Google has recently released a patch to address multiple vulnerabilities within its browser, Google Chrome. These vulnerabilities could allow an attacker to take control of the affected system. If Google Chrome is implemented on your network, it is highly encouraged that those systems be updated to the latest version. The version that was released to patch these vulnerabilities is 61.0.3163.79.
Cyber security has been a growing topic over the course of the last several years. There have been many high-profile events that disrupted business operations, caused financial loss and damaged company reputations. Many tend to believe that most attackers are more interested in large companies, but that couldn’t be further from the truth. In many cases, small businesses are the easiest target. There are a few different layers of security that you can utilize to better protect your network. Each layer itself is minor, but when stacked up together, they provide a strong barrier of protection that can help you to safeguard your business. With your most vulnerable asset being the user, let us help you identify what can be done to help your business.
Topics: Cyber Security
Cisco has released an alert regarding a vulnerability in its Cisco WebEx browser extension for Google Chrome and Mozilla Firefox. This vulnerability allows for an unauthenticated remote attacker to execute arbitrary code with privileges of the affected browser on the system. The following releases are listed as vulnerable:
A fileless ransomware, SOREBRECT, that has recently been discovered, injects malicious code into a legitimate system process on the target system and will then remove itself in order to evade antivirus detection. SOREBRECT has targeted enterprise systems in varying industries. Upon infection, files on the system are encrypted and the attackers are capable of running remote commands on the affected system. SOREBRECT also has the capability to scan the network for computers and open shares, and will encrypt files at those locations. Although initially only affected systems in the middle east, it has since spread throughout the globe. In order to mitigate any potential infection, it is strongly encouraged that you restrict users write permissions on shared drives, keep systems up to date and have security mechanisms in place.
Indicators are now showing that, even though NotPetya disguises itself as ransomware, it actually works to lock the files permanently. Essentially, this is a cyber warfare tool that is being used to wipe the drive of the affected system and there is no way to recover the files. It appears that this began in the Ukraine and was potentially created and dispersed by Russia. We will continue to update as information becomes available.
Today, another global ransomware attack has struck several nations and is using the same exploit utilized by WannaCry: EternalBlue. Currently, there have been several thousand infections which is comparable to WannaCry’s spread in its first several hours. If infected, the machine will display a black screen with red lettering demanding $300 worth of bitcoins. Currently there is no data on whether paying the ransom result in the decryption of your critical files.
The United States Computer Emergency Readiness Team (US-CERT), in joint efforts with the Department of Homeland Security (DHS), has recently been alerted to recent malicious actions of the North Korean Government. The intended targets of their activity is focused towards the media, aerospace, financial and critical infrastructure sectors of the United States.
In 2015 HP released an audio driver on a number of systems that inadvertently acted as a keylogger. This could potentially allow a malicious individual to record critical information from a user’s keystrokes on these machines. HP has released a listing of systems that are affected by this:
Reports are now showing that WannaCry Ransomware has affected 200,000 victims in 150 different countries. On Monday experts expected the issue to escalate due to users returning to work following the initial attack. Microsoft released an emergency patch on Friday (5/12) but the attackers have now released a revised version of the ransomware.