Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label Public Networks. Show all posts

Delaware Libraries Hit by Ransomware Attack, Internet Services Disrupted

 

Last week, Delaware’s public libraries faced a cyberattack, causing widespread disruption to computer and internet access. Signs posted at libraries informed visitors that Wi-Fi and PCs were out of service, with officials confirming a ransomware attack took down all internet services. Despite the inconvenience, visitors can still check out books and use other library services. Ransomware attacks like this often start with phishing emails or social engineering, where users are tricked into actions that allow hackers access. 

Matt Barnett, CEO of cybersecurity firm Sevn-X, explained that attackers typically cast a wide net with phishing emails, waiting for a target to take the bait. He speculated that the hackers responsible for this attack are likely from Russia or Eastern Europe, suggesting they targeted Delaware not out of malice but simply because it was an easy opportunity. Hackers look for low-hanging fruit, making any vulnerable entity a potential target. Ransomware attacks usually demand payment in exchange for returning access to the compromised systems. 

In this instance, Delaware state officials have not confirmed if any personal information was stolen. However, the situation serves as a stark reminder of the importance of cybersecurity, even for community services like public libraries. Cybersecurity experts stress the need for vigilance and proactive measures to protect against such threats. Organizations should implement strong email security protocols, train employees to recognize phishing attempts, and regularly update software to patch vulnerabilities. Regular data backups are also essential, ensuring that in the event of an attack, systems can be restored without paying a ransom. 

While this attack has disrupted library services, it is also a learning opportunity. Public institutions, often seen as “soft targets,” must prioritize cybersecurity to protect their networks, systems, and the personal data of their users. By investing in robust cybersecurity measures, conducting employee training, and implementing multi-factor authentication, public services can better defend themselves against future attacks. 

This incident serves as a reminder that cyber threats are ever-present, and even seemingly small targets like public libraries are not immune. As ransomware attacks continue to rise, organizations of all sizes must take active steps to fortify their defenses and educate themselves about potential risks.

Iranian Hacker Group Void Manticore Linked to Destructive Cyber Attacks on Israel and Albania

 

A recent report from Check Point Research (CPR) has unveiled the activities of an Iranian hacker group known as Void Manticore, which has been linked to a series of destructive cyber attacks on Israel and Albania. Affiliated with Iran’s Ministry of Intelligence and Security (MOIS), Void Manticore operates alongside another Iranian threat actor, Scarred Manticore, to carry out these attacks. 

The group employs various online personas, such as "Karma" for attacks in Israel and "Homeland Justice" for those in Albania. Their tactics involve gaining initial access to target networks using publicly available tools and deploying custom wipers to render data inaccessible on both Windows and Linux systems. CPR’s analysis details a systematic collaboration between Void Manticore and Scarred Manticore. Initially, Scarred Manticore gains access and exfiltrates data from targeted networks. 

Control is then transferred to Void Manticore, which executes the destructive phase of the operation. This strategic partnership amplifies the scale and impact of their cyber attacks. The report underscores the similarities in the attacks on Israel and Albania, including the exploitation of specific vulnerabilities for initial access, the use of similar tools, and the coordinated efforts between the two groups. These overlaps suggest a well-established routine for the Iranian hacker groups. 

Void Manticore's toolkit includes several custom wipers, such as the CI Wiper, Partition Wipers like LowEraser, and the recently deployed BiBi Wiper, named after Israeli Prime Minister Benjamin Netanyahu. These wipers specifically target files and partition tables, using advanced techniques to corrupt files and disrupt system functionality. 

The revelation of Void Manticore's activities and its collaboration with Scarred Manticore underscores the growing sophistication and coordination of state-affiliated cyber threat actors. The combined use of psychological tactics and destructive malware represents a significant escalation in cyber warfare, posing substantial risks to national security and critical infrastructure. 

As these cyber threats continue to evolve, it is imperative for nations and organizations to strengthen their cybersecurity defenses and enhance their capabilities to detect, mitigate, and respond to such sophisticated attacks. The report from CPR serves as a crucial reminder of the persistent and evolving nature of cyber threats posed by state-affiliated actors like Void Manticore and Scarred Manticore.

