<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber Threats Archives - TranscendentIT Consulting</title>
	<atom:link href="https://transcendent-it.net/category/cyberthreats/feed/" rel="self" type="application/rss+xml" />
	<link>https://transcendent-it.net/category/cyberthreats/</link>
	<description>HIPAA Security Rule, IT Security, Cyber Security, IT Solutions, IT Consulting</description>
	<lastBuildDate>Sun, 02 Feb 2025 15:10:42 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://transcendent-it.net/wp-content/uploads/2018/09/cropped-TranscendentIT_CustomLogoDesign_Opt1-32x32.png</url>
	<title>Cyber Threats Archives - TranscendentIT Consulting</title>
	<link>https://transcendent-it.net/category/cyberthreats/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">137718711</site>	<item>
		<title>2024 Cybersecurity Threats in 2024</title>
		<link>https://transcendent-it.net/cyberthreats/2024-cybersecurity-threats-in-2024/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=2024-cybersecurity-threats-in-2024</link>
					<comments>https://transcendent-it.net/cyberthreats/2024-cybersecurity-threats-in-2024/#respond</comments>
		
		<dc:creator><![CDATA[Marshall Frett]]></dc:creator>
		<pubDate>Sun, 02 Feb 2025 15:10:31 +0000</pubDate>
				<category><![CDATA[Cyber Threats]]></category>
		<guid isPermaLink="false">https://transcendent-it.net/?p=1774</guid>

					<description><![CDATA[<p>2024 was a banner year for cyber attacks across the globe. A few data points as it relates to cyber attacks which occurred in 2024 inlcude: According to the &#8220;The State of Ransomware 2024&#8221; report by Sophos, ransomware impacted 59% of respondents. Phishing attacks skyrocketed by 4,151% since the public release of ChatGPT in late&#8230;</p>
<p>The post <a href="https://transcendent-it.net/cyberthreats/2024-cybersecurity-threats-in-2024/">2024 Cybersecurity Threats in 2024</a> appeared first on <a href="https://transcendent-it.net">TranscendentIT Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p class="">2024 was a banner year for cyber attacks across the globe. A few data points as it relates to cyber attacks which occurred in 2024 inlcude: According to the &#8220;The State of Ransomware 2024&#8221; report by Sophos, ransomware impacted 59% of respondents. Phishing attacks skyrocketed by 4,151% since the public release of ChatGPT in late 2022, as reported by SlashNext in &#8220;The State of Phishing 2024.&#8221; Netscout recorded around 8 million DDoS attacks in the first half of 2024. The IBM/Ponemon Institute report stated that the average total cost of data breaches in 2024 was $4.88 million. Below are Transcendent IT’s list top 10 list of cyber attacks for 2024.</p>



<p class="">1. <strong>Ransomware</strong> &#8211; Ransomware is a type of <a href="https://en.wikipedia.org/wiki/Malware">malware</a> that <a href="https://en.wikipedia.org/wiki/Encryption">encrypts</a> the victim&#8217;s <a href="https://en.wikipedia.org/wiki/Personal_data">personal data</a> until a <a href="https://en.wikipedia.org/wiki/Ransom">ransom</a> is paid. Ransomware attacks against U.S. organizations in 2024 disrupted healthcare systems, supply chains and government services and led to tens of millions of dollars in ransom payments. TechTarget.com list 10 of the biggest ransomware attacks of 2024. Businesses and organizations should ensure they have a plan of some kind to respond to ransomware attacks.</p>



<ol class="wp-block-list"></ol>



<p class="">2. <strong>Business Email Compromise</strong> &#8211; In a BEC scam—also known as email account compromise (EAC)—criminals send an email   message that appears to come from a known source making a legitimate request. In the worst of cases, thousands or even hundreds of thousands of dollars are sent to criminals instead. Employees should verify payment and purchase requests in person if possible or by calling the person to make sure a request is legitimate. </p>



<ol class="wp-block-list"></ol>



<p class="">3. <strong>State Sponsored Attacks</strong> &#8211; A state-sponsored attack is a well-funded, organized cyberattack or act of terrorism that is sanctioned by a government. These attacks are often used to achieve political, economic, or military objectives. Organizations have to take a proactive and holistic approach to cyber security, which should include security measures like continuous monitoring, regular vulnerability assessments, and prompt patch applications to protect their company and customer data</p>



<p class="">4. <strong>AI and Machine Learning</strong> &#8211; AI and machine learning cyber attacks, also called &#8220;adversarial attacks&#8221;, are malicious actions that exploit vulnerabilities in artificial intelligence (AI) and machine learning (ML) systems by manipulating input data to trick the AI into making incorrect decisions. Businesses and organizations should be sure to Implement role-based access control (RBAC) and multi-factor authentication (MFA) can help in securing AI models against unauthorized access, providing an additional layer of security by verifying user identities and restricting access based on user roles and permissions.</p>



<p class=""><strong>5. Insider Attacks</strong> &#8211; An &#8220;insider threat&#8221; cyber attack is a malicious act where someone with authorized access to an organization&#8217;s systems, like a current or former employee, contractor, or business partner, intentionally uses their privileged position to steal data, disrupt operations, or cause harm to the company, often for personal gain or revenge; essentially, a cyber attack originating from within the organization itself. To protect against insider threat attacks, businesses and organizations can implement access controls, security training, and data loss prevention solutions. They can also establish physical security, monitor user activity, and develop an incident response plan.</p>



<p class="">6. <strong>Social Engineering</strong> &#8211; Social engineering cyber attacks are a type of cybercrime that use psychological manipulation to trick people into giving away sensitive information. The goal is to gain access to systems, commit fraud, or steal personal information. A good defense against social engineering attacks is for security teams to keep software and firmware regularly updated, particularly security patches. Don&#8217;t run your phone rooted, or your network or PC in administrator mode. Even if a social engineering attack gets your non-administrative user account password, it won&#8217;t let an attacker reconfigure your system or install software on it.</p>



<p class="">7. <strong>Third Party Exposure</strong> &#8211; A third-party data breach is a security incident where a third party&#8217;s systems are compromised and sensitive data is stolen. This can happen when a malicious actor gains access to a third-party vendor&#8217;s systems or when a vendor&#8217;s systems are used to access sensitive information. To protect against third-party cyber attacks, you should implement a thorough third-party risk management process, including: evaluating vendor security practices during selection, establishing strong security contracts with clear expectations, conducting regular security audits, monitoring vendor compliance, and limiting data sharing with third parties, all while incorporating risk management into your contracts and performing due diligence before signing with any new vendor.</p>



<p class="">8. <strong>DNS Tunneling</strong> &#8211; DNS tunneling is a difficult-to-detect attack that routes DNS requests to the attacker&#8217;s server, providing attackers a covert command and control channel, and data exfiltration path. DNS is like a phonebook for the internet, helping to translate between IP addresses and domain names. Organizations can detect and prevent DNS tunneling attacks by: Implementing advanced DNS traffic analysis and monitoring tools. Using threat intelligence to identify and block known malicious domains. Configuring DNS security extensions (DNSSEC) to ensure the authenticity of DNS data.</p>



