Cisco Releases Security Updates for Multiple Products
This article is contributed. See the original author and article here.
This article is contributed. See the original author and article here.
This article is contributed. See the original author and article here.
The cybersecurity authorities of the United States, Australia, Canada, New Zealand, and the United Kingdom have released a joint Cybersecurity Advisory (CSA) to warn organizations that Russia’s invasion of Ukraine could expose organizations both within and beyond the region to increased malicious cyber activity from Russian state-sponsored cyber actors or Russian-aligned cybercrime groups.
Joint CSA: Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure, drafted with contributions from industry members of the Joint Cyber Defense Collaborative, provides an overview of Russian state-sponsored advanced persistent threat groups, Russian-aligned cyber threat groups, and Russian-aligned cybercrime groups to help the cybersecurity community protect against possible cyber threats.
U.S., Australian, Canadian, New Zealand, and UK cybersecurity authorities urge critical infrastructure network defenders to prepare for and mitigate potential cyber threats by hardening their cyber defenses as recommended in the joint CSA.
For more information on current and historical Russian-state-sponsored cyber activity and recommended mitigations, see the following CISA webpages:
This article is contributed. See the original author and article here.
We continue to expand the Azure Marketplace ecosystem. For this volume, 134 new offers successfully met the onboarding criteria and went live. See details of the new offers below:
Get it now in our marketplace | |
|---|---|
Apache Web Server on Ubuntu 16.04 LTS: Cognosys provides this preconfigured image of Apache Web Server on Ubuntu 16.04 LTS for Microsoft Azure. Deploy a self-managed Apache web server community edition at minimal cost while enjoying the benefits of enterprise-grade security. | |
Citrix Virtual Apps and Desktop Advanced CCU: Deploy apps and desktops at scale to any device with Citrix’s advanced concurrent user licensing model. Built on Microsoft Azure, this virtual desktop infrastructure solution allows you to manage all your environments from one cloud-based location. | |
Datto Remote Monitoring and Management for MSPs: This solution allows you to manage multiple endpoints with the flexibility to monitor and mitigate risk with a centralized view. It provides a modern user experience with intuitive navigation, powerful search, and insightful dashboards. | |
Easy Body Fit: Delight shoppers, boost sales, and reduce merchandise returns with this AI-powered Easy Body Fit sizing app. The body scan solution generates perfect 3D measurements and can help your customers find a flawless fit and style, while gathering crucial consumer intelligence. | |
EVA Unified Commerce Consulting Sprint: This offer provides brands and retailers insight into EVA’s SaaS solution on Microsoft Azure. EVA is a global commerce platform that ensure a seamless shopping experience by designing customer-centric architecture for running instore logistics and order flows. | |
Evertrack for Information Security: Evertrack is an AI-powered productivity management platform designed to help managers efficiently monitor, measure, track, and classify their teams’ activities. Evertrack, available only in Portuguese, is 100 percent LGPD compliant. | |
Evertrack for IT Inventory Management: Evertrack for IT inventory management supports supervision of employees by combining centralized operations with information security data. Get an overview of your company’s micro and macro landscape. This application is available only in Portuguese. | |
Evertrack for Operational Insights: This solution centralizes operational, IT, HR and information security insights so you can easily manage your employees and boost their productivity with data-driven and targeted strategies. Evertrack for Operational Insights is available only in Portuguese. | |
Fish Crowd Detection API: This solution detects a school of fish and other marine life from an input photo using AI. The Fish Crowd Detection API can be useful in developing applications for deep sea exploration and building submerged surveillance cameras for fishing ships. | |
Forecast Platform: ML DevOps Service: Utilizing Microsoft Azure services and reference architectures, HMS Analytical Software covers the complete project lifecycle from ideation and feasibility analysis to the operationalization of a strategic enterprise-grade manufacturing intelligence platform. | |
IP Restriction by miniOrange: This solution enables easy setup of adaptive authentication methods for extra security. Configure a list of IP addresses to allow or deny access when a user tries to login into any of the applications configured with adaptive authentication, limit the number of devices, and more. | |
Jekyll: This offer from Niles Partners provides Jekyll, a static html page generator, on a Microsoft Azure virtual machine. Written in Ruby, Jekyll enables clutter-free and effortless site building by rendering markdown or textile templates so you can publish static pages in one go. | |
LCMS: With LCMS, system providers can dispatch software updates to devices. It also provides a mechanism to avoid man-in-the-middle attacks. Additionally, it verifies the software is issued by a trusted source. This can prevent malware from being installed and damaging your devices. | |
Lookout Cloud Security: Lookout Cloud Access Security Broker provides advanced security monitoring and control for Microsoft Office 365 and other cloud collaboration platforms. Integrated with Azure Information Protection (AIP) it offers deep visibility and end-to-end data protection and compliance. | |
Magento Ready with Ubuntu Server LTS 20.04: readymind offers this optimized Microsoft Azure virtual machine instance of Magento with Ubuntu Server LTS 20.04. Magento is an open-source e-commerce platform. This app is available only in Spanish. | |
MediaWiki: This offer provides MediaWiki on a Microsoft Azure virtual machine and is powered by Niles Partners. MediaWiki is a free and open-sources software designed to run on server farms and suited to power collaborative websites with various anti-spam and anti-vandalism extensions. | |
Migrate to Azure Virtual Desktop: 2-Week Proof of Concept: Hexaware offers an implementation trial to experience Microsoft Azure Virtual Desktop first-hand. It leverages Azure Virtual Desktop to build a turnkey, virtual workspace proposition that solves remote work issues and improves user experience. | |
Opigno LMS + Support: This offer provides Opigno LMS with support from ATH Infosystems. Opigno is an open source, Drupal-based learning management system that offers engaging and fun lessons tailored to your specific environment, industry, and business objectives. | |
People Smoking Blur API: This solution detects, localizes, and blurs people smoking objects from an input photo using AI. The smoking objects must be focalized, unobstructed, with the details very clear. Pictures are not stored. Also, the photo quality and angles contribute to a higher reading accuracy. | |
