This is a very interesting article from MalwareBytes and things that can have consequences for you.
What is social engineering?
https://www.malwarebytes.com/social-engineering/?utm_source=double-opt-in&utm_medium=email-internal-b2c&utm_campaign=EM-B2C-2020-January-newsletter-Issue2&utm_content=how-not-to-buy-drugs-on-internet
Wednesday, January 22, 2020
Tuesday, January 7, 2020
Iran cyber warning!!!
National Cyber Awareness System:
SUBSCRIBER SERVICES:
Manage Preferences | Unsubscribe | Help
01/06/2020 03:01 PM EST
Original release date: January 6, 2020
Iranian cyber threat actors have continuously improved their offensive cyber capabilities. They continue to engage in more “conventional” activities ranging from website defacement, distributed denial of service (DDoS) attacks, and theft of personally identifiable information (PII), but they have also demonstrated a willingness to push the boundaries of their activities, which include destructive wiper malware and, potentially, cyber-enabled kinetic attacks.
The U.S. intelligence community and various private sector threat intelligence organizations have identified the Islamic Revolutionary Guard Corps (IRGC) as a driving force behind Iranian state-sponsored cyberattacks–either through contractors in the Iranian private sector or by the IRGC itself.
Summary
The Cybersecurity and Infrastructure Security Agency (CISA) is sharing the following information with the cybersecurity community as a primer for assisting in the protection of our Nation’s critical infrastructure in light of the current tensions between the Islamic Republic of Iran and the United States and Iran’s historic use of cyber offensive activities to retaliate against perceived harm. Foremost, CISA recommends organizations take the following actions:- Adopt a state of heightened awareness. This includes minimizing coverage gaps in personnel availability, more consistently consuming relevant threat intelligence, and making sure emergency call trees are up to date.
- Increase organizational vigilance. Ensure security personnel are monitoring key internal security capabilities and that they know how to identify anomalous behavior. Flag any known Iranian indicators of compromise and tactics, techniques, and procedures (TTPs) for immediate response.
- Confirm reporting processes. Ensure personnel know how and when to report an incident. The well-being of an organization’s workforce and cyber infrastructure depends on awareness of threat activity. Consider reporting incidents to CISA to help serve as part of CISA’s early warning system (see Contact Information section below).
- Exercise organizational incident response plans. Ensure personnel are familiar with the key steps they need to take during an incident. Do they have the accesses they need? Do they know the processes? Are your various data sources logging as expected? Ensure personnel are positioned to act in a calm and unified manner.
Technical Details
Iranian Cyber Threat Profile
Iran has a history of leveraging asymmetric tactics to pursue national interests beyond its conventional capabilities. More recently, its use of offensive cyber operations is an extension of that doctrine. Iran has exercised its increasingly sophisticated capabilities to suppress both social and political perspectives deemed dangerous to Iran and to harm regional and international opponents.Iranian cyber threat actors have continuously improved their offensive cyber capabilities. They continue to engage in more “conventional” activities ranging from website defacement, distributed denial of service (DDoS) attacks, and theft of personally identifiable information (PII), but they have also demonstrated a willingness to push the boundaries of their activities, which include destructive wiper malware and, potentially, cyber-enabled kinetic attacks.
The U.S. intelligence community and various private sector threat intelligence organizations have identified the Islamic Revolutionary Guard Corps (IRGC) as a driving force behind Iranian state-sponsored cyberattacks–either through contractors in the Iranian private sector or by the IRGC itself.
Iranian Cyber Activity
According to open-source information, offensive cyber operations targeting a variety of industries and organizations—including financial services, energy, government facilities, chemical, healthcare, critical manufacturing, communications, and the defense industrial base—have been attributed, or allegedly attributed, to the Iranian government. The same reporting has associated Iranian actors with a range of high-profile attacks, including the following:- Late 2011 to Mid-2013 – DDoS Targeting U.S. Financial Sector: In response to this activity, in March 2016, the U.S. Department of Justice indicted seven Iranian actors employed by companies performing work on behalf of the IRGC for conducting DDoS attacks primarily targeting the public-facing websites of U.S. banks. The attacks prevented customers from accessing their accounts and cost the banks millions of dollars in remediation. [1]
- August/September 2013 – Unauthorized Access to Dam in New York State: In response, in March 2016, the U.S. Department of Justice indicted one Iranian actor employed by a company performing work on behalf of the IRGC for illegally accessing the supervisory control and data acquisition (SCADA) systems of the Bowman Dam in Rye, New York. The access allowed the actor to obtain information regarding the status and operation of the dam. [2]
- February 2014 – Sands Las Vegas Corporation Hacked: Cyber threat actors hacked into the Sands Las Vegas Corporation in Las Vegas, Nevada, and stole customer data, including credit card data, Social Security Numbers, and driver’s license numbers. According to a Bloomberg article from December 2014, the attack also involved a destructive portion, in which the Sands Las Vegas Corporation’s computer systems were wiped. In September 2015, the U.S. Director of National Intelligence identified the Iranian government as the perpetrator of the attack in a Statement for the Record to the House Permanent Select Committee on Intelligence. [3]
- 2013 to 2017 – Cyber Theft Campaign on Behalf of IRGC: In response, in March 2018, the U.S. Justice Department indicted nine Iranian actors associated with the Mabna Institute for conducting a massive cyber theft campaign containing dozens of individual incidents, including “many on behalf of the IRGC.” The thefts targeted academic and intellectual property data as well as email account credentials. According to the indictment, the campaign targeted “144 U.S. universities, 176 universities across 21 foreign countries, 47 domestic and foreign private sector companies, the U.S. Department of Labor, the Federal Energy Regulatory Commission, the State of Hawaii, the State of Indiana, the United Nations, and the United Nations Children’s Fund.” [4]
Mitigations
Recommended Actions
The following is a composite of actionable technical recommendations for IT professionals and providers to reduce their overall vulnerability. These recommendations are not exhaustive; rather they focus on the actions that will likely have the highest return on investment. In general, CISA recommends two courses of action in the face of potential threat from Iranian actors: 1) vulnerability mitigation and 2) incident preparation.- Disable all unnecessary ports and protocols. Review network security device logs and determine whether to shut off unnecessary ports and protocols. Monitor common ports and protocols for command and control activity.