Guard Your Data: The Pitfalls to Avoid on Public Wi-Fi Networks

 


Since remote and hybrid working has become increasingly prevalent, many office workers no longer have to be in the office constantly. Many people can work from their homes, but sometimes it is nice to change scenery – which is why some people work from cafes, coffee shops, or even unconventional locations such as a boat or van – even though working from home is a great option for many people. 

It is possible that working people may be on their way to work, or even on vacation, and need to be able to check in on e-mail, social media, or banking applications from an airport, hotel lobby, or conference centre as they go, such as while in an airport, hotel lobby, or conference centre.  

This will make it likely that the public spaces in which they stay will have free Wi-Fi available to all visitors. As a result of the venue's free Wi-Fi, customers can make use of the internet, which is useful for them, and could encourage them to stay in public areas for a longer period.  

It is common for public Wi-Fi networks not to be equipped with the necessary security measures called encryption, which scrambles the information that is sent from their computer or device to the router so strangers cannot access it. 

Cybercrooks could intercept the information that they send over these networks if there is no security measure in place to protect it from them. There are several security risks associated with public Wi-Fi, including hackers taking advantage of the lax security of the network to monitor users' Wi-Fi connection and steal their personal information and passwords, or even take over their accounts online if proper precautions are not taken.

Among the information gathered could be the passwords of bank accounts and social media accounts, as well as personal information. An internet snoop could also observe which websites the users visit and the data they enter into web forms, which could help access the information gathered. 

At the time, the conventional wisdom was that one should not access a bank website or social media account on a WiFi network while on a public Wi-Fi network. Today, they do not have to be as strict, however, that does not mean they should not be cautious. 

Their data should be protected by at least one layer of encryption so that at least one layer of encryption is applied to all of their data. To steal sensitive information from unsecured networks, cybercriminals use both their professional know-how and free tools to sneak in and take control of the network. 

Some of the information that they steal will include passwords, banking information, and personal information that could be used to steal someone's identity. Generally, bank websites and social media websites use Hypertext Transfer Protocol Secure (HTTPS), which is a secure version of the HTTP protocol, which is indicated in the address bar by the prefix "https://" or the lock icon. 

The data that you send to and from a website is encrypted in transit when you log into it with the HTTPS version of that website. A virtual private network (VPN) is a technology that allows WiFi users to route all their internet traffic through a trusted network such as a virtual private network (VPN). 

Although VPNs are often used to bypass geo-blocked content, they have many other great advantages including being secure. As a result, the traffic is encrypted and hidden, as well as routed through one of their servers. Whether Wi-Fi users are looking for a VPN that is reliable, secure, and convenient, the list of 2023's best VPNs is a good starting point, but Google One subscriptions also have a VPN that comes included with them. 

To make sure that the device does not automatically reconnect when people use public Wi-Fi, they must ensure they have disabled auto-reconnecting or have chosen the "forget this network" option when they are using public Wi-Fi. 

When auto-reconnect is enabled and the users' device is connected to a nearby network, their device is broadcasting to potential bad actors that they accept nearby networks as being on par with their home network and treat them as such. Threat actors may connect stealthily to their devices with the help of their SSIDs (network names) because devices recognize known networks by their SSIDs. 

How to Use Public Wi-Fi Safely  


Confirm the Network's Legitimacy

To ensure that the Wi-Fi network people are connecting to is authentic, make sure they look for official signs or consult the establishment staff to confirm its authenticity. Trustworthy networks reduce the risk of cyber threats. 

Steer Clear of Entering Sensitive Data

Do not enter confidential data, such as credit card details or passwords, while using public Wi-Fi. Keep your personal information private by refusing to enter sensitive data, such as passwords. By taking this precaution, there will be less chance of a breach of personal information. 

Employ a VPN for Added Security

Whenever people connect to a public Wi-Fi network, it is strongly advised that they should use a Virtual Private Network (VPN). VPNs encrypt their data and shield their digital activities from prying eyes.