SS-NEWS-090: Infragard hacked!

Episode 90 December 19, 2022 00:36:08
SS-NEWS-090: Infragard hacked!
Security Serengeti
SS-NEWS-090: Infragard hacked!

Dec 19 2022 | 00:36:08

/

Show Notes

This was a pretty boring news week.  ChatGPT took up all the air, so we tried it out to see if it could podcast better than us!  Spoiler alert - Not yet.  The ChatGPT summaries (included below as an fyi) were ALL wrong in some way, and we discuss how in the podcast.

Article 1 - AWS strains to make Simple Storage Service not so simple to screw up
ChatGPT Summary - Amazon Web Services (AWS) has announced a new feature for its Simple Storage Service (S3) called S3 Replication Time Control (S3 RTC), which allows users to specify the exact time that objects should be replicated between S3 storage classes and AWS regions. S3 RTC is designed to help users reduce costs and improve the efficiency of their data replication processes by allowing them to specify when replication should occur and how often it should be repeated. The feature also includes options for scheduling replication during specific time windows and for specifying different replication times for different object groups. AWS believes that S3 RTC will be particularly useful for users who need to replicate data between regions for disaster recovery or compliance purposes, as it allows them to specify exact replication times to meet their specific business needs.

Article 2 - Royal Ransomware Puts Novel Spin on Encryption Tactics
ChatGPT Summary - The article discusses a new variant of ransomware called "Royal Ransomware," which uses novel encryption tactics to evade detection and make recovery more difficult. The ransomware is delivered through a phishing email that contains a malicious link or attachment, which, when clicked, installs the malware on the victim's system. Once installed, the ransomware encrypts the victim's files and demands a ransom in exchange for the decryption key. What sets Royal Ransomware apart from other ransomware is its use of advanced techniques to avoid detection by security software and to make it more difficult for victims to recover their data. These techniques include using multiple layers of encryption, deleting shadow copies of the victim's files, and installing a rootkit to maintain persistence on the victim's system. The article advises organizations to implement strong cybersecurity measures, such as email filtering and employee training, to protect against ransomware attacks.

Article 3 - InfraGard, FBI Program for Critical Infrastructure Cybersecurity, Breached by Hackers
ChatGPT Summary - The Federal Bureau of Investigation (FBI) has issued a warning about a recent cyber attack on the InfraGard program, which is a partnership between the FBI and private sector organizations to share information about critical infrastructure and cybersecurity threats. The attack reportedly involved the use of a phishing email that was sent to InfraGard members, which contained a link that, when clicked, installed malware on the recipient's computer. The malware gave the attackers access to the victim's system and allowed them to steal login credentials and other sensitive information. The FBI is advising InfraGard members and other organizations to be cautious when opening emails and to use strong passwords and two-factor authentication to protect against these types of attacks.
Supporting Article:
FBI’s Vetted Info Sharing Network ‘InfraGard’ Hacked

Article 4 - New Ransom Payment Schemes Target Executives, Telemedicine
ChatGPT Summary - The article discusses a new type of ransom payment scheme that has emerged in recent months, targeting executives and telemedicine organizations. In these attacks, the attackers use a variety of tactics to gain access to the victim's email account and impersonate the victim, sending requests for money or sensitive information to colleagues and associates. The attackers may also threaten to release sensitive or embarrassing information if the ransom is not paid. The article advises individuals and organizations to be vigilant in protecting their email accounts and to carefully verify the identity of anyone requesting sensitive information or money. It also recommends using two-factor authentication and other security measures to protect against these types of attacks.

If you found this interesting or useful, please follow us on Twitter @serengetisec and subscribe and review on your favorite podcast app!

Other Episodes

Episode 95

January 23, 2023 00:29:02
Episode Cover

SS-RPRT-095: Talos Inaugural Year in Review Report for 2022

In our continual search for the most useful Information Security Report, chock full of insight and wisdom, we review the Talos Inaugural Year In...

Listen

Episode 125

September 12, 2023 00:32:26
Episode Cover

SS-SUBJ-125: Detection Posture Management

Today we take a look at some tools that provide "Detection Posture Management", which is the fanciest way I found to describe it.  These...

Listen

Episode 116

June 19, 2023 00:33:08
Episode Cover

SS-NEWS-116: First SOAR with Generative AI!

FINALLY!  A SOAR platform called Blink has added generative AI to the creating automations.  I'm sure this is just a step in getting there,...

Listen