STE WILLIAMS

US senators green-light recruitment of crack infosec teams, both public and private

The US Congress has, near enough, approved a law bill to create a new set of dedicated cyber-security teams within the Department of Homeland Security.

On Tuesday, the Senate passed S.315, also known as the DHS Cyber Hunt and Incident Response Teams Act of 2019, a bipartisan measure that funds the creation of both investigation and response teams at various agencies within the department.

According to co-sponsors Maggie Hassan (D-NH) and Rob Portman (R-OH), the legislation is aimed to not only create teams for investigations within Homeland Security, but also outside using the private sector. In addition to creating these teams, the bill will authorize spending to bring in private companies when needed.

The teams’ duties will include assisting agencies in recovering from attacks and outages, risk assessment and threat mitigation, and developing recommendations and best practices for network and data security at various DHS offices.

“This bipartisan legislation will allow the best minds in cybersecurity to work together to better protect our digital infrastructure and to respond to attacks,” Hassan said after the bill passed.

“I am pleased that this commonsense bill passed the Senate, and I urge my colleagues in the House to pass it without delay.”

Someone enjoying a spliff

FBI, NSA to hackers: Let us be blunt. Weed need your help. We’ll hire you even if you’ve smoked a little pot in the past

READ MORE

Having passed the Senate, the bill heads to the House for final approval before being sent to be signed into law by the President. As The Hill notes, a passage in the House is likely, as the Senate bill is a modified version of one the House voted in favor of back in June.

Given recent events, however, the President might be otherwise occupied from signing bills for some time.

“Our cyber response teams play an important role in protecting against cyber threats, reducing cybersecurity risks, and helping to get our cyber infrastructure back up and running after an attack occurs,” Portman said of the bill.

“I am glad the Senate passed our bipartisan legislation and I hope we send it to the president’s desk soon so that we can strengthen our response efforts in the event of a cyberattack.” ®

Sponsored:
Beyond the Data Frontier

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/09/26/senate_dhs_security_bill/

GandCrab Developers Behind Destructive REvil Ransomware

Code similarities show a definite technical link between the malware strains, Secureworks says.

The decision by the developers of GandCrab ransomware to “retire” earlier this year after raking in an estimated $2 billion in less than 18 months may have more to do with a shift in focus than a desire to fade away into obscurity.

A new Secureworks analysis of recent ransomware activity has confirmed earlier suspicions that “Gold Garden,” the group behind GandCrab, is actively involved in another ransomware variant named REvil that has been wreaking havoc in recent months.

REvil first emerged in mid-April, about a month before Gold Garden announced its retirement from the ransomware scene. Since then the ransomware has been linked to numerous attacks, most notably on nearly two dozen Texas municipalities and hundreds of dentist offices around the country. The malware has been especially notable for its use in so-called “compromise-once-infect-many” attacks on targets with many customers, such as managed service providers (MSPs), Secureworks said.

In the months since GandCrab disappeared, REvil has quickly established itself as one of the most dangerous and prolific ransomware threats in the wild. The group behind it — who Secureworks has dubbed “Gold Southfield” — has been employing the same ransomware-as-a service model that GandCrab employed. Threat actors have used a variety of techniques to distribute REvil, including via an Oracle WebLogic exploit, malicious spam and phishing emails, and through compromised managed service providers.

According to Secureworks, its technical analysis of some early REvil samples uncovered several similarities in code with GandCrab that cannot be explained away by happenstance.

For example, the string decoding function in REvil is nearly identical to the one used in GandCrab. It also uses nearly the same logic and functionality for building command-and-control URLs as GandCrab. There are other artifacts in REvil’s code — such as certain debug paths and version numbering patterns — that suggest the first version of REvil might at least have been intended to be the next version of GandCrab, Secureworks said.

Both GandCrab and REvil also have code that prevents the malware from infecting systems based in Russia. While that by itself is not indicative of a link, it does suggest the authors behind both malware strains are from the same region, Secureworks said.

Phony Retirement
Rob Pantazopoulos, a researcher at Secureworks’ Counter Threat Unit (CTU), says it’s unclear why GandCrab’s developers might have suddenly decided to stop further use of that malware.

