This weekly brief highlights the latest Threat Intelligence: Evidence-based knowledge about an existing hazard designed to help organizations understand the risks common and severe external threats, used to inform decisions regarding the subject’s response. LookingGlass Cyber (n) - Actionable, relevant, and timely information that can help when assessing the security posture of an organization. A little more left. No no, that’s now too far... news to provide insight into the latest threats to various industries.
“According to a recent study, most healthcare data breaches in 2015 were caused by cyberattacks, such as Phishing: The use of emails that appear to be from a legitimate, trusted source that are enticed to trick recipients into entering valid credentials including personal information such as passwords or credit card numbers into a fake platform or service. LookingGlass Cyber (n) - tailoring an attack (such as email) to garner trust and credentials that are then used maliciously. The preverbal digital version of the ol' hook and bait. scams and Ransomware: A type of malware that serves as a form of extortion by one party on a group of persons or organizations. Oftentimes takes the form of encrypting a victim’s hard drive denying them access to files or other information with demands taking the form of a ransom before access is restored. LookingGlass Cyber (n) - when an organization, group, or hacker takes control of your system to extort a user or organization for money. Ch-ching!.
Cyberattacks were the top cause of healthcare data breaches in 2015, according to a recent study by Symantec Corporation on healthcare Cybersecurity: A set of security techniques that are designed to protect the integrity of computer systems, programs and data from theft and damage to their hardware, software or other information as well as the disruption and misappropriation of their services. LookingGlass Cyber (n) - Professional paid ninjas who protect the cyber world from cyber attacks. Everybody is doing it, but we have the double black belt with the Versace logo. So yeah, we’re really good..
The study showed that providers have shifted their views on healthcare cybersecurity to account for the rise of cyber threats, such as ransomware and phishing scams, and the increasing risk to care delivery and patient safety.
“Researchers have come across a new banking Trojan that appears to borrow code from the notorious Zeus.
Dubbed Panda Banker, the threat was discovered in February by Fox IT and later analyzed in detail by experts at Proofpoint.
According to Proofpoint, cybercriminals have used both spear-phishing emails and exploit kits to deliver the Trojan. In one spear-phishing campaign observed on March 10, attackers sent an email containing a malicious document to people working in mass media and manufacturing organizations. When recipients opened the document, Panda Banker was downloaded from a remote server.”
– Security Week
Legal and Regulations
The Cabinet Office published the UK Cyber Security Strategy 2011-2016 final report, looking at the impact and highlights of the program since its launch with particular reference to the program’s central objectives of business security, resilience to cyber attacks, to create a open, vibrant, and stable cyberspace able to support an open society, and to enhance skills, knowledge, and capabilities around cyber security in the UK.
– UK G
“An “Anonymous” YouTube user named “TheAnonMessage” has just announced #Op_Pharma, a coordinated effort to expose the “lies and corruption of the medical system” and Big Pharma.
The video introduction uses clips from a documentary that includes the voice of the Health Ranger and other outspoken critics of the pharmaceutical cartels. From there, the video shows a “V for Vendetta” video while a computer generated voice speaks […]”
“A new version of the NewPosThings PoS Malware: A generic term for a software that is designed to disable or otherwise damage computers, networks and computer systems LookingGlass Cyber (n) - another type of cold that can destroy a computer by latching on to destroy other programs. is using a clever technique to extract data from infected PoS terminals that almost no security solution monitors for malware activity.
The NewPoSThings malware appeared many years ago, and for a long time, it didn’t stand out from the crowd of other PoS malware families.
Just like the competition, NewPoSThings infected Windows processes that handled credit card data, scraping content for financial information, and then sending it to its C&C server.”
“Malware authors have put together a strain of malicious code written entirely in Python, in what may turn out to be an experiment in creating a new type of cross-platform nasty.
PWOBot is written entirely in Python, and compiled via PyInstaller to generate a Microsoft Windows executable.
The malware has already infected a number of Europe-based organisations, particularly in Poland, according to new research.”
“The FBI cannot unlock 13% of the password-protected cellphones it has seized as evidence in the past six months, a top bureau official told a House panel Tuesday.
About 30% of the 3,000-plus phones that the FBI has seized since Oct. 1 require passwords to open, said Amy Hess, executive assistant director of the FBI’s science and technology branch. The FBI was able to unlock most of those phones, but the number that they can’t get into is growing as tech companies build devices with stronger data encryption, Hess said. She also said passwords are becoming longer and more difficult to guess, even with special computer programs designed to crack them.”