{"id":1061,"date":"2021-05-24T12:00:00","date_gmt":"2021-05-24T12:00:00","guid":{"rendered":"https:\/\/news.nucleon.sh\/?p=1061"},"modified":"2021-05-24T09:43:13","modified_gmt":"2021-05-24T09:43:13","slug":"cyber-news-update-63","status":"publish","type":"post","link":"https:\/\/news.nucleon.sh\/ko\/2021\/05\/24\/cyber-news-update-63\/","title":{"rendered":"CYBER NEWS UPDATE #63"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">This podcast will give you a summary of the latest news related to cyber intelligence and proactive cybersecurity in only a few minutes.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The podcast is aimed at professionals who are short on time, or for anyone who would like to know a bit more about what is REALLY happening out there in the cyber world.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The focus of this podcast will be on the latest cyber events for non-technical people; anyone can listen and understand.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-soundcloud wp-block-embed-soundcloud\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"CyberCure Episode 63 by Cyber Intelligence Briefing\" width=\"660\" height=\"400\" scrolling=\"no\" frameborder=\"no\" src=\"https:\/\/w.soundcloud.com\/player\/?visual=true&#038;url=https%3A%2F%2Fapi.soundcloud.com%2Ftracks%2F1054377001&#038;show_artwork=true&#038;maxheight=990&#038;maxwidth=660&#038;secret_token=s-JB2843XbwQx\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">One of the USA&#8217;s largest pipelines, which carries refined gasoline and jet fuel from Texas up the East Coast to New York, was forced to shut down after being hit by ransomware in a vivid demonstration of the vulnerability of energy infrastructure to cyberattacks.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The operator of the system, <strong>Colonial Pipeline<\/strong> had shut down its 5,500 miles of pipeline, which it says carries 45 percent of the East Coast\u2019s fuel supplies, in an effort to contain the breach.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Colonial Pipeline <\/strong>acknowledged that its corporate computer networks had been hit by a ransomware attack, in which criminal groups hold data hostage until the victim pays a ransom. The company said it had shut the pipeline itself, as a precautionary act, apparently for fear that the hackers might have obtained information that would enable them to attack susceptible parts of the pipeline.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Commercial pipelines are continuously targeted by hackers as they have many controllers that are connected online in order to monitor and control systems remotely.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">If attackers gain control of such an industrial system they will be able in theory to open different valves and cause flooding and physical malfunction to expensive equipment.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Cyber Threat Intelligence<\/strong> is a great example of how new cybersecurity services can complement the existing traditional security measures.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">By using CTI (a.k.a Cyber Threat Intelligence) organizations can use Intelligence infrastructure providers such as <strong>Nucleon Cyber<\/strong> in order to deploy an extensive Intelligence network that enables them to deal with cyber threats proactively and reduce the security exposure dramatically.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<figure class=\"wp-block-video wp-block-embed is-type-video is-provider-videopress wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"VideoPress Video Player\" aria-label='VideoPress Video Player' width='660' height='371' src='https:\/\/videopress.com\/embed\/aEKRo23A?autoPlay=1&amp;loop=1&amp;muted=1&amp;persistVolume=0&amp;preloadContent=metadata&amp;hd=0&amp;cover=1' frameborder='0' allowfullscreen allow='clipboard-write'><\/iframe><script src='https:\/\/v0.wordpress.com\/js\/next\/videopress-iframe.js?m=1674852142'><\/script>\n<\/div><\/figure>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p class=\"wp-block-paragraph\">An incident that happened a while ago and worth mentioning is a potentially sensitive information leak from the Washington D.C. police department that was allegedly breached by a ransomware attack from a group seeking a payout.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">A group called <strong>Babuk<\/strong> claimed to be behind the attack. In a post made on its website, the group threatened to release information pulled from the department&#8217;s systems if they were not paid an undisclosed amount.