Articles of interest from the week of May 27, 2024
New ShrinkLocker Ransomware Uses BitLocker to Encrypt Your Files A new ransomware strain called ShrinkLocker creates a new boot partition to encrypt...
24/7/365 Monitoring & Alerting
Compromise Assessments
Threat Hunting
Vulnerability Management
CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR®/RMF Pro)
ATO/RMF Support
If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.
Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.
At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.
2 min read
John Frasier : Sep 5, 2024 10:29:18 AM
The global malware campaign (that must not be named?) is targeting organizations by impersonating tax authorities, and using custom tools like Google Sheets for command and control. (Dark Reading)
“He who should not be named has made a new but oh-so-familiar Horcrux. Sophisticated phishing campaigns continue to increase the risk of BEC along with a slew of other identity security issues…as if we didn’t already loathe taxes. Although Professor Dumbledore is no longer around, steadfast allies in the form of security best practices are still the best defense against the dark arts. Namely, of attack vectors like this 'Voldemort' malware campaign. Clear protocols for handling and verifying sensitive information and training all employees on email best practices help eliminate human error as the needle moves in the threat landscape. Companies that utilize robust email filtering systems, enforce mandatory MFA, and employ SPF, DMARC, DKIM, and BIMI authentications have the best shot of not falling victim to the curse.” – Candace Respress, Senior SOC Analyst at Ingalls Information Security |
In a significant development in the fight against cybercrime, the operators behind a notorious one-time passcode theft service have pleaded guilty. This service, which compromised countless online accounts by bypassing two-factor authentication, was a major player in the underground market. Discover the intricate details of the operation, how it was taken down, and what this means for the future of online security. (KrebsOnSecurity)
Between April and July 2024, Microsoft observed Iranian state-sponsored threat actor Peach Sandstorm deploying a new custom multi-stage backdoor, which we named Tickler. Tickler has been used in attacks against targets in the satellite, communications equipment, oil and gas, as well as federal and state government sectors in the United States and the United Arab Emirates. This activity is consistent with the threat actor’s persistent intelligence-gathering objectives and represents the latest evolution of their long-standing cyber operations. (Microsoft)
On Tuesday, virtualization software technology vendor VMware pushed out a security update for its Fusion hypervisor to address a high-severity vulnerability that exposes users to code execution exploits. (SecurityWeek)
Security researchers have found a vulnerability in a key air transport security system that allowed unauthorized individuals to potentially bypass airport security screenings and gain access to aircraft cockpits. (BleepingComputer)
Federal authorities have arrested a Nashville man on charges he hosted laptops at his residences in a scheme to deceive US companies into hiring foreign remote IT workers who funneled hundreds of thousands of dollars in income to fund North Korea’s weapons program. (Ars Technica)
Malicious hackers are exploiting a zero-day vulnerability in Versa Director, a software product used by many Internet and IT service providers. Researchers believe the activity is linked to Volt Typhoon, a Chinese cyber espionage group focused on infiltrating critical U.S. networks and laying the groundwork for the ability to disrupt communications between the United States and Asia during any future armed conflict with China, (KrebsOnSecurity)
A new threat is targeting Apple users and is designed to slip past defenses, putting your privacy at serious risk. Learn how this malware operates, who’s at risk, and what you can do to protect your data. (TechRadar)
New ShrinkLocker Ransomware Uses BitLocker to Encrypt Your Files A new ransomware strain called ShrinkLocker creates a new boot partition to encrypt...
New Cyber Incident Notification Requirements for Credit Unions Beginning on September 1, 2023, all federally insured credit unions must notify the...
Black Basta Ransomware Poses as IT Support on Microsoft Teams to Breach Networks The BlackBasta ransomware operation has moved its social engineering...