- Enhance monitoring of network and email traffic. Review network signatures and indicators for focused operations activities, monitor for new phishing themes and adjust email rules accordingly, and follow best practices of restricting attachments via email or other mechanisms.
- Patch externally facing equipment. Focus on patching critical and high vulnerabilities that allow for remote code execution or denial of service on externally facing equipment.
- Log and limit usage of PowerShell. Limit the usage of PowerShell to only users and accounts that need it, enable code signing of PowerShell scripts, and enable logging of all PowerShell commands.
- Ensure backups are up to date and stored in an easily retrievable location that is air-gapped from the organizational network.
Patterns of Publicly Known Iranian Advanced Persistent Threats
The following mitigations and detection recommendations regarding publicly known Iranian advanced persistent threat (APT) techniques are based on the MITRE ATT&CK Framework. [5]Iranian APT Technique | Mitigation and Detection |
---|---|
Credential Dumping | Mitigation
|
Obfuscated Files or Information | Mitigation
|
Data Compressed | Mitigation
|
PowerShell | Mitigation
|
User Execution | Mitigation
|
Scripting | Mitigation
|
Registry Run Keys/Startup Folder | Mitigation
|
Remote File Copy | Mitigation
|
Spearphishing Link | Mitigation
|
Spearphishing Attachment | Mitigation
|
References
Contact Information
CISA encourages recipients of this report to contribute any additional information that they may have related to this threat. For any questions related to this report, please contact CISA at- 1-888-282-0870 (From outside the United States: +1-703-235-8832)
- CISAServiceDesk@cisa.dhs.gov (UNCLASS)
- us-cert@dhs.sgov.gov (SIPRNET)
- us-cert@dhs.ic.gov (JWICS)
Revisions
- January 6, 2019: Initial version
This product is
provided subject to this Notification and this
Privacy & Use
policy.
A copy of this publication is available at www.us-cert.gov. If you need help or have questions, please send an email to info@us-cert.gov. Do not reply to this message since this email was sent from a notification-only address that is not monitored. To ensure you receive future US-CERT products, please add US-CERT@ncas.us-cert.gov to your address book. |
OTHER RESOURCES: |
Contact Us | Security Publications | Alerts and Tips | Related Resources |
STAY CONNECTED: | ||||||
Manage Preferences | Unsubscribe | Help
The rise of the robots
Did you know:
In logistics, robots can pay for themselves within three to nine months, and with lower purchase prices, easier-to-configure robots and greater capabilities of robots that can find their way around a building, even small- and mid-size companies can now more easily deploy robots and gain a fast return.
As pointed out in Material Handling & Logistics, there are many types of robots available to help with distribution center/fulfillment center operation tasks today. They can assist with loading, unloading, sorting, picking, transportation, storage, delivery and audits. They also use different forms of navigation tools such as rail, wire-guided, labels, magnet tape, laser, vision, geo-guidance and others.
Two areas deserve special attention:
Picking. The trend away from case or bulk movement handling toward single SKUs has been accelerated due to e-commerce. These types of goods-to-person systems have taken the form of forward pick, racked systems that use robotic vehicles to bring cases and totes of goods to stations and then return the item container back into storage. There is also an increasing use of robotic machines to perform the pick process to detect, reach out, grasp and place into a receptacle items to fulfill an order.
Sortation. There have not been that many applications of robots doing item sortation in the U.S. Up until now, AGVs (automated guided vehicles) have been used for case, pallet, bulk, or specialized container movement for many years across a wide range of industries and applications. However, there are now examples of AGVs that automatically read barcodes and then deliver items in a single pass to a designated order consolidation point.
These two areas are a focal point by companies to increase productivity and decrease labor expenses. An example is the retail giant Walmart that recently introduced robotic cleaners. The robots do a programmed set of routines and clean a store thus allowing for Walmart to save on labor by eliminating part of their cleaning crew expense!
Will there be more robots in retail or industry? You can bet on it as companies try to cut expenses and increase delivery times so as to keep that potential customer from going elsewhere!
More to come!
Joe Rossini
Subscribe to:
Posts (Atom)