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Screenshots of alleged arrest records and internal memos were posted on Babuk&#8217;s website and re-shared online. Sensitive information was not revealed as much as it&#8217;s known.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Babuk<\/strong> ransomware is a ransomware threat discovered in 2021 that has impacted at least five big enterprises before, with one already paying the criminals $85,000 after negotiations.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">As with other variants, this ransomware is deployed in the network of enterprises that the criminals carefully target and compromise.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The security firm <strong>McAfee<\/strong> was able to plot the telemetry of targets, revealing that the group is currently targeting the transportation, healthcare, plastic, electronics, and agricultural sectors across multiple geographies.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Surprisingly a few days after the exploit the hacker group published a post saying goodbye and that they\u2019re hanging up its spurs. but they promised to sell the sources of their malware or release it as open-source, so more people can use it !<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"660\" height=\"440\" data-attachment-id=\"1073\" data-permalink=\"https:\/\/news.nucleon.sh\/ko\/2021\/05\/24\/cyber-news-update-63\/cyber-attack-with-unrecognizable-hooded-hacker-using-virtual-reality-digital-glitch-effect\/\" data-orig-file=\"https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/05\/cyber-attack-with-unrecognizable-hooded-hacker-using-virtual-reality-digital-glitch-effect.jpg?fit=4500%2C3003&amp;ssl=1\" data-orig-size=\"4500,3003\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;2&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;NIKON D810&quot;,&quot;caption&quot;:&quot;Cyber attack with unrecognizable hooded hacker using virtual reality, digital glitch effect.&quot;,&quot;created_timestamp&quot;:&quot;1495029402&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;50&quot;,&quot;iso&quot;:&quot;1000&quot;,&quot;shutter_speed&quot;:&quot;0.01&quot;,&quot;title&quot;:&quot;Cyber attack with unrecognizable hooded hacker using virtual reality, digital glitch effect&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"Cyber attack with unrecognizable hooded hacker using virtual reality, digital glitch effect\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;Cyber attack with unrecognizable hooded hacker using virtual reality, digital glitch effect.&lt;\/p&gt;\n\" data-large-file=\"https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/05\/cyber-attack-with-unrecognizable-hooded-hacker-using-virtual-reality-digital-glitch-effect.jpg?fit=660%2C440&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/05\/cyber-attack-with-unrecognizable-hooded-hacker-using-virtual-reality-digital-glitch-effect-1024x683.jpg?resize=660%2C440&#038;ssl=1\" alt=\"\" class=\"wp-image-1073\" srcset=\"https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/05\/cyber-attack-with-unrecognizable-hooded-hacker-using-virtual-reality-digital-glitch-effect.jpg?resize=1024%2C683&amp;ssl=1 1024w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/05\/cyber-attack-with-unrecognizable-hooded-hacker-using-virtual-reality-digital-glitch-effect.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/05\/cyber-attack-with-unrecognizable-hooded-hacker-using-virtual-reality-digital-glitch-effect.jpg?resize=768%2C513&amp;ssl=1 768w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/05\/cyber-attack-with-unrecognizable-hooded-hacker-using-virtual-reality-digital-glitch-effect.jpg?resize=1536%2C1025&amp;ssl=1 1536w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/05\/cyber-attack-with-unrecognizable-hooded-hacker-using-virtual-reality-digital-glitch-effect.jpg?resize=2048%2C1367&amp;ssl=1 2048w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/05\/cyber-attack-with-unrecognizable-hooded-hacker-using-virtual-reality-digital-glitch-effect.jpg?resize=1200%2C801&amp;ssl=1 1200w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/05\/cyber-attack-with-unrecognizable-hooded-hacker-using-virtual-reality-digital-glitch-effect.jpg?resize=10%2C7&amp;ssl=1 10w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/05\/cyber-attack-with-unrecognizable-hooded-hacker-using-virtual-reality-digital-glitch-effect.jpg?resize=432%2C288&amp;ssl=1 432w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/05\/cyber-attack-with-unrecognizable-hooded-hacker-using-virtual-reality-digital-glitch-effect.jpg?resize=396%2C264&amp;ssl=1 