5 Major Cyber Attacks in December 2024

The cybersecurity research team of ANY.RUN found and analyzed a bunch of emerging threats with the help of our mighty Interactive Sandbox and Threat Intelligence Lookup.

We’ve been sharing their findings via X and in our blog. Here is a summary on the most interesting insights from December 2024.

Phishing Campaigns targeting Microsoft’s Azure Blob Storage

Original post on X

Phishing page: HTML document with a characteristic attribute

Cyber criminals are abusing Microsoft’s cloud-based file storage solution by hosting phishing pages on the service, employing techniques like HTML smuggling.

The phishing pages are HTML documents that contain a block input element with the ID attribute “doom”. The pages include information about users’ software obtained via JScript (OS and browser), to make them more convincing.

Phishing pages on Azure Blob Storage typically have a short lifespan. Attackers may host pages with redirects to phishing sites. With minimal suspicious content, these pages can evade detection slightly longer.

See the analysis session in the ANY.RUN sandbox.

User’s credentials get stolen from fake sign-in form
  • Threat actors leverage the *.blob.core.windows[.]net subdomain to store documents.
  • Company logos are extracted using email address parsing and loaded from the logo[.]clearbit[.]com service.
  • To collect and store stolen data, an HTTP POST request is sent to nocodeform[.]io for collecting form submissions.
AI-generated summary of the attack in the sandbox

Use the following Threat Intelligence Lookup query to find threats targeting the set of requested domains:

See the Tasks tab in the search results for sandbox sessions with malicious URLs

And this search request to find links to HTML pages hosted on Azure Blob Storage.

Get 20 free requests in TI Lookup
to enrich your threat investigations 



Contact us


Microsoft’s OneDrive also fell victim to HTML Blob Smuggling Campaign

The original post on X

As in the attack above, threat actors make victims believe they are logging into a legitimate platform.

Phishing page disguised as OneDrive login form

Using ANYRUN’s MITM feature, we extracted base.js from the traffic and decoded it. The attack begins with a bait placed on OneDrive. After clicking the link, the user is redirected to the main page containing the HTML Blob Smuggling code. After entering their credentials, victims are redirected to a legitimate website.

Stolen credentials are sent via an HTTP POST request to the C2 server.

Attack details: image sources, stolen data route

The website’s design, background, and icons are stored on IPFS, while lure images, mimicking real services, are hosted on imgur .com.

View the attack unfold in the wild: one, other, or yet another sandbox session.

Analyze malicious files and links with ANY.RUN’s Interactive Sandbox for free 



Get 14-day trial


Phishing links in Microsoft Dynamics 365 web forms

Original post on X

And again, a Microsoft service utilized for malicious activity. Phishers create forms with embedded links on *.microsoft.com subdomains. The links that users receive look legitimate, so people feel safe opening them.

With TI Lookup, we uncovered a link that tricked users into attempting to access a non-existent PDF file hosted on a Microsoft website.

Phishing URL: hxxps://customervoice.microsoft[.]com/Pages/ResponsePage.aspx?id=N_pyUL0QJkeR_KiXHZsVlyTB1Qoy7S9IkE8Ogzl8coFUNVIzNlI5MEhCNlBPRFMwMklUV0JZVTkxVS4u

Malicious page looks like a document hosted within Microsoft service

Use this simple query for TI Lookup to find attacks employing this technique and view them unveiled in our sandbox.

URLs engaged in the attack, found by TI Lookup

Anatomy of a fresh LogoKit

Original post on X

LogoKit is a comprehensive set of phishing tools known for using services that offer logos and screenshots of target websites. Our team has researched the algorithm of such an attack.

Icons, pictures, backgrounds, forms: LogoKit-powered fake page

Let’s look at the example run in our sandbox.

  • The company’s logo is fetched from a legitimate logo storage service: hxxps://logo.clearbit[.]com/<Domain>.
  • The background is retrieved via request to a website screenshot service, using the following template: hxxps://thum[.]io/get/width/<DPI>/https://<Domain>.
  • The domain chain is led by a decoder-redirector: hxxps:// asiangrocers [.]store/fri/?haooauvpco=bWlubmllQGRpc25leS5jb20. It is a fake Asian food store website built on a #WordPress template, with a domain age of around four years. The template contains email addresses filled with typos.

The decoder-redirector shields the page from analysis and redirects the victim to the actual phishing page.

In our example, the real content of the phishing page and the associated scripts are hosted on the Cloudflare Pages platform. They are stored in the assets/ folder, which contains styles, images, and scripts

Three scripts with random 10-character names are designed to protect the page from analysis and send stolen data to the threat actors:

  • assets/js/e0nt7h8uiw[.]js
  • assets/js/vddq2ozyod[.]js
  • assets/js/j3046eqymn[.]js

The stolen authentication data is sent to a remote Command and Control server controlled by the attackers via an HTTP POST request containing the following parameters: fox=&con=

Manufacturers, beware: an attack combining Lumma and Amadey is targeting you

The cybercriminals’ tactics of attacking the manufacturing industry are recently evolving from data encryption to snatching control over critical infrastructure and stealing sensitive information.

