Wednesday, August 10, 2022
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

Attackers unleash LockBit ransomware on US government computers

Researcher by Researcher
April 15, 2022
in Cybersecurity
0
Ransomware attacks are on the rise, who is being affected?
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


According to Sophos, the route of attack stemmed from vulnerabilities in the system’s open firewall ports.

ransomware.
Image: nevarpp, Getty Images/iStockphoto

New findings from cybersecurity company Sophos show some of the methods employed by hackers when it comes to exploiting gaps in federal devices. One attack highlighted in the report found that ransomware groups spend at least five months combing through a regional U.S. government agency’s files and system before deploying a LockBit attack onto the affected computer.

“This was a very messy attack,” said Andrew Brandt, principal security researcher at Sophos. “Working together with the target, Sophos researchers were able to build a picture that started with what appears to be novice attackers breaking into the server, poking around the network and using the compromised server to Google a combination of pirated and free versions of hacker and legitimate admin tools to use in their attack.”

How a government computer was infiltrated

Over a period of nearly half a year, hackers prodded through the target network, then used the Google Chrome browser to find and install hacking tools onto the affected server. From there, a number of different pieces of hacking equipment, such as password brute-forcers and crypto miners were installed on the computer, along with custom scripts and configuration files for ransomware that were later found to be in the targeted system.

Must-read security coverage

The unskilled but effective attack then attempted to employ IT management software to avoid detection, through use of tools such as ScreenConnect and AnyDesk, typically used for remote access purposes. It was later discovered by Sophos that in the setup of the system itself, the IT team left open RDP ports on a firewall for public access to the server, allowing for the infiltration by the hacking group in question.

SEE: Mobile device security policy (TechRepublic Premium)

Once remote access was enabled, the LockBit ransomware was then deployed on the system by taking advantage of the system vulnerability. The malicious parties attempted to cover their tracks once finished by deleting log files, but Sophos was able to reconstruct the steps taken for the hack to take place, as it was suspected to have been perpetrated by unsophisticated cyberattackers.

“This case is a compelling reminder that while stories about APT’s and zero-day attacks dominate the news, many cyberattacks come from relatively unsophisticated individuals taking advantage of simple errors or easily avoided misconfigurations,” said Chris Clements, VP of Solutions Architecture at Cerberus Sentinel. “In this case, there were many failures by the organization that were the equivalent of rolling out the red carpet to the attackers. Leaving RDP access open to the internet is extremely risky. Automated bots routinely scan the entire internet for open RDP servers to brute force with common accounts and passwords. In this situation the attackers lucked into guessing credentials for an account that was not only an administrator on the exposed system, but also had administrator rights to the entire network. This would have been an immediate game over situation for any experienced attacker, but the initial attacker here appears to have been extremely inexperienced.”

Staying protected from cyberattacks

The one silver lining in this situation was that the attackers seemed inexperienced and not sure what to do after gaining access to the government network. In many cases, affected organizations are not so lucky to be able to reconstruct the timeline and method of attack. Brandt recommends that businesses take an around the clock approach to cybersecurity, along with making determinations on how and why software is downloaded to devices on the network.

“A robust, proactive, 24/7 defense-in-depth approach will help to prevent such an attack from taking hold and unfolding,” he said. “The most important first step is to try to prevent attackers from gaining access to a network in the first place, for example by implementing multi-factor authentication and setting firewall rules to block remote access to RDP ports in the absence of a VPN connection. If a member of the IT team hasn’t downloaded them for a specific purpose, the presence of [unrecognized] tools on machines on your network is a red flag for an ongoing or imminent attack.”

This type of attack is also a lesson in taking extra precautions when it comes to network setup and ensuring any potential routes of attack are shut down through constant monitoring by the IT team. If ransomware can find a way into and infect a federal network, it is critical that organizations without government-level cybersecurity take time to make sure virtual safeguards are in place in case of attack.



Source link

Related articles

Musk Threatens to Walk Away From Twitter Deal

Jury Finds Ex-Twitter Worker Spied for Saudi Royals

August 10, 2022
How to reset your Windows 10 password when you forget it

How to reset your Windows 10 password when you forget it

August 10, 2022
Tags: AttackerscomputersGovernmentLockBitRansomwareUnleash
Share76Tweet47

Related Posts

Musk Threatens to Walk Away From Twitter Deal

Jury Finds Ex-Twitter Worker Spied for Saudi Royals

August 10, 2022
0

A former Twitter worker was found guilty on Tuesday of spying for Saudi officials keen to unmask critics on the...

How to reset your Windows 10 password when you forget it

How to reset your Windows 10 password when you forget it

August 10, 2022
0

Learn how to reset your Windows 10 password whether you use a Microsoft Account or a local account. Uh-oh, you’ve...

VMware Warns of Critical Authentication Bypass Flaw

Exploit Available for Critical VMware Bug CVE-2022-31656

August 9, 2022
0

The researcher who discovered two critical vulnerabilities in VMware ONE Workspace Access has released a proof-of-concept exploit for one of...

High-Severity Flaw in Argo CD is Information Leak Risk

Privya Emerges From Stealth With Data Privacy Code Scanning Platform

August 9, 2022
0

Privya emerged from stealth mode on Tuesday with a data privacy-focused code scanning platform and $6 million in seed funding....

How older security vulnerabilities continue to pose a threat

How older security vulnerabilities continue to pose a threat

August 9, 2022
0

Security flaws dating back more than 10 years are still around and still pose a risk of being freely exploited,...

Load More
  • Trending
  • Comments
  • Latest
Brave browser’s Tor mode exposed users’ dark web activity

Brave browser’s Tor mode exposed users’ dark web activity

February 18, 2022
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
UK Fintech News Round-Up: The Latest Stories 02/03

UK Fintech News Roundup: The Latest Stories 10/08

August 10, 2022
Musk Threatens to Walk Away From Twitter Deal

Jury Finds Ex-Twitter Worker Spied for Saudi Royals

August 10, 2022
MAS Confirms the Return of Singapore Fintech Festival 2022 as an In-Person Event

MAS Confirms the Return of Singapore Fintech Festival 2022 as an In-Person Event

August 10, 2022
How to reset your Windows 10 password when you forget it

How to reset your Windows 10 password when you forget it

August 10, 2022

Recent Posts

UK Fintech News Round-Up: The Latest Stories 02/03

UK Fintech News Roundup: The Latest Stories 10/08

August 10, 2022
Musk Threatens to Walk Away From Twitter Deal

Jury Finds Ex-Twitter Worker Spied for Saudi Royals

August 10, 2022
MAS Confirms the Return of Singapore Fintech Festival 2022 as an In-Person Event

MAS Confirms the Return of Singapore Fintech Festival 2022 as an In-Person Event

August 10, 2022

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • Malware
  • Networking
  • Protection

Tags

Access Android attack Attacks banking BiWeekly bug Cisco critical Cyber Cybersecurity Data devices Digital exploited financial Finds Fintech Flaw flaws Google Group Hackers Krebs Latest malware Microsoft million Network News open Payments phishing Ransomware RoundUp scams security Software TFT Threat vulnerability warns Week Windows zeroday

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved