penetration Testing, Regulatory Compliance, Risk Management, Security Advisory, Security Auditing, Security Best Practices, Vendor Security, vulnerability management

MOVEit Data Breach: The Expanding Aftermath

In recent months, the financial services industry has been rocked by a series of high-profile data breaches, exposing millions of customers’ personal information, and leading to legal actions against major institutions. This latest wave of cyberattacks highlights the evolving threat landscape and need for organizations to safeguard their data and solidify their assets. This Security Advisory highlights the ongoing fallout caused by the MOVEit breach, initially reported by nGuard in July.

Impact of the Breach
In May, the MOVEit attack campaign led by Cl0p began disclosing sensitive data from more than 600 worldwide organizations including financial firms, universities, the U.S. federal government, and public retirement systems. To date, the breaches have affected approximately 50 million customers who had their Social Security numbers, financial account information, and other sensitive data stolen by hackers. Since then, MOVEit has released several CVEs with multiple remediation updates to assist their clients in fortifying their file transfer environment. The long-term effects of this incident are still unknown but with the continuous rise of exposed customers and lawsuits, the total cost is currently estimated at nearly $10 billion USD.

Response from Affected Institutions
At the time of the hacking campaign, nearly 31% of the hosts running at-risk MOVEit servers were tied to financial organizations. Several of these institutions, including Charles Schwab, TD Ameritrade, Genworth Financial, Prudential, and TIAA, have faced lawsuits in the wake of these data breaches. The lawsuits allege negligence, unjust enrichment, and breach of implied contract on the part of these institutions.

Most of the financial institutions have responded by emphasizing their commitment to protecting their clients and conducting thorough investigations into the incidents. In response to a class action lawsuit, Prudential has offered free credit monitoring in attempts to help customers feel protected against future threats.

TIAA, which partnered with vendor Pension Benefit Information (PBI) Research Services for data transfer, is facing allegations of failing to secure personally identifiable information (PII) of teachers, staff, and students. The lawsuit aims to highlight vulnerabilities in the MOVEit software and criticized the delayed disclosure of the breach. PBI, although offering identity theft protection, also faced severe criticism for its handling of the situation.

Protecting Infrastructure and Customers
Widespread attacks like the MOVEit breach cannot be overstated. They serve as a wake-up call for all industries and individuals to take a multifaceted approach to enhance their cybersecurity footprint. nGuard has over 20 years of experience helping high-target organizations within the Finance, Healthcare, and Transportation industries and recommends the following proactive security practices to provide peace of mind:  

  1. Comprehensive Security Audits: Conduct regular security audits to identify vulnerabilities in software and data transfer systems. These audits should include assessments of cloud infrastructure and third-party vendors’ security practices.
  2. Penetration Testing: Assess the effectiveness of security controls by identifying vulnerabilities and detailed defense strategies with current patches and remediations.
  3. Data Encryption: Ensure that sensitive data is encrypted both in transit and at rest. Strong encryption protocols should be in place to protect customer information from unauthorized access.
  4. Incident Response: Develop and test robust incident response plans to ensure swift and effective actions in the event of a breach. This includes timely and transparent communication with affected parties and adherence to specific requirements and security standards. Additionally, having an Incident Response vendor on retainer ensures faster response times, tailored to the distinct operations and needs of your organization.
  5. Employee Training: Continuously educate employees about cybersecurity risks and best practices through Security Awareness Training. Equip your team with clear policies and skills to recognize, report, and respond to red flags through Tabletop Exercises or social engineering engagements.
  6. Log Collection and Correlation: Maintain detailed logs and conduct analysis to proactively detect suspicious activity in your environment. This invaluable tool enhances your security stance by analyzing and correlating event data and sending alerts of suspicious activity.
  7. Vulnerability Management: Secure your environment by proactively managing risks and promoting continuous improvement in processes and practices with nGuard’s Vulnerability Management. Whether your focus is on remediation validation, PCI compliance, or possible exploits, rest assured that nGuard’s Vulnerability Management services are ahead of the curve.
  8. Framework Alignment: Establish a systematic procedure for assessing service providers responsible for safeguarding sensitive data or managing your organization’s vital IT platforms and processes. This exercise aims to verify that these providers are effectively securing both the platforms and the data they handle. Strategic Security Assessments guide teams in designing the definitive policies and procedures around clear frameworks for cybersecurity compliance and best practice.

 
The MOVEit compromise highlights the critical need for assertive cybersecurity measures. To ensure strong posture it is essential to take proactive action to secure systems, conduct comprehensive audits, and prioritize the protection of customer data. By implementing robust cybersecurity practices, institutions can not only protect their clients but also safeguard their reputation and financial stability.

Filed Under: Advisory, Breach, Compliance, Events, Financial, General, Products & Services, Vulnerabilities & Exploits Tagged With: Class Action Lawsuits, Cloud security, Comprehensive Security Audits, Customer Data Protection, Cyber Threats, cybersecurity, Data Breaches, Data Encryption, Data Privacy, Data Security, Employee Training, Financial Institutions, Financial Services, Framework Alignment, Incident Response, Legal Actions, Log Collection, Log Correlation, MOVEit Breach, network security, Penetration Testing, Regulatory Compliance, Risk Management, Security Advisory, Security Auditing, Security Best Practices, Vendor Security, vulnerability management

TWiC: China Cyberattacks, ManageEngine Exploits, FBI Urges Barracuda Appliance Removal, Cyber Insurance

In this edition of This Week in Cybersecurity, we bring you a comprehensive overview of the latest developments and pressing concerns within cybersecurity. As threats continue to evolve, it is crucial to stay informed and prepared. Join us as we explore four pivotal topics that demand attention and action.

