Customer portal
Articles Tagged with

dark web threat intelligence

"SOS
Opinion, SME Cybersecurity, Tips

Proactive Digital Risk Monitoring: Stay Ahead of Emerging Threats

In today’s hyperconnected digital landscape, businesses and individuals are facing an unprecedented level of cyber threats. From data breaches to ransomware attacks, cybercriminals are constantly evolving their tactics, targeting vulnerabilities, and exploiting weak spots in both personal and organisational security. As the threat landscape becomes more complex, it is no longer sufficient to simply react to attacks after they occur. Instead, proactive digital risk monitoring has become essential for staying ahead of emerging threats and safeguarding valuable assets.

This blog explores the importance of proactive digital risk monitoring, the key components of an effective monitoring strategy, and how businesses and individuals can benefit from taking a proactive approach to their digital security.

Top 5 Cyber Threats Every SME Should Be Aware Of

The Growing Importance of Digital Risk

Digital risk refers to the potential for cyber threats to compromise the security, privacy, and operational integrity of businesses and individuals. This encompasses a broad range of risks, including data breaches, identity theft, cyberattacks, financial fraud, and reputational damage. As digital transformation continues to reshape industries and personal lives, the attack surface for cybercriminals expands, creating more opportunities for exploitation.

Traditional security measures, such as firewalls, antivirus software, and encryption, provide important layers of defence. However, they are often reactive, meaning they address threats only after they have already occurred. In contrast, digital risk monitoring is a proactive approach that involves continuously scanning and assessing digital environments for potential risks. By identifying threats before they have a chance to cause harm, organisations and individuals can stay one step ahead of attackers and avoid costly disruptions.

Why Proactive Digital Risk Monitoring Matters

The rapid evolution of cyber threats means that waiting for an attack to happen before responding is no longer a viable strategy. Cybercriminals are increasingly sophisticated, employing tactics such as phishing, social engineering, ransomware, and malware to bypass traditional defences. Furthermore, threats can emerge from a wide range of sources, including insider attacks, third-party vulnerabilities, and new zero-day exploits.

Proactive digital risk monitoring helps mitigate these risks by continuously monitoring for signs of suspicious activity, vulnerabilities, and emerging attack vectors. This allows businesses and individuals to detect threats early and take swift action to prevent damage.

For individuals, the consequences of a cyberattack can be devastating, with personal data, financial information, and even social media accounts becoming prime targets for exploitation. Proactive monitoring tools offer early warnings about potential security breaches, allowing individuals to protect their personal information before it’s too late. These tools can also help users monitor personal devices for malware or unauthorised access, ensuring that cybercriminals are detected before they can steal data or cause disruptions.

For businesses, the stakes are even higher. A single data breach can result in significant financial losses, damage to brand reputation, and legal penalties under data protection laws such as the General Data Protection Regulation (GDPR) or the Data Protection Act. Proactive digital risk monitoring not only helps businesses reduce the likelihood of such breaches but also enables them to fulfil their compliance obligations by showing they took preemptive measures to protect sensitive data. In highly regulated industries like healthcare and finance, such an approach is essential.

Core Components of Digital Risk Monitoring

Digital risk monitoring involves a combination of tools, technologies, and processes designed to provide a comprehensive overview of potential threats. Here are some of the key components:

1. Threat Intelligence

Threat intelligence involves gathering and analysing data about potential and current threats, helping organisations and individuals stay informed about the tactics, techniques, and procedures used by cybercriminals. This information is collected from various sources, including open-source intelligence (OSINT), proprietary databases, and the dark web.

The insights gained from threat intelligence enable more informed decision-making, helping to prioritise risks and allocate resources to address the most pressing threats. By monitoring real-time intelligence, organisations can identify emerging vulnerabilities and take preemptive measures to close security gaps before they are exploited.

Threat intelligence is especially valuable for spotting trends in cybercrime. As attacks such as ransomware continue to rise, having real-time data about threat actors’ methodologies can be the difference between successfully defending against an attack or becoming a victim. The ability to track ransomware groups, phishing campaigns, or distributed denial-of-service (DDoS) activities empowers security teams to preemptively bolster defences where needed.

2. Dark Web Monitoring

The dark web is a hidden part of the internet where cybercriminals trade stolen data, malware, and hacking tools. Monitoring this space is critical for detecting potential data breaches or threats before they escalate. Dark web monitoring tools scan underground marketplaces, forums, and chat rooms for signs that sensitive information, such as usernames, passwords, or personal data, has been compromised.

By identifying these early warning signs, businesses can take swift action to secure accounts, notify affected individuals, and prevent further damage. Similarly, individuals can benefit from dark web monitoring by receiving alerts if their personal information is being traded or misused. Being aware that stolen credentials are being sold allows individuals to change passwords or enable multi-factor authentication (MFA) before any unauthorised access occurs.

SOS Intelligence Ransomware Statistics October 23

For organisations, dark web monitoring has become a key aspect of supply chain security as well. Compromised data related to third-party vendors or partners can be an early indicator of broader cybersecurity risks. Monitoring this space ensures that businesses can track the spread of any exposed credentials or intellectual property, giving them a head start on responding to potential supply chain breaches.

3. Vulnerability Scanning

Vulnerability scanning tools are designed to automatically assess systems, networks, and applications for security weaknesses that could be exploited by attackers. These tools identify unpatched software, misconfigurations, and other vulnerabilities that cybercriminals could use to gain unauthorised access to sensitive data.

Regular vulnerability scanning is essential for maintaining a strong security posture. It ensures that potential entry points for attackers are identified and addressed in a timely manner, reducing the risk of exploitation. In today’s environment, where remote workforces rely on cloud services and various digital platforms, the need for regular scanning is even greater, as businesses must secure a rapidly expanding range of access points.

For individuals, using vulnerability scanning tools on personal devices and home networks can help secure devices such as routers, IoT devices, and computers. With many individuals now using personal devices for work, ensuring these devices are free from vulnerabilities is crucial for both personal and professional security.

4. Brand Monitoring

Cybercriminals often impersonate legitimate companies in phishing attacks or fraudulent schemes. Brand monitoring tools help organisations track how their brand is being used online and detect instances of impersonation, domain squatting, or other unauthorised uses of their identity.

By proactively monitoring brand mentions on social media platforms, domain registrations, and other online sources, organisations can detect and respond to brand abuse before it damages their reputation or puts their customers at risk. For example, phishing emails often use look-alike domains to trick recipients into thinking the message is from a legitimate source. Detecting these fraudulent domains early allows businesses to take them down before any major damage is done.

Brand monitoring also helps businesses keep track of customer sentiment and potential security-related complaints. If customers are publicly mentioning phishing attacks that appear to come from a legitimate brand, the company can act swiftly to alert customers and work with platforms to block or remove the fraudulent content.

5. Incident Response

Even with proactive monitoring in place, incidents can still occur. That’s why having a well-defined incident response plan is critical. Digital risk monitoring tools often include incident response features that guide organisations and individuals through the steps needed to contain and mitigate the damage of a cyber incident.

Spot the Scam: Recognising Phishing and Social Engineering Tactics

Effective incident response requires rapid detection, investigation, and remediation of the threat. The faster an organisation or individual can respond to a threat, the less damage it is likely to cause. Digital risk monitoring tools often provide real-time alerts and actionable insights to help guide response efforts, making it easier to isolate compromised systems, remove malicious software, or notify affected parties.

Incident response also relies on strong communication protocols, ensuring that all stakeholders are informed of the situation and can respond accordingly. For businesses, this includes IT staff, legal teams, public relations teams, and any regulatory bodies that may need to be notified.

Benefits of Proactive Digital Risk Monitoring

Adopting a proactive digital risk monitoring strategy offers numerous benefits to both organisations and individuals. Let’s explore some of the most significant advantages:

1. Early Detection of Threats

One of the primary benefits of digital risk monitoring is the ability to detect and address threats early, before they can cause significant harm. By continuously monitoring for suspicious activity, organisations and individuals can respond quickly and mitigate the risk of data breaches, financial loss, and reputational damage.

2. Strengthened Security Posture

Regular vulnerability scanning and real-time threat intelligence help improve overall security posture. Proactive monitoring ensures that weaknesses are identified and addressed as soon as they emerge, reducing the risk of cyberattacks and improving resilience to potential threats.

3. Cost Savings

Responding to a cyberattack can be costly, especially if it involves legal fees, fines, and remediation efforts. Proactive digital risk monitoring can help reduce these costs by preventing attacks before they occur, minimising the need for expensive incident response measures and lowering the risk of fines associated with data breaches.

4. Enhanced Compliance

Many industries are subject to regulations that require organisations to monitor for potential threats and report breaches. Proactive digital risk monitoring helps organisations meet these compliance requirements by providing the tools necessary to detect and address risks in real time.

5. Peace of Mind

For individuals, proactive digital risk monitoring provides peace of mind. Knowing that their personal data, financial information, and online accounts are being monitored allows individuals to take quick action if a threat is detected, reducing the risk of identity theft or fraud.

Implementing a Proactive Digital Risk Monitoring Strategy

Implementing an effective digital risk monitoring strategy requires a combination of the right tools, processes, and expertise. Organisations should start by assessing their risk landscape and identifying the most critical assets they need to protect. From there, they can deploy the appropriate monitoring tools, such as threat intelligence platforms, vulnerability scanners, and dark web monitoring solutions.

For individuals, using personal security tools, such as password managers, dark web monitoring services, and antivirus software, can help secure personal information and detect potential threats.

Conclusion

In a world where cyber threats are constantly evolving, taking a reactive approach to digital security is no longer enough. Proactive digital risk monitoring offers individuals and organisations the ability to stay ahead of emerging threats, protect valuable assets, and avoid costly disruptions. By adopting a proactive strategy that includes threat intelligence, vulnerability scanning, dark web monitoring, and incident response, businesses and individuals can significantly reduce their risk exposure and safeguard their digital environments.

What we can do to help

At SOS Intelligence, we specialise in providing advanced cyber threat intelligence and digital risk monitoring solutions. We are trusted by many organisations and businesses who recognise the essential service we provide.

Our platform is designed to help businesses and organisations identify, analyse, and mitigate potential cyber threats before they cause harm. Using a combination of AI-driven tools and expert analysis, we monitor the deep and dark web, criminal forums, and other online sources to detect potential risks such as data breaches, leaked credentials, or emerging malware threats.

Our digital risk monitoring services give organisations real-time visibility into their cyber exposure, allowing them to proactively address vulnerabilities and stay ahead of adversaries. We provide actionable intelligence that helps to protect sensitive data, intellectual property, and brand reputation. Whether it’s identifying potential phishing attacks or discovering compromised accounts, our tools ensure that organisations can act swiftly to mitigate risks.

We also offer bespoke solutions tailored to specific business needs, enabling our clients to safeguard their digital assets effectively. With SOS Intelligence, you gain the confidence of knowing that your organisation is continuously protected in an ever-evolving digital landscape.

What now? May we suggest scheduling a demo here? So many of our customers say they wish they found us earlier. We look forward to meeting you.

Photo by 🔮🌊💜✨ on Unsplash

""/
Opinion, SME Cybersecurity, Tips

10 Best Cybersecurity Practices for Individuals and Businesses

In today’s increasingly digital world, cybersecurity is no longer just a concern for IT departments. With the proliferation of personal devices and remote work, individuals and businesses alike face a constant barrage of cyber threats. Whether it’s phishing attacks, data breaches, or malware, the risks are real and growing. By implementing key cybersecurity practices, you can protect sensitive data, reduce your vulnerability, and ensure a safer digital environment. Below, we explore the 10 best cybersecurity practices for both individuals and businesses, from two-factor authentication to regular data backups.

1. Enable Two-Factor Authentication (2FA)

Two-factor authentication (2FA) adds an extra layer of security to your accounts by requiring not only a password but also a second form of verification, such as a code sent to your phone. This ensures that even if your password is compromised, the attacker cannot access your account without the second factor.

For individuals, 2FA can be enabled on email accounts, social media platforms, and financial services. For businesses, implementing 2FA across corporate networks and systems significantly reduces the risk of unauthorised access. Beyond login security, 2FA is also crucial in protecting sensitive areas such as payment gateways or admin control panels.

While enabling 2FA might seem like an extra step in your daily login routine, the benefits far outweigh the inconvenience. Cybercriminals primarily target easy opportunities. By adding this additional layer of security, you’re drastically lowering your risk of falling victim to an attack. Furthermore, modern 2FA solutions offer options such as biometrics, reducing friction for users.

  • Why it matters: Passwords alone can be easily stolen through phishing attacks or brute-force techniques. Adding a second verification step makes it exponentially harder for hackers to gain access, even if your password is leaked in a data breach.
  • Tip for businesses: Ensure that all employees use 2FA for their work accounts, especially for admin-level accounts, which are often the prime targets for attackers. Also, enforce this across all remote access points to protect against network vulnerabilities.

2. Use Strong, Unique Passwords

Passwords are the first line of defence in protecting your accounts. Yet, many individuals and businesses still rely on weak or reused passwords across multiple accounts. A strong password is typically at least 12 characters long, uses a mix of letters, numbers, and special characters, and avoids easily guessable information such as birthdates or common words.

For businesses, the stakes are higher. Poor password hygiene can lead to breaches that expose sensitive data and damage customer trust. It’s crucial to enforce strict password policies and encourage employees to use a password manager to generate and store complex passwords securely. A password manager can significantly simplify the task of managing numerous complex passwords, removing the temptation to reuse them.

Beyond the immediate protection against password-based attacks, using strong and unique passwords for each service ensures that even if one account is compromised, others remain safe. Additionally, businesses should regularly audit their password policies, ensuring that no default passwords remain in use within the organisation.

  • Why it matters: Reusing passwords across multiple platforms can lead to a domino effect where one breach leads to multiple compromised accounts. Strong passwords help mitigate brute-force attacks, where hackers try numerous combinations to crack a password.
  • Tip for individuals: Avoid using personal information like pet names or birthdays. Instead, consider using a passphrase—a longer, more complex string of words that’s easier to remember but difficult to guess. Passphrases are especially effective because they balance security and ease of use.

3. Regularly Update Software and Systems

Software updates aren’t just about new features—they often contain critical security patches that fix vulnerabilities. Cybercriminals frequently exploit outdated software to gain access to systems, making it vital for both individuals and businesses to regularly update operating systems, applications, and security software. However, updates are often delayed by users or administrators who find them inconvenient, creating a significant security gap.

For individuals, turning on automatic updates for your devices can help ensure that critical security patches are applied as soon as they become available. Businesses, especially those managing a range of systems and devices, should establish clear policies around patch management, including regular audits to ensure compliance.

Neglecting updates can leave your devices exposed to a wide range of cyber threats, including zero-day exploits that target newly discovered vulnerabilities. In fact, some of the most devastating cyberattacks in recent years exploited unpatched software vulnerabilities that had been known but left unattended.

  • Why it matters: Keeping your software up-to-date reduces your risk of being targeted by attacks that exploit known vulnerabilities. Hackers actively scan for systems running outdated software, making it critical to stay ahead of the curve.
  • Tip for businesses: Implement automatic updates where possible and ensure that legacy systems are phased out or properly secured with compensating controls. For industries with regulatory compliance requirements, timely updates can also help avoid fines or penalties.

4. Backup Data Regularly

Data is one of the most valuable assets for both individuals and businesses. A well-structured data backup plan ensures that even in the event of a ransomware attack, hardware failure, or accidental deletion, your critical information can be recovered. In today’s environment, data loss could mean losing irreplaceable memories, critical business information, or legal documents.

For individuals, backing up photos, documents, and other important files to a secure location, whether in the cloud or on an external hard drive, can save you from disaster. For businesses, regular backups—ideally automated—should be an integral part of your disaster recovery plan. It’s also important to periodically test backups to ensure they function correctly when needed.

In the business context, maintaining regular backups that include system images allows organisations to restore not only data but also entire systems if necessary. This can be the difference between quickly recovering from an incident and suffering extended downtime.

  • Why it matters: Cyberattacks, particularly ransomware, often target your data. Without backups, you could lose irreplaceable information or be forced to pay a ransom to recover it. Even beyond cyberattacks, natural disasters or equipment failure can cause data loss.
  • Tip for businesses: Implement the 3-2-1 backup rule: keep three copies of your data, on two different types of media, with one stored offsite. This ensures redundancy and protection against various types of data loss, whether from physical damage, theft, or cyberattacks.

5. Educate Employees on Cybersecurity

A company’s cybersecurity is only as strong as its weakest link, and that link is often its employees. Human error is a major factor in many cyberattacks, particularly in cases of phishing and social engineering. Therefore, it’s critical to provide regular cybersecurity awareness training to employees, helping them recognise common threats such as suspicious emails or social engineering attempts.

For individuals, staying informed about common cyber threats can also help you avoid scams and phishing attacks that might target your personal accounts. However, for businesses, this extends to a formalised training programme, often involving real-world simulations, such as phishing tests, to assess employee awareness.

An educated workforce can serve as a powerful line of defence. When employees understand the risks, they are more likely to act responsibly, reducing the chances of inadvertently opening a door to cybercriminals. Regular updates to training programmes also help employees stay current on the latest threats.

  • Why it matters: Most cyberattacks start with an employee clicking on a malicious link or downloading a harmful attachment. Education can dramatically reduce these occurrences, making employees your first line of defence against breaches.
  • Tip for businesses: Simulate phishing attacks to test your employees’ vigilance and reinforce training in a practical, real-world way. Regularly updating the training content also ensures that employees stay aware of emerging threats and tactics.

6. Secure Your Wi-Fi Networks

Your Wi-Fi network is the gateway to your online activity, and an unsecured network can provide an easy entry point for attackers. Both individuals and businesses should ensure their Wi-Fi is protected with strong passwords and encryption. Unfortunately, unsecured networks are often overlooked in favour of convenience, leading to preventable breaches.

At home, many people leave the default router password unchanged, making it easy for hackers to access the network. For businesses, the situation is even more critical. Guest Wi-Fi, often provided for customer convenience, should be isolated from internal systems, ensuring that external users cannot inadvertently access sensitive business data.

Proper Wi-Fi security goes beyond just setting a strong password. It also includes using up-to-date encryption protocols, like WPA3, and disabling unnecessary features such as remote management. Businesses, in particular, should regularly audit their network configurations to ensure compliance with security best practices.

  • Why it matters: An unsecured network can allow hackers to intercept data, including passwords and financial information. Attackers often exploit weak network security to gain initial access, then pivot to more sensitive areas.
  • Tip for businesses: Use WPA3 encryption for your business network and ensure that guest Wi-Fi is isolated from critical internal systems. Consider implementing network segmentation to further limit access to sensitive systems based on user roles.

7. Use a Virtual Private Network (VPN)

A Virtual Private Network (VPN) encrypts your internet connection, making it much harder for cybercriminals to intercept your data. VPNs are particularly useful when working remotely or using public Wi-Fi, as these environments are more vulnerable to attacks. A VPN masks your IP address and makes your online activity less traceable, adding another layer of privacy.

For businesses, providing employees with VPN access ensures secure communication between remote workers and the company’s internal network. This is especially important for organisations with a distributed workforce or for employees who travel frequently. Enforcing VPN use ensures that sensitive company data is not exposed over unsecured connections.

Beyond the obvious benefit of secure browsing, a VPN can also help bypass geo-restrictions, which can be important for businesses operating in multiple regions. Additionally, VPNs prevent ISPs and other third parties from tracking your online activity, further enhancing privacy.

  • Why it matters: Public Wi-Fi is often unsecured, leaving your data vulnerable to interception. A VPN provides a secure connection, whether you’re checking emails in a coffee shop or working remotely.
  • Tip for individuals: Always use a VPN when connecting to public Wi-Fi networks. For the best security, choose a reputable VPN provider with a no-logs policy and strong encryption standards.

8. Implement Role-Based Access Control (RBAC)

Role-Based Access Control (RBAC) limits access to systems and data based on an employee’s role within the organisation. This ensures that only authorised personnel can access sensitive information, reducing the risk of internal threats or accidental data exposure. For example, a marketing team member doesn’t need access to financial data, just as an IT administrator doesn’t require access to HR records.

For businesses, implementing RBAC is a critical step in protecting sensitive data and complying with privacy regulations like GDPR or HIPAA. This approach limits the potential damage of a breach by ensuring that even if one account is compromised, the attacker doesn’t gain access to everything.

RBAC can be managed through identity and access management (IAM) tools, allowing for easy enforcement and auditing of access policies. It’s also important to review these roles regularly, adjusting them as employees move within the organisation or as job functions evolve.

  • Why it matters: Limiting access to sensitive data reduces the likelihood of insider threats and ensures compliance with data protection regulations. Even if an account is compromised, the attacker’s access will be limited to only what the user’s role permits.
  • Tip for businesses: Regularly audit user access rights to ensure that they align with current job functions. Remove access immediately when employees leave the company or change roles, as lingering access points can create unnecessary security risks.

9. Monitor for Suspicious Activity

Detecting cyberattacks before they cause significant damage is crucial. Both individuals and businesses should actively monitor for suspicious activity, such as unauthorised logins, unusual device behaviour, or changes to security settings. Many security tools offer real-time monitoring and alerts that can notify you of potential breaches.

For businesses, implementing Security Information and Event Management (SIEM) systems can help centralise the detection of suspicious behaviour across the network. By collecting and analysing data from various sources, SIEM tools can help identify patterns that might indicate a potential attack. Regular auditing of logs and systems can also reveal signs of compromise.

Monitoring is about being proactive. Once an attack is detected, swift action can limit damage and prevent further spread. Organisations should have incident response plans in place, ensuring that they are ready to act when suspicious activity is detected.

  • Why it matters: The faster you detect a cyberattack, the faster you can respond. Delayed detection often leads to greater damage, whether it’s more data being stolen or malicious software spreading throughout the network.
  • Tip for individuals: Enable login alerts for all your accounts, so you’re immediately notified if someone attempts to access your account from an unrecognised device or location. This can provide an early warning of a potential breach.

10. Conduct Regular Security Audits

A security audit is a comprehensive assessment of your security policies, systems, and practices. For businesses, regular audits are essential for identifying vulnerabilities, ensuring compliance with industry regulations, and validating that security controls are functioning as intended. Individuals can also benefit from self-audits by reviewing account security, device settings, and data backup practices.

For businesses, audits should involve testing everything from firewall configurations to employee security awareness. Conducting regular penetration tests, where ethical hackers attempt to breach your systems, can also provide valuable insights into potential weaknesses. These audits not only help improve security but also demonstrate due diligence in the event of a data breach.

By identifying weaknesses before they are exploited, you can take corrective action to strengthen your defences. Additionally, security audits provide an opportunity to review and update policies, ensuring that they reflect current best practices and emerging threats.

  • Why it matters: Cyber threats evolve quickly, and what was secure a year ago may not be secure today. Regular audits ensure that your defences are up-to-date and capable of defending against the latest threats.
  • Tip for businesses: Hire third-party auditors to provide an objective assessment of your security posture. These external audits can uncover blind spots that internal teams may overlook, offering a fresh perspective on your organisation’s security practices.

Conclusion

Cybersecurity is not a one-size-fits-all solution. It requires a combination of best practices, from using strong passwords and 2FA to regularly updating software and backing up data. For businesses, additional layers of protection, such as firewalls, access controls, and continuous monitoring, are essential to safeguarding critical assets.

Both individuals and businesses must remain vigilant and proactive, as the cyber threat landscape is constantly changing. By implementing these 10 best practices, you can greatly reduce the risk of cyberattacks and protect your personal and professional data.

In an age where digital threats are on the rise, securing your information has never been more important. Whether you’re an individual trying to safeguard your personal accounts or a business aiming to protect sensitive data, these cybersecurity practices are vital steps toward a safer digital future.

Photos by Ed Hardie Paulius Dragunas Siyuan Hu Misha Feshchak Privecstasy Luis Villasmil on Unsplash

"Compromised
SOS Intelligence Weekly News Round Up

Weekly News Round-up

29 July – 4 August 2024

CVE Discussion

Over the past week, we’ve monitored our vast collection of new data to identify discussions of CVEs. 

News Roundup

Linux Servers Exposed to Data Exfiltration from TgRat

The TgRat trojan, first discovered in 2022, is now targeting Linux servers to steal data. Controlled via a private Telegram group, it can download files, take screenshots, execute commands remotely, and upload files. TgRat verifies the computer name’s hash upon startup and establishes a network connection if it matches, using Telegram to communicate with its control server.

Due to Telegram’s popularity and the anonymity it provides, TgRat’s use of it as a control mechanism makes detection difficult. It executes commands via the bash interpreter, encrypted with RSA, and manages multiple bots using unique IDs.

This unique control mechanism complicates detection, as typical network traffic to Telegram servers can mask malicious activity. Installing antivirus software on all local network nodes is recommended to prevent infection.

Threat Actors Using Fake Authenticator Sites to Deliver Malware

Researchers from ANY RUN identified a malware campaign called DeerStealer, which uses fake websites mimicking legitimate Google Authenticator download pages to deceive users. The primary site, “authentificcatorgoolglte[.]com,” looks similar to the genuine Google page to trick users into downloading malware. Clicking the download button on this fake site transmits the visitor’s IP address and country to a Telegram bot and redirects users to a malicious file on GitHub, likely containing DeerStealer, which can steal sensitive data once executed.

The Delphi-based DeerStealer malware employs obfuscation techniques to hide its activities and runs directly in memory without leaving a persistent file. It initiates communication with a Command and Control (C2) server by sending a POST request with the device’s hardware ID to “paradiso4.fun.” Subsequent POST requests suggest data exfiltration.

Analysis revealed the use of single-byte XOR encryption for transmitted data, uncovering PKZip archives containing system information. Researchers also linked DeerStealer to the XFiles malware family, noting that both use fake software sites for distribution but differ in their communication methods.

Threat Actors Abusing TryCloudflare to Deliver Malware

Cybercriminals are increasingly using TryCloudflare Tunnel to deliver Remote Access Trojans (RATs) like Xworm, AsyncRAT, VenomRAT, GuLoader, and Remcos in financially motivated attacks. TryCloudflare allows developers to experiment with Cloudflare Tunnel without adding a site to Cloudflare’s DNS, which attackers exploit to create temporary infrastructures that bypass traditional security controls.

This tactic, initiated in February 2024, has intensified, posing a significant threat due to its rapid deployment and evasion capabilities. Recent campaigns often use URL links or attachments to download malicious files, which execute scripts to install RATs and other malware.

Campaigns frequently target global organisations, using high-volume email campaigns with lures in multiple languages, often exceeding the volume of other malware campaigns. Attackers dynamically adapt their attack chains and obfuscate scripts to evade defences, demonstrating a sophisticated and persistent threat.

By abusing TryCloudflare tunnels, attackers generate random subdomains on trycloudflare.com, routing traffic through Cloudflare to avoid detection. For example, on May 28, 2024, and July 11, 2024, targeted campaigns used tax-themed lures and order invoice themes, respectively, to deliver AsyncRAT and Xworm via malicious email attachments and PowerShell scripts, providing remote system access and data exfiltration capabilities.

Ransomware Threat Actors Exploiting VMWare ESXi

Microsoft researchers have identified a critical vulnerability in VMware’s ESXi hypervisors, CVE-2024-37085, which allows ransomware operators to gain full administrative permissions on domain-joined ESXi hypervisors. This flaw, associated with the “ESX Admins” group, enables any domain user who can create or rename groups to escalate their privileges, potentially gaining full control over the ESXi hypervisor. Exploiting this vulnerability can result in the encryption of the hypervisor’s file system, access to virtual machines, data exfiltration, and lateral movement within the network.

Ransomware groups such as Storm-0506, Storm-1175, Octo Tempest, and Manatee Tempest have been observed exploiting this vulnerability, deploying ransomware like Akira and Black Basta to encrypt ESXi file systems.

A notable attack by Storm-0506 involved using Qakbot and exploiting a Windows vulnerability to elevate privileges, followed by deploying Black Basta ransomware. In response, VMware has released a security update to address CVE-2024-37085. Microsoft urges organisations to apply this update, validate and secure the “ESX Admins” group, deny access or change administrative group settings, use multifactor authentication for privileged accounts, and secure critical assets with the latest security updates and monitoring procedures.

Photo by Joshua Hoehne on Unsplash

"Crowdstrike
SOS Intelligence Weekly News Round Up

Weekly News Round-up

15 – 21 July 2024

CVE Discussion

Over the past week, we’ve monitored our vast collection of new data to identify discussions of CVEs.

News Roundup

Ransom paid by AT&T

AT&T recently paid $370,000 to a hacker affiliated with the ShinyHunters group to delete manipulated client data, including call and text metadata, which had been compromised between May 2022 and January 2023. The breach occurred from April 14th to April 25th, 2024, through unauthorised access to AT&T’s third-party cloud platform. The compromised data included phone numbers, communication dates, and call durations, but did not involve the actual content of conversations or text messages.

The payment was made in Bitcoin, and the hacker confirmed the data deletion through a demonstration video. Despite this effort to erase evidence, there is concern that some information might still be accessible, potentially posing ongoing security risks for AT&T’s consumers.

Compromise of Squarespace domain names

Squarespace customer accounts were compromised by hackers, leading to unauthorised access to sensitive information such as email addresses and account details. The breach was attributed to a third-party vendor, highlighting concerns about the security measures in place for customer data. In response, Squarespace has notified affected users and is working to enhance their security protocols.

To protect their accounts, customers are urged to change their passwords and enable two-factor authentication. This incident underscores the persistent risks associated with third-party integrations in the digital environment and the importance of robust security measures.

22 minutes to exploit

Cloudflare’s Q1 2024 Application Security Report reveals that it takes hackers an average of just 22 minutes to exploit newly disclosed vulnerabilities, highlighting a concerning trend in cybersecurity. The report indicates that Distributed Denial-of-Service (DDoS) attacks remain a significant threat, constituting 37.1% of mitigated traffic, while automated traffic makes up one-third of all internet activities, a substantial portion of which is malicious.

Additionally, API traffic has increased to 60%, with many organisations regularly missing a large number of their public-facing API endpoints. The report also underscores the growing use of zero-day exploits and the challenges posed by third-party integrations in web applications, emphasising the constantly evolving cybersecurity threat landscape.

Exploiting the Crowdstrike Issue

On July 19, 2024, Windows systems were impacted by an issue with the CrowdStrike Falcon sensor, which cybersecurity experts have flagged as a serious concern. Hackers exploited this vulnerability to target CrowdStrike customers through phishing campaigns, social engineering, and the distribution of potentially harmful software. The attackers impersonated CrowdStrike support, falsely claiming the issue was a content update error rather than a security problem.

This incident underscores the need for companies to authenticate communication channels and adhere to official guidance on modern threats. Additionally, it highlights the importance of educating employees about behaviours that could compromise security, helping to strengthen defences against such opportunistic attacks.

Photo by Joshua Hoehne on Unsplash

"SOS
Product news

Business Update

We’ve had a lot going on since the start of the year and so I’ve recorded a short update for you. Click to watch and listen!

We are very thankful for all our customers, those who have been with us since we started and the new ones over the past months.

"Data
Opinion, Tips

Happy Data Privacy Day!

Held annually on 28 January every year since 2007, Data Privacy Day was introduced by the Council of Europe to commemorate Convention 108 – the first, legally binding, international treaty on data protection signed in 1981.  Data Privacy Day exists now to bring the concept of data privacy to the forefront, and encourage everyone to consider the steps they take to keep their data safe, and what more they could be doing.

The landscape of data privacy has changed dramatically since that first celebration in 2007.  Wholesale changes to legislation have been implemented, new international regulations brought in and enforced, and on the whole, a shift in the dynamic of how the general public thinks about the privacy of their data.

Managing your data privacy can be a daunting task – our data is everywhere, and we’re not always consciously aware of what is happening to it.  Unsecured data, oversharing online, interacting with suspicious communications – these are all things that the threat actors of the world rely on from their victims to achieve their criminal goals.  Here are several simple things that can be done to improve your online privacy:

  • Limit sharing on social media

Social media is a gold mine of information for those with malicious intentions.  Sharing events such as birthdays, names of loved ones, employment details etc, can allow a threat actor to very quickly socially engineer scams to encourage you to divulge sensitive information.  Although we shouldn’t, quite often those details such as birthdays and loved ones’ names end up in our passwords too, so it doesn’t take much for a threat actor with a little motivation to work these out.  Ensuring privacy settings are set to maximum, and not over-sharing, will do much to protect from these threats.

  • Think before you click

We receive a deluge of emails every day, in both our personal and work lives.  Threat actors know this too which is why they’ll use email as a method to target individuals and businesses to gain access to sensitive data.  Phishing scams rely on the innocent victim not realising that the email in front of them is fake, or trying to get them to do something they shouldn’t be doing.  So if in doubt, stop and think before clicking on links or opening attachments.

  • Know your rights

Know your data privacy rights, and what applies in your country.  In Europe, this will be GDPR, which gives a lot of control back to the person to whom the data relates.  This includes:

  • The right to be informed
  • The right of access
  • The right of rectification
  • The right to erasure
  • The right to restrict processing
  • The right to data portability
  • The right to object
  • Rights in relation to automated decision making, including profiling

Despite best efforts, threat actors are constantly looking for new and novel ways to gain access to our data, and inevitably, some of this will be stolen and used for criminal activity.  SOS Intelligence has been diligently monitoring the digital landscape over 2023.  Our recent findings are a stark reminder of the rising threat of phishing attacks.  Over the past year, we have observed over half a million unique credentials compromised through phishing, and with the growth of Generative AI techniques, we expect that number to grow in 2024.

One standout feature of our technology is our real-time alert system.  This capability ensures that our clients are promptly notified when their staff have fallen victim to phishing, allowing for a swift response and effective risk mitigation, helping you to ensure that your data remains as private as possible.

Photo by Jason Dent on Unsplash

"SOS
Product news

Join us for our next SOS Intelligence webinar on Understanding Third-Party Risk for Cybersecurity

I’m delighted to invite you to our next webinar on Wednesday 14th June at 11am for twenty minutes.

Understanding Third-Party Risk for Cybersecurity 

Who is this for?

  • Anyone in a business or organisation who has responsibility for online security.
  • CTOs or senior managers who want to understand the risks of third-party cyber breaches and how to monitor them.
  • MSSPs who would like to leverage our solution with their clients.

You will learn:

  • What are third-party cyber security risks and what are the common breaches + consequences
  • The role of cyber threat intelligence in third-party risk management
  • How SOS Intelligence will help you manage your risk and your third parties

We are recording the session so if you sign up and are not able to make it, you will be sent a replay.

Sign up takes seconds, just click the button below.

"SOS
Flash Alert

Flash Alert – Brute-Force scanning of VPNs

SOS Intelligence has recently seen indications of brute-force login activity against VPN services associated with a customer.  

Our research has linked this activity to an Initial Access Broker (IAB), who has recently released access to a brute force scanning tool through their profile on a high-profile cyber-crime forum. 

Thanks to Daniel, our new Threat Intelligence Analyst who has been investigating this. Future flash alerts and intelligence reports will come from Daniel via email. If you would like to get these, you can sign up here.

The IAB has shared information with our Intelligence Team, showing statistics relating to successful logins they have found whilst scanning VPN networks.

This has highlighted a concerning amount of networks accessible using commonly known default login credentials.  However, the IAB has acknowledged that some of these may represent honeypots.

Source: SOS Intelligence discussion with Bassterlord

Initial Access Brokerage is a common feature of cyber-crime forums.  The individuals concerned involve themselves with the compromise of computer networks. 

Once persistence within the network has been maintained, they monetize that access by selling it within forums, often to actors with access to destructive malware.  Therefore, IAB activity can often be a precursor to Ransomware and/or Data-exfiltration attacks.

Other Discussions identified by the SOS Intelligence Platform related to VPN Provider Scanning

Recommendation

We recommend reviewing any VPN services in use to ensure all default account passwords have been changed, and any built-in accounts have been disabled, in accordance with the best practices of your provider.

At SOS Intelligence we can provide bespoke intelligence feeds to help monitor your data to help you identify when credentials have been leaked and are appearing online, helping you to stay ahead of the attackers and keep your networks safe.

Photo by Kevin Ku on Unsplash

"Eastern
Product news

Supporting the Eastern Cyber Resilience Centre

We are delighted to announce that we are the newest Eastern Cyber Resilience Centre Community Ambassador.

The Eastern Cyber Resilience Centre (ECRC) supports and helps protect SMEs, supply chain businesses and third sector organisations in the East of England against cyber crime.

The ECRC began its journey in November 2020. Led by Policing and facilitated by Business Resilience International Management (BRIM), they have followed a structured modular programme based on a highly successful model that had previously been established for over 9 years in Scotland.

They work in structured partnership with regional Policing, Academia, Businesses, Third and Public Sector organisations through a variety of ways.

What is a Community Ambassador?

Community Ambassadors are local businesses who recognise that cyber resilience is essential for their own customers and supply chains and want to help the ECRC promote this message.

We fully support what the ECRC are doing and very much look forward to working closely with them in the future.

1 2 3
Privacy Settings
We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
Youtube
Consent to display content from - Youtube
Vimeo
Consent to display content from - Vimeo
Google Maps
Consent to display content from - Google
Spotify
Consent to display content from - Spotify
Sound Cloud
Consent to display content from - Sound