News & Updates

BrandPost: Cybercriminals are abusing security tools—here’s how we’re stopping them

By Microsoft Security

Cybercriminals are constantly looking for novel ways to evade detection and enact harm. Outdated copies of common security tools have become one avenue. Microsoft, cybersecurity software company Fortra™ and the Health Information Sharing and Analysis Center (Health-ISAC) recently came together to combat this issue.

On March 31, 2023, the U.S. District Court for the Eastern District of New York issued a court order allowing Microsoft, Fortra, and Health-ISAC to disrupt the malicious infrastructure criminals use to facilitate their attacks. Cobalt Strike, which is provided by Fortra, is a legitimate and popular post-exploitation tool used for adversary simulation; however, threat actors will sometimes abuse and alter older versions of the software. These illegal copies are referred to as “cracked” and have been used to launch destructive attacks, such as those against the Government of Costa Rica and the Irish Health Service Executive. Microsoft software development kits and APIs have also been abused as part of the malware coding and distribution infrastructure to target and mislead victims.

To read this article in full, please click here

Cybersecurity Tools

What is a DoS Attack?

DoS (denial-of-service) attacks play an unusual role in cyber crime. Unlike most forms of criminal hacking, they aren’t primarily designed to capture or sensitive information, which can be sold for profit. Instead, DoS attacks are intended to shut down or severely disrupt an organisation’s systems. There is no direct benefit to the criminal hacker in doing this, but the loss of service can cost the victim up to £100,000. There are several ways that a criminal hacker can launch a DoS attacks, and countless reasons they might be motivated to pull off an attack. How does a DoS attack work?

The post What is a DoS Attack? appeared first on IT Governance UK Blog.

News & Updates

Experts warn of backdoor-like behavior within Gigabyte systems

Researchers discovered a suspected backdoor-like behavior within Gigabyte systems that exposes devices to compromise. Researchers from firmware security firm Eclypsium have discovered a suspected backdoor-like behavior within Gigabyte systems. The experts discovered that the firmware in Gigabyte systems drops and executes a Windows native executable during the system startup process. The executable is utilized for insecure […]

The post Experts warn of backdoor-like behavior within Gigabyte systems appeared first on Security Affairs.

Exit mobile version