A Netskope foi reconhecida como líder novamente no Quadrante Mágico do Gartner®™ para plataformas SASE. Obtenha o relatório

fechar
fechar
Sua Rede do Amanhã
Sua Rede do Amanhã
Planeje seu caminho rumo a uma rede mais rápida, segura e resiliente projetada para os aplicativos e usuários aos quais você oferece suporte.
          Experimente a Netskope
          Coloque a mão na massa com a plataforma Netskope
          Esta é a sua chance de experimentar a plataforma de nuvem única do Netskope One em primeira mão. Inscreva-se em laboratórios práticos e individualizados, junte-se a nós para demonstrações mensais de produtos ao vivo, faça um test drive gratuito do Netskope Private Access ou participe de workshops ao vivo conduzidos por instrutores.
            Líder em SSE. Agora é líder em SASE de fornecedor único.
            A Netskope é reconhecida como a líder mais avançada em visão para as plataformas SSE e SASE
            2X é líder no Quadrante Mágico do Gartner® para plataformas SASE
            Uma plataforma unificada criada para sua jornada
              Protegendo a IA generativa para leigos
              Protegendo a IA generativa para leigos
              Saiba como sua organização pode equilibrar o potencial inovador da IA generativa com práticas robustas de segurança de dados.
                E-book moderno sobre prevenção de perda de dados (DLP) para leigos
                Prevenção Contra Perda de Dados (DLP) Moderna para Leigos
                Obtenha dicas e truques para fazer a transição para um DLP fornecido na nuvem.
                  Livro SD-WAN moderno para SASE Dummies
                  SD-WAN moderno para leigos em SASE
                  Pare de brincar com sua arquitetura de rede
                    Compreendendo onde estão os riscos
                    O Advanced Analytics transforma a maneira como as equipes de operações de segurança aplicam insights orientados por dados para implementar políticas melhores. Com o Advanced Analytics, o senhor pode identificar tendências, concentrar-se em áreas de preocupação e usar os dados para tomar medidas.
                        Suporte Técnico Netskope
                        Suporte Técnico Netskope
                        Nossos engenheiros de suporte qualificados estão localizados em todo o mundo e têm diversas experiências em segurança de nuvem, rede, virtualização, fornecimento de conteúdo e desenvolvimento de software, garantindo assistência técnica de qualidade e em tempo hábil.
                          Vídeo da Netskope
                          Treinamento Netskope
                          Os treinamentos da Netskope vão ajudar você a ser um especialista em segurança na nuvem. Conte conosco para ajudá-lo a proteger a sua jornada de transformação digital e aproveitar ao máximo as suas aplicações na nuvem, na web e privadas.

                            Threat Labs News Roundup: January 2023

                            Feb 16 2023

                            Summary

                            The purpose of the Netskope Threat Labs “Cybersecurity News Roundup” series is to provide enterprise security teams an actionable brief on the top cybersecurity news from around the world. The brief includes summaries and links to the top news items spanning cloud-enabled threats, malware, and ransomware.

                            Top Stories

                            Attackers using SEO poisoning to deliver Gootkit

                            A new report shows that attackers are using search engine optimization (SEO) poisoning techniques to deliver the Gootkit malware loader on organizations in the Australian healthcare industry. Details

                            New APT group targeting government and military sectors

                            A new APT group named Dark Pink is targeting government and military sectors in multiple countries in APAC with a custom malware that aims to steal confidential information. Details

                            Microsoft Azure issue could have allowed unauthorized access

                            A server-side request forgery (SSRF) vulnerability in four different Microsoft Azure services could have been exploited to gain unauthorized access to cloud resources. Details

                            New Emotet variant emerged

                            The Emotet botnet has returned with new functionality designed to facilitate lateral movement via SMB and to steal credit card numbers from Google Chrome. Details

                            Cybersecurity Events in Ukraine

                            Spike in cyberattacks from Russia-linked hackers

                            The Polish government is warning of a spike in cyber attacks coming from Russia-linked hacking groups including GhostWriter, targeting different fronts including strategic energy and armament providers . Details

                            APT group targeting US nuclear research laboratories

                            A Russia-linked APT group named Cold River (a.k.a. Calisto) targeted three nuclear research laboratories in the United States between August and September 2022. Details

                            Decrease in stolen payment cards since the war started

                            A new report shows a 24% decrease in stolen card records published in the dark web since the war started, which likely impacted Russian and Ukrainians threat actors. Details

