Tag Archive for: teams

Biden speaks after briefing from national security teams


President-elect Joe Biden is delivering remarks Monday afternoon, hours after President Trump finally signed a massive government funding bill and coronavirus relief package, the future of which he’d thrust into uncertainty with 11th-hour demands.



Joe Biden wearing a suit and tie: President-Elect Joe Biden And Vice President-elect Kamala Harris Announce Miguel Cardona As Hhe Nominee For Education Secretary


© Joshua Roberts / Getty Images
President-Elect Joe Biden And Vice President-elect Kamala Harris Announce Miguel Cardona As Hhe Nominee For Education Secretary

Mr. Biden’s comments will follow a briefing from members of his national security and foreign policy agency review teams “on their findings and key challenges that the Biden-Harris administration will inherit,” according to the president-elect’s transition team.

How to watch President-elect Joe Biden’s remarks

  • What: President-elect Joe Biden delivers remarks
  • When: Monday, December 28
  • Time: 3:30 p.m. ET
  • Location: Wilmington, Delaware
  • Online stream: Live on CBSN — in the player above or on your mobile or streaming device

The president-elect has been vocal about the numerous challenges his administration will face once he assumes office, chief among them reversing the economic devastation brought by the coronavirus pandemic and mitigating the spread of the virus.

Video: Biden rebukes Trump for his response to cyberattack on U.S. government (CBS News)

Biden rebukes Trump for his response to cyberattack on U.S. government

UP NEXT

UP NEXT

Mr. Biden will also be tasked with responding to the massive cyberattack that hit numerous government agencies, including the Departments of Energy, State and Treasury.

The perpetrators of the breach, believed to be Russian hackers, infiltrated computer networks through a popular software product from SolarWinds, a Texas-based company that also works with many of the nation’s largest corporations. The full scope of the cyberattack and the damage done remain unclear. Mr. Biden last week condemned Mr. Trump for allowing the breach to occur on his watch and vowed to take it…

Source…

Microsoft Teams Hit by ‘FakeUpdates’ Malware Using Cobalt Strike; Here’s How to Prevent It


Microsoft warned its users about recent “FakeUpdates” campaigns targeting  various types of companies, particularly the education sector that uses Teams videoconferencing app. 

According to a Bleeping Computer as shared by Threat Post, the tech giant warned its customers about the security threat using fake Microsoft Teams update ads as backdoors to infect networks with malware. They use Cobalt Strike in this campaign, which targets the K-12 education and other companies, which are currently dependent on videoconferencing apps such as Microsoft Teams amid the coronavirus pandemic.

Microsoft Teams Is Under Attack by ‘FakeUpdates’ Malware Using Cobalt Strike

(Photo : Microsoft)
Microsoft Teams Is Under Attack by ‘FakeUpdates’ Malware Using Cobalt Strike

Microsoft Teams: ‘FakeUpdates’ Malware Uses Cobalt Strike

According to a report, cyber attackers use Cobalt Strike to infect company networks outside the infection point.

Cobalt Strike is being used by threat actors to spread ransomware and other kinds of malware. It is a commodity attack-simulation tool, which was used in exploiting the privilege-elevation flaw Zerologon that allows attackers to gain access to the domain controller and fully compromise Active Directory identity services.

The Microsoft advisory stated that attackers in the recent FakeUpdates campaign used search-engine ads to promote Teams software top results into a domain that they can use and control for infamous activity. Then, if victims would click the link, it would download a payload and execute a PowerShell script that loads malicious content.

Cybercriminals use Cobalt Strike as payload, so threat actors can laterally move across the network beyond the initial infection system. It also installs a valid Microsoft Teams app on the system, so it seems legitimate and prevents victims from noticing the attack.

‘FakeUpdates’ Malware Uses Cobalt Strike

(Photo : Microsoft)
‘FakeUpdates’ Malware Uses Cobalt Strike

The advisory also stated that the campaign dispenses malware, which include the infostealer Predator the Thief, which steals sensitive data including account credentials, payment data, and browsers. The tech giant also noticed the latest campaigns spreading ZLoader and Bladabindi (NJRat) backdoor.

In…

Source…

US Cyber Command now has teams around the world tracking hackers from Russia, China, Iran, N. Korea and more


The U.S. Cyber Command has sent teams to Europe, the Middle East, and Asia as part of increased U.S. efforts to track down Russian, Iranian, Chinese, and North Korean hacking groups ahead of election day.

Military officials told the New York Times that Cyber Command, which runs the military’s offensive and defensive cyber operations, has expanded on efforts it began in 2018 to track foreign hacking operations and identify the methods they were using to break into computer networks.

2018 efforts primarily focused on counteracting Russian cybersecurity threats, but have expanded with cyber teams being sent to the Middle East and Asia. A U.S. intelligence report in August warned of Russian efforts to denigrate Democratic presidential candidate Joe Biden, and Chinese and Iranian efforts to undermine President Donald Trump.

“Since 2018, we have expanded our hunt forward operations to all major adversaries,” Lt. Gen. Charles L. Moore Jr., the deputy head of Cyber Command, told the New York Times in an interview at Fort Meade, Maryland.

Cyber Command refers to its efforts to proactively find hacker groups as “Hunt forward operations.” Cyber Command efforts are reportedly aimed at getting close to foreign hacker groups to identify and potentially stop cyberattacks against the U.S.

Moore described the Cyber Command actions as a proactive effort to defend against hackers. He told the New York Times, “We want to take down the archer rather than dodge the arrows.”

Cyber Command continued to assist in operations against potential cyber-attacks following the 2018 election and Moore said the anti-hacking past Election Day in 2020.

“We are not stopping or thinking about our operations slacking off on Nov. 3,” Moore told the New York Times. “Defending the election is now a persistent and ongoing campaign for Cyber Command.”

In 2018 Cyber Command reportedly sent teams to North Macedonia, Montenegro and other countries to learn more about Russian operations. Cyber Command also sent warnings to potential Russian trolls and reportedly worked to keep at least one Russian troll-farm offline on election day during the 2018 U.S. midterm elections.

Cyber Command also…

Source…