One reason could be to evade law enforcement. “The threat actors realized that their boisterous nature and researcher-taunting caused some unwanted attention, so they evolved and rebranded under REvil, which, thus far, has been significantly lower key,” Pantazopoulos says.

Or it is likely an internal rift occurred among Gold Garden members, resulting in the creation of Gold Southfield with many of the same members from the original group. Regardless of the reasons, since the threat group announced its retirement, GandCrab activity appears to have completely ceased.

Technically, REvil appears to be on par with GandCrab and has more or less the same capabilities. “In my opinion, the significant difference with REvil is the targeting methodologies employed by REvil partners and distributors,” Pantazopoulos says.

Since REvil first surfaced, there have been numerous reports of attackers leveraging compromised managed service providers and strategic Web compromises to essentially compromise once and infect many. “For a highly skilled threat actor, this is a low-effort, high-reward scenario,” he says.

In a report last month, Fidelis, which has been tracking REvil, described the malware as one of the most active strains during the second quarter of this year. The security vendor estimated REvil as accounting for 12.5% of the ransomware market share compared with about 24% for Ryuk and 17% for the Phobos ransomware strain.

[REvil] operations have spread wide in the last few months, thanks to different methods, such as malspam, exploit kits, RDP brute-forcing, hacks of MSP, and zero-day exploits,” says a spokeswoman from Malwarebytes, another security vendor that has been tracking the malware. The malware has essentially filled the hole created by GandCrab’s exit.

GandCrab was extremely successful, but perhaps its operators decided to refocus their business in ways where they can run operations by focusing on bigger targets,” the spokeswoman notes.

Related Content:

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “The Beginner’s Guide to Denial-of-Service Attacks: A Breakdown of Shutdowns.”

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/gandcrab-developers-behind-destructive-revil-ransomware/d/d-id/1335919?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

New Emergency Communications Plan Released by CISA

The Cybersecurity and Infrastructure Security Agency’s latest version of the National Emergency Communications Plan comes after a two-year process to improve the cybersecurity and flexibility of the nation’s emergency communications.

When things go wrong, you need a plan. That’s why the Cybersecurity and Infrastructure Security Agency (CISA) today released the latest version of the National Emergency Communications Plan (NECP). The NECP sets out the strategic plan for establishing and maintaining communications operability, interoperability, and continuity in case of disaster.

Among other things, the NECP established guidelines for how first responders from different governmental units will communicate with one another when they have to work together. In the latest update, the NECP addresses cybersecurity, formal governance, and new technology integration in its pages.

According to a statement from CISA, the plan was updated after input from more than 3,500 stakeholders from federal, state, local, tribal, and territorial public safety agencies, government officials, nongovernmental organizations, and the private sector. A series of webinars is now planned to help stakeholders understand NECP changes and how to use the new frameworks.

For more, read here.

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “The Beginner’s Guide to Denial-of-Service Attacks: A Breakdown of Shutdowns.”

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/operations/new-emergency-communications-plan-released-by-cisa/d/d-id/1335920?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Hacker House shoved under UK Parliament’s spotlight following Boris Johnson funding allegs

Infosec training biz Hacker House has been catapulted to Parliamentary prominence after reports that co-founder Jennifer Arcuri secured UK government funding because of her personal relationship with now-Prime Minister Boris Johnson.

At today’s first Parliamentary sitting since the Supreme Court overruled prorogation yesterday, Department for Digital, Culture, Media and Sport (DCMS) minister Matt Warman (a former tech editor of the Daily Telegraph) was sent in to bat on behalf of Johnson – and thus Hacker House.

Hacker House was promised £100,000 in January as part of a government fund to “help drive diversity in cybersecurity”, as Labour party deputy leader Tom Watson MP noted in Parliament.

MPs were told that so far it has received £47,000, with the remaining £53k frozen until further notice.

The Sunday Times reported at the weekend that Johnson, when he was Mayor of London, was a personal friend of Arcuri’s, took her on trade missions and helped secure a total of £126,000 in public funding for her business.

“We are of course aware of claims raised by The Sunday Times and the department is reviewing its decision,” Warman told the House of Commons, following a febrile QA session with attorney-general Geoffrey Cox about Brexit.