The consequences of such attacks can be severe, leading to theft of intellectual property, disruption of operations, financial losses, and compliance violations. Businesses need to take the threat most seriously, understand it and get prepared.

Attack used Emmenhtal loader to facilitate infection

This December, we have analyzed a new attack aimed at industrial market players. The mechanics are based on Lumma Stealer and Amadey Bot. The former hunts for valuable information, the latter takes control over the infected systems. View analysis.

  • It all starts with phishing emails with URLs leading users to download LNK files disguised as PDFs;
  • The malicious LNK file, once activated, initiates PowerShell via an ssh.exe command. Following a chain of scripts, a CPL file is downloaded;
  • PowerShell and Windows Management Instrumentation (WMI) commands are utilized to collect detailed information about the victim’s system.

For the details, read our blog post, view analysis session in our sandbox and dive deeper with TI Lookup. Use the search query with the name of the threat and the path to one of the malicious files used in the attack.

About ANY.RUN  

ANY.RUN helps more than 500,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. Our threat intelligence products, TI Lookup, YARA Search and Feeds, help you find IOCs or files to learn more about the threats and respond to incidents faster.  

With ANY.RUN you can: 

  • Detect malware in seconds
  • Interact with samples in real time
  • Save time and money on sandbox setup and maintenance
  • Record and study all aspects of malware behavior
  • Collaborate with your team 
  • Scale as you need

Get 14-day free trial of ANY.RUN’s Interactive Sandbox →

The post 5 Major Cyber Attacks in December 2024 appeared first on ANY.RUN’s Cybersecurity Blog.

ANY.RUN’s Cybersecurity Blog – ​Read More

Crypto scam: seed phrases shared publicly | Kaspersky official blog

“I have a question. I have USDT stored in my wallet, and I have the seed phrase. How to transfer my funds to another wallet?” — we found a comment like this under a finance-related video on YouTube. And the seed phrase was revealed in full in the comment.

This looked suspicious: even a complete cryptocurrency beginner should know better than to share their seed phrase with the entire world. We were wary, and for a good reason — this comment turned out to be a scam.

Keep reading to find out what can go wrong if you somehow come across someone’s seed phrase…

“I give you the seed phrase, and you help me transfer my money to another wallet”

Let’s start with the basics. A seed phrase is a randomly generated unique sequence of dictionary words that together form a phrase needed to recover access to a cryptowallet. When someone shares their seed phrase — essentially the key to their wallet — it looks extremely suspicious. We then discovered similar comments, each containing the same recovery phrase and a request for help transferring funds to another platform. Notably, all these messages were posted from newly created accounts.

In similar comments written from newly created accounts, supposedly “crypto newbies” generously share their seed phrases

Now, let’s imagine for a second that someone reading one of these comments is a little unscrupulous and, instead of helping the newbie, decides to take a peek inside the wallet (after all, they have the key). Upon opening the wallet, they’re pleasantly surprised to find it stuffed with USDT: a TRC20 token on the TRON network tied to the value of the US dollar. The wallet contains the equivalent of eight thousand dollars. Well, what to do next? The correct answer would be to remember that there’s no such thing as a free lunch, and steer well clear of the wallet.

Finding several thousand US dollars in someone else's wallet looks like a lucky chance to get rich for a immoral person

Finding several thousand US dollars in someone else’s wallet looks like a lucky chance to get rich for a immoral person

However, the scam assumes that our nefarious passerby will want to appropriate all or at least part of the cryptocurrency. But to withdraw USDT, a small fee must be paid in another currency: TRX (the TRON cryptocurrency token). Unfortunately, the wallet doesn’t have enough TRX, so the thief tries to transfer TRX from their own personal wallet — only to discover that the tokens they transferred immediately ended up in a completely different, third wallet.

The list of transactions details the scammers' earnings

The list of transactions details the scammers’ earnings

The catch is that the bait is set up as a multi-signature wallet. To authorize outgoing transactions in such wallets, approval from two or more people is required, so transferring USDT to a personal wallet won’t work — even after paying the “commission”.

So, the scammers are impersonating beginners who foolishly share access to their cryptowallets, tricking equally naive thieves — who end up becoming the victims. In this scenario, the scammers are something like digital Robin Hoods, as the scheme primarily targets other crooked individuals. But this twist is nothing new — we’ve previously covered a much more elegant crypto fraud scheme, also aimed at unprincipled people.

How to protect yourself from crypto scams

The way to protect against the above-described scam is quite simple: just be a decent person and don’t try to get into other people’s cryptowallets — even if the seed phrase is left in the comments of your favorite YouTube channel or even slipped under your front door.

In all other cases, crypto asset owners can follow these universal tips and recommendations:

  • Learn about the latest scams aimed at stealing cryptocurrency to stay aware of current trends.
  • Secure your devices with reliable protection.
  • Double-check any information received from strangers: scammers can pose both as beginners in the crypto world or as experienced trading sharks.