<p class="">9. <strong>Poor Cyber Hygiene</strong> &#8211; Poor cyber hygiene&#8221; refers to neglecting basic digital security practices, like using weak passwords, not updating software regularly, clicking on suspicious links in emails, or failing to use strong security measures, which can leave a person or system vulnerable to cyber attacks like malware, phishing scams, and ransomware, essentially opening the door for hackers to exploit these weaknesses; it&#8217;s considered a significant contributor to cyber breaches due to the lack of preventative measures. Network administrators can protect against poor hygiene cyber attacks by doing the opposite of what is described above.</p>



<p class="">10. <strong>Configuration Mistakes</strong> &#8211; A &#8220;configuration mistake cyber attack&#8221; refers to a cyber attack that exploits vulnerabilities created by incorrect settings or misconfigurations on a system, such as a server, network device, or application, essentially providing an easy entry point for hackers due to poorly configured security features like leaving default passwords unchanged, enabling unnecessary features, or not properly managing user permissions. Network administrators should develop a security minded checklist of items to ensure gets addressed when deploying new devices or software platforms on a network.</p>



<p class="">References</p>



<p class=""><em>2024 ransomware report: Sophos State of ransomware</em>. SOPHOS. (n.d.-a). https://www.sophos.com/en-us/content/state-of-ransomware</p>



<p class=""><em>Cost of a data breach 2024</em>. IBM. (n.d.). https://www.ibm.com/reports/data-breach<br><br></p>



<ol class="wp-block-list"></ol>
<p>The post <a href="https://transcendent-it.net/cyberthreats/2024-cybersecurity-threats-in-2024/">2024 Cybersecurity Threats in 2024</a> appeared first on <a href="https://transcendent-it.net">TranscendentIT Consulting</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://transcendent-it.net/cyberthreats/2024-cybersecurity-threats-in-2024/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1774</post-id>	</item>
		<item>
		<title>Third Party Cyber Security Risks</title>
		<link>https://transcendent-it.net/cyberthreats/third-party-cyber-security-risks/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=third-party-cyber-security-risks</link>
					<comments>https://transcendent-it.net/cyberthreats/third-party-cyber-security-risks/#respond</comments>
		
		<dc:creator><![CDATA[Marshall Frett]]></dc:creator>
		<pubDate>Mon, 23 Oct 2023 00:21:22 +0000</pubDate>
				<category><![CDATA[Cyber Threats]]></category>
		<guid isPermaLink="false">https://transcendent-it.net/?p=1588</guid>

					<description><![CDATA[<p>Third Party Cyber Security Risks A third-party vendor is any outside or external entity that an organization does business with. This includes suppliers, manufacturers, service providers, business partners, affiliates, brokers, distributors, resellers and agents. From an IT perspective, they often fall under the service provider or affiliate areas. Organizations often have to share data or&#8230;</p>
<p>The post <a href="https://transcendent-it.net/cyberthreats/third-party-cyber-security-risks/">Third Party Cyber Security Risks</a> appeared first on <a href="https://transcendent-it.net">TranscendentIT Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3>Third Party Cyber Security Risks</h3>
<p>A third-party vendor is any outside or external entity that an organization does business with. This includes suppliers, manufacturers, service providers, business partners, affiliates, brokers, distributors, resellers and agents. From an IT perspective, they often fall under the service provider or affiliate areas. Organizations often have to share data or an IT service of some sort with one another. This often results in access, sometimes elevated access, being granted to the third party company. A report on <a href="https://www.riskmanagementmonitor.com/security-risks-of-third-party-vendor-relationships/">“Security Risks of Third-Party Vendor Relationships”</a> published by RiskManagementMonitor.com includes an infographic estimating that 60% of data breaches involve a third party. When pondering why this is the case, I settle on the reality that many organizations don’t actually vet the IT security practices of firms they get involved with. At most, they may ask whether the firm has an insurance policy that covers Cybersecurity losses and insist the policy payout a certain amount per incident, usually at least 1 million dollars.  The same report by RiskManagementMonitor.com also found that only 52% of companies have security standards in place regarding third-party vendors and contractors.</p>
<p>Because of the many cybersecurity risks floating around today, companies should begin to sure up this major cybersecurity hole in many programs. This can be done by developing an IT security questionnaire which can be answered by any third-party vendor they will be involved with. When the answers are reviewed, Cybersecurity departments should look for areas of weakness, report to leadership the potential risks identified by questionnaire responses, and if they want to move forward regardless, track the remediation of any risks identified.</p>
<p>A second action organizations can take is to require external verification of security practices outside of their responses to the questionnaire, by having them acquire an IT certification. There are several on the market today including <a href="https://hitrustalliance.net/">HITRUST</a> for HIPAA compliance, the <a href="https://dodcio.defense.gov/CMMC/about/">Cyber Security Maturity Model</a> for those who do business with the US Department of Defense, <a href="https://www.iso.org/certification.html">ISO 27001,</a> and compliance to <a href="https://www.nist.gov/cybersecurity">NIST</a> standards which doesn’t include a certification, but a score based on the organization’s maturity level. Note that these efforts will be costly for the vendor to achieve which may narrow the number of vendors to those who can afford to do so.</p>
<p>Third parties can also refer to major applications and services that provide IT services like data hosting. There is an inherent assumption of secure IT practices by these services, and in many instances that is simply not the case.</p>
<p>The post <a href="https://transcendent-it.net/cyberthreats/third-party-cyber-security-risks/">Third Party Cyber Security Risks</a> appeared first on <a href="https://transcendent-it.net">TranscendentIT Consulting</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://transcendent-it.net/cyberthreats/third-party-cyber-security-risks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1588</post-id>	</item>
		<item>
		<title>How to Recognize a Phishing Email</title>
		<link>https://transcendent-it.net/cyberthreats/how-to-recognize-a-phishing-email/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-to-recognize-a-phishing-email</link>
					<comments>https://transcendent-it.net/cyberthreats/how-to-recognize-a-phishing-email/#respond</comments>
		
		<dc:creator><![CDATA[Marshall Frett]]></dc:creator>
		<pubDate>Mon, 11 Sep 2023 18:48:34 +0000</pubDate>
				<category><![CDATA[Cyber Threats]]></category>
		<guid isPermaLink="false">https://transcendent-it.net/?p=1558</guid>