Hackers Exploit Barracuda Email Security Appliances: FBI Urges Immediate Removal

The FBI has issued a compelling alert urging the swift removal of compromised email security appliances manufactured by Barracuda Networks. This comes after Barracuda issued the same advice back in May, which was detailed in another nGuard Security Advisory. Despite patches designed to fix the exploited zero-day vulnerability (CVE-2023-2868), the FBI asserts that these patches have proven ineffective against suspected Chinese hackers. Organizations are strongly advised to remove all Barracuda Email Security Gateway (ESG) appliances promptly. This warning underscores the importance of vigilance and the evolving nature of cyber threats. To protect your organization from these attacks and stay informed of these new vulnerabilities as they are discovered, nGuard offers Vulnerability Scanning and Penetration Testing, along with Security Device Configuration Audit services that can help identify vulnerabilities, assess risks, and fortify your infrastructure against potential attacks.

Growing Concerns of Destructive Cyberattacks by China

Top U.S. cyber official, Jen Easterly, director of the U.S. Cybersecurity and Infrastructure Agency, has sounded an alarm about the potential for China to launch destructive cyberattacks on critical U.S. infrastructure in the event of escalated tensions. China’s hackers are reportedly positioning themselves for such actions, which represent a significant departure from their historical cyber espionage activities. nGuard has a wide range of experience helping organizations secure their critical infrastructure from Energy and Utilities, to Manufacturing, to Healthcare, to Government.

Cyber Insurance and the Nexus of Coverage and Protection

As cybersecurity evolves, the relationship between cybersecurity and insurance industries becomes increasingly intricate. Experts in the field gathered at the Def Con hacker conference to discuss the need for cyber insurance, its assessment, and its alignment with cybersecurity measures. Back in February, nGuard wrote about 5 new requirements that insurance companies need to issue policies. Security Awareness Training and Testing, Vulnerability Management, and 24/7/365 Monitoring were among the requirements listed. While cyber insurance offers financial protection, factors like calculating premiums and assessing risks are challenges that require attention. The role of cyber insurance as a motivator to enhance cybersecurity programs is emphasized, with a call to move quickly in preparing for potential cyberattacks.

Lazarus Hackers Exploit ManageEngine Vulnerability: New Threats Emerge

The North Korean state-backed Lazarus hacker group has capitalized on a critical ManageEngine ServiceDesk vulnerability (CVE-2022-47966) to compromise an internet backbone infrastructure provider and healthcare organizations. In early 2023, Lazarus exploited the flaw in multiple Zoho ManageEngine products to infiltrate a U.K. internet backbone provider, deploying the “QuiteRAT” malware and unveiling the newly discovered “CollectionRAT” remote access trojan (RAT). QuiteRAT, a potent malware discovered in February 2023, showcases enhanced capabilities compared to its predecessor, MagicRAT. CollectionRAT, linked to the “EarlyRAT” family and the Andariel subgroup, boasts sophisticated features, including on-the-fly code decryption using the Microsoft Foundation Class framework. Lazarus’ evolving tactics, employing open-source tools and frameworks, pose challenges for attribution and defense strategies. To safeguard against emerging threats, nGuard offers comprehensive Penetration Testing and Vulnerability Management services to assess vulnerabilities, enhance security, and mitigate risks.

The evolving nature of cyber threats demands taking proactive measures and forming strategic partnerships. As highlighted in the topics covered, cybersecurity is ever-changing where staying informed, prepared, and collaborating with experts is critical. At nGuard, we offer a suite of solutions designed to assist organizations in navigating this complex landscape. From incident response and vulnerability management to proactive security assessments, we are ready to enhance your security posture. The key to cybersecurity success lies in constant adaptation and continuous improvement.

Filed Under: Advisory, Breach, Compliance, Events, Financial, General, Products & Services, Vulnerabilities & Exploits Tagged With: Attribution Challenges, Barracuda Email Security, China Cyberattacks, Continuous Improvement, critical infrastructure, Cyber espionage, cyber insurance, Cyber Insurance Policies, Cyber Threats, cybersecurity, Cybersecurity Measures, Defense Strategies, Destructive Cyberattacks, Emerging Threats, FBI Alert, Hackers, Incident Response, Jen Easterly, Lazarus Hacker Group, Malware Analysis, ManageEngine Exploits, nGuard Security, Penetration Testing, Proactive Security, Risk assessment, Security Awareness, Threat intelligence, vulnerability management, Zero-day vulnerability

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to Next Page »
nGuard

nGuard

3540 Toringdon Way
Suite 200
Charlotte, NC 28277-4650

info@nGuard.com

Client Portal

Solutions

  • Security Assessments
  • Compliance
  • Cyber Security Incident Response
  • Penetration Testing
  • Managed Event Collection
  • nGuard Vulnerability Management
  • Red Team Testing
  • Mobile Security
  • Cloud Security

Industries

  • Healthcare
  • Energy
  • Information Technology
  • Manufacturing
  • Defense
  • Banking
  • Insurance
  • Government
  • Transportation
  • Entertainment
  • Food & Beverage

About Us

  • Our Company
  • Careers
  • Blog

© 2023 nGuard. All rights reserved.

  • Privacy Policy