Kaspersky official blog – ​Read More

Top 10 Ransomware Trends Observed in 2024: A Look Ahead to 2025

Cyble-Blogs-Ransomware

Ransomware attacks have evolved into one of the most significant threats to global cybersecurity. These attacks have shifted from mere opportunistic schemes to advanced operations targeting businesses, critical infrastructure, and even governments. The year 2024 saw ransomware actors innovating at an unprecedented pace, leveraging new technologies and tactics to inflict maximum damage.

With ransomware incidents causing an average cost of $4.54 million per breach—excluding ransom payments—it is imperative for organizations to stay informed and prepared.

This article delves into the top 10 ransomware trends observed in 2024 and provides predictions for what lies ahead in 2025.

1. Double and Triple Extortion Schemes

In 2024, ransomware actors moved beyond simple file encryption to adopt double and triple extortion tactics. These methods involve not only encrypting a victim’s data but also exfiltrating it and threatening to release it publicly unless a ransom is paid. Triple extortion adds another dimension: threatening to disrupt business operations or targeting customers and third parties associated with the victim.

  • Example: A leading healthcare provider in the U.S. fell victim to a triple extortion scheme where attackers encrypted sensitive patient records, exfiltrated the data, and launched Distributed Denial of Service (DDoS) attacks until the ransom was paid. This resulted in financial losses and severe reputational damage.

Prediction for 2025: Expect these multi-layered extortion methods to become the norm as attackers seek greater leverage and higher payouts. Organizations will need to strengthen their data security measures and incident response plans to mitigate these risks.

2. Ransomware-as-a-Service (RaaS) Proliferation

The Ransomware-as-a-Service (RaaS) model gained significant traction in 2024, enabling even low-skilled cybercriminals to launch ransomware attacks. Under this model, ransomware developers provide affiliates with ready-to-use tools and infrastructure in exchange for a share of the profits.

  • Example: Groups like LockBit, BlackCat, and Play have turned RaaS into a booming industry, offering technical support, user manuals, and even marketing strategies to affiliates.

Prediction for 2025: The RaaS ecosystem will expand further, with more criminal groups entering the market. This will likely result in a surge in ransomware incidents targeting small and medium-sized businesses (SMBs) that lack advanced cybersecurity defenses.

3. Data Exfiltration as a Standard Tactic

Stealing sensitive data before encrypting systems has become a standard tactic in ransomware operations. This not only increases the ransom demand but also amplifies the reputational and regulatory consequences for victims.

  • Example: In 2024, a global financial institution faced a ransomware attack where attackers exfiltrated millions of customer records. The breach led to legal consequences and a loss of customer trust, despite the organization’s efforts to recover.

Prediction for 2025: With stricter data privacy regulations like GDPR and CCPA, data exfiltration attacks will pose an even greater risk. Organizations will need to implement stronger encryption and data loss prevention (DLP) solutions to counteract these threats.

4. Zero-Day Exploits and Advanced Phishing

Ransomware groups are increasingly using zero-day vulnerabilities and highly targeted phishing campaigns to gain initial access to victim networks.

  • Example: In 2024, a large technology company was breached when employees fell for an advanced phishing email disguised as a legitimate communication from a trusted vendor. The attackers exploited a zero-day vulnerability to deploy ransomware, causing significant operational downtime.

Prediction for 2025: As more organizations adopt digital transformation initiatives, the attack surface for ransomware groups will expand. Expect more zero-day exploits and socially engineered phishing campaigns aimed at high-value targets.

5. Living Off the Land (LotL) Techniques

Ransomware actors are employing Living Off the Land (LotL) techniques to evade detection by using legitimate tools and processes already present in the victim’s network.

  • Example: In a 2024 attack on a healthcare organization, attackers used PowerShell and Remote Desktop Protocol (RDP) to move laterally within the network without triggering traditional security alarms.

Prediction for 2025: LotL techniques will become more prevalent, making it essential for organizations to implement advanced endpoint detection and response (EDR) solutions and conduct regular audits of privileged accounts.

6. Critical Infrastructure as a Prime Target

Critical infrastructure sectors, including healthcare, energy, and government, have become top targets for ransomware groups. These sectors often lack strong cybersecurity defenses, making them vulnerable to attacks with far-reaching consequences.

  • Example: In 2024, a North American energy provider suffered a ransomware attack that caused widespread power outages and operational disruptions.

Prediction for 2025: With geopolitical tensions on the rise, ransomware attacks on critical infrastructure are expected to increase. Governments and private sectors will need to collaborate on improving the resilience of these essential systems.

7. Industrial Ransomware Targeting Manufacturing

The manufacturing and industrial sectors have seen a rise in ransomware attacks, disrupting production lines and supply chains.

  • Example: In 2024, a global automotive manufacturer was hit by ransomware that halted production for weeks, leading to millions in losses and delayed product deliveries.