					<description><![CDATA[<p>How to recognize a phishing email Phishing is by far the most common information gathering method used by cyber attackers. If you respond to a phishing email, it tells the attacker that the email address is valid and there’s actually a potentially vulnerable human being at that address. There are a few things we all&#8230;</p>
<p>The post <a href="https://transcendent-it.net/cyberthreats/how-to-recognize-a-phishing-email/">How to Recognize a Phishing Email</a> appeared first on <a href="https://transcendent-it.net">TranscendentIT Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3>How to recognize a phishing email</h3>
<p>Phishing is by far the most common information gathering method used by cyber attackers. If you respond to a phishing email, it tells the attacker that the email address is valid and there’s actually a potentially vulnerable human being at that address. There are a few things we all should do to check emails and protect ourselves from potential malware and virus infections which often result in data exfiltration and unwanted access to company resources.</p>
<h4>Check the domain name of the sending email address</h4>
<p>The easiest way to identify a phishing email is to check the domain of the sending email address. Many phishing emails identify as being from major companies like Microsoft, Paypal, or a large bank. Those organizations use certain and finite email domain names and the phishing emails do not and cannot send from legitimate domains. See the example below.</p>
<p><a class="dt-pswp-item" href="https://i0.wp.com/transcendent-it.net/wp-content/uploads/2023/09/Phishing-Email-Microsoft.jpg?ssl=1" data-dt-img-description="" data-large_image_width="624" data-large_image_height="335"><img data-recalc-dims="1" fetchpriority="high" decoding="async" class="size-full wp-image-1559 aligncenter" src="https://i0.wp.com/transcendent-it.net/wp-content/uploads/2023/09/Phishing-Email-Microsoft.jpg?resize=624%2C335&#038;ssl=1" alt="" width="624" height="335" srcset="https://i0.wp.com/transcendent-it.net/wp-content/uploads/2023/09/Phishing-Email-Microsoft.jpg?w=624&amp;ssl=1 624w, https://i0.wp.com/transcendent-it.net/wp-content/uploads/2023/09/Phishing-Email-Microsoft.jpg?resize=600%2C322&amp;ssl=1 600w, https://i0.wp.com/transcendent-it.net/wp-content/uploads/2023/09/Phishing-Email-Microsoft.jpg?resize=300%2C161&amp;ssl=1 300w" sizes="(max-width: 624px) 100vw, 624px" /></a></p>
<h4>Hover over any links in the email and see where they point to.</h4>
<p>Next, you can hover over any links in the email and determine the validity of those links. In the example below, the link goes to an IP address which is not common and therefore should not be clicked on.</p>
<p><a class="dt-pswp-item" href="https://i0.wp.com/transcendent-it.net/wp-content/uploads/2023/09/Phishing-Links.jpg?ssl=1" data-dt-img-description="" data-large_image_width="624" data-large_image_height="153"><img data-recalc-dims="1" decoding="async" class="size-full wp-image-1561 aligncenter" src="https://i0.wp.com/transcendent-it.net/wp-content/uploads/2023/09/Phishing-Links.jpg?resize=624%2C153&#038;ssl=1" alt="" width="624" height="153" srcset="https://i0.wp.com/transcendent-it.net/wp-content/uploads/2023/09/Phishing-Links.jpg?w=624&amp;ssl=1 624w, https://i0.wp.com/transcendent-it.net/wp-content/uploads/2023/09/Phishing-Links.jpg?resize=600%2C147&amp;ssl=1 600w, https://i0.wp.com/transcendent-it.net/wp-content/uploads/2023/09/Phishing-Links.jpg?resize=300%2C74&amp;ssl=1 300w" sizes="(max-width: 624px) 100vw, 624px" /></a></p>
<h4>Use an email analyzer your email client</h4>
<p>There are many email analyzers offered for use today. If your company doesn’t have one deployed, you should alert your management to it and ask the IT person to implement such a capability. The example below is the result of an analyzer. They usually analyze four major areas of a message. The sending address, links contained in the message, any attachments in the message and content found in the body of the message.</p>
<p><a class="dt-pswp-item" href="https://i0.wp.com/transcendent-it.net/wp-content/uploads/2023/09/SLAM-Phishing.jpg?ssl=1" data-dt-img-description="" data-large_image_width="464" data-large_image_height="476"><img data-recalc-dims="1" decoding="async" class="size-full wp-image-1562 aligncenter" src="https://i0.wp.com/transcendent-it.net/wp-content/uploads/2023/09/SLAM-Phishing.jpg?resize=464%2C476&#038;ssl=1" alt="" width="464" height="476" srcset="https://i0.wp.com/transcendent-it.net/wp-content/uploads/2023/09/SLAM-Phishing.jpg?w=464&amp;ssl=1 464w, https://i0.wp.com/transcendent-it.net/wp-content/uploads/2023/09/SLAM-Phishing.jpg?resize=292%2C300&amp;ssl=1 292w" sizes="(max-width: 464px) 100vw, 464px" /></a></p>
<h4>Use a good email filtering service</h4>
<p>Email filtering services like <a href="https://www.mimecast.com/products/">Mimecast</a> and <a href="https://www.n-able.com/resources/mail-assure-for-it-pros-datasheet">Mail Assure</a> provide email filtering and analysis services and will often catch and quarantine most phishing emails before they hit your inbox. Your organization may not be using a filtering service, so talk with your management team and inquire about this capability.</p>
<h4>Slow down</h4>
<p>Lastly, what most users need to do is slow down. We can quickly click on items we probably should not. Sometimes, new employees get in a rush and overlook very obvious requests from scammers that are not normal in the organization. If the President of the company never asks you to go out and buy gift cards, then that is not something you should do if you get a request via email to do so. In-person verification of such requests should be a normal practice.</p>
<p>The post <a href="https://transcendent-it.net/cyberthreats/how-to-recognize-a-phishing-email/">How to Recognize a Phishing Email</a> appeared first on <a href="https://transcendent-it.net">TranscendentIT Consulting</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://transcendent-it.net/cyberthreats/how-to-recognize-a-phishing-email/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1558</post-id>	</item>
		<item>
		<title>Top 5 Cyber Threats of 2020</title>
		<link>https://transcendent-it.net/cyberthreats/top-5-cyber-threats-of-2020/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=top-5-cyber-threats-of-2020</link>
					<comments>https://transcendent-it.net/cyberthreats/top-5-cyber-threats-of-2020/#respond</comments>
		
		<dc:creator><![CDATA[Marshall Frett]]></dc:creator>
		<pubDate>Sun, 20 Dec 2020 21:05:25 +0000</pubDate>
				<category><![CDATA[Cyber Threats]]></category>
		<guid isPermaLink="false">http://box2095.temp.domains/~transdb7/?p=1316</guid>

					<description><![CDATA[<p>The post <a href="https://transcendent-it.net/cyberthreats/top-5-cyber-threats-of-2020/">Top 5 Cyber Threats of 2020</a> appeared first on <a href="https://transcendent-it.net">TranscendentIT Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper"><div class="vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_pos_align_center vc_separator_no_text vc_sep_color_grey wpb_content_element  wpb_content_element" ><span class="vc_sep_holder vc_sep_holder_l"><span class="vc_sep_line"></span></span><span class="vc_sep_holder vc_sep_holder_r"><span class="vc_sep_line"></span></span>
</div></div></div></div></div><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h4><strong>Top 5 Cyber Security Threats of 2020</strong></h4>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>The year 2020 will go down in history as the year the world was struck by the COVID-19 pandemic resulting in large numbers of hospitalizations and deaths. The pandemic also had a major impact on computer networks and computer systems as many businesses implemented telework solutions. The overall increase in the number of individuals using computers, the internet and more specifically cloud-based solutions, created more opportunities for the emergence of cyber threats and attacks across the globe. Below are our top 5 cyber threats of 2020.</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p><strong>More Sophisticated Phishing Attacks</strong> &#8211; A <a href="https://en.wikipedia.org/wiki/Phishing">phishing attack</a> occurs when an attacker sends an email to an unsuspecting user containing either an attachment or a hyperlink. When the user either opens the attachment or clicks on the hyperlink the payload the attacker sent is activated. The payload usually initiates a software installation of some kind usually designed to either ex-filtrate data from the affected system or take up residence on the machine in hopes of later exploiting the machine itself or the network the machine resides on. 2020 has seen a significant increase in both the amount and sophistication of phishing emails across the business community to include even more targeted <a href="https://zvelo.com/network-security-malicious-threats-and-common-computer-definitions/#spear-phishing">spear phishing</a> and <a href="https://zvelo.com/network-security-malicious-threats-and-common-computer-definitions/#vishing">whale phishing</a> types of attacks. The best prevention against limiting successful attacks is simply, user education. Phishing campaigns designed to keep users readily mindful of phishing attempts can be an effective prevention measure. Tips on <a href="https://staysafeonline.org/blog/5-ways-spot-phishing-emails/">how to recognize a phishing attack</a> are available online or from cyber security professionals at your place of employment.</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p><strong>New variants of Ransomeware</strong> &#8211; New strains of ransomware have continued to ravage networks and individuals around the globe. A few new variants include Cerber. <a href="https://www.datto.com/blog/ransomware-roundup-bart-cerber-and-cryptxxx?utm_campaign=common-types-ransomware&amp;utm_medium=Blog&amp;utm_source=22" target="_blank" rel="noopener">Cerber</a> targets cloud-based Microsoft 365 users and has impacted millions of users using an elaborate phishing campaign. This type of malware emphasizes the growing need for <a href="https://www.techradar.com/news/what-is-saas">SaaS</a> backups in addition to on-premise. Another strain is named NotPetya. NotPetya is a  variant of <a href="https://www.datto.com/blog/hospital-hit-with-cyber-attack-new-ransomware-appears?utm_campaign=common-types-ransomware&amp;utm_medium=Blog&amp;utm_source=22">Petya</a>, a strain of ransomware first seen in 2016. However, researchers now believe NotPetya is instead a <a href="https://www.datto.com/blog/notpetya-cyberattack-wiper-malware?utm_campaign=common-types-ransomware&amp;utm_medium=Blog&amp;utm_source=22" target="_blank" rel="noopener">malware known as a wiper</a> with the sole purpose of destroying data instead of obtaining a ransom. Lastly, <a href="https://www.datto.com/blog/locky-teslacrypt-among-latest-ransomware-threats?utm_campaign=common-types-ransomware&amp;utm_medium=Blog&amp;utm_source=22" target="_blank" rel="noopener">Locky&#8217;s</a> approach is similar to many other types of ransomware. The malware is spread in an email message disguised as an invoice. When opened, the invoice is scrambled and the victim is instructed to enable macros to read the document. When macros are enabled, Locky begins encrypting a large array of file types using AES encryption. The best means of defense and protection still remains a good off-site backup of any critical data.</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p><strong>IOT Attacks</strong> &#8211; <a href="https://www.avast.com/c-what-is-the-internet-of-things">Internet of Things</a> system intrusions still present a clear and present danger in today&#8217;s internet-powered world. Companies of all sizes and in all sectors are exposed, as long as they utilize non-security minded and configured IoT systems to make critical operational decisions, remotely and in real time. Such systems include, “Inventory trackers, temperature controls, or any type of IoT device that is gathering actionable data are at risk of an attack,&#8221; says Mike Nelson, Vice-President of IOT for Digicert. “The hacker either embeds malware on the device causing it to report inaccurate values, or, the hacker performs a man in the middle attack and manipulates the values as they are passed from the device.”</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p><strong>Botnet Attacks using AI machine learning capabilities</strong> &#8211; The first half of 2020 saw an increase in attacks and threats directed at Operational Technology (OT) and Internet of Things (IoT) networks. According to <a href="https://www.nozominetworks.com/">Nozomi Networks</a>, a large number of the attacks were from from IoT botnets. Some of the IoT botnets that continue to present a threat in 2020 include Dark Nexus (derived from Qbot and Mirai), Mukashi, LeetHozer, Hoaxcalls, and Mozi.m. The CSDE issued an <a href="https://securingdigitaleconomy.org/wp-content/uploads/2019/11/CSDE_Botnet-Report_2020_FINAL.pdf">International Botnet and IOT Security guide for 2020</a> in an attempt to share information amongst various stakeholders and IT communities who need to protect their networks.</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p><strong>Cloud Jacking</strong> &#8211; Cloud jacking involves the compromise and subsequent hi-jacking of cloud-based accounts. Such accounts have significantly increased in usage as a result of the COVID-19 pandemic. To protect against cloud-jacking, businesses and individuals should implement multi-factor authentication technologies to additional requirements to achieve successful logon. Organizations should also consider the use of VPN technologies and private cloud network configurations to restrict network locations logon sessions can be initiated from.</p>

		</div>
	</div>
</div></div></div></div>
</div><p>The post <a href="https://transcendent-it.net/cyberthreats/top-5-cyber-threats-of-2020/">Top 5 Cyber Threats of 2020</a> appeared first on <a href="https://transcendent-it.net">TranscendentIT Consulting</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://transcendent-it.net/cyberthreats/top-5-cyber-threats-of-2020/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1316</post-id>	</item>
		<item>
		<title>4 Methods of Malware Analysis</title>
		<link>https://transcendent-it.net/cyberthreats/malware-analysis/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=malware-analysis</link>
					<comments>https://transcendent-it.net/cyberthreats/malware-analysis/#comments</comments>
		
		<dc:creator><![CDATA[Marshall Frett]]></dc:creator>
		<pubDate>Sun, 17 Jun 2018 22:24:01 +0000</pubDate>
				<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[malware]]></category>
		<guid isPermaLink="false">http://box2095.temp.domains/~transdb7/?p=937</guid>

					<description><![CDATA[<p>The post <a href="https://transcendent-it.net/cyberthreats/malware-analysis/">4 Methods of Malware Analysis</a> appeared first on <a href="https://transcendent-it.net">TranscendentIT Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>As described by Mr. Lenny Zeltser, malware analysis can occur in 4 distinct phases. These steps and methods are listed in order from easiest to hardest. They are:</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h3 style="text-align: left;">Fully Automated Analysis</h3>
<h3 style="text-align: left;">Static Properties Analysis</h3>
<h3>Interactive Behavior Analysis</h3>
<h3 style="text-align: left;">Manual Code Reversing</h3>

		</div>
	</div>
</div></div></div><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div  class="wpb_single_image wpb_content_element vc_align_left">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img data-recalc-dims="1" loading="lazy" decoding="async" class="vc_single_image-img " src="https://i0.wp.com/transcendent-it.net/wp-content/uploads/2018/06/MalwareAnalysisPhases.jpg?resize=480%2C300&#038;ssl=1" width="480" height="300" alt="MalwareAnalysisPhases" title="MalwareAnalysisPhases" loading="lazy"  data-dt-location="https://transcendent-it.net/cyberthreats/malware-analysis/attachment/malwareanalysisphases/" /></div>
		</figure>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>Fully automated analysis involve the use of tools that scan files and produce reports on its findings. Such tools are usually commercially developed with canned reports and recommendations on how to address malware. The downside of fully automated tools is they often don&#8217;t provide as much insight about a piece of malware as a investigator would using more manual processes.</p>
<p>The next step and\or method of analyzing malware is examining the static properties of a file. Static properties include things like hashes, file header details, packer signatures and metadata. This type of information helps to identify malware quickly which allows for quick searches for known ways to address it. This method can be very effective for widely known pieces of malware but not for more unique ones where not as much information may be available to identify and address it.</p>
<p>The next step or method is interactive behavioral analysis. This involves a technician with the appropriate skill sets to actually run and observe the malware in a number of controlled environments. The malware may run in an isolated lab environment or it could run in an environment that allows it to connect back to command and control servers elsewhere. When this is done the technician is able to monitor and in some cases duplicate the behavior of the malware which ultimately allows for a much deeper understanding of how the malware works and what it is capable of. The most important aspect of this method is the skill sets of the person performing the work. It would be helpful if the person had a background in network administration and some coding experience as well.</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<div style="text-align: center;"><div class="emaillist" id="es_form_f1-p937-n1"><form action="/category/cyberthreats/feed/#es_form_f1-p937-n1" method="post" class="es_subscription_form es_shortcode_form  es_ajax_subscription_form" id="es_subscription_form_6a04868de250b" data-source="ig-es" data-form-id="1"><div class="es-field-wrap"><label>Name*<br /><input type="text" name="esfpx_name" class="ig_es_form_field_name" placeholder="" value="" required="required" /></label></div><div class="es-field-wrap ig-es-form-field"><label class="es-field-label">Email*<br /><input class="es_required_field es_txt_email ig_es_form_field_email ig-es-form-input" type="email" name="esfpx_email" value="" placeholder="" required="required" /></label></div><input type="hidden" name="esfpx_lists[]" value="7a3090d1573b" /><input type="hidden" name="esfpx_form_id" value="1" /><input type="hidden" name="es" value="subscribe" />
			<input type="hidden" name="esfpx_es_form_identifier" value="f1-p937-n1" />
			<input type="hidden" name="esfpx_es_email_page" value="937" />
			<input type="hidden" name="esfpx_es_email_page_url" value="https://transcendent-it.net/cyberthreats/malware-analysis/" />
			<input type="hidden" name="esfpx_status" value="Unconfirmed" />
			<input type="hidden" name="esfpx_es-subscribe" id="es-subscribe-6a04868de250b" value="87c44f1e79" />
			<label style="position:absolute;top:-99999px;left:-99999px;z-index:-99;" aria-hidden="true"><span hidden>Please leave this field empty.</span><input type="email" name="esfpx_es_hp_email" class="es_required_field" tabindex="-1" autocomplete="-1" value="" /></label><input type="submit" name="submit" class="es_subscription_form_submit es_submit_button es_textbox_button" id="es_subscription_form_submit_6a04868de250b" value="Submit" /><span class="es_spinner_image" id="spinner-image"><img data-recalc-dims="1" decoding="async" src="https://i0.wp.com/transcendent-it.net/wp-content/plugins/email-subscribers/lite/public/images/spinner.gif?w=1200&#038;ssl=1" alt="Loading" /></span></form><span class="es_subscription_message " id="es_subscription_message_6a04868de250b" role="alert" aria-live="assertive"></span></div></div>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div  class="wpb_single_image wpb_content_element vc_align_center">
		
		<figure class="wpb_wrapper vc_figure">
			<div class="vc_single_image-wrapper   vc_box_border_grey"><img data-recalc-dims="1" loading="lazy" decoding="async" width="585" height="308" src="https://i0.wp.com/transcendent-it.net/wp-content/uploads/2018/06/Microsoft-Process-Monitor.jpg?resize=585%2C308&#038;ssl=1" class="vc_single_image-img attachment-large" alt="" title="Microsoft Process Monitor" srcset="https://i0.wp.com/transcendent-it.net/wp-content/uploads/2018/06/Microsoft-Process-Monitor.jpg?w=585&amp;ssl=1 585w, https://i0.wp.com/transcendent-it.net/wp-content/uploads/2018/06/Microsoft-Process-Monitor.jpg?resize=300%2C158&amp;ssl=1 300w" sizes="(max-width: 585px) 100vw, 585px"  data-dt-location="https://transcendent-it.net/cyberthreats/malware-analysis/attachment/microsoft-process-monitor/" /></div>
		</figure>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p>Fully automated analysis involve the use of tools that scan files and produce reports on its findings. Such tools are usually commercially developed with canned reports and recommendations on how to address malware. The downside of fully automated tools is they often don&#8217;t provide as much insight about a piece of malware as a investigator would using more manual processes.</p>
<p>The next step and\or method of analyzing malware is examining the static properties of a file. Static properties include things like hashes, file header details, packer signatures and metadata. This type of information helps to identify malware quickly which allows for quick searches for known ways to address it. This method can be very effective for widely known pieces of malware but not for more unique ones where not as much information may be available to identify and address it.</p>
<p>The next step or method is interactive behavioral analysis. This involves a technician with the appropriate skill sets to actually run and observe the malware in a number of controlled environments. The malware may run in an isolated lab environment or it could run in an environment that allows it to connect back to command and control servers elsewhere. When this is done the technician is able to monitor and in some cases duplicate the behavior of the malware which ultimately allows for a much deeper understanding of how the malware works and what it is capable of. The most important aspect of this method is the skill sets of the person performing the work. It would be helpful if the person had a background in network administration and some coding experience as well.</p>
<p>The last method I will discuss is manual code reversing. This method requires the use of a code disassembler and a debugger which could be accompanied by a de-compiler, various plug-ins and other tools as needed. The ability to capture and dump the contents of the memory of a system is important as well. Reverse engineering malware can provide the following benefits.</p>
<ul>
<li>Decoding of encrypted data stored by the malware</li>
<li>Logic determination and algorithm generation</li>
<li>Understanding other malware capabilities not discovered in other steps</li>
</ul>
<p>All or one of the above methods can be used during the investigation of an incident or intrusion. It really depends a lot on the expertise of the technician performing the analysis, what information they are seeking, and how far he or she is willing to go to get it information. Reverse engineering will provide the most comprehensive understanding of a piece of malware when compared with the other methods. See a short video on protecting yourself from malware <a href="https://transcendent-it.net/security-videos/">here</a>. <a href="https://www.template.net/business/tools/malware-analysis/">Click here</a> to get review some malware analysis tools and techniques.</p>
<p>References</p>
<p>Zeltser, L. (2015, February 19). Mastering 4 Stages of Malware Analysis. Retrieved June 17, 2018, from <a href="https://zeltser.com/mastering-4-stages-of-malware-analysis/" rel="noopener">https://zeltser.com/mastering-4-stages-of-malware-analysis/</a></p>
<p>Aubert, M. (2017, February 01). Malware Analysis for the Incident Responder. Retrieved June 17, 2018, from <a href="https://blogs.cisco.com/security/malware-analysis-for-the-incident-responder" rel="noopener">https://blogs.cisco.com/security/malware-analysis-for-the-incident-responder</a></p>

		</div>
	</div>
</div></div></div></div>
</div><p>The post <a href="https://transcendent-it.net/cyberthreats/malware-analysis/">4 Methods of Malware Analysis</a> appeared first on <a href="https://transcendent-it.net">TranscendentIT Consulting</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://transcendent-it.net/cyberthreats/malware-analysis/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">937</post-id>	</item>
		<item>
		<title>Data Breaches</title>
		<link>https://transcendent-it.net/cyberthreats/data-breaches/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=data-breaches</link>
					<comments>https://transcendent-it.net/cyberthreats/data-breaches/#comments</comments>
		
		<dc:creator><![CDATA[Marshall Frett]]></dc:creator>
		<pubDate>Sun, 29 Apr 2018 10:47:22 +0000</pubDate>
				<category><![CDATA[Cyber Threats]]></category>
		<guid isPermaLink="false">http://box2095.temp.domains/~transdb7/?p=833</guid>

					<description><![CDATA[<p>The post <a href="https://transcendent-it.net/cyberthreats/data-breaches/">Data Breaches</a> appeared first on <a href="https://transcendent-it.net">TranscendentIT Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h4>Data Breaches</h4>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h3>What is a data breach?</h3>
<p>Generally, a data breach is a security incident where digital information is accessed or taken in an unauthorized manner. Enterprise risk management explains that there are five types of data breaches:</p>
<ol>
<li>Malware</li>
<li>Phishing</li>
<li>Password Attacks</li>
<li>Ransomware and</li>
<li>Denial-of-Service</li>
</ol>
<p>Malware is software whose purpose is to harm a device or computer. Phishing is a cyber attack that involves an attacker masquerading as a trusted entity to trick a user into willingly giving up sensitive information. Password attacks are those where an attacker guesses a users&#8217; password through brute force or combination attacks. This attack is more often successful when the user has a weak password. Ransomware is when an attacker gets access to and holds data hostage until they get a reward. A denial-of-service attack is a breach in which an attacker manages to deny a user access to data they are authorized to look at. Physical theft can also cause a data breach.</p>
<h3>Response and Preparedness</h3>
<p>Data breaches can be complicated and costly to manage. The first way to prepare for data breaches is to have a preparedness plan in place before it occurs. A preparedness plan includes knowing who your first responders are. This should be a team with people familiar with the systems and security control of your organization and having a plan for how to identify and resolve the problem.</p>
<p>Here are 10 ways organizations can defend their networks and assets against a data breach:</p>
<ol>
<li>Strong IT Policies</li>
<li>Strong Passwords</li>
<li>Strong anti-virus\anti-malware software</li>
<li>Strong firewall</li>
<li>Strong encryption</li>
<li>Security patching and Vulnerability scanning</li>
<li>User education</li>
<li>Data Loss Prevention capabilities</li>
<li>Log auditing</li>
<li>Backups</li>
</ol>
<p>&nbsp;</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<div style="text-align: center;"><div class="emaillist" id="es_form_f1-p833-n2"><form action="/category/cyberthreats/feed/#es_form_f1-p833-n2" method="post" class="es_subscription_form es_shortcode_form  es_ajax_subscription_form" id="es_subscription_form_6a04868deb219" data-source="ig-es" data-form-id="1"><div class="es-field-wrap"><label>Name*<br /><input type="text" name="esfpx_name" class="ig_es_form_field_name" placeholder="" value="" required="required" /></label></div><div class="es-field-wrap ig-es-form-field"><label class="es-field-label">Email*<br /><input class="es_required_field es_txt_email ig_es_form_field_email ig-es-form-input" type="email" name="esfpx_email" value="" placeholder="" required="required" /></label></div><input type="hidden" name="esfpx_lists[]" value="7a3090d1573b" /><input type="hidden" name="esfpx_form_id" value="1" /><input type="hidden" name="es" value="subscribe" />
			<input type="hidden" name="esfpx_es_form_identifier" value="f1-p833-n2" />
			<input type="hidden" name="esfpx_es_email_page" value="833" />
			<input type="hidden" name="esfpx_es_email_page_url" value="https://transcendent-it.net/cyberthreats/data-breaches/" />
			<input type="hidden" name="esfpx_status" value="Unconfirmed" />
			<input type="hidden" name="esfpx_es-subscribe" id="es-subscribe-6a04868deb219" value="87c44f1e79" />
			<label style="position:absolute;top:-99999px;left:-99999px;z-index:-99;" aria-hidden="true"><span hidden>Please leave this field empty.</span><input type="email" name="esfpx_es_hp_email" class="es_required_field" tabindex="-1" autocomplete="-1" value="" /></label><input type="submit" name="submit" class="es_subscription_form_submit es_submit_button es_textbox_button" id="es_subscription_form_submit_6a04868deb219" value="Submit" /><span class="es_spinner_image" id="spinner-image"><img data-recalc-dims="1" decoding="async" src="https://i0.wp.com/transcendent-it.net/wp-content/plugins/email-subscribers/lite/public/images/spinner.gif?w=1200&#038;ssl=1" alt="Loading" /></span></form><span class="es_subscription_message " id="es_subscription_message_6a04868deb219" role="alert" aria-live="assertive"></span></div></div>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h3>Prepared Plan Metrics</h3>
<p>In the event a breach does occur the following metrics can be used to measure how effective an organization&#8217;s response is:</p>
<h3><a name="_Toc510920710"></a>Mean Time to Identify (MTTI)</h3>
<p>MTTI, which can also be called Mean Time to Detection (MTTD) measures how quickly an organization can identify an event and generate an alert. It determines how fast the organization is alerted when something suspicious happens anywhere in their digital environment. This metric is calculated by finding the difference between the start of any security event and its detection. Either by a technician or via monitoring tools. A detection skill ratio could be calculated by dividing the Mean Time to Resolution from the MTTI.</p>
<h3><a name="_Toc510920711"></a>Mean Time to Notify (MTTN)</h3>
<p>MTTN is a metric that measures the average time taken to notify a pre-determined list of contacts that a security incident has occurred. This metric is measured by finding the difference between the time someone is notified and the initial time the event was detected.</p>
<h3><a name="_Toc510920712"></a>Mean Time to Analyze and Assess (MTTAA)</h3>
<p>The time taken to contain and review the event. The mean time to analyze and assess an issue is the time it takes initial and second level responders to come to an understanding of what has occurred and then determine a way forward. Sometime the widespread nature and inevitable response of panic can lead to significant delays in properly assessing an issue and then charting a course forward for resolution. Once detected the MTTAA should not exceed 2 hours in most situations.</p>
<h3><a name="_Toc510920713"></a>Time Taken to Gather Acquire an Image</h3>
<p>This metric will measure the amount of time the chosen imaging tool takes to acquire an image of an affected device. This time will indeed vary depending on what kind of device is being imaged. The target times are as follows: 3 hours for workstation with a 500 GB or less hard drive. 1 hour for a tablet device. 2 hours for a cell phone device. 5 hours for a server. 2 hours for a network device. Should the tools chosen to acquire these kinds of images not be able to meet these target times an evaluation will be done to understand why and if another tool should be procured.</p>
<h3><a name="_Toc510920714"></a>Escalation to a Higher or More Technical Individual or Team</h3>
<p>Some security incidents require an escalation to a more advanced individual, engineer or team of individuals to assess and handle. This metric will measure, if necessary, how long it took the initial response team to escalate to a higher level of support. Processes should be established to clearly delineate when an escalation should occur to avoid significant delays in resolution of issues. The target time on this metric will vary depending on the incident but in general should not exceed 2-4 hours.</p>
<h3><a name="_Toc510920715"></a>Mean Time to Fix (MTTF)</h3>
<p>The MTTF metric can be used to measure the amount of time it takes to restore a service or a system or anything that causes a service outage. This includes infrastructure being taken offline due to a security incident or event. This could be a workstation for a user or it could be a server that houses lots of data and provides a service to the network. Depending on the organization a target time to fix should be 72 hours. This is an aggressive target but in many cases, it may be possible replace a system instead of making the impacted system operational again.</p>
<h3><a name="_Toc510920716"></a>Mean Time to Know (MTTK) – The Root Cause of an Incident</h3>
<p>The MTTK metric measures the amount of time it takes to determine the root cause of a security incident and the full extent of the incident including all who were affected and any data that may have been compromised. Depending on the organization a target MTTK time should be 30 days. As tools and experience increase on the team it is very possible that this time will decrease but it should certainly not increase. This includes the production of a formal root cause analysis report.</p>
<h3><a name="_Toc510920717"></a>Mean Time to Verify (MTTV)</h3>
<p>The MTTV metric can be used to measure the amount of time it takes to confirm the satisfactory resolution of a security incident with the parties affected. Depending on the organization the target time for this metric should be 14 days after the root cause report has been produced and finalized. This metric attempts to ensure that every stakeholder affected has received the best possible resolution to their issue that can be afforded.</p>
<h3><a name="_Toc510920718"></a>Mean Time Between Security Incidents</h3>
<p>As the security posture of the network improves, it is rational to expect there to be less security incidents. Therefore, one of the metrics that should be monitored is the average time between security incidents. Depending on the organization an ideal target time for this metric is 6 months. This time should continue to get longer as security practices and safeguards improve. If it is less than the target time an investigation into what can be done to meet the target time should be conducted.</p>
<h3><a name="_Toc510920719"></a>Mean Time to Resolution (MTTR)</h3>
<p>The MTTR metric is one that takes into account a few aspects of metrics listed above to measure them altogether. Those aspects include:</p>
<ol>
<li>Collection of evidence</li>
<li>Validation of evidence</li>
<li>Reaction to evidence</li>
</ol>
<p>&nbsp;</p>
<p>Rouse, M. (2017, December). What is data breach ? &#8211; Definition from WhatIs.com. Retrieved from https://searchsecurity.techtarget.com/definition/data-breach</p>
<p>Written by: Marshall Frett &amp; Pamela Katali</p>

		</div>
	</div>
</div></div></div></div>
</div><p>The post <a href="https://transcendent-it.net/cyberthreats/data-breaches/">Data Breaches</a> appeared first on <a href="https://transcendent-it.net">TranscendentIT Consulting</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://transcendent-it.net/cyberthreats/data-breaches/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">833</post-id>	</item>
		<item>
		<title>Loyphish-Malicious Software</title>
		<link>https://transcendent-it.net/cyberthreats/loyphish-malicious-software/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=loyphish-malicious-software</link>
					<comments>https://transcendent-it.net/cyberthreats/loyphish-malicious-software/#comments</comments>
		
		<dc:creator><![CDATA[Marshall Frett]]></dc:creator>
		<pubDate>Sat, 04 Nov 2017 16:45:58 +0000</pubDate>
				<category><![CDATA[Cyber Threats]]></category>
		<guid isPermaLink="false">http://box2095.temp.domains/~transdb7/?p=552</guid>

					<description><![CDATA[<p>The post <a href="https://transcendent-it.net/cyberthreats/loyphish-malicious-software/">Loyphish-Malicious Software</a> appeared first on <a href="https://transcendent-it.net">TranscendentIT Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<h3 style="text-align: left;">Loyphish &#8211; Malicious Software</h3>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p><strong>PWS:HTML/Loyphish.G, </strong>more commonly referred to as Loyphish, is a type of attack that involves visiting a phishing page, which is a malicious webpage used to steal your login credentials. It belongs to be a member of the PWS:HTML/Phish family. In most cases it disguises itself as a legitimate banking webpage and attempts to trick you into completing a login attempt. While you may think you are submitting your sensitive data to your respective bank, you have actually submitted your information to a remote attacker. Attackers use images, logos, and verbiage to persuade you into thinking you are visiting the bank’s authorized website. The webpage itself can be really annoying. It pops up often when you browse or use a search engine to find information. In short, you cannot use the Internet normally. In addition, there are a lot of threats in its webpage;  threats that will be installed onto your computer when you visit the webpage. So please keep in mind, PWS:HTML/Loyphish.G is definitely a virus with a high level of risk. It needs to be removed immediately before it installs more and more threats onto your computer.</p>
<p>Having an understanding the major types of malware in use can help you make informed decisions about acquiring tools to protect your computer. To prevent infection from any of these threats, be sure to use up-to-date antivirus software and ensure your firewall is enabled on your computer. Be sure to install the latest updates for all of your installed software and always keep your operating system current. Finally, be cautious when visiting unknown websites and opening email attachments.</p>
<h2>Solution</h2>
<h3>Details for a Solution – Remove PWS:HTML/Loyphish.G Manually by Yourself</h3>
<p><strong>Step one</strong>– Boot your computer into Safe Mode With Networking.</p>
<p>To perform this procedure, please restart your computer. -&gt; As your computer restarts but before Windows launches, tap “F8″ key constantly. -&gt; Use the arrow keys to highlight the “Safe Mode with Networking” option and then press ENTER. -&gt; If you don’t get the Safe Mode with Networking option, please restart the computer again and keep tapping “F8″ key immediately.</p>
<p><strong>Step two</strong> – open your Task Manager by pressing Ctrl+Alt+Delete keys and then stop the PWS:HTML/Loyphish.G process:</p>
<pre>[random name].exe of PWS:HTML/Loyphish.G</pre>
<p><strong>Step three</strong>– delete the following files created by PWS:HTML/Loyphish.G in Local disk C hard drive:</p>
<pre>%UserProfile%\[random].exe
%ProgramFiles%\Internet Explorer\Connection Wizard\[random]
%Windir%\Microsoft.NET\Framework\[random].exe
%System%\[random].exe
%Temp%\[random].bat</pre>
<p><strong>Step four</strong> – open your Registry Editor program by navigating to Start Menu, type in Regedit, and then click OK. When you have been in Registry Editor, please delete the following registry entries associated with PWS:HTML/Loyphish.G:</p>
<pre>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\[random]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run\[random]
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\[random]
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\svflooje\Enum\[random]</pre>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<div style="text-align: center;"><div class="emaillist" id="es_form_f1-p552-n3"><form action="/category/cyberthreats/feed/#es_form_f1-p552-n3" method="post" class="es_subscription_form es_shortcode_form  es_ajax_subscription_form" id="es_subscription_form_6a04868e6e68f" data-source="ig-es" data-form-id="1"><div class="es-field-wrap"><label>Name*<br /><input type="text" name="esfpx_name" class="ig_es_form_field_name" placeholder="" value="" required="required" /></label></div><div class="es-field-wrap ig-es-form-field"><label class="es-field-label">Email*<br /><input class="es_required_field es_txt_email ig_es_form_field_email ig-es-form-input" type="email" name="esfpx_email" value="" placeholder="" required="required" /></label></div><input type="hidden" name="esfpx_lists[]" value="7a3090d1573b" /><input type="hidden" name="esfpx_form_id" value="1" /><input type="hidden" name="es" value="subscribe" />
			<input type="hidden" name="esfpx_es_form_identifier" value="f1-p552-n3" />
			<input type="hidden" name="esfpx_es_email_page" value="552" />
			<input type="hidden" name="esfpx_es_email_page_url" value="https://transcendent-it.net/cyberthreats/loyphish-malicious-software/" />
			<input type="hidden" name="esfpx_status" value="Unconfirmed" />
			<input type="hidden" name="esfpx_es-subscribe" id="es-subscribe-6a04868e6e68f" value="87c44f1e79" />
			<label style="position:absolute;top:-99999px;left:-99999px;z-index:-99;" aria-hidden="true"><span hidden>Please leave this field empty.</span><input type="email" name="esfpx_es_hp_email" class="es_required_field" tabindex="-1" autocomplete="-1" value="" /></label><input type="submit" name="submit" class="es_subscription_form_submit es_submit_button es_textbox_button" id="es_subscription_form_submit_6a04868e6e68f" value="Submit" /><span class="es_spinner_image" id="spinner-image"><img data-recalc-dims="1" decoding="async" src="https://i0.wp.com/transcendent-it.net/wp-content/plugins/email-subscribers/lite/public/images/spinner.gif?w=1200&#038;ssl=1" alt="Loading" /></span></form><span class="es_subscription_message " id="es_subscription_message_6a04868e6e68f" role="alert" aria-live="assertive"></span></div></div>
<p>;</p>

