Information Security & Compliance Blog
Contact: US (877) 838-7947 | UK +44 131 260 3044 Blog | Careers | Contact Us | Client Support

Reestablishing Trust: How Retailers Can Help Prevent Cyber Breaches

The holiday season isn’t all joy for retail stores. It’s also a time when cyber criminals redouble their efforts to attack sellers. Below are tips for retailers to help prevent network breaches. Make Security Awareness Training an ongoing process for everyone in your company as well as for your third-party vendors. Last year around the […]

3 Incident Response Tips To Save You Time & Money

The motto “be prepared” can easily apply to your organization’s ability to respond to cyber threats. Not only does its response impact brand image, but if not done properly, the impact can be quite costly. In the 2014 Cost of Data Breach Study: Global Analysis, by the Ponemon Institute, the average cost to a company in 2014 was $3.5 million, 15 percent more than what it cost in 2013.

Keeping Cyber Criminals from Breaking into Your Network via Your Vendors

The media has reported that several companies in the past year have suffered significant security breaches, as a result of hackers compromising companies’ third party vendors. Instead of going after large organizations directly, some threat actors are opting to target smaller, third party vendors who do business with the larger companies. The criminals are hoping these third party vendors will have fewer security protections in place. If the hackers are able to break into one of these vendors, get their hands on the credentials the vendor uses to access the larger company’s network and successfully use those credentials, then the criminals have just gained their initial foothold into the target company— all under the guise of a trusted partner. From there, the hackers might go after valuable trade secrets and Intellectual Property, customer credit and debit card data, or Personal Identifiable Information for Employees and Customers (names, addresses, social security numbers, email addresses and phone numbers).

Strengthening the Human Firewall

Many high profile security breaches occur when hackers target an organization’s weakest link: its people. Lack of basic information security awareness among employees has resulted in stolen organizational materials, intellectual property, and money.

Hackers don’t need to attack your organization directly – they can access vulnerabilities through partner groups as well because the weakness is the same – a lack of information security awareness among its employees. The impact to an organization’s finances, reputation, and operations cannot be ignored. Targeting the human element is a trend that Dell SecureWorks researchers and incident responders have observed increasing in popularity by hackers world-wide, from sophisticated state-sponsored groups to novice hackers.

Shellshock Bash attacks on the rise

On September 24, 2014, the Bash command injection vulnerability described by CVE-2014-6271 was publicly disclosed. The Dell SecureWorks Counter Threat Unit™ (CTU) research team released a set of countermeasures to its iSensor devices (Dell SecureWorks’ proprietary Intrusion Protection/Detection systems) to address this vulnerability, as well as related vulnerabilities that were identified in the following days. As of Monday, September 29, 2014, Dell SecureWorks iSensor devices repelled more than 140,000 scanning and exploit attempts.

Where you AT?: Indicators of lateral movement using at.exe on Windows 7 systems

Dell SecureWorks Counter Threat Unit™ (CTU) analysts were recently engaged with a client thought to have been compromised by a threat group CTU researchers have named Threat Group-0416 (TG-0416) . Various artifacts from the initial phases of the incident provided strong indications of the existence of this particular threat group within the client’s infrastructure. TG-0416 is a stealthy and extremely successful Advanced Persistent Threat (APT) group known to target a broad range of verticals since at least 2009, including technology, industrial, manufacturing, human rights groups, government, pharmaceutical, and medical technology.

Redefining “advanced persistent” adversaries?

Since the beginning of 2013, the popular press has documented many major information security intrusions and attacks. These stories have included veiled hints that the amount of sophistication suggests the intrusions are perpetrated by “advanced persistent” adversaries who must be sponsored by nation-states. Dell SecureWorks Counter Threat Unit™ (CTU) researchers have drawn a different conclusion based on evidence left behind from recent persistent intrusions in well-secured organizations.

Threat Group-0110 targets manufacturing and financial organizations via phishing

Since the evening of July 21, 2014, Dell SecureWorks Counter Threat Unit™ (CTU) researchers have observed a threat group the CTU research team refers to as Threat Group-0110 (TG-0110)[i] phishing many organizations in the manufacturing and financial verticals. TG-0110 is known for using the Pirpi backdoor to access endpoints. Pirpi can search for and exfiltrate files, run other executable files, and execute commands. It also has reverse shell capabilities.

Gameover Zeus re-emerges without peer-to-peer capability

Dell SecureWorks CTU(TM) researchers have observed the distribution of a modified version of the Gameover Zeus malware. The global Gameover Zeus infrastructure was disrupted in late May 2014 by law enforcement and private industry partners during Operation Tovar. The infrastructure, including its peer-to-peer (P2P) network, remains under the control of those organizations and is not available to the threat actors who originally operated it. The new version observed in distribution on July 10, 2014 has jettisoned the P2P component in favor of a centralized command and control (C2) infrastructure that is based on a domain generation algorithm (DGA).

Online Tools

  • Print this Page
  • Share This Resource