Prediction for 2025: As industrial control systems (ICS) and IoT devices become more interconnected, ransomware targeting these environments will grow. Organizations must prioritize securing operational technology (OT) networks.

8. Decline in Average Ransom Payment but Higher Incident Costs

While the average ransom payment dropped from $850,000 to $569,000 in 2024, the overall cost of ransomware incidents has risen due to operational disruptions, data recovery expenses, and reputational damage.

  • Example: A mid-sized retail company paid a lower ransom in 2024 but incurred over $3 million in total costs due to lost sales, customer churn, and recovery efforts.

Prediction for 2025: Organizations may see lower ransom demands, but the indirect costs of ransomware attacks will continue to climb. This highlights the importance of proactive defenses and comprehensive incident response plans.

9. Evolving Ransomware Variants

New ransomware variants with enhanced capabilities emerged in 2024, including Akira and BlackCat, which feature advanced encryption and stealth techniques.

  • Example: Akira ransomware targeted a European bank, using multi-layered encryption that rendered recovery nearly impossible without paying the ransom.

Prediction for 2025: Ransomware variants will continue to evolve, focusing on bypassing traditional defenses and targeting cloud environments and hybrid work setups.

10. Increased International Collaboration and Crackdowns

Law enforcement agencies and cybersecurity organizations have intensified their efforts to combat ransomware through international collaboration. In 2024, several high-profile ransomware groups were dismantled, and stolen funds were recovered.

  • Example: A joint operation by the FBI and Europol in 2024 disrupted a major ransomware operation, recovering $20 million in ransom payments.

Prediction for 2025: While these crackdowns are promising, ransomware groups will adapt and find new ways to evade law enforcement. Continued international collaboration will be critical to countering these threats.

Looking Ahead to 2025

As we move into 2025, the ransomware landscape will continue to evolve. Here are some key predictions:

  1. AI-Powered Ransomware: Attackers will leverage artificial intelligence to automate ransomware campaigns and improve phishing success rates.
  2. Focus on Cloud Environments: With more businesses migrating to the cloud, ransomware groups will target cloud-native applications and services.
  3. Stricter Regulations: Governments will implement more stringent reporting and compliance requirements for ransomware incidents.
  4. Cyber Insurance Challenges: The cost of cyber insurance will rise, with stricter conditions for coverage related to ransomware.
  5. Post-Attack Recovery Services: Organizations will invest more in post-attack recovery services, such as takedown solutions and data restoration.

To Sum Up

The ransomware trends of 2024 highlight threat actors‘ adaptability and ingenuity. To stay ahead of these evolving threats, organizations must adopt a proactive approach, including strong cybersecurity measures, employee awareness programs, and collaborative efforts with industry peers and law enforcement.

By understanding the tactics and strategies employed by ransomware groups, businesses can better prepare for the challenges that lie ahead in 2025 and beyond.

Source:

https://cyble.com/knowledge-hub/ransomware-tactics-adopted-by-threat-actors-in-2024/

https://www.statista.com/topics/4136/ransomware/#topicOverview

Monthly Ransomware Threat Intelligence 2027.pdf

The post Top 10 Ransomware Trends Observed in 2024: A Look Ahead to 2025 appeared first on Cyble.

Blog – Cyble – ​Read More

Hardware for SIEM systems | Kaspersky official blog

At some point, the information security department of any large company inevitably begins to consider introducing a SIEM system — or replacing the existing one, and must therefore estimate the budget required for its deployment. But SIEM isn’t a lightweight product that can be deployed within existing infrastructure. Almost all solutions in this category require additional hardware, meaning that equipment must be purchased or rented.

So, for accurate budgeting, it’s necessary to take into account the expected hardware configuration. In this post, we discuss how SIEM hardware requirements change depending on the company’s profile and system’s architecture, and provide rough parameters to help estimate the preliminary cost of such equipment.

Evaluating the data flow

Essentially, a SIEM system collects event data from internal and external sources and identifies security threats by correlating this data. Therefore, before considering what hardware will be required, it’s essential to first assess the volume of information the system will process and store. To this end, you need to first identify critical risks to the infrastructure, and then determine the data sources that must be analyzed to help detect and address threats related to these risks. These are the data sources to focus on. Such an assessment is necessary not only to determine the required hardware, but also to estimate the cost of licensing. For example, the cost of licensing for our Kaspersky Unified Monitoring and Analysis Platform SIEM system directly depends on the number of events per second (EPS). Another important aspect is to check how the vendor calculates the number of events for licensing. In our case, we take the events per second after filtering and aggregation, calculating the average number of events over the past 24 hours rather than their peak values — but not all vendors follow this approach.

The most common sources include endpoints (Windows events, Sysmon, PowerShell logs, and antivirus logs), network devices (firewalls, IDS/IPS, switches, access points), proxy servers (such as Squid and Cisco WSA), vulnerability scanners, databases, cloud systems (such as AWS CloudTrail or Office 365), and infrastructure management servers (domain controllers, DNS servers, and so on).