                            Gamaredon abusing Telegram to target Ukraine

                            The Russian-sponsored APT group Gamaredon launched attacks against military and law enforcement sectors in Ukraine using Telegram. Details

                            ISP says that 2022 broke all DDoS attack records

                            A new report from Russia’s largest ISP shows that 2022 broke all DDoS attack records in the country, with the most attacked region being Moscow with 500,000 DDoS attempts. Details

                            IT Army of Ukraine breached Russian energy giant

                            The IT Army of Ukraine says that they have breached a Russian energy company named Gazprom and had access to 1.5 GB archive with the company’s financial and economic activities. Details

                            Cloud-Enabled Threats

                            Malicious PyPI packages abusing Cloudflare Tunnel

                            Six new malicious PyPI (Python Package Index) packages were found deploying information stealer malware that abuse the command-line tool Cloudflare Tunnel for network communication. Details

                            Attackers could target developers through Visual Studio Marketplace

                            Researchers have found a new technique that abuses Visual Studio Code marketplace to upload rogue extensions that can provide initial foothold on developer’s devices. Details

                            New infostealer spread through Google Ads

                            A new information stealer malware named Rhadamanthys has been delivered through fake Google ads mimicking popular remote workforce software, like AnyDesk and Zoom. Details

                            Raccoon and Vidar malware abusing GitHub and Google Ads

                            Researchers unveiled a malicious campaign aiming to spread the Raccoon and Vidar information stealers, hosted on GitHub, through fake Google Ads and SEO poisoning techniques. Details

                            Abusing GitHub to host malicious files

                            Researchers have demonstrated how attackers could abuse GitHub Codespace’s features to create a file server to spread malware using legitimate GitHub accounts. Details

                            New malicious campaign abusing cloud storage services

                            A new malicious campaign was found targeting the Middle East, abusing public cloud storage services such as files.fm and failiem.lv to host malware that leads to NjRAT (a.k.a. Bladabindi). Details

                            Ransomware

                            LockBit apologizes for infecting SickKids hospital

                            The LockBit RaaS group has released a free decryptor for the Toronto hospital SickKids with an apology note saying that one of the affiliates broke their rules. Details

                            Ransomware attack in the Saint Gheorghe Recovery Hospital

                            The ransomware attack in the Saint Gheorghe Recovery Hospital in December 2022 is still affecting their operations, preventing the hospital from receiving payments for medical services provided. Details

                            BitDefender releases decryptor for MegaCortex

                            The AV company BitDefender has released a decryptor for the MegaCortex ransomware, which appeared in the wild in May 2019. Details

                            Lorenz ransomware encrypted files five months after the initial access

                            An investigation into a Lorenz ransomware attack shows that the attackers breached the network five months before they moved laterally, exfiltrated data, and encrypted files. Details

                            Cuba ransomware exploiting Microsoft Exchange servers

                            The Cuba ransomware group is exploiting unpatched Microsoft Exchange servers through a critical server-side request forgery (SSRF) vulnerability, according to Microsoft. Details

                            Vice Society attacking Australian firefighting service

                            The Vice Society ransomware group has claimed responsibility for the cyberattack suffered by Australia’s Fire Rescue Victoria (FRVP) occurred in December 2022. Details

                            Avast releases decryptor for BrianLian

                            The AV company Avast has released a decryptor for the BrianLian ransomware, which emerged in the summer of 2022. Details

                            Vice Society ransomware targeting manufacturing companies

                            A new research shows that the Vice Society ransomware group is targeting the manufacturing sector in Brazil, Argentina, Switzerland, and Israel. Details

                            New ransomware abusing Windows Everything tool

                            Sharing similarities with Conti ransomware, which had its source code leaked in 2022, a new ransomware named Mimic was discovered by researchers, abusing a legitimate Windows tool named Everything. Details

                            Hive ransomware shut down by Europol

                            The ransomware-as-a-service group Hive operation was recently shut down by an international operation between Europol and authorities in Germany, The Netherlands, and the US, also releasing decryption keys for Hive’s victims. Details

                            author image
                            Gustavo Palazolo
                            Gustavo Palazolo is an expert in malware analysis, reverse engineering and security research, working many years in projects related to electronic fraud protection.
                            Gustavo Palazolo is an expert in malware analysis, reverse engineering and security research, working many years in projects related to electronic fraud protection.
                            Conecte-se com a Netskope

                            Subscribe to the Netskope Blog

                            Sign up to receive a roundup of the latest Netskope content delivered directly in your inbox every month.