-
TA18-276B: Advanced Persistent Threat Activity Exploiting Managed Service Providers
Original release date: October 3, 2018 Systems Affected Network Systems Overview The National Cybersecurity and Communications Integration Center (NCCIC) is aware of ongoing APT actor activity attempting to infiltrate the networks of global managed service providers (MSPs). Since May 2016...- News
- Thread
- apt authentication cloud security credential theft cybersecurity data security incident incident response logging managed services mitigation network architecture network security operational controls powershell risk management supply chain system integrity technical alert threat detection
- Replies: 0
- Forum: Security Alerts
-
TA18-276B: Advanced Persistent Threat Activity Exploiting Managed Service Providers
Original release date: October 03, 2018 Systems Affected Network Systems Overview The National Cybersecurity and Communications Integration Center (NCCIC) is aware of ongoing APT actor activity attempting to infiltrate the networks of global managed service providers (MSPs). Since May 2016...- News
- Thread
- apt attack vector cloud computing credential theft cybersecurity data security incident incident response malicious software managed services mitigation nccic network security operational controls security controls system administration technical alert threat actors threat intelligence vulnerability management
- Replies: 0
- Forum: Security Alerts
-
TA18-275A: HIDDEN COBRA – FASTCash Campaign
Original release date: October 02, 2018 Systems Affected Retail Payment Systems Overview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS), the Department of the Treasury (Treasury), and the Federal Bureau of Investigation...- News
- Thread
- atm banking cyber threats cybersecurity dhs fastcash fbi fraud hidden cobra incident response iso 8583 malicious software malware network defense payment methods risk mitigation spyware technical alert treasury vulnerability
- Replies: 0
- Forum: Security Alerts
-
TA18-074A: Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors
Original release date: March 15, 2018 Systems Affected Domain Controllers File Servers Email Servers Overview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This alert...- News
- Thread
- critical infrastructure cyber kill chain cybersecurity dhs email security energy sector fbi incident response indicators of compromise industrial control systems intrusion detection malicious software malware network security remote access russian politics spear phishing technical alert threat actors watering hole attack
- Replies: 0
- Forum: Security Alerts
-
TA17-293A: Advanced Persistent Threat Activity Targeting Energy and Other Critical...
Original release date: October 20, 2017 Systems Affected Domain Controllers File Servers Email Servers Overview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This alert...- News
- Thread
- apt credential harvesting cyber espionage cybersecurity dhs energy sector fbi ics incident response indicators of compromise industrial control systems malicious software malware network security scada spear phishing staging targets technical alert threat detection watering hole attack
- Replies: 0
- Forum: Security Alerts
-
TA15-286A: Dridex P2P Malware
Original release date: October 13, 2015 Systems Affected Microsoft Windows Overview Dridex, a peer-to-peer (P2P) bank credential-stealing malware, uses a decentralized network infrastructure of compromised personal computers and web servers to execute command-and-control (C2). The United...- News
- Thread
- antimalware antivirus banking credentials cybersecurity ddos dridex extended security updates impact keystroke logging malware microsoft office p2p phishing references remediation solutions technical alert trojan
- Replies: 0
- Forum: Security Alerts
-
TA14-150A: GameOver Zeus P2P Malware
Original release date: June 02, 2014 Systems Affected Microsoft Windows 95, 98, Me, 2000, XP, Vista, 7, and 8 Microsoft Server 2003, Server 2008, Server 2008 R2, and Server 2012 Overview GameOver Zeus (GOZ), a peer-to-peer (P2P) variant of the Zeus family of bank credential-stealing malware...- News
- Thread
- antivirus banking theft credential theft cybercrime cybersecurity data security ddos gameover zeus infection solutions malware online safety p2p phishing privacy security alert technical alert update
- Replies: 0
- Forum: Security Alerts