As a rule, to form preliminary expectations about the average event flow, the size of the organization can serve as a guide. However, the architectural particularities of specific IT infrastructure can make company size a less decisive parameter.

In general, for small and medium-sized organizations with just one office — or up to several offices with good communication channels among them and IT infrastructure located in a single data center — an average event flow of 5000–10 000 EPS can be expected. For large companies, making an estimate is more challenging: depending on the complexity of the infrastructure and the presence of branches, EPS can range from 50 000 to 200 000 EPS.

Architectural components of an SIEM system

An SIEM system generally consists of four main components: the management subsystem, event collection subsystem, correlation subsystem, and storage subsystem.

Core (management subsystem). You can think of this as the control center of the system. It allows managing the other components, and provides visualization tools for SOC analysts — enabling them to easily configure operational parameters, monitor the SIEM system’s state, and, most importantly, view, analyze, sort and search events, process alerts, and work with incidents. This control center needs to also support log viewing through widgets and dashboards, and enable quick data search and access.

The core is an essential component and can be installed as a single instance or as a cluster to provide a higher level of resilience.

Event collection subsystem. As the name suggests, this subsystem collects data from various sources and converts it into a unified format through parsing and normalization. To calculate the required capacity of this subsystem, one must consider both the event flow intensity and the log format in which events arrive from sources.

The server load depends on how the subsystem processes logs. For example, even for structured logs (Key Value, CSV, JSON, XML), you can use either regular expressions (requiring significantly more powerful hardware) or the vendor’s built-in parsers.

Correlation subsystem. This subsystem analyzes data collected from logs, identifies sequences described in correlation rule logic, and, if necessary, generates alerts, determines their threat levels, and minimizes false positives. It’s important to remember that the correlator’s load is also determined not only by the event flow but by the number of correlation rules and the methods used to describe detection logic as well.

Storage subsystem. An SIEM system must not only analyze but also store data for internal investigations, analytics, visualization and reporting, and in certain industries — for regulatory compliance and retrospective alert analysis. Thus, another critical question at the SIEM system design stage is how long you want to store collected logs. From an analyst’s perspective, the longer the data is stored, the better. However, a longer log retention period increases hardware requirements. A mature SIEM system provides the ability to strike a balance by setting different retention periods for different log types. For example, 30 days for NetFlow logs, 60 days for Windows informational events, 180 days for Windows authentication events, and so on. This allows data to be optimally allocated across available server resources.

It’s also important to understand what volume of data will be stored using hot storage (allowing quick access) and cold storage (suitable for long-term retention). The storage subsystem must offer high performance, scalability, cross-storage search capabilities (both hot and cold), and data viewing options. Additionally, the ability to back up stored data is essential.

Architectural features of Kaspersky SIEM

So, we’ve laid out the ideal requirements for an SIEM system. It probably won’t surprise you that our Kaspersky Unified Monitoring and Analysis Platform meets these requirements. With its built-in capability to scale for data flows reaching hundreds of thousands of EPS within a single instance, our SIEM system isn’t afraid of high loads. Importantly, it doesn’t need to be split into multiple instances with correlation results reconciled afterwards — unlike many alternative systems.

The event collection subsystem of the Kaspersky Unified Monitoring and Analysis Platform system is equipped with a rich set of parsers optimized for processing logs in each format. Additionally, the multi-threading capabilities of Go mean the event flow can be processed using all available server resources.

The data storage subsystem used in our SIEM system consists of servers that store data, and servers with the clickhouse-keeper role, which manage the cluster (these servers don’t store data themselves but facilitate coordination among instances). For data flows of 20 000 EPS with a relatively low number of search queries, these services can operate on the same servers that store the data. For higher data flows, it’s recommended to separate these services. For instance, they can be deployed on virtual machines (a minimum of one is required, though three are recommended).

The Kaspersky Unified Monitoring and Analysis SIEM storage system is flexible — allowing event flows to be distributed across multiple spaces, and specifying the storage depth for each space. For example, inexpensive disks can be used to create cold storage (where searches are still possible, just slower). This cold storage can house data that is unlikely to require analysis but must be stored due to regulatory requirements. Such information can be moved to cold storage literally the day after it’s collected.

Thus, the data storage approach implemented in our SIEM system enables long-term data retention without exceeding the budget on expensive equipment, thanks to hot and cold storage capabilities.

SIEM architecture deployment using our SIEM as an example

The Kaspersky Unified Monitoring and Analysis Platform supports multiple deployment options, so it’s important first to determine your organization’s architecture needs. This can be done based on the estimated EPS flow, and the particularities of your company. For simplicity, let’s assume the required data retention period is 30 days.

Data flow: 5000–10 000 EPS

For a small organization, the SIEM system can be deployed on a single server. For example, our SIEM system supports the All-in-One installation option. In this case, the required server configuration is 16 CPUs, 32GB of RAM, and a 2.5TB of disk space.