Follow-up reporting claimed that a “friend” of Arcuri’s said Johnson only visited her flat to “understand tech” and “get educated”, with her stepfather stating: “No way would there have been a sexual relationship.”

Money and funny business

A DCMS press release from January about Hacker House’s funding stated: “The aim… is to boost not only the total number, but the diversity of those working in the UK’s cybersecurity industry. It will help organisations develop and sustain projects that identify, train and place untapped talent from a range of backgrounds into cybersecurity roles quickly.”

A statement in Arcuri’s name distributed as part of the same DCMS press release said: “The team of Hacker House are thrilled to be included in the funding of this grant as this allows us the opportunity to continue to develop content that trains and enable candidates to retain practical skills needed for roles within information security.”

None of this cut much ice with Parliament today.

Doggedly, Warman, who was on his first ministerial outing at the despatch box, insisted there was “no undue lobbying to the best of my knowledge… there was no evidence that the prime minister intended to do anything improper whatsoever.”

Lib Dem MP Layla Moran commented in Parliament that Hacker House “is not based in the UK”, Arcuri having moved to the US in 2018, and said that the person living at the company’s UK registered address “is in Cheshire where she used to rent”, adding that the “current occupant sends post for Miss Arcuri back to sender.”

“What steps,” asked Moran, “did [DCMS] take to ensure Hacker House was based and operating in the UK? Why did officials waive the rule that the grant couldn’t exceed 50 per cent of the company’s income? Did the prime minister… make any representations to the department recommending Hacker House for this funding?”

Warman replied: “The prime minister and his staff have absolutely no role in the award of this grant and I suspect I’ll be saying that a number of times.”

502? Well, it’s a bit wobbly

Deputy Labour Party leader Tom Watson chipped in later in the Parliamentary debate to say: “The minister [Warman] suggested that I try to register with Hacker House. I looked at social media and there are many people who tried to do that and they get an error message, 502 bad gateway. Can he explain why Hacker House seems to have disappeared?”

Put on the spot, Warman stuttered back: “It – it is of course a part of this department’s processes to make sure the services we procure are properly delivered and we will continue to do so.”

It appears to El Reg that Hacker House’s website is loading, albeit very slowly, suggesting the sustained public interest is causing its servers to wobble rather than anything nefarious. Plenty of screenshots of HTTP 502 error messages for the hacker.house domain can be found on Twitter.

We have asked Hacker House whether the company wishes to comment and will update this article if we hear back. ®

Sponsored:
How to get more from MicroStrategy by optimising your data stack

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/09/25/hacker_house_boris_johnson_funding_allegations/

Confused why Trump fingered CrowdStrike in that Ukraine call? You’re not the only one…

A garbled remark by President Donald Trump in a just-released phone-call transcript with the Ukrainian head of state has focused attention on cloudy security shop CrowdStrike.

The US Commander-in-chief name-dropped Silicon Valley’s CrowdStrike during a July chat with Ukranian President Volodymyr Zelensky, which was ostensibly to discuss bilateral relations. The call has become a focal point of a whistleblower scandal that has now triggered a House of Representatives impeachment investigation of the President.

An anonymous whistleblower has claimed that over the course of the call, Trump on multiple occasions suggested to Zelensky that US military aid payments could be withheld from the Ukraine unless it agreed to re-open a criminal corruption probe into one of Trump’s potential 2020 election opponents: former Vice President Joe Biden – specifically, Biden’s son. The Bidens deny any wrongdoing, and there is no evidence of wrongdoing.

So where does CrowdStrike come in? About halfway into the call transcript [PDF], released under intense political pressure, Trump makes reference to the work CrowdStrike did back in 2016 looking into raids carried out by hackers against the Democratic National Committee (DNC) and its email system.

“I would like you to do us a favor though because our country has been through a lot and Ukraine knows a lot about it,” President Trump is quoted telling Zelensky.

“I would like you to find out what happened with this whole situation with Ukraine, they say CrowdStrike … I guess you have one of your wealthy people… The server, they say Ukraine has it.”