396w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/05\/cyber-attack-with-unrecognizable-hooded-hacker-using-virtual-reality-digital-glitch-effect.jpg?resize=1120%2C747&amp;ssl=1 1120w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/05\/cyber-attack-with-unrecognizable-hooded-hacker-using-virtual-reality-digital-glitch-effect.jpg?resize=660%2C440&amp;ssl=1 660w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/05\/cyber-attack-with-unrecognizable-hooded-hacker-using-virtual-reality-digital-glitch-effect.jpg?resize=330%2C220&amp;ssl=1 330w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/05\/cyber-attack-with-unrecognizable-hooded-hacker-using-virtual-reality-digital-glitch-effect.jpg?w=1320&amp;ssl=1 1320w, https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/05\/cyber-attack-with-unrecognizable-hooded-hacker-using-virtual-reality-digital-glitch-effect.jpg?w=1980&amp;ssl=1 1980w\" sizes=\"auto, (max-width: 600px) 91vw, (max-width: 900px) 600px, (max-width: 1060px) 50vw, (max-width: 1200px) 520px, (max-width: 1400px) 43vw, 600px\" \/><\/figure>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p class=\"wp-block-paragraph\">This week we chose to focus on recent attacks that were done using different phishing techniques.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Ransomware attacks are here to stay and organizations need to enforce themselves with good cyber intelligence and abilities in order to block the most dangerous attackers.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Organizations with good security systems are able to proactively block attackers whether they are famous or not.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Using intelligence the organization will block the root identifiers of the threats enabling it to even block 0-day threats that no one knows about.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p class=\"wp-block-paragraph\">That\u2019s it for this podcast, stay safe and see you in the next podcast.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Don\u2019t forget to visit <a href=\"http:\/\/www.nucleon.sh\/\">www.nucleon.sh<\/a> for the latest podcasts on cyber intelligence.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This podcast will give you a summary of the latest news related to cyber intelligence and proactive cybersecurity in only a few minutes. The podcast is aimed at professionals who are short on time, or for anyone who would like to know a bit more about what is REALLY happening out there in the cyber [&hellip;]<\/p>\n","protected":false},"author":143072865,"featured_media":1071,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","_crdt_document":"","advanced_seo_description":"The podcast is aimed at professionals who are short on time, or for anyone who would like to know a bit more about what is REALLY happening out there in the cyber world.\n\nThe focus of this podcast will be on the latest cyber events for non-technical people; anyone can listen and understand.","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_wpas_customize_per_network":false,"jetpack_post_was_ever_published":false},"categories":[646263560],"tags":[30480,27793878,61188,14066,103,1142,14992,192933,297262,699,684292383,684292384,684292385,684292386,684292387],"class_list":["post-1061","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercure-ai","tag-cyber","tag-cyber-intelligence","tag-hackers","tag-intelligence","tag-news","tag-podcast","tag-police","tag-ransomware","tag-scada","tag-usa","tag-babuk","tag-colonial","tag-pipline","tag-texas","tag-washington","entry-image--landscape"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/news.nucleon.sh\/wp-content\/uploads\/2021\/05\/high-pressure-pipeline-gas-transporting-by-stainless-steel.jpg?fit=5760%2C3840&ssl=1","jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/paa2yX-h7","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/posts\/1061","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/users\/143072865"}],"replies":[{"embeddable":true,"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/comments?post=1061"}],"version-history":[{"count":11,"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/posts\/1061\/revisions"}],"predecessor-version":[{"id":1078,"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/posts\/1061\/revisions\/1078"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/media\/1071"}],"wp:attachment":[{"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/media?parent=1061"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/categories?post=1061"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.nucleon.sh\/ko\/wp-json\/wp\/v2\/tags?post=1061"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}