Data flow: 30 000 EPS

For larger organizations, separate servers are needed for each SIEM component. Dedicating a server exclusively for storage ensures that search queries don’t affect the processing of events by the collector and correlator. However, the collector and correlator services can still be deployed together (or separately, if desired). An approximate equipment configuration for this scenario is as follows:

  • Core: 10 CPUs, 24GB of RAM, 0.5TB of disk space
  • Collector: 8 CPUs, 16GB of RAM, 0.5TB of disk space
  • Correlator: 8 CPUs, 32GB of RAM, 0.5TB of disk space
  • Storage: 24 CPUs, 64GB of RAM, 14TB of disk space

Data flow: 50 000–200 000 EPS

For large enterprises, additional factors must be considered when defining the architecture. These include ensuring resilience (as the substantial data-flow increases the risk of failure) and the presence of company divisions (branches). In such cases, more servers may be required to install the SIEM system, as it’s preferable to distribute collector and correlator services across different servers for such high EPS flows.

Data flow: 200 000 EPS

As EPS flows grow and the infrastructure divides into separate independent units, the amount of equipment required increases accordingly. Additional servers will be needed for collectors, storage, correlators, and keepers. Moreover, in large organizations, data availability requirements may take precedence. In this case, the Kaspersky Unified Monitoring and Analysis Platform storage cluster divides all collected events into shards. Each shard consists of one or more data replicas. And each shard replica is a cluster node, meaning a separate server. To ensure resilience and performance, we recommend deploying the cluster with two replicas per shard. For processing such large EPS volumes, three collector servers may be required, installed in the offices with the highest event flows.

Kaspersky SIEM in holding companies

In large enterprises, the cost of implementing an SIEM system increases not only with the volume of data, but also depending on the usage profile. For example, in some cases (such as MSP and MSSP environments, as well as large holding companies with multiple subsidiaries or branches), multi-tenancy is required. This means the company needs to maintain multiple “mini-SIEMs”, which operate independently. Our solution enables this through a single installation at the head office, without the need to install separate systems in/at each branch/tenant. This significantly reduces equipment costs.

SIEM scheme

Let’s imagine either (i) a holding company, (ii) a vertically-integrated enterprise, or (iii) a geographically-distributed corporation with either various independent security teams or a need to isolate data access among branches. The Kaspersky Unified Monitoring and Analysis Platform tenant model allows for segregated access to all resources, events, and third-party integration settings. This means one installation functions as multiple separate SIEM systems. In this case, while each tenant can develop its own content (correlation rules), there’s also the option of distributing a unified set of resources across all divisions. In other words, each division can have its own collectors, correlators, and rules, but the HQ security team can also assign standardized bundles of security content for everyone — ensuring consistent protection across the organization.

SIEM in holding

Thus, using the Kaspersky Unified Monitoring and Analysis Platform ensures the necessary performance with relatively modest computing resources. In some cases, savings on hardware can reach up to 50%.

For a more accurate understanding of the required resources and implementation costs, we recommend talking with our specialists or integration partners. We (or our partners) can also provide premium support, assist in developing additional integrations (including using API capabilities for connected products), and oversee the deployment of a turnkey solution covering system design, equipment estimation, configuration optimization, and much more. Learn more about our SIEM system, the Kaspersky Unified Monitoring and Analysis Platform, on the official product page.

Kaspersky official blog – ​Read More

Top 5 Lessons for CISOs and Cybersecurity Professionals from 2024

Cyble | lessons for CISO

The year 2024 has been a rollercoaster for cybersecurity professionals worldwide. From ransomware attacks paralyzing critical industries to insider threats causing massive data breaches, the challenges for Chief Information Security Officers (CISOs) and cybersecurity teams have been relentless. These cyberattacks and data breaches highlight the importance of adapting strategies and learning from past events to secure organizations better as cyber threats evolve. 

Here are the top five lessons for CISO and cybersecurity professionals should learn from as 2025 begins. 

Lessons from 2024 that CISOs Must Carry Forward 

1. Human Error Remains the Biggest Cyber Vulnerability 

A staggering 84% of CISOs in countries like Saudi Arabia, Canada, France, and South Korea identified human error as their organization’s greatest cybersecurity weakness in 2024. This vulnerability extends to phishing attacks, misconfigurations, poor credential management, and insider threats. 

Case in Point: The Star Health Insurance Breach 

In August 2024, India’s largest health insurer, Star Health, suffered a data breach exposing millions of customer medical reports and personal details. The threat actor “xenZen” accused the company’s CISO of insider collusion, sharing a screenshot alleging that credentials were leaked via email. 

This Star Health Insurance data breach highlights two key lessons: 

  • Cybersecurity training needs to go beyond awareness: Employees, especially those handling sensitive data, must undergo regular, scenario-based training. 

  • Strengthen insider threat detection: Advanced monitoring tools and strict access controls can help detect suspicious activities before they escalate into full-blown breaches. 

2. Multi-Factor Authentication (MFA) Is Non-Negotiable 

In 2024, weak or absent MFA emerged as a common denominator in several high-profile breaches. Attackers exploited credential weaknesses to gain access to sensitive systems, causing significant damage. 

Case in Point: The Snowflake Breach 

The U.S.-based cloud storage company Snowflake experienced a breachwhere compromised credentials—obtained through malware—were used to access sensitive customer data. The lack of MFA enforcement on demo accounts allowed hackers to compromise the data of high-profile clients like TicketMaster and LendingTree. 

Lesson Learned: 

  • Implement MFA universally: Every account, internal or external, must have MFA enabled. A single weak link can jeopardize the entire ecosystem. 

  • Enforce credential hygiene: Regularly rotate credentials, monitor for leaked credentials on the dark web, and implement strong password policies. 

3. Ransomware Is Evolving—So Must Your Defenses 

Ransomware attacks continued to dominate headlines in 2024, with 41% of CISOs worldwide naming it a top cybersecurity risk. These attacks increasingly targeted critical infrastructure and essential service providers, making their impact devastating. 

Case in Point: The CDK Global Ransomware Attack 

In June 2024, CDK Global, a software provider for car dealerships, was hit by a ransomware attack that disrupted operations for over 15,000 dealerships. Major companies like Asbury Automotive and Lithia Motors had to revert to manual processes, resulting in financial losses and customer dissatisfaction. 

Lesson Learned: 

  • Strengthen endpoint protection: Implement advanced threat detection tools to identify and stop ransomware before it spreads. 

  • Create vigorous incident response plans: Include regular backups, tabletop exercises, and quick recovery protocols to minimize downtime. 

4. The Supply Chain Is a Critical Weak Link

Cybercriminals increasingly exploited vulnerabilities in supply chains, targeting third-party vendors to gain access to larger organizations. 

Case in Point: The Dell Data Breach 

In 2024, Dell confirmed a data breach exposing 49 million customer purchase records. While financial data remained secure, the stolen information was sufficient to launch phishing and smishing attacks. 

Case in Point: The Ascension Health Cyberattack 

A massive cyberattack on Ascension Health disrupted clinical operations, forcing the nonprofit health system to disconnect from some business partners. The attack led to an additional operating loss of $1.8 billion for the fiscal year. 

Lesson Learned: 

  • Conduct thorough vendor risk assessments: Before partnering with third-party vendors, evaluate their cybersecurity posture. 

  • Mandate compliance with security standards: Require vendors to adopt strong security practices like SOC 2 compliance and regular penetration testing. 

5. Customer Trust Is Harder to Rebuild After a Breach

In 2024, cyberattacks had far-reaching consequences beyond financial losses. According to statistics, 47% of respondents indicated that attracting new customers became significantly harder after a data breach. 

Case in Point: Change Healthcare (CHC) Ransomware Attack 

In February 2024, Change Healthcare fell victim to a ransomware attack linked to the BlackCat group. With sensitive health data of over 110 million individuals exposed, the incident eroded trust among customers. Despite offering credit monitoring services, the reputational damage proved difficult to mitigate. 

Lesson Learned: 

  • Be transparent and proactive: When breaches occur, communicate quickly, outline steps taken to mitigate the impact, and offer affected customers tangible support. 

  • Invest in brand reputation management: Build a strong security narrative and a culture of trust through certifications, audits, and visible cybersecurity initiatives. 

Actionable Takeaways for CISOs and Cybersecurity Professionals 

As the threat landscape becomes increasingly complex, organizations must adopt a multi-faceted approach to cybersecurity. Incorporating advanced tools and platforms can significantly enhance CISO’s ability to address modern threats and safeguard their enterprise. 

Tools like Cyble Vision provide a comprehensive suite of capabilities that can empower organizations to identify, monitor, and mitigate threats across their digital footprint. For example: 

  • Attack Surface Management: Proactively identify and mitigate vulnerabilities by gaining a complete view of your organization’s external attack surface. 

  • Brand Intelligence: Protect against online brand abuse, including phishing and fraudulent domains, to safeguard customer trust and your organization’s reputation. 

  • Dark Web Monitoring: Stay ahead of cybercriminals with continuous monitoring of dark web activities, uncovering leaked credentials, sensitive data, and emerging threats. 

  • Cyber Threat Intelligence: Leverage AI-driven insights and continuous monitoring to detect and counteract evolving cyber threats in real time. 

  • Takedown and Disruption Services: Address malicious campaigns effectively by removing fraudulent websites and disrupting attack operations. 

  • Third-Party Risk Management: Identify and mitigate risks from vendors and external collaborators, ensuring security in your business partnerships. 

  • Vulnerability Management: Use advanced scanning and remediation tools to address vulnerabilities before they are exploited. 

These capabilities, combined with features like digital forensics, incident response, and executive monitoring, enable CISOs to adopt a proactive, intelligence-led approach to managing cybersecurity challenges. Solutions like Cyble’s provide the visibility and tools needed to stay ahead of adversaries, reduce exposure, and protect critical assets. 