It is not clear exactly what Trump means by “the server” in this case, as the DNC hack involved dozens of computer systems that were not physical machines but rather dozens of virtual machine instances hosted in a cloud data center, all of which were wiped to get rid of the malware the hackers had installed to spy on the committee.

According to the DNC, the FBI took full disk images of all affected machines, including 180 personal computer and 140 servers. CrowdStrike also viewed the images and passed its finding on to the Feds.

The Register pinged CrowdStrike to see if it had any idea why its name popped up, and the security house gave a polite statement more or less indicating they are just as in the dark as the rest of us.

“With regards to our investigation of the DNC hack in 2016, we provided all forensic evidence and analysis to the FBI,” the statement reads. “As we’ve stated before, we stand by our findings and conclusions that have been fully supported by the US Intelligence community.” ®

Sponsored:
How to get more from MicroStrategy by optimising your data stack

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/09/25/crowdstrike_mention_in_ukraine/

Cloud Insight … and Stuff

All fluff, all the time.

Source: jeffr1209

What security-related videos have made you laugh? Let us know! Send them to [email protected].

Beyond the Edge content is curated by Dark Reading editors and created by external sources, credited for their work. View Full Bio

Article source: https://www.darkreading.com/edge/theedge/cloud-insight--and-stuff/b/d-id/1335915?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Microsoft’s Azure Sentinel SIEM Now Generally Available

The cloud-native SIEM is designed to search data from users, applications, servers, and devices running on-prem and in the cloud.

Microsoft’s Azure Sentinel, a new cloud-native security information and event management (SIEM) system, is now generally available following more than six months of public preview.

Azure Sentinel, first announced at the end of February, was built to help organizations better identify threats in the cloud. Seventy percent of businesses continue to anchor security analytics and operations with SIEM systems, and 82% have committed to moving large volumes of applications and workloads to the public cloud, Microsoft reports, citing research from ESG.

Like other SIEM systems, Azure Sentinel pulls large volumes of data from users, applications, servers, and devices running on-prem or in the cloud so admins can better identify threats. On top of that, it’s tightly integrated with Microsoft services and also scours data from tools including Azure Security Center, Azure Active Directory, and Microsoft 365. Beta testers report the tool is easy to set up and eliminates the hassle of moving data across separate systems.

Beyond Microsoft services, the SIEM pulls information from third-party tools built by Cisco, Check Point, Palo Alto Networks, and Symantec, Microsoft said when the service debuted. It has published a pricing model, with pay-as-you-go rates starting at $2.46 per GB data scanned.

Read more details here.

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “The Beginner’s Guide to Denial-of-Service Attacks: A Breakdown of Shutdowns.”

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/cloud/microsofts-azure-sentinel-siem-now-generally-available/d/d-id/1335911?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Web Attacks Focus on SQL Injection, Malware on Credentials

Attackers continue to focus on bread-and-butter tactics, according to a quarterly threat report.

Attackers continued to stick to a well-known playbook for the second quarter of 2019, focusing on attacking websites using SQL injection attacks and stealing passwords and credentials via malware and phishing attacks, according to the latest quarterly threat report from security firm WatchGuard. 

While the company saw a slight decline in many threat metrics — with antivirus detections declining 6% between quarters and more sophisticated threats declining 2% — each of the top 10 network attacks on WatchGuard’s list increased in volume, with the frequency of the top attack, SQL injection, jumping by a factor of 12. Overall, the two types of SQL injection attacks included on the list counted for more than a third of all network attacks detected by the firm’s devices. 

Only two of the other top 10 attacks — exploits focused on vulnerabilities in Adobe Flash and Shockwave — were not Web-based threats, the report found.

“The top network attacks have remained Web-based attacks for many, many quarters — either a direct vulnerability in Web server software; a Web-client attack, where it is a drive-by download that affects the client; or a Web-application attack on a vulnerability in either a framework that you installed or in your custom code,” says Corey Nachreiner, chief technology officer at WatchGuard.

In addition to focusing on attacking Web applications, attackers aimed to harvest credentials from compromised machines and users. The top threat, Mimikatz, is an open source tool originally created in 2014 as a project to learn coding but whose purpose is to harvest several different types of credentials, including plain-text password, hashes, kerberos tickets, and PIN codes.

