Tag Archive for: dns hijacking

Number of Coronavirus-Related Scams Jump

The Internet Crime Complaint Center (IC3) has noted a large increase in cyber threat complaints per day. Before the COVID-19 pandemic began, they were receiving around 1,000 complaints daily. Now, they receive 4,000 complaints a day.

These cyber threats are foreign groups trying to steal COVID-19 related information. As well as cybercriminals trying to exploit users working from home. Health agencies have reported an increase in cyber threats as well, as they are a very profitable target for cyber criminals.

“Near the start of the epidemic, researchers at the cybersecurity company Barracuda Networks reported a 667 percent increase in “phishing” emails.”

These emails are sent with the purpose of downloading viruses onto the recipient’s computers. With the increase in reported phishing scams, it is important to understand and identify possible scams when going through your emails.

Protect your business and your employees

Numbers don’t lie, and the possibility of your business falling victim to a cyber attack has never been higher. Protecting your business and sensitive data is a priority in the era of cybercrime.

Ostra Cyber Security offers a total solution for cybersecurity that combines Fortune 100 tools and is easy to deploy without needing to purchase any hardware. Ostra Cyber Security is perfect for those who do not want to put a lot of time into their cybersecurity program. Just set it up and forget about it. It requires no IT support, it is budget friendly, and Ostra does all the work to stop threats before they reach you.

Want to find out more? Contact us today!

Iranian Flag

Iran’s Potential Cyber Threat: What to Know

Geopolitical Impacts

Ostra’s threat intelligence partner, FireEye, assesses with high confidence that Iranian cyber espionage presents a high-frequency, serious intensity threat particularly to organizations in the government, oil and gas, telecommunications, and financial services industries located in the United States, Saudi Arabia, and other Middle Eastern countries.  Historically state-sponsored actors have conducted cyber espionage or intentionally destructive attacks as retaliation or revenge for geopolitical or military events.

Mitigation Strategies

Historically malicious attacks originating from Iran have utilized a wide range of tactics.

Current Action

FireEye has all known Iranian malware virus signatures and automatically pushed out to all licenses. FireEye will continuously automatically update all licenses as future malware viruses become known.

 

Potential Tactics & Recommended Mitigations

Tactic:  Password Spraying – the attempt to harvest legitimate login credentials by trying common passwords against a large number of accounts.

Mitigation:  Follow standard password and authentication best practices including;

  • Thorough investigation of anomalous login attempts
  • Multi-factor authentication for remote access
  • Account audits to ensure all are appropriately terminated and have current authentication controls applied

Tactic: VPN Vulnerability Scanning

Mitigation: Ostra ensures our clients’ VPN solution is up to date and patched.   We monitors user login and system event logs. 

Tactic:  DNS Hijacking – Domain name system, is the renaming of IP addresses into human sounding names like google.com.  Hackers alter DNS server records in order to make a malicious site appear legitimate)

Mitigation:

  • Implement multi-factor authentication on domain registrar accounts
  • Audit DNS records
  • Monitor SSL certificate transparency logs and revoke any fraudulently issued certificates. 

Tactic:  Spearphishing – email fraud that is targeted to a particular person or company.

Mitigation:

  • Ensure all device Operating System and applications are up-to-date and fully patched
  • Educate users to
    • Validate links and attachments before opening,
    • Validate the legitimacy of the sender,
    • Request secondary validation of unexpected links or attachments

Tactic:  Social Media – Iranian actors have used complex social engineering tactics on social media to influence opinion and to perpetrate attacks.

Mitigation:

  • Be extra cautious of files and links shared on social media sites.
  • Validate the identity of unexpected contact through secondary means.