Tag Archive for: Operators

Infobip acquires Anam to offer enhanced product and service offerings for mobile network operators


Infobip announces it has acquired SMS firewall service provider Anam that offers solutions to more than 80 MNOS with more than 606 million customers across the world. The purchase price remains undisclosed and consists of a combination of cash and Infobip shares. 

This strategic acquisition strengthens Infobip’s position as the first choice for mobile network operators through enhanced product and service offerings. 

Their combined product portfolio for MNOs represents an exceptional proposition to mobile operators that will also vastly benefit subscribers, and includes best in class SMS Firewall, SMS Hubs, SMSC, CPaaS, RCS and Authentication & Verification. 

With Anam joining Infobip’s Strategic Operator Partnerships division, customers of both companies will benefit from a better all-up offering including 24/7 Networks Operations Centre (NOC), on ground support, enriched analytics, and reporting. 

Additionally, it offers greater scale through Infobip’s truly global presence and direct relationship with over 650 carriers across the world. Together Anam and Infobip’s combined assets secure the best supply chain available today for A2P SMS globally. 

The companies will now be able to provide technical solutions to a combined 700+ MNOS globally with 64% global mobiles reached. Infobip processes more than 14 billion monthly customer interactions across the full range of communication channels, in more than 190 countries around the globe. 

Both companies are active GSMA associate members and have consistently ranked Tier 1 in ROCCO’s A2P SMS Firewall vendor benchmarking reports. Both are also recipients of Juniper Future Digital Awards in their respective fields making this a highly complementary union. 

Anam is also one of the few companies that hold certification of both ISO 27001 and ISO 20000 – best practice standards for information security and IT service management – that guarantee premium levels of Quality of Service to operators.  

Culturally, both businesses have closely matched company values and beliefs –abiding by a team-based ethos which emphasizes employee…

Source…

Ransomware Operators Using SystemBC Malware as Backdoor


Fraud Management & Cybercrime
,
Next-Generation Technologies & Secure Development
,
Ransomware

Researchers Have Seen Commodity Malware Used With Ryuk and Egregor

Ransomware Operators Using SystemBC Malware as Backdoor
Diagram shows how ransomware operators incorporate the SystemBC malware into an attack. (Source: Sophos)

Several recent ransomware attacks, including those involving Ryuk and Egregor, have used a commodity malware variant called SystemBC as a backdoor, security firm Sophos reports.

See Also: 7 Ways to Take Cybersecurity to New Levels

First uncovered by security firm Proofpoint in August 2019, SystemBC works as a network proxy for concealed communications as well as remote access Trojan, or RAT, that allows threat actors to deploy additional commands and scripts to infected Windows devices as well to gather data.

And while researchers have tracked SystemBC over the years, the Sophos report finds that its creators have added new features, with ransomware operators and their affiliates taking advantage of these updates to deploy their crypto-locking malware.

Sophos found that the SystemBC malware now uses the Tor anonymizing network to encrypt and conceal the destination of command-and-control server traffic. This not only helps obfuscate the attackers’ communications but also allows them to better hide when data is gathered and exfiltrated, according to the report.

“Collectively, these capabilities give attackers a point-and-shoot capability to perform discovery, exfiltration and lateral movement with packaged scripts and executables – without having to have hands on keyboard,” Sophos analysts…

Source…

Botnet Operators Abusing Legit GitHub, Pastebin Resources


Cryptocurrency Fraud
,
Cybercrime
,
Fraud Management & Cybercrime

Researchers: ‘Gitpaste-12’ Botnet Mainly Targets Linux And IoT Devices

Botnet Operators Abusing Legit GitHub, Pastebin Resources
GitHub Page Hosting ‘Gitpaste-12’ malware before being taken down (Source: Juniper Threat Labs)

The operators behind a recently uncovered botnet dubbed “Gitpaste-12” are abusing legitimate services such as GitHub and Pastebin to help hide the malware’s malicious infrastructure, according to report from Juniper Threat Labs.

See Also: Palo Alto Networks Ignite 20: Discover the Future of Cybersecurity, Today


The botnet, which was first uncovered in October but appears to have been activated in July, mainly targets vulnerable Linux applications as well as internet of things and other connected devices, according to Juniper. The researchers also note that the malware contains at least 12 separate attack modules to help it infect new endpoints and apps.


While the ultimate purpose of the botnet is not fully known, the Juniper analysis finds that Gitpaste-12 comes equipped with cryptomining capabilities and can specifically mine monero cryptocurrency, according to the report.


It is the use of legitimate services such as Pastebin and Github, however, that stood out when the researchers first came across the botnet last month, according to the report.


By using Pastebin and GitHub, the malware can remain hidden from firewalls and proxies. This allows the operators to act stealthily while building the botnet and sending instructions through the command-and-control server, according Juniper’s Alex Burt and Trevor Pott note in their report.


Juniper has contacted…

Source…

More than 1,000 Air Force cyber security operators to transfer to Space Force – SpaceNews

More than 1,000 Air Force cyber security operators to transfer to Space Force  SpaceNews
“cyber warfare news” – read more