People Smoking Detection API: This solution detects people smoking objects from an input photo using AI. The smoking objects must be focalized, unobstructed, with the details very clear. Pictures are not stored. Also, the photo quality and angles contribute to a higher reading accuracy. | |
pi-cli – Cross Platform CLI Framework: pi-cli is Perpetual Intelligence’s cross-platform framework for building command-line systems or interface (CLI) in the .NET ecosystem. Create CLIs with a few flags or advanced CLIs with organization commands, command groups, and subcommands. | |
PostgreSQL 13.3 on CentOS Stream 8.0: Optimized for production environments on Microsoft Azure, this EuroDB minimal image containing PostgreSQL 13.3 on CentOS Stream 8.0 from EuroLinux is designed to support the most demanding applications. | |
PostgreSQL 13.3 with EuroDB Modules on CentOS Stream 8.0: This image offered by EuroLinux provides PostgreSQL 13.3 with EuroDB modules on CentOS Stream 8.0. EuroDB modules significantly expand the capabilities of the engine beyond those available in standard PostgreSQL database. | |
Privacy Analytics Eclipse – Enterprise: Eclipse empowers healthcare organizations to automate de-identification of data at scale, significantly simplifying an expert determination approach (as defined under HIPAA guidance) to safely share and reuse data, while protecting individual privacy. | |
Python on Ubuntu 20.04: This offer from Apps4Rent provides Python on Ubuntu 20.04. Python is a widely used programming language with a wide array of applications ranging from building websites, software, and games to programming networks. | |
Sea Mine Detection API: Intended for military and naval training, this cross-browser REST API uses artificial intelligence to detect and classify underwater or floating mines from an input photo using AI. An online app may be used to check the input and output JSONs of the API. | |
Secured DreamFactory on Ubuntu 16.04 LTS: This is a REST API for SQL and NoSQL databases, file storage, cache, email, and push notifications. Using DreamFactory, developers can build mobile, web, and IoT applications without hand coding APIs. Deploy DreamFactory instead of a vanilla install. | |
SilverStripe: This offer from Niles Partners provides SilverStripe, an enhanced content management system that provides authors with an intuitive AJAX-based web interface, while developers can leverage modern programming techniques like OOP, MVC, and ORM with the robust PHP-based framework. | |
Supermetrics for Azure Synapse: Supermetrics’ data integration solution makes it easy to move marketing data from different platforms to Azure Synapse or Azure Storage Container. Automated data pipelines enable you to trial and then purchase this SaaS offer at a fixed annual rate. | |
Tanium: Tanium’s enterprise platform helps organizations gain visibility and control in real time across all endpoints regardless of their number or location. Turbocharge your security team’s capabilities so they can proactively hunt for new vulnerabilities and threats operations. | |
Go further with workshops, proofs of concept, and implementations | |
Azure Arc Hybrid Cloud Management: 4-Week Pilot Implementation: Collect and aggregate your operational data across a hybrid datacenter environment while modernizing infrastructure and operations into a single pane of glass with Cyclotron’s pilot implementation. | |
Azure Cloud Migration: 8-Week Implementation: Achieve better scalability, security, and versatility with this cost-effective and sustainable migration to Microsoft Azure. VENZO’s certified professionals will guide you throughout your cloud journey. | |
Azure Data Warehouse: 6-Week Proof of Concept: In this engagement, Unify will work with your organization to align business, data, and analytics goals while developing a data warehouse strategy and proof of concept to support your self-service reporting needs.
| |
Azure DevOps Services Offerings: 8-Week Basic Implementation: Huco Fzco will help you optimize your development and delivery pipelines securely and enable you to bring your innovations to market faster using Microsoft Azure. Decrease time to market with seamless automated application delivery. | |
Azure Digital Business Transformation: 8-Week Implementation: This offer from Publicis Sapient will include the foundational landing zone design and buildout on Microsoft Azure, including a defined business transformation strategy of leveraging Azure cloud services. | |
Azure Sentinel: 4-Week Workshop: The experts from &Partners will provide an overview of Microsoft Azure Sentinel along with insights on active threats to your Microsoft 365 cloud and on-premises environments. You’ll gain end-to-end expertise, cost savings, audits, and more. | |
Azure Virtual Desktop: 10-Day Implementation: CruicalLogics will bring the power of cloud-native resource management to your organization with the design, planning, introduction and management of Azure Virtual Desktop. This offer will devise a functioning platform and identify key deliverables. | |
Azure Virtual Desktop for Healthcare and Life Sciences: 4-Week Implementation: In this offer, boxxe provides a range of modern, cost-effective, and flexible Azure Virtual Desktop services designed for the healthcare industry, so your staff can connect securely and provide services from anywhere. | |
Azure Virtual Desktop Pilot: 12-Day Proof of Concept: Allow Phoenix to architect, deploy, and manage performant End User Computing (EUC) solutions to cope with the high demands of the modern, mobile workforce. This pilot offer is for up to 40 users to test and begin their move to Azure Virtual Desktop. | |
Power BI Administrator from BSG: 4-Hour Implementation: Administrate your Microsoft Power BI tenant and back up and restore your artifacts in Power BI by leveraging Azure Blob Storage and Azure Functions with this offering from BSgroup. Monitor your user activity and store it for later analysis. | |
Business Opportunities with Azure: Half-Day Workshop: This offering is only available in French. A Softcom Technologies Microsoft Azure cloud expert will help you identify opportunities to use Azure to help digitalize your business. Learn what it takes to set up Azure and more. | |
Citrix on Azure Deployment Services: 7-Day Implementation: Wordtext Systems will help deploy Citrix virtualization on Microsoft Azure so your IT team can have the flexibility of delivering enterprise-class VDI infrastructure services for Windows apps and desktops with the benefits of cloud elasticity. | |
Cloud for Marketing by 55: 1-Day Workshop: The objective of this workshop from 55 is to define the marketing data architecture and organization you need to implement the top priority use cases to meet your goals. Fully control the tools, data sources, and algorithms that inform your marketing decisions. | |
Customer Data Intelligence Platform: 6-Week Proof of Concept: This offer from Publicis Sapient provides a real-time, unified intelligent insights view into your customer data by leveraging Microsoft Azure data, machine learning, and analysis services. The solution is focused on the retail and media industries. | |
Cyber Resilience with SAP on Azure: This service from Kyndryl’s integrates the cloud-native environment of Microsoft Azure with Azure Active Directory, Microsoft Defender and other custom services to ensure your business data from SAP is protected. | |
Data & AI Consulting Services: 3-Month Implementation: Inetum-Realdolmen will set up a modern data platform on Microsoft Azure so you can move past traditional reports and dashboards to building industry-level business analytics apps powered by AI and ML. | |
DevOps Modernization: 2-Day Workshop: Active Solution will combine analytic design methods and qualitative assessments to identify your business objectives, user roles, and needs, resulting in a roadmap for a more comprehensive and efficient Azure DevOps process. | |
Digital Identity Framework: 5-Week Implementation: Gain a global view of your organization’s user identities and protect your applications with Neudesic’s solution. Their experts will enable multifactor authentication through Microsoft Azure Active Directory and deploy an Azure landing zone. | |
Digital Twin: 10-Week Proof of Concept: OpenSistemas will demonstrate how to make your product lifecycles and factory processes predictive, prescriptive, and self-aware. Utilizing Microsoft Azure IoT services you will learn to visualize and contextualize data on a virtual asset for sophisticated analytics. | |
Disaster Recovery in Azure: 5-Week Implementation: Get trained on how to deploy a disaster recovery solution to keep your workloads and data safe in this implementation from AMTRA. Remediation of workloads on Microsoft Azure and DR solution compatibility are part of this cost-effective offer. | |
GitHub Enablement: 1-Week Proof of Concept: Drive a cost-optimized, secure, and Microsoft Azure-ready GitHub migration journey with Insight’s offering. Insight will work with you to scope, plan, and execute a proof of concept of GitHub Enterprise and selected DevOps processes and apps on Azure. | |
Infrastructure as Code (IaC) on Microsoft Azure: 3-Week Implementation: To address the issue of error-prone and time-consuming manual infrastructure setting, eliminating human error, VOLO offers Infrastructure as Code implementation along with configuration management for Azure. | |
Managed Azure Sentinel Extended Detection Response: 1-Week Implementation: HTG will utilize Microsoft Azure security tools to deliver managed detection and response services in real-time so you can respond effectively against cyber events, including phishing, malware and ransomware attacks. | |
Microsoft Azure + Nutanix Frame: 5-Day Workshop: Egroup will show you how to leverage the power of Microsoft Azure to quickly and easily deploy hundreds or thousands of Nutanix Frame-based applications and desktops as needed without the burdens of infrastructure management. | |
Profisee Master Data Management: 4-Day Workshop: QS2’s customized Master Data Management workshop can be used as quick start for your data governance journey. The workshop environment is built using Profisee MDM running in QS2’s Microsoft Azure training environment. | |
Rise Technology – App Modernization: 4-Week Implementation: Rise Technology will partner with you in your modernization projects by systematically reviewing a variety of environments and infrastructure and mapping their features and functionality to Microsoft Azure workloads. | |
Rise Technology – Cloud Native App Redesign: 28-Week Implementation: Accelerate business outcomes with Rise Technology’s app redesign services. Utilizing Azure Kubernetes Service and microservices architecture you will learn how to create end-to-end CI/CD pipelines and automate processes. | |
The Data Value Capture: 1-Day Workshop: By combining design thinking, industry and domain-specific expertise, and a set of accelerators that reside on the Microsoft Azure platform, Wavicle Data Solutions will identify opportunities and develop a value-based roadmap for modernizing your data platform. | |
Thinkubator: 8-Week Implementation: Sogeti’s Intelligent Experience Thinkubator will implement a chatbot using Azure Cognitive Services to accelerate your business outcomes and AI digital transformation initiatives. Key focus areas include vision, speech, language, knowledge, and search. | |
WatServ IoT Blueprint: 4-Week Discovery Workshop: Data engineers from WatServ will help you get clarity on your next IoT project using the power of the Microsoft Azure IoT platform. Unlock the full value of your data to meet your current and future business objectives. | |
Contact our partners | |
Abstracta – A Data Abstraction Platform | |
Aggregion Data Collaboration Platform | |
Apporetum – Application Access Management | |
Azure Application Migration: 2-Day Assessment | |
Azure Discovery Service: 6-Week Assessment | |
Azure Governance: 4-Week Assessment | |
Azure Migration Readiness: 1-Week Assessment | |
Azure Platform Foundation and Landing Zone: 2-Hour Briefing | |
Azure Sentinel: Managed Services | |
Azure Virtual Desktop: 3-Day Assessment | |
Calastone Money Market Services | |
Client Lifecycle Management: Automated AML and KYC Compliance | |
Cloud Wallet: Take Control of Your Cloud Spend | |
Cyber Resilience Maturity: 2- to 3-Week Assessment | |
Cytomate Advanced Persistent Threats (APT) | |
Data & AI Discovery: 10-Day Assessment | |
Data Estate: 5-Week Assessment | |
Data Management & Governance: 12-Week Assessment | |
Data Strategy: 10-Day Assessment | |
Datacenter Transformation: 3-Week Assessment | |
Datto Continuity for Microsoft Azure (DCMA) for MSPs | |
Datto SaaS Defense for Microsoft 365 for MSPs | |
Demand Forecasting SaaS Offering | |
Distributed Market Infrastructure (DMI) Fund Services | |
DWH/BI Architecture: 4-Week Assessment | |
Enterprise Microsoft Adoption: 1-Day Assessment | |
EY Lifecycle Navigation (EY Lion) | |
F5 Distributed Cloud Bot Defense Service Node | |
Harbor Exporter Packaged by Bitnami | |
HCL Accelerate on Azure: 1-Hour Briefing | |
Hybrid Cloud Transformation Using Stack HCI & Azure Arc: 3-Week Assessment | |
IBM Consulting Global Azure App Modernization OpenShift Services | |
IBM Consulting Global Azure Cloud Native Services | |
Lead with Data: 10-Day Assessment | |
Microsoft Azure Sentinel SOC Services: 8-Week Assessment | |
Modern Tech Ops Maturity: 2-Hour Assessment | |
NVISO Managed Security for SME | |
NXLog AIX Audit for Azure Sentinel | |
Project Management Automation Tools | |
Rise App Modernization: 1-Week Assessment | |
SecureKi Privileged Access Management Solution | |
SMB Microsoft Adoption: 1-Day Assessment | |
Sybase to Azure SQL Database: 5-Week Assessment | |
Synergy Indicata: Grant Management Software | |
Synergy Indicata: Portfolio Management, Monitoring & Evaluation Software | |
Synergy PFM: Integrated Public Financial Management | |
VenueArc – Automated Contract Generator | |
VenueArc – Clientele Management | |
VenueArc – Venue Booking Calendar | |
Verified Biometric Authentication | |
This article is contributed. See the original author and article here.