In addition, a phishing attack that aims to harvest users’ credentials also made the top 10 threat list. “The trend of authentication being a target, while not a new one this quarter, remains big,” Nachreiner says.

WatchGuard’s report is not the first to note the all-out assault that online attackers are waging on user and administrator credentials. Earlier this year, security firms Trend Micro and Rapid7 noted that phishing attacks and credential-stuffing attacks had both taken off. In April, Akamai also reported that it had detected some 30 billion attempts to login to services using the wrong credentials.

“It is a constant problem,” said Martin McKeay, a security researcher and editorial director at Akamai, at the time.

Three of WatchGuard’s top 10 malware detections by volume were also the most widespread, affecting a large share of WatchGuard customers rather than just inundating a few customers with a deluge of attacks, Nachreiner says.

“When we started do this, there was not much overlap between the lists,” he says. “The fact that three of the most widespread piece of malware were also on the top 10 list is interesting — and when something is both widespread and high-volume, that should give you some pause. The trend of authentication being a target, while not a new one this quarter, remains big.”

The top of the detection list is Mimikatz, which does not show up on the widespread list. 

“The credential-theft tool Mimikatz has remained a top threat for the last two years, mirroring the threat landscape trend of attacks most commonly leveraging stolen credentials,” the report states. “These days, it isn’t enough to simply use a strong and unique password. Attackers have too many ways to steal that password right out from under you, whether it be from tools like Mimikatz or through clever phishing attacks.”

Mimikatz is not the only penetration tool used by online attackers. Two modules for the Kali Linux distribution for penetration testers made the top 10 list as well.

WatchGuard advises workers to use two-factor authentication to reduce the impact of stolen credentials. In addition, the security firm recommends that companies train their workers to spot phishing attacks and deploy breach detection technology. 

Related Content:

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “The Beginner’s Guide to Denial-of-Service Attacks: A Breakdown of Shutdowns.”

 

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT’s Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline … View Full Bio

Article source: https://www.darkreading.com/threat-intelligence/web-attacks-focus-on-sql-injection-malware-on-credentials/d/d-id/1335910?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

5 Updates from PCI SSC That You Need to Know

As payment technologies evolve, so do the requirements for securing cardholder data.PreviousNext

Image source: PCI SSC

Image source: PCI SSC

More than 1,300 stakeholders from across the payments industry convened in Vancouver this month for the Payment Card Industry Security Standards Council’s (PCI SSC) North America Community Meeting.

Key topics on the agenda included a new security standard for contactless payments on off-the-shelf mobile devices, development of the next major version of the PCI Data Security Standard, and a soon-to-be released new version of the PCI standard for point-to-point encryption (P2PE). Also announced at the Vancouver event was a new Security Framework that will guide the PCI Security Council’s standards and decision-making processes in the years ahead.

Much of the focus of the initiatives is on extending PCI security standards to new and emerging payment technologies such as contactless payments on mobile devices. Under the new Strategic Framework, stakeholders will have more of a say in how standards for payments security evolve in coming years. Increasingly, the focus is on ensuring organizations meet the intent and objectives of the PCI security standard and not just on whether they have the recommended controls in place or not.

For well more than a decade, all organizations handling payment card data, both directly and indirectly, have had to comply with PCI DSS. The standard — developed by MasterCard, Visa, American Express, Discover, and JCB — prescribes a set of security requirements for protecting credit and debit card data.

The controls are designed to ensure that organizations handling payment card data have secure networks and systems, secure payment applications, strong access control mechanisms, and a robust vulnerability management program and that they regularly test and monitor their networks for security issues. Numerous companies that have experienced payment card data breaches in recent years have had to pay fines and face other consequences for failing to comply with PCI requirements.

Here are five items that were on top of the agenda at the North America Community meeting in Vancouver.

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full BioPreviousNext

Article source: https://www.darkreading.com/5-updates-from-pci-ssc-that-you-need-to-know/d/d-id/1335874?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Long-Lining: Reeling In the Big Fish in Your Supply Chain

The object of this new attack campaign is not swordfish or tuna but high-ranking executives within target organizations.

