Tag Archive for: Unprepared

UK unprepared for catastrophic ransomware attack: Report – Anadolu Agency | English



UK unprepared for catastrophic ransomware attack: Report  Anadolu Agency | English

Source…

Enterprises Unprepared to Defend Against MITRE ATT&CK Techniques


Enterprises lack detections for more than three-quarters of all MITRE ATT&CK techniques, while 12% of SIEM rules are broken and will never fire due to data quality issues including misconfigured data sources and missing fields.

These were among the results of a CardinalOps report which analyzed real-world data from production SIEMs including from Splunk, Microsoft Sentinel, IBM QRadar and Sumo Logic.

The data covered more than 4,000 detection rules, nearly one million log sources and hundreds of unique log source types, spanning industry verticals ranging from banking and financial services to manufacturing and energy. 

The study also indicated that while organizations are implementing “detection-in-depth”—collecting data from multiple security layers including Windows endpoints and email—monitoring of containers lags behind.

Broken Rules

Mike Parkin, senior technical engineer at Vulcan Cyber, said the biggest issue he sees is the number of “broken rules” that will never trigger an event.
“While some of them are undoubtedly edge cases that would have been unlikely to trigger an event in any case, many are almost certainly the result of misconfiguration or broken logic,” he said. 

John Gallagher, vice president of Viakoo Labs at Viakoo, said two study findings were particularly concerning.

“While it is encouraging to see there is already sufficient data to detect 94% of potential MITRE ATT&CK techniques, it raises the question of what the missing 6% is and how impactful such attacks might be,” he said.

For example, if the missing 6% resulted in catastrophic damage (e.g., an IoT attack vector that is highly damaging) it might put more focus on achieving higher than 94% coverage. 

He added that “security layers” is a term defined by CardinalOps and is useful for organizations to plan resources and strategies based on their specific organization. “However, it includes containers but not IoT/OT, which seems like a significant oversight,” Gallagher noted.

For example, IoT/OT is used by almost all organizations (more than the 68% who reported using containers) and is less covered by a security layer within their SIEM than containers are.

“Lack of high-fidelity data…

Source…

Consumers Face Greater Risks From Malware But Many are Unprepared and Vulnerable


Consumers experience the same malware threats as do businesses, but are often victimized by inadequate cybersecurity protections, ReasonLabs reports.

Credit: Getty Images

Many consumers face the same malware threats as do businesses, yet they are often victimized by inadequate security to protect themselves from cyberattacks. In many cases, the resources to defend their home networks and devices, ReasonLabs said in a new report.

A good deal of individuals and home users also are saddled with using legacy anti-virus products with antiquated engines that need to be replaced, the New York-based, consumer-centric security provider said:

“One commonality that unites most individuals or home users, no matter where they are in the world or what their socioeconomic status might be, is a lack of adequate cybersecurity with the capabilities of protecting their devices and home networks from next-generation threats.”

Key Findings From the Report

Here are the study’s findings:

  • The emergence of the metaverse and increased adoption of IoT devices carry new cyber risks, such as the metaverse attack vector identified by ReasonLabs researchers in 2022.
  • Malicious web extensions are becoming more and more prevalent; 15% of all malicious extensions detected throughout 2022 came from users in the United States.
  • Trojanized software, such as coin miners, backdoors, infostealers, remote access trojans (RATs), and spyware, continues to be a top threat to home users and remote employees, as they accounted for 31% of all detections.
  • The rise in HackUtilities detections from 4% in 2021 to 20% in 2022 demonstrates that online piracy — the use of pirated or cracked software and applications — is either at or near an all-time high.
  • Cyber warfare is increasingly impacting average citizens around the world, with the most notable examples in 2022 coming from Russia’s war in Ukraine. The study found a large increase in detections in Ukraine throughout February compared to January, signaling that Russia’s invasion was also paired with cyberattacks.
  • The…

Source…

India is dangerously unprepared for Chinese cyber-war. AIIMS ransomware attack shows why


Eight hundred acres of living theatre had been lovingly produced to allow the emperor to traverse his kingdom and the world without leaving home: The Garden of Eternal Brightness contained the temples of Tibet and Mongolia, the garden of Hangzhou, and a street scene with actors playing shopkeepers, entertainers and even beggars. The Western gardens, designed by Jesuit missionaries, included faux-baroque palaces and monuments modelled on the greatest European architecture.

Then, in 1860, French and British armies marched into Beijing, pillaging the Garden of Eternal Brightness and stealing royal treasures, including a Pekinese dog they nicknamed “Looty.” Around 10 years ago, in 2013, when Chinese President Xi Jinping came to power, he took top colleagues on a museum tour recording those events—and claimed the Communist Party alone could guard China’s independence.

Late in the summer of 2018, Ding Xiaoyang stood in the headquarters of the Ministry of State Security—located on the western end of the ruins of the Garden of Eternal Brightness—to receive a medal honouring the intelligence officer’s contributions. Through a front company called Hainan Technology, United States prosecutors have alleged, Ding identified and recruited “talented computer hackers to penetrate foreign entities and steal trade secrets, proprietary research and data.”

The Ministry of State Security—China’s principal intelligence service—targeted cutting-edge research on biotechnology, robotics and applied physics at universities and even industrial conglomerates. The campaign was part of a secret war authorised by Xi to secure the “great national revival” he promised.


Also read: Narco test for Aftab Poonawalla won’t help. It’s bad-faith science masking lazy police work


The world of Wicked Rose

For more than two weeks now, the All India Institute of Medical Sciences (AIIMS) has been struggling to restore data lost in a ransomware attack. The data was said to have been obliterated by malware developed inside Chinese intelligence-controlled hacking networks. Experts are uncertain about the identity and motives of the attackers—which could range from ransom…

Source…