Tag Archives: malware

FBI, DHS Provide Information on Russian Intell Agency’s Cyber Exploitation Techniques

NSA-CISA-FBI-UK NCSC

The FBI and the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) have released a joint advisory to provide information on cyber tools and techniques used by Russian Foreign Intelligence Service actors to compromise government networks, information technology companies and think tanks. FBI also observed that SVR actors have transitioned from using malware to homing in on cloud-based platforms. 

Read More »

CISA Issues Analysis Report on ‘Supernova’ Malware

Cybersecurity and

The Cybersecurity and Infrastructure Security Agency (CISA) has identified a malware dubbed Supernova used by advanced persistent threat actors to compromise an organization’s enterprise network through a Pulse Secure virtual private network device. Hackers use Supernova to conduct reconnaissance and domain mapping and steal credentials and sensitive data.

Read More »

Lookout Report: Phishing, Credential Theft Attacks Increased for Federal Agencies in 2020

Cyber Diplomacy

Information technology security company Lookout released a report stating that over 70 percent of phishing-based threats to agencies last year used tactics to obtain sensitive information through login credentials. The report also found that credential harvesting techniques significantly increased for federal agencies compared to state and local entities. Credential theft tactics that impacted federal agencies rose by 90 percent.

Read More »

CISA, Treasury, FBI Issue Advisory on North Korea’s Cryptocurrency Malware ‘AppleJeus’

Ransomware Attack

The Cybersecurity and Infrastructure Security Agency (CISA), Department of the Treasury (DOT) and the FBI have released a joint advisory about the AppleJeus malware and other indicators of compromise that North Korea-backed threat actors use to perform cryptocurrency theft. The joint advisory released Wednesday provides technical details about seven versions of AppleJeus malware that Hidden Cobra actors have been using since 2018. 

Read More »

CISA Releases Analysis of ‘Supernova’ Malware Linked to SolarWinds Cybersecurity Breach

NIST Cybersecurity

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a report on the “Supernova” malware that threat actors used to impact SolarWinds’ Orion information technology management tool and breach critical user data. CISA said Wednesday that the new malware analysis includes indicators of compromise to help IT teams study malicious artifacts related to the malware.

Read More »

DISA Officials Say Cloud-Based Internet Isolation Could Help Block Malware, Reduce Bandwidth; Vice Adm. Nancy Norton Quoted

Vice Adm. Nancy Norton

Officials with the Defense Information Systems Agency (DISA) said implementing the Cloud-Based Internet Isolation (CBII) system for browsing the web could help the Department of Defense (DoD) improve cybersecurity and generate approximately $300 million in savings. CBII could help reduce the bandwidth and protect against malware by assigning a cloud-based intermediary that oversees all direct communication. 

Read More »

Treasury Orders Sanctions on Russian Research Institute Over Malware

Cybersecurity

The US Department of the Treasury (USDT) has imposed sanctions on a Russian government-controlled research institute found to be linked to the Triton malware. TsNIIKhM was also found to be surveying at least 20 U.S. electric facilities for cyber vulnerabilities in 2019. The Triton malware targets industrial safety systems at critical infrastructure facilities.

Read More »

CISA, MS-ISAC Issue Alert on ‘Emotet’ Malware

Emotet Malware

The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing and Analysis Center (MS-ISAC) have released an advisory on a new kind of malware called Emotet that spreads through phishing emails. CISA said in the alert published Tuesday that Emotet is a form of Trojan virus with “worm-like” elements that can impact an entire network.

Read More »