Supply chain attacks are becoming an increasingly popular strategy for threat actors. According to Symantec, supply chain attacks rose by 78% in 2018, and a similar report by Carbon Black estimates that half of cyberattacks now target supply chains. From a hacker’s perspective, it makes sense. Just as trusted insiders can inflict the most damage to an enterprise, compromising and exploiting a trusted business relationship can also be devastatingly effective. By targeting companies that provide outsourced services, attackers can exploit an organization with fewer security resources to get behind the firewalls of a more-secure partner.

Recently, Blue Hexagon’s security researchers caught an attack in progress at a Silicon Valley firm that provides outsourced software development services. Aided by a deep learning-aided analysis of the attack, we found a number of novel aspects to the campaign that, despite being designed to appear as multiple, discrete attacks, were determined to be a sophisticated, well-designed and researched campaign carried out by a single threat actor. Through this analysis, we believe we have uncovered a previously unknown strategy by threat actors and that we have named “Long-Line,” a reference to the method of offshore commercial fishing whereby a single vessel sets multiple baited hooks suspended from a cable that is miles in length.

The intent of long-lining is to catch big fish, such as swordfish and tuna. Similarly, long-line threat campaigns are carried out by a single threat actor using multiple elements designed specifically to catch high-ranking executives within the target organization. As a permutation of a supply chain attack, the goal of a long-line attack is to use the compromised organization as a platform for conducting further attacks on companies in the victim’s business network, taking advantage of the trusted business relationship with the brand and the individual executive.

In our analysis of this attack, we found that the threat actor involved assumed five distinct identities, each identity created to appear as a company already engaged in a business relationship with the target organization, including two companies involved in transportation, and companies in textiles, electronics, and construction.

Correspondence directed to the targeted executive reflected a great deal of research and included subject lines and attachments consistent with the businesses and the executive’s role, and did not appear to be random, over-the-transom messages. In each case, the attack vector was a weaponized document infected with Agent Tesla malware. Agent Tesla is an information stealer designed to steal sensitive information including, but not limited to, data associated with the following categories of software:

  • Web browsers: Google Chrome, Mozilla Firefox, Opera, Chromium, Chrome Plus by Maple Studio, Yandex, Orbitum 
  • Email clients: Mozilla Thunderbird, Microsoft Outlook, Aerofox Foxmail, IncrediMail, Qualcomm Eudora
  • FTP clients: WinSCP, SmartFTP, FileZilla, WS_FTP by IPSwitch, CoreFTP by FTPWare 
  • Internet Download Manager 

If clicked, the exploit would execute code and infect the victim’s system via different Windows executables hosted on the domain tvfn.com.vn, which impersonates the Vietnamese website for a leading Japanese company that makes metal hoses and expansion joints.

Impersonated website: TF Vietnam Corp: https://tfvn.com.vn/ 

Real website: http://www.tfv.com.vn/index.php?Bcat=1start=0lg=vn

The “whois” information for this domain indicates that it was registered by the “Ministry of Information and Communications (Vietnam),” which is a branch of the government in Vietnam that oversees telecommunications and Internet. It is important to note that the Vietnamese government does not publish registrar information for domains registered in Vietnam. The threat actors behind this were aware of this and used it to their advantage.

Despite obvious attempts to mask the campaign’s origin as coming from a single source, we were able to use deep learning to positively attribute the attack to a single threat group. We are in the process of conducting further analysis to attempt to identify the country of origin and whether the threat group is a known entity or a new group. We are also conducting further research in an attempt to learn more about this type of attack and who is behind it and will announce our findings when we do.

Related Content:

 

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “‘Playing Around’ with Code Keeps Security, DevOps Skills Sharp.”

Saumitra Das is the CTO and Co-Founder of Blue Hexagon. He has worked on machine learning and cybersecurity for 18 years. As an engineering leader at Qualcomm, he led teams of machine learning scientists and developers in the development of ML-based products shipped in … View Full Bio

Article source: https://www.darkreading.com/risk/long-lining-reeling-in-the-big-fish-in-your-supply-chain-/a/d-id/1335866?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple