Skip to main content

Friday Five: Verizon's DBIR Findings, Biden's Critical Infrastructure Blueprint, & More

by Robbie Araiza on Friday May 3, 2024

Contact Us
Free Demo
Chat

Verizon's annual Data Breach Investigations Report topped this past week's headlines. Read about their findings, more on the fight to secure critical infrastructure, a malware threat impacting at-home workers, and more in this week's Friday Five.

EXPLOITATION OF VULNERABILITIES ALMOST TRIPLED AS A SOURCE OF DATA BREACHES LAST YEAR BY TIM STARKS

Last year saw a 180% surge in attacks exploiting vulnerabilities, largely due to the MOVEit hack, according to Verizon's annual data breach report. The MOVEit breach, with a total of 1,567 identified notifications, was one of the most significant ransomware attacks of the past year, contrasting with the surprisingly underwhelming impact of the log4j vulnerability. MOVEit disproportionately affected the education sector, highlighting its vulnerability as one of the least equipped sectors to fend off attacks. The report also analyzed over 10,000 breaches and 30,000 incidents, revealing minimal impact from artificial intelligence-driven attacks. Existing methods remain effective, suggesting sophistication isn't always necessary for success.

Read more

CRITICAL INFRASTRUCTURE BLUEPRINT GETS LONG-AWAITED UPDATE BUT MAINTAINS STATUS QUO ON KEY SECTORS BY DAVID DIMOLFETTA

The White House has updated Presidential Policy Directive 21 (PPD-21), reaffirming 16 critical infrastructure sectors without adding new ones, despite previous recommendations. The update designates the Cybersecurity and Infrastructure Security Agency (CISA) as the national coordinator, requires the Office of the Director of National Intelligence to provide the White House with a critical infrastructure intelligence assessment within six months of the signing, and makes the Homeland Security Secretary responsible for sending a report to the president every other year that summarizes U.S. efforts to mitigate cyber risks to the sectors. Moreover, intelligence agencies will share information with infrastructure operators, who are often hackers' first targets. The rewrite aims to address evolving cyber threats, moving from counterterrorism to strategic competition and nation-state hacking.

Read more

ACCOUNT COMPROMISE OF “UNPRECEDENTED SCALE” USES EVERYDAY HOME DEVICES BY DAN GOODIN

Okta has issued a warning about a large-scale attack campaign that uses mobile devices and browsers of unsuspecting users to reroute fraudulent login attempts, with the attackers employing various methods -- including proxy services and TOR networks -- to disguise the origins of their actions. Attackers are then using affected devices for credential-stuffing attacks, which involve using stolen login credentials to gain unauthorized access to online accounts. Okta's advisory follows a similar report from Cisco's Talos security team that identified similar attacks. Okta's advisory advises users to be cautious of apps and services that may use their devices for malicious purposes, and network administrators are encouraged to implement strong password policies and multifactor authentication.

Read more

US GOVT WARNS OF PRO-RUSSIAN HACKTIVISTS TARGETING WATER FACILITIES BY LAWRENCE ABRAMS

The US government, along with several agencies and international partners, has issued a warning about pro-Russian hacktivists targeting unsecured operational technology (OT) systems, which control physical processes in various industries, such as water treatment plants. The hacktivists aim to disrupt operations or create disturbances using unsophisticated techniques, but they are also capable of more serious threats. Recent attacks in 2024 targeted water treatment facilities in Texas and Indiana, as well as infrastructure in Poland and France. The advisory outlines mitigation steps, including securing remote access, enabling multifactor authentication, and updating security measures to protect against these threats.

Read more

NEW CUTTLEFISH MALWARE INFECTS ROUTERS TO MONITOR TRAFFIC FOR CREDENTIALS BY BILL TOULAS

A new malware dubbed 'Cuttlefish' targets enterprise-grade and SOHO routers, enabling data monitoring and theft. It creates proxy or VPN tunnels to bypass security measures and performs DNS and HTTP hijacking, potentially introducing more payloads. Infections likely occur through vulnerabilities or credential brute-forcing and although it shares code with HiatusRat, attribution is challenging. Cuttlefish deploys a bash script to collect data and execute its payload, after which it monitors network traffic for credential data, logging and exfiltrating it to the attacker's server. Prevention measures include strong credentials, firmware updates, and monitoring for unusual logins.

Read more

Tags:  Data Breaches Critical Infrastructure Malware Vulnerabilities

Recommended Resources

The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention

All the essential information you need about DLP in one eBook.

6 Cybersecurity Thought Leaders on Data Protection
6 Cybersecurity Thought Leaders on Data Protection

Expert views on the challenges of today & tomorrow.

Digital Guardian Technical Overview
Digital Guardian Technical Overview

The details on our platform architecture, how it works, and your deployment options.

Get the latest security insights
delivered to your inbox each week.