		</div>
	</div>
</div></div></div></div><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p><em><strong>References:</strong></em></p>
<p>Armendariz, T. (Aug. 25, 2017).  Top Malware Threats and How to Protect Yourself. Retrieved from <a href="https://www.lifewire.com/top-malware-threats-153641">https://www.lifewire.com/top-malware-threats-153641</a></p>
<p>Facinelli, M. (Oct. 14, 2012). Manually Remove PWS:HTML/Loyphish.G – to Get Rid of PWS:HTML/Loyphish.G Infection Completely. Retrieved from<a href="https://blog.teesupport.com/manually-remove-pwshtmlloyphish-g-to-get-rid-of-pwshtmlloyphish-g-infection-completely/"> https://blog.teesupport.com/manually-remove-pwshtmlloyphish-g-to-get-rid-of-pwshtmlloyphish-g-infection-completely/</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>

		</div>
	</div>
</div></div></div></div>
</div><p>The post <a href="https://transcendent-it.net/cyberthreats/loyphish-malicious-software/">Loyphish-Malicious Software</a> appeared first on <a href="https://transcendent-it.net">TranscendentIT Consulting</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://transcendent-it.net/cyberthreats/loyphish-malicious-software/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">552</post-id>	</item>
		<item>
		<title>Ransomware-Malicious Software</title>
		<link>https://transcendent-it.net/cyberthreats/ransomware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ransomware</link>
					<comments>https://transcendent-it.net/cyberthreats/ransomware/#comments</comments>
		
		<dc:creator><![CDATA[Marshall Frett]]></dc:creator>
		<pubDate>Mon, 30 Oct 2017 20:14:31 +0000</pubDate>
				<category><![CDATA[Cyber Threats]]></category>
		<guid isPermaLink="false">http://box2095.temp.domains/~transdb7/?p=458</guid>

					<description><![CDATA[<p>The post <a href="https://transcendent-it.net/cyberthreats/ransomware/">Ransomware-Malicious Software</a> appeared first on <a href="https://transcendent-it.net">TranscendentIT Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid dt-default" style="margin-top: 0px;margin-bottom: 0px"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element " >
		<div class="wpb_wrapper">
			<p><strong>Ransomware</strong> is a type of malware that prevents or limits users from accessing their computer systems, either by locking the system&#8217;s screen or by locking the users&#8217; files via encryption unless or until a ransom is paid. Security experts have warned that ransomware is the fastest growing form of computer virus. Like other computer viruses, it usually finds its way onto a device by exploiting a security hole in vulnerable software or by tricking somebody into installing it.</p>
<p><strong>Prevention and Protection</strong></p>
<p>The best protection against ransomware attacks appears to be good backups of the system before it was infected. Backups should be kept off-site as much as possible. Cloud backup services like that of Carbonite are a good option. Also anti-virus\anti-malware software should be used to alert on activity like the encrypting of files or other than normal behavior. At the time of this post Trend Micro&#8217;s offering is a good option. User education on this topic is another means of protecting networks against infiltrations. Security departments should conduct frequent phishing exercises designed to teach users the methods used to entice them to click on links that install malicious software.</p>
<p><strong>Ransom Prices and Payment</strong></p>
<p>Ransom prices vary depending on the ransomware variant and the price or exchange rates of digital currencies. Ransomware payments are typically made using bitcoin or similar technology. Bitcoin is a new currency that was created in 2009 by an unknown person using the alias Satoshi Nakamoto. Transactions are made with no middle men – meaning, no banks! There are no transaction fees and no need to give your real name. More merchants are beginning to accept them: You can buy webhosting services, pizza or even manicures. Several marketplaces called “bitcoin exchanges” allow people to buy or sell bitcoins using different currencies. Mt. Gox is the largest bitcoin exchange.</p>
<p>&nbsp;</p>
<p><em><strong>Links to articles of ransomware attacks:</strong></em></p>
<p><a href="https://www.usatoday.com/story/tech/news/2016/11/28/san-francisco-metro-hack-meant-free-rides-saturday/94545998/">San Francisco Metro System Attack</a></p>
<p><a href="https://arstechnica.com/information-technology/2016/04/maryland-hospital-group-denies-ignored-warnings-allowed-ransomware-attack/">MedStar Health System Attack</a></p>
<p><a href="https://www.computerworld.com/article/3163046/security/police-lost-8-years-of-evidence-in-ransomware-attack.html">Texas Police Department Attack</a></p>
<p>&nbsp;</p>
<p>References:</p>
<p>CNN Money. (N.D.) What is a Bitcoin. Retrieved from <a href="http://money.cnn.com/infographic/technology/what-is-bitcoin/">http://money.cnn.com/infographic/technology/what-is-bitcoin/</a></p>
<p>Trend Micro. (N.D.) Ransomware. Retrieved from <a href="https://www.trendmicro.com/vinfo/us/security/definition/ransomware">https://www.trendmicro.com/vinfo/us/security/definition/ransomware</a></p>

		</div>
	</div>
</div></div></div></div>
</div><p>The post <a href="https://transcendent-it.net/cyberthreats/ransomware/">Ransomware-Malicious Software</a> appeared first on <a href="https://transcendent-it.net">TranscendentIT Consulting</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://transcendent-it.net/cyberthreats/ransomware/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">458</post-id>	</item>
	</channel>
</rss>
