Rampant ransomware.

Flintstone61

Known around here
Joined
Feb 4, 2020
Messages
6,603
Reaction score
10,922
Location
Minnesota USA
Stuxnet was left on some USB thumbdrives, in hopes some Iranian, would eventually come across one, and bring it into the Centrifuge. and apparently that is what happened to uranium enrichment problems in Iran. Don't quote me on Specific's I have "Sumtimers" :wtf:
 

Left Coast Geek

Getting comfortable
Joined
May 20, 2021
Messages
389
Reaction score
398
Location
mid-left coast
my final $job, from which I retired a few years ago (when my department was shut down after 20 years), was a large multinational manufacturing firm.

some years earlier the HR and Payroll operations, which had been moved overseas to a SE asian country, someone got ahold of a jr HR person by phone, and faked being a US executive VP on the road, and convinced the jr HR person to email them the entire US payroll database. that included name, SS#, home and work address, phone numbers, bank routing numbers for autodeposit, spouse and children names, and their SS #s, etc etc etc. this effected something like 15000 US employees.

who needs computer hacking when you've got a telephone?
 

mikeynags

Known around here
Joined
Mar 14, 2017
Messages
1,034
Reaction score
940
Location
CT
my final $job, from which I retired a few years ago (when my department was shut down after 20 years), was a large multinational manufacturing firm.

some years earlier the HR and Payroll operations, which had been moved overseas to a SE asian country, someone got ahold of a jr HR person by phone, and faked being a US executive VP on the road, and convinced the jr HR person to email them the entire US payroll database. that included name, SS#, home and work address, phone numbers, bank routing numbers for autodeposit, spouse and children names, and their SS #s, etc etc etc. this effected something like 15000 US employees.

who needs computer hacking when you've got a telephone?
You're absolutely right. It's called social engineering and it takes advantage of the weakest link in the chain, the human :)
 

Left Coast Geek

Getting comfortable
Joined
May 20, 2021
Messages
389
Reaction score
398
Location
mid-left coast
You're absolutely right. It's called social engineering and it takes advantage of the weakest link in the chain, the human :)
in this specific case, I feel sorry for the young SE asian girl who probably barely spoke english. but yeah, weakest link. and yeah, Big.Corp saves money moving HR and Payroll to SE Asia, and screws their entire staff.

in my case, I'm happy to be retired, my department was dissolved and our functions moved to various development groups in Asia that had been working under us.
 

alastairstevenson

Staff member
Joined
Oct 28, 2014
Messages
15,952
Reaction score
6,787
Location
Scotland
But so much worse when critical national infrastructure is brought down :
In a surprising development, it seem the FBI has managed to acquire and open the attacker's Bitcoin wallet and recover the ransom that Colonial paid :
 

Jessie.slimer

BIT Beta Team
Joined
Aug 23, 2019
Messages
1,631
Reaction score
4,660
Location
Illinois
Does anyone else find it odd that these highly skilled hackers still had that much stolen currency in their bitcoin wallet to be "recovered"?

Did the FBI actually return it to Colonial?

Even if the story is true, by the FBI's own admission they still got away with over $1M...
 

Nick70068

Getting the hang of it
Joined
Mar 11, 2019
Messages
80
Reaction score
83
Location
Fairhope, Al
We use a phishing training service. Each user gets and email each month enticing them to follow the link. It’s reasonably effective. Better than nothing.
We required cybersecurity training for all faculty, staff, and students at a large medical school. Training includes an emphasis on phishing techniques used to gain access to our network. Monthly an in-house phishing email is randomly sent out to network users. And without a doubt, there are network users that fall for this. Offenders have their network access temporarily disabled until they meet with I.T. to explain what they did, and are required to repeat additional training. Yet, many times they are repeat offenders.
 

sebastiantombs

Known around here
Joined
Dec 28, 2019
Messages
11,511
Reaction score
27,692
Location
New Jersey
We required cybersecurity training for all faculty, staff, and students at a large medical school. Training includes an emphasis on phishing techniques used to gain access to our network. Monthly an in-house phishing email is randomly sent out to network users. And without a doubt, there are network users that fall for this. Offenders have their network access temporarily disabled until they meet with I.T. to explain what they did, and are required to repeat additional training. Yet, many times they are repeat offenders.
As I've said before, you can't cure stupid. There are times when even the most cautious and savvy can fall for these little gems, too.
 

alastairstevenson

Staff member
Joined
Oct 28, 2014
Messages
15,952
Reaction score
6,787
Location
Scotland
Joined
Jul 17, 2019
Messages
18
Reaction score
17
Location
FL
We took the approach of using host-based firewalls (that aren't Microsoft). We found over 40 Microsoft applications that phone home for one reason or another.
Our rule set only allows signed MS applications to communicate with the domain controllers over specified TCP/UDP ports. Everything else is specific and granular in nature.
It was a lot of overhead but I'm positive that Excel.exe can only perform LDAP queries to the DC and not download other software or perform other operations.
The concept is simple, but the execution uses a lot of resources up front.
Still figuring out the white-listing software portion, but I'll call it done when that's up and running.
After all that, we'll still have to deal with stupid human tricks
 

alastairstevenson

Staff member
Joined
Oct 28, 2014
Messages
15,952
Reaction score
6,787
Location
Scotland
Another big supply-chain ransomware attack :

About 200 US businesses have been hit by a "colossal" ransomware attack, according to a cyber-security firm.
Huntress Labs said the hack targeted Florida-based IT company Kaseya before spreading through corporate networks that use its software.
 

handinpalm

Getting comfortable
Joined
Sep 21, 2016
Messages
679
Reaction score
1,433
Location
Tampa Bay FL
Most likely the best way to control this ransomware it to outlaw cryptocurrency, until the $ can be tracked to users. Until then it is open warfare and we are going to lose. Nothing is going to happen until a ransomware attack causes major catastrophic problem with the power/water infrastructure and many people die. We are never really proactive, only reactive.

BTW, what was on the "off limit" list that Biden gave Putin? I guess we will never know, so he does not have to hold him accountable.

Another big supply-chain ransomware attack :


 
Last edited:
Top