Russian state-sponsored cyber actors have demonstrated capabilities to compromise IT networks; develop mechanisms to maintain long-term, persistent access to IT networks; exfiltrate sensitive data from IT and operational technology (OT) networks; and disrupt critical industrial control systems (ICS)/OT functions by deploying destructive malware.
Historical operations have included deployment of destructive malware—including BlackEnergy and NotPetya—against Ukrainian government and critical infrastructure organizations. Recent Russian state-sponsored cyber operations have included DDoS attacks against Ukrainian organizations. Note: for more information on Russian state-sponsored cyber activity, including known TTPs, see joint CSA Understanding and Mitigating Russian State-Sponsored Cyber Threats to U.S. Critical Infrastructure.
Cyber threat actors from the following Russian government and military organizations have conducted malicious cyber operations against IT and/or OT networks:
Overview: FSB, the KGB’s successor agency, has conducted malicious cyber operations targeting the Energy Sector, including UK and U.S. energy companies, U.S. aviation organizations, U.S. government and military personnel, private organizations, cybersecurity companies, and journalists. FSB has been known to task criminal hackers for espionage-focused cyber activity; these same hackers have separately been responsible for disruptive ransomware and phishing campaigns.
Industry reporting identifies three intrusion sets associated with the FSB, but the U.S. and UK governments have only formally attributed one of these sets—known as BERSERK BEAR—to FSB.
The U.S. and UK governments assess that this APT group is almost certainly FSB’s Center 16, or Military Unit 71330, and that FSB’s Center 16 has conducted cyber operations against critical IT systems and infrastructure in Europe, the Americas, and Asia.
Resources: for more information on BERSERK BEAR, see the MITRE ATT&CK® webpage on Dragonfly.
High-Profile Activity: in 2017, FSB employees, including one employee in the FSB Center for Information Security (also known as Unit 64829 and Center 18), were indicted by the U.S. Department of Justice (DOJ) for accessing email accounts of U.S. government and military personnel, private organizations, and cybersecurity companies, as well as email accounts of journalists critical of the Russian government.[9] More recently, in 2021, FSB Center 16 officers were indicted by the U.S. DOJ for their involvement in a multi-stage campaign in which they gained remote access to U.S. and international Energy Sector networks, deployed ICS-focused malware, and collected and exfiltrated enterprise and ICS-related data. One of the victims was a U.S. nuclear power plant.[10]
Resources: for more information on FSB, see:
Overview: SVR has operated an APT group since at least 2008 that has targeted multiple critical infrastructure organizations. SVR cyber threat actors have used a range of initial exploitation techniques that vary in sophistication coupled with stealthy intrusion tradecraft within compromised networks. SVR cyber actors’ novel tooling and techniques include:
High-Profile Activity: the U.S. Government, the Government of Canada, and the UK Government assess that SVR cyber threat actors were responsible for the SolarWinds Orion supply chain compromise and the associated campaign that affected U.S. government agencies, critical infrastructure entities, and private sector organizations.[12][13][14]
Also known as: APT29, COZY BEAR, CozyDuke, Dark Halo, The Dukes, NOBELIUM, and NobleBaron, StellarParticle, UNC2452, YTTRIUM [15]
Resources: for more information on SVR, see:
For more information on the SolarWinds Orion supply chain compromise, see:
Overview: GTsSS, or Unit 26165, is an APT group that has operated since at least 2004 and primarily targets government organizations, travel and hospitality entities, research institutions, and non-governmental organizations, in addition to other critical infrastructure organizations.
According to industry reporting, GTsSS cyber actors frequently collect credentials to gain initial access to target organizations. GTsSS actors have collected victim credentials by sending spearphishing emails that appear to be legitimate security alerts from the victim’s email provider and include hyperlinks leading to spoofed popular webmail services’ logon pages. GTsSS actors have also registered domains to conduct credential harvesting operations. These domains mimic popular international social media platforms and masquerade as tourism- and sports-related entities and music and video streaming services.
High-Profile Activity: the U.S. Government assesses that GTsSS cyber actors have deployed Drovorub malware against victim devices as part of their cyber espionage operations.[16] The U.S. Government and UK Government assess that GTsSS actors used a Kubernetes® cluster to conduct widespread, distributed, and anonymized brute force access attempts against hundreds of government and private sector targets worldwide.[17]
Also known as: APT28, FANCY BEAR, Group 74, IRON TWILIGHT, PawnStorm, Sednit, SNAKEMACKEREL, Sofacy, STRONTIUM, Swallowtail, TG-4127, Threat Group-4127, and Tsar Team [18]
Resources: for more information on GTsSS, see the MITRE ATT&CK webpage on APT28.
Overview: GTsST, or Unit 74455, is an APT group that has operated since at least 2009 and has targeted a variety of critical infrastructure organizations, including those in the Energy, Transportation Systems, and Financial Services Sectors. According to industry reporting, GTsST also has an extensive history of conducting cyber espionage as well as destructive and disruptive operations against NATO member states, Western government and military organizations, and critical infrastructure-related organizations, including in the Energy Sector.
The primary distinguishing characteristic of the group is its operations use techniques aimed at causing disruptive or destructive effects at targeted organizations using DDoS attacks or wiper malware. The group’s destructive operations have also leveraged wiper malware that mimics ransomware or hacktivism and can result in collateral effects to organizations beyond the primary intended targets. Some of their disruptive operations have shown disregard or ignorance of potential secondary or tertiary effects.
High-Profile Activity: the malicious activity below has been previously attributed to GTsST by the U.S. Government and the UK Government.[19][20]
The U.S. Government, the Government of Canada, and UK Government have also attributed the October 2019 large-scale, disruptive cyber operations against a range of Georgian web hosting providers to GTsST. This activity resulted in websites—including sites belonging to the Georgian government, courts, non-government organizations (NGOs), media, and businesses—being defaced and interrupted the service of several national broadcasters.[21]22][23]
Also known as: ELECTRUM, IRON VIKING, Quedagh, the Sandworm Team, Telebots, VOODOO BEAR [24]
Resources: for more information on GTsST, see the MITRE ATT&CK webpage on Sandworm Team.
Overview: TsNIIKhM, as described on their webpage, is a research organization under Russia’s Ministry of Defense (MOD). Actors associated with TsNIIKhM have developed destructive ICS malware.
High-Profile Activity: TsNIIKhM has been sanctioned by the U.S. Department of the Treasury for connections to the destructive Triton malware (also called HatMan and TRISIS); TsNIIKhM has been sanctioned by the UK Foreign, Commonwealth, and Development Office (FCDO) for a 2017 incident that involved safety override controls (with Triton malware) in a foreign oil refinery.[25][26] In 2021, the U.S. DOJ indicted a TsNIIKhM Applied Development Center (ADC) employee for conducting computer intrusions against U.S. Energy Sector organizations. The indicted employee also accessed the systems of a foreign oil refinery and deployed Triton malware.[27] Triton is a custom-built malware designed to manipulate safety instrumented systems within ICS controllers, disabling the safety alarms that prevent dangerous conditions.
Also known as: Temp.Veles, XENOTIME [28]
Resources: for more information on TsNIIKhM, see the MITRE ATT&CK webpage on TEMP.Veles. For more information on Triton, see:
In addition to the APT groups identified in the Russian State-Sponsored Cyber Operations section, industry reporting identifies two intrusion sets—PRIMITIVE BEAR and VENOMOUS BEAR—as state-sponsored APT groups, but U.S., Australian, Canadian, New Zealand, and UK cyber authorities have not attributed these groups to the Russian government.
Resources: for more information on PRIMITIVE BEAR, see the MITRE ATT&CK webpage on the Gamaredon Group.
Resources: for more information on VENOMOUS BEAR, see the MITRE ATT&CK webpage on Turla.
Cybercrime groups are typically financially motivated cyber actors that seek to exploit human or security vulnerabilities to enable direct theft of money (e.g., by obtaining bank login information) or by extorting money from victims. These groups pose consistent threats to critical infrastructure organizations globally.
Since Russia’s invasion of Ukraine in February 2022, some cybercrime groups have independently publicly pledged support for the Russian government or the Russian people and/or threatened to conduct cyber operations to retaliate against perceived attacks against Russia or materiel support for Ukraine. These Russian-aligned cybercrime groups likely pose a threat to critical infrastructure organizations primarily through:
Based on industry and open-source reporting, U.S., Australian, Canadian, New Zealand, and UK cyber authorities assess multiple Russian-aligned cybercrime groups pose a threat to critical infrastructure organizations. These groups include:
Note: although some cybercrime groups may conduct cyber operations in support of the Russian government, U.S., Australian, Canadian, New Zealand, and UK cyber authorities assess that cyber criminals will most likely continue to operate primarily based on financial motivations, which may include targeting government and critical infrastructure organizations.
Overview: the CoomingProject is a criminal group that extorts money from victims by exposing or threatening to expose leaked data. Their data leak site was launched in August 2021.[31] The CoomingProject stated they would support the Russian Government in response to perceived cyberattacks against Russia.[32]
Overview: according to open-source reporting, Killnet released a video pledging support to Russia.[33]
Victims: Killnet claimed credit for carrying out a DDoS attack against a U.S. airport in March 2022 in response to U.S. materiel support for Ukraine.[34]
Overview: MUMMY SPIDER is a cybercrime group that creates, distributes, and operates the Emotet botnet. Emotet is advanced, modular malware that originated as a banking trojan (malware designed to steal information from banking systems but that may also be used to drop additional malware and ransomware). Today Emotet primarily functions as a downloader and distribution service for other cybercrime groups. Emotet has been used to deploy WIZARD SPIDER’s TrickBot, which is often a precursor to ransomware delivery. Emotet has worm-like features that enable rapid spreading in an infected network.
Victims: according to open sources, Emotet has been used to target industries worldwide, including financial, e-commerce, healthcare, academia, government, and technology organizations’ networks.
Also known as: Gold Crestwood, TA542, TEMP.Mixmaster, UNC3443
Resources: for more information on Emotet, see joint Alert Emotet Malware. For more information on TrickBot, see joint CSA TrickBot Malware.
Overview: SALTY SPIDER is a cybercrime group that develops and operates the Sality botnet. Sality is a polymorphic file infector that was discovered in 2003; since then, it has been replaced by more advanced peer-to-peer (P2P) malware loaders.[35]
Victims: according to industry reporting, in February 2022, SALTY SPIDER conducted DDoS attacks against Ukrainian web forums used to discuss events relating to Russia’s military offensive against the city of Kharkiv.
Also known as: Sality
Overview: SCULLY SPIDER is a cybercrime group that operates using a malware-as-a-service model; SCULLY SPIDER maintains command and control infrastructure and sells access to their malware and infrastructure to affiliates, who distribute their own malware.[36][37] SCULLY SPIDER develops and operates the DanaBot botnet, which originated primarily as a banking Trojan but expanded beyond banking in 2021 and has since been used to facilitate access for other types of malware, including TrickBot, DoppelDridex, and Zloader. Like Emotet, Danabot effectively functions as an initial access vector for other malware, which can result in ransomware deployment.
According to industry reporting, recent DDoS activity by the DanaBot botnet suggests SCULLY SPIDER has operated in support of Russia’s military offensive in Ukraine.
Victims: SCULLY SPIDER affiliates have primarily targeted organizations in the United States, Canada, Germany, United Kingdom, Australia, Italy, Poland, Mexico, and Ukraine.[38] According to industry reporting, in March 2022, Danabot was used in DDoS attacks against multiple Ukrainian government organizations.
Also known as: Gold Opera
Overview: SMOKEY SPIDER is a cybercrime group that develops Smoke Loader (also known as Smoke Bot), a malicious bot that is used to upload other malware. Smoke Loader has been available since at least 2011, and operates as a malware distribution service for a number of different payloads, including—but not limited to—DanaBot, TrickBot, and Qakbot.
Victims: according to industry reporting, Smoke Loader was observed in March 2022 distributing DanaBot payloads that were subsequently used in DDoS attacks against Ukrainian targets.
Resources: for more information on Smoke Loader, see the MITRE ATT&CK webpage on Smoke Loader.
Overview: WIZARD SPIDER is a cybercrime group that develops TrickBot malware and Conti ransomware. Historically, the group has paid a wage to the ransomware deployers (referred to as affiliates), some of whom may then receive a share of the proceeds from a successful ransomware attack. In addition to TrickBot, notable initial access and persistence vectors for affiliated actors include Emotet, Cobalt Strike, spearphishing, and stolen or weak Remote Desktop Protocol (RDP) credentials.
After obtaining access, WIZARD SPIDER affiliated actors have relied on various publicly available and otherwise legitimate tools to facilitate earlier stages of the attack lifecycle before deploying Conti ransomware.
WIZARD SPIDER pledged support to the Russian government and threatened critical infrastructure organizations of countries perceived to carry out cyberattacks or war against the Russian government.[39] They later revised this pledge and threatened to retaliate against perceived attacks against the Russian people.[40]
Victims: Conti victim organizations span across multiple industries, including construction and engineering, legal and professional services, manufacturing, and retail. In addition, WIZARD SPIDER affiliates have deployed Conti ransomware against U.S. healthcare and first responder networks.
Also known as: UNC2727, Gold Ulrick
Resources: for more information on Conti, see joint CSA Conti Ransomware. For more information on TrickBot, see joint CSA TrickBot Malware.
Overview: XakNet is a Russian-language cyber group that has been active as early as March 2022. According to open-source reporting, the XakNet Team threatened to target Ukrainian organizations in response to perceived DDoS or other attacks against Russia.[41] According to reporting from industry, on March 31, 2022, XakNet released a statement stating they would work “exclusively for the good of [Russia].” According to industry reporting, the XakNet Team may be working with or associated with Killnet actors, who claimed credit for the DDoS attacks against a U.S. airport (see the Killnet section).
Victims: according to industry reporting, in late March 2022, the XakNet Team leaked email contents of a Ukrainian government official. The leak was accompanied by a political statement criticizing the Ukrainian government, suggesting the leak was politically motivated.
U.S., Australian, Canadian, New Zealand, and UK cyber authorities urge critical infrastructure organizations to prepare for and mitigate potential cyber threats by immediately (1) updating software, (2) enforcing MFA, (3) securing and monitoring RDP and other potentially risky services, and (4) providing end-user awareness and training.
As part of a longer-term effort, implement network segmentation to separate network segments based on role and functionality. Network segmentation can help prevent the spread of ransomware and threat actor lateral movement by controlling traffic flows between—and access to—various subnetworks.
To further prepare for and mitigate cyber threats from Russian state-sponsored or criminal actors, U.S., Australian, Canadian, New Zealand, and UK cyber authorities encourage critical infrastructure organizations to implement the recommendations listed below.
U.S., Australian, Canadian, New Zealand, and UK cybersecurity authorities urge network defenders of critical infrastructure organizations to exercise due diligence in identifying indicators of malicious activity. Organizations detecting potential APT or ransomware activity in their IT or OT networks should:
For additional guidance on responding to a ransomware incident, see the CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide.
See the joint advisory from Australia, Canada, New Zealand, the United Kingdom, and the United States on Technical Approaches to Uncovering and Remediating Malicious Activity for guidance on hunting or investigating a network, and for common mistakes in incident handling.
Additionally, CISA, the FBI, and NSA encourage U.S. critical infrastructure owners and operators to see CISA’s Federal Government Cybersecurity Incident and Vulnerability Response Playbooks. Although tailored to federal civilian branch agencies, these playbooks provide operational procedures for planning and conducting cybersecurity incident and vulnerability response activities and detail each step for both incident and vulnerability response.
Note: U.S., Australian, Canadian, New Zealand, and UK cyber authorities strongly discourage paying a ransom to criminal actors. Paying a ransom may embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Paying the ransom does not guarantee that a victim’s files will be recovered.
The information you have accessed or received is being provided “as is” for informational purposes only. CISA, NSA, FBI, ACSC, CCCS, NZ NCSC, NCSC-UK, and the UK National Crime Agency (NCA) do not endorse any commercial product or service, including any subjects of analysis. Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring.
MITRE and ATT&CK are registered trademarks of The MITRE Corporation. Kubernetes is a registered trademark of The Linux Foundation.
This document was developed by U.S., Australian, Canadian, New Zealand, and UK cybersecurity authorities in furtherance of their respective cybersecurity missions, including their responsibilities to develop and issue cybersecurity specifications and mitigations.
[1] Cybersecurity and Infrastructure Security Agency
[2] Federal Bureau of Investigation
[3] National Security Agency
[4] Australian Cyber Security Centre
[5] Canadian Centre for Cyber Security
[6] New Zealand’s National Cyber Security Centre
[7] United Kingdom’s National Cyber Security Centre
[8] United Kingdom’s National Crime Agency
[9] U.S. DOJ Press Release: U.S. Charges Russian FSB Officers and Their Criminal Conspirators for Hacking Yahoo and Millions of Email Accounts
[10] U.S. DOJ Press Release: Four Russian Government Employees Charged in Two Historical Hacking Campaigns Targeting Critical Infrastructure Worldwide
[11] CrowdStrike Blog: Early Bird Catches the Wormhole: Observations from the StellarParticle Campaign
[12] U.S. White House Statement: FACT SHEET: Imposing Costs for Harmful Foreign Activities by the Russian
[13] Government of Canada Statement on SolarWinds Cyber Compromise
[14] UK Government Press Release: Russia: UK and US expose global campaign of malign activity by Russian intelligence services
[15] MITRE ATT&CK: APT29
[16] Joint CSA Russian GRU 85th GTsSS Deploys Previously Undisclosed Drovorub Malware
[17] Joint CSA Russian GRU Conducting Global Brute Force Campaign to Compromise Enterprise and Cloud Environments
[18] MITRE ATT&CK APT28
[19] Joint CSA New Sandworm Malware Cyclops Blink Replaces VPNFilter
[20] UK Government Press Release: UK condemns Russia’s GRU over Georgia cyber-attacks
[21] U.S. Department of State, Press Statement: The United States Condemns Russian Cyber Attack Against the Country of Georgia
[22] Government of Canada CSE Statement on Malicious Russian Cyber Activity Targeting Georgia
[23] UK Government Press Release: UK condemns Russia’s GRU over Georgia cyber-attacks
[24] MITRE ATT&CK The Sandworm Team
[25] U.S. Department of the Treasury Press Release: Treasury Sanctions Russian Government Research Institution Connected to the Triton Malware
[26] UK Government Press Release: UK exposes Russian spy agency behind cyber incident
[27] U.S. DOJ Press Release: Four Russian Government Employees Charged in Two Historical Hacking Campaigns Targeting Critical Infrastructure Worldwide
[28] MITRE ATT&CK TEMP.Veles
[29] NSA and NCSC-UK Cybersecurity Advisory Turla Group Exploits Iranian APT To Expand Coverage Of Victims
[30] CrowdStrike Adversary Profile: VENEMOUS BEAR
[31] KELA Cybersecurity Intelligence Center: Ain’t No Actor Trustworthy Enough: The importance of validating sources
[32] Twitter: Valery Marchive Status, Feb. 25, 2022 1:41 PM
[33] The Record by Recorded Future: Russia or Ukraine: Hacking Groups Take Sides
[34] Twitter: CyberKnow Status, March 29, 2022, 7:54 AM
[35] CrowdStrike Blog: Who is Salty Spider (Sality)?
[36] Proofpoint Blog: New Year, New Version of DanaBot
[37] Zscaler Blog: Spike in DanaBot Malware Activity
[38] Proofpoint Blog: New Year, New Version of DanaBot
[39] The Record by Recorded Future: Russia or Ukraine: Hacking Groups Take Sides
[40] TechTarget: Conti ransomware gang backs Russia, threatens US
[41] The Record by Recorded Future: Russia or Ukraine: Hacking Groups Take Sides
The U.S., Australian, Canadian, New Zealand, and UK cyber authorities would like to thank CrowdStrike, Google, LookingGlass Cyber, Mandiant, Microsoft, and Secureworks for their contributions to this CSA.
This article is contributed. See the original author and article here.
Oracle has released its Critical Patch Update for April 2022 to address 520 vulnerabilities across multiple products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.
CISA encourages users and administrators to review the Oracle April 2022 Critical Patch Update and apply the necessary updates.
This article is contributed. See the original author and article here.
Navigating uncertainty and corporate change can be a major challenge for organizations, especially for security and compliance teams. The processes and ways we engage with our colleagues, customers and partners look very different than they did just a few years ago. The nature of work is evolving, and our strategies on how to protect our users and our data must evolve with it.
Results from Microsoft’s most recent Work Trend Index indicated 52% of employees are considering a switch to remote or hybrid in the year ahead, and that 43% of employees are likely to consider changing jobs. Security teams will now have to be more diligent in protecting their corporate data as employees work from different locations or leave the organization.
We recently shared how Microsoft insider risk solutions were evolving to meet the needs of the Great Reshuffle, including enhanced data exfiltration detection capabilities and richer alert context.
Today we announced Microsoft Purview – a comprehensive set of solutions which help you govern, protect, and manage your entire data estate. This new brand family combines the capabilities of the former Azure Purview and the Microsoft 365 Compliance portfolio that customers already rely on, providing unified data governance and risk management for your organization. Insider Risk Management in Microsoft 365 will now be called Microsoft Purview Insider Risk Management.
As part of this announcement, we are excited to announce the latest updates for Insider Risk Management:
New updates to analytics
One of the best ways to get started with Insider Risk Management is with an analytics assessment. Within 48 hours of an Insider Risk Management administrator initiating the analytics assessment, the results provide actionable insights which may indicate risk of data leaks or theft, such as what percentage of users in your environment are performing exfiltration activities. These results are anonymized and aggregated, providing a top-level view of existing risks in your environment while protecting user privacy.
We are excited to announce that analytics will now be going further with new policy recommendations, email notifications and sequence detection capabilities in public preview:
New policy triggers based on anomalous activity
We are also further expanding Insider Risk Management’s ability to support organizations concerned about anomalous (or abnormal) activity. With our new anomalous activity policy trigger, security and compliance teams will have the ability to customize their policies to trigger on an anomalous activity, like an unusual amount of emails with attachments sent outside the organization, and bring users into scope of that policy.
This new capability means that Insider Risk Management can augment and support work done by security teams, by identifying what activities are abnormal or irregular for a user. Organizations looking to integrate more machine learning and automated decision making into their insider risk investigations may find that the anomalous activity trigger capabilities can help in identifying potential risks.
New detection capabilities for priority file types
When thinking about high-priority data or sensitive documents, your organization may have specific file types deemed particularly important. For example, an automotive company developing new car designs may create and save these designs in 3-D formats like .3dxml or .3mf. These files can be considered particularly sensitive due to the nature of their content, and organizations may want to prioritize these critical IP file types as high priority.
Insider Risk Management now allows organizations to indicate specific file types they would like to prioritize for additional visibility and scrutiny. Insider Risk Management administrators who are setting up new policies are able to indicate which file extensions should be considered high-priority, which can help in risk detection and surfacing important alerts.
Expanded coverage with third-party alerts (via Microsoft Defender for Cloud Apps)
Insider Risk Management becomes even more powerful with alerts surfaced from third-party connected applications. We are now supporting nine additional third-party anomaly alert types via Microsoft Defender for Cloud Apps. These automatically enabled detection policies can detect and collate results, identifying behavioral anomalies across your users and devices in your network. Through this integration, Insider Risk Management expands coverage into multi-cloud environments including alerts identifying anomalous activity on Google Cloud Platform or Amazon Web Services, and allows organizations to have visibility if users are performing potentially high-risk activities like unusual mass deletion of content from a connected cloud app.
To leverage these capabilities in your policies, update your Insider Risk Management settings to include the “Microsoft Defender for Cloud Apps” policy indicators.
To learn more about anomaly detection policies in Defender for Cloud Apps, visit our Microsoft Docs page: Create anomaly detection policies in Defender for Cloud Apps.
Recommended guidance and actions for Insider Risk Management administrators
The best way to leverage the full capacity of Insider Risk Management is configuring the solution for your environment, your organizational requirements and your users.
Administrators are now more empowered than ever with guided recommendations for fine-tuning Insider Risk Management to fit their needs. These new recommendations are designed to help you to better manage noise from alerts in your environment, with recommended policy actions like adding domains, excluding specific file types or ensuring that all users are covered with at least one policy.
Watch part one of our new Insider Risk Management Mechanics video series
We have just kicked off a new Mechanics video series about our insider risk solutions. Insider Risk Management and Communication Compliance. In our first video, we show how you can leverage machine learning to identify explicit high-risk incidents like data theft or workplace harassment and how our solutions provide designated stakeholders with context and workflows to take action on insider risk.
New “Become an Insider Risk Management Ninja” resource page
Microsoft has a number of resources to help you get started and to learn more about using and configuring Insider Risk Management. For the one-stop shop of our public-facing material and resources on the solution, check out the new “Become an Insider Risk Management Ninja” resource page at https://aka.ms/insiderriskninja.
This page will be updated quarterly so be sure to bookmark it to see the latest on Insider Risk Management!
Get started
These new features in Microsoft Purview Insider Risk Management have already rolled out or will start rolling out to customer tenants in the coming weeks. These solutions are also generally available across government clouds, supported in Government Community Cloud (GCC), GCC-High, and US Department of Defense (DoD) tenants.
We are happy to share that there is now an easier way for you to try Microsoft Purview solutions directly in the Microsoft Purview compliance portal. If you are a current Microsoft 365 E3 user and interested in experiencing Insider Risk Management, check out the Insider Risk Management Trial or the Microsoft Purview Trial to see how insider risk solutions and analytics can give you actionable insights.
Learn more about how to get started and configure policies in your tenant in the supporting documentation for Insider Risk Management. Keep a lookout for updates to the documentation with information on the new features over the coming weeks.
This article is contributed. See the original author and article here.
With rising staff shortages and increasing costs from security breaches, it is time to review the business case for modernizing your endpoint management.
The post The business case for endpoint management modernization according to Microsoft appeared first on Microsoft 365 Blog.
Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.
This article is contributed. See the original author and article here.
CISA has released draft versions of two guidance documents—along with a request for comment (RFC)—that are a part of the recently launched Secure Cloud Business Applications (SCuBA) project:
The public comment period for the RFC guidance documents closes on May 19, 2022.
In accordance with Executive Order 14028, which is aimed at improving security for federal government networks, CISA’s SCuBA project aims to develop consistent, effective, modern, and manageable security that will help secure agency information assets stored within cloud operations.
CISA encourages interested parties to review the RFC guidance documents and provide comment. See CISA Blog: SCuBA? It means better visibility, standards, and security practices for government cloud for more information and for links to the RFC guidance documents.
This article is contributed. See the original author and article here.
Along with the announcement of Azure Managed Grafana, we are excited to introduce new Grafana integrations with Azure Monitor including the ability to pin Azure Monitor visualizations from Azure Portal to Grafana dashboards and new out-of-the-box Azure Monitor dashboards.
Grafana allows you to query, visualize and create operational dashboards on Azure Monitor data. Using Azure Managed Grafana, you can now view your Azure monitoring data in Grafana dashboards in a few simple clicks. You can quickly pin Azure Monitor visualizations from the Azure Portal to new or existing Grafana dashboards by adding panels to your Grafana dashboard directly from Azure Monitor. Additionally, you can combine app and infrastructure metrics from multiple Azure sources into a single dashboard for full stack visibility.
How to create your first dashboard
In this example of a full-stack dashboard used to monitor Azure App Services, a DevOps engineer wants to include application layer response times from Azure Monitor application insights, garbage collection counts from Azure Monitor metrics and user events by type from Azure Monitor logs all in a single screen view.
After creating an Azure Managed Grafana workspace in the Azure portal, the engineer navigates to Azure Monitor metrics explorer to build the chart for the Garbage Collections metrics from the Azure App Service platform. Then, use Pin to Grafana to embed the chart into the dashboard.
Next, the engineer navigates to Azure Monitor Application Insights and uses Metrics to create a chart showing page load time component metrics before using Pin to Grafana to embed the chart into the same Grafana dashboard.
Last, the engineer uses Log Analytics to write a custom query to view the number of user events on the App Service split by event type. This query can also be run in Grafana which supports Azure Monitor logs and Azure Resource Graph in addition to the Azure Monitor metrics shown above.
The resulting Grafana dashboard highlights that multiple data sources and different layers of the application stack can be monitored in a single dashboard.
You can also easily get started with full-stack Azure app and infrastructure monitoring using out-of-the-box Grafana dashboards. New dashboards are now available for several popular Azure Monitor insights and to view Azure alerts. These dashboards are included in or can be downloaded from Azure Monitor Team dashboards. Use these out of the box dashboards ‘as is’ or as starting points for creating your own custom versions.
Notes:
These new workflows are in addition to previously announced Azure Managed Grafana capabilities including:
Get started today with this Quickstart on creating your first Azure Managed Grafana workspace.
This article was originally posted by the FTC. See the original article here.
Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.
Recent Comments