By integrating such advanced tools into their cybersecurity frameworks, CISOs can not only address existing risks but also build resilience against future threats, ensuring their organization’s digital security is always one step ahead. 

To Sum Up 

The lessons from 2024’s high-profile cyberattacks highlight the need for a shift from reactive to proactive cybersecurity strategies. With 38% of CISOs identifying malware as a top risk and 29% pointing to email fraud and DDoS attacks, it’s clear that the threat landscape continues to evolve at an alarming pace.  

However, as businesses navigate these challenges, the focus must remain on fortifying human and technological defenses, building cyber resilience, and fostering transparency in post-breach communication. 

As organizations worldwide grapple with the dual pressures of digital transformation and escalating cyber threats, the stakes have never been higher. Learning from the mistakes and successes of 2024 will empower CISOs and cybersecurity professionals to build stronger, more adaptive defenses—ensuring not just survival but success in the face of cyber adversity. 

The post Top 5 Lessons for CISOs and Cybersecurity Professionals from 2024 appeared first on Cyble.

Blog – Cyble – ​Read More

CISA Recommends Encrypted Messaging Apps as Telecom Security Questioned 

Cyble | Telecom networks

The security of U.S. telecom networks has come under fresh scrutiny in recent months, with the latest example coming this week when the Cybersecurity and Infrastructure Security Agency (CISA) recommended that individuals in need of high security use encrypted messaging apps for mobile communications. 

Concern grew in October when CISA and the FBI confirmed that China-linked threat actors had infiltrated telecom networks in an attempt to spy on President-elect Donald Trump and the campaign of Vice President Kamala Harris, among other top U.S. officials. 

Congressional hearings followed, including an extraordinary admission from Senator Mark Warner that “thousands and thousands and thousands” of vulnerable telecom network devices might need to be replaced. 

“Unlike some of the European countries where you might have a single telco, our networks are a hodgepodge of old networks,” Warner told the Washington Post. “The big networks are combinations of a whole series of acquisitions, and you have equipment out there that’s so old it’s unpatchable.” 

Guidance earlier this month from U.S. cyber and national security agencies and counterparts in Canada, Australia and New Zealand offered comprehensive advice for hardening and securing global telecom networks in light of the attacks, and the U.S. Federal Communications Commission (FCC) said it would take steps to mandate stronger telecom security. 

Attention Turns to SS7 and Diameter as List of Attackers Grows 

Recently, the security of the 40-year-old Signaling System No. 7 (SS7) telecom protocols used in 2G and 3G SMS and phone services – as well as international roaming – came under renewed scrutiny over SS7’s potential to allow location tracking, interception of voice data and multi-factor authentication keys, as well as the protocol’s potential as a spyware delivery vector. The 4G and 5G Diameter protocol also has location tracking vulnerabilities, and 4G and 5G users could also find themselves downgraded to SS7 when roaming. 

Senator Ron Wyden earlier this month released 23 pages of correspondence with the U.S. Department of Defense (DoD) detailing insecurities in telecom messaging systems and the SS7 and Diameter protocols. Wyden and Senator Eric Schmitt asked DoD Inspector General Robert Storch to “investigate the Department of Defense’s (DOD) failure to secure its unclassified telephone communications from foreign espionage.” 

“Teams and certain other platforms utilized by DOD are not end-to-end encrypted by default, causing concerning gaps in security that could easily be mitigated,” the Senators wrote. “End-to-end encrypted voice, video, and text messaging tools such as Signal, WhatsApp, and FaceTime better protect communications in the event that the company that offers the service is hacked.” 

DoD has begun limited pilots of a potentially more secure platform known as Matrix that is widely used by NATO allies, but the senators said the Defense Department needs to do more. 

The letter included a number of appendices detailing correspondence between Wyden’s staff and the DoD. 

In one, Wyden’s staff asked the DoD if it agreed with three statements by the Department of Homeland Security on SS7’s and Diameter’s security shortcomings that were included in a 2017 report – and the DoD responded that it agreed with the statements. 

The three DHS statements the DoD agreed with are: 

  • DHS “believes that all U.S. carriers are vulnerable to [SS7 and Diameter] exploits, resulting in risks to national security, the economy, and the Federal Government’s ability to reliably execute national essential functions.” 

  • DHS “believes SS7 and Diameter vulnerabilities can be exploited by criminals, terrorists, and nation-state actors/foreign intelligence organizations.” 

  • DHS “believes many organizations appear to be sharing or selling expertise and services that could be used to spy on Americans.” 

Wyden also said he had seen an unreleased CISA report from 2022 detailing U.S. telecom security issues that contained “alarming details about SS7-related surveillance activities involving U.S. telecommunications networks.” 

Wyden asked if DoD was “aware of any incidents in 2022 or 2023 in which DoD personnel, whether located in the U.S. or outside the U.S, were surveilled through SS7 and Diameter enabled technologies?” 

The DoD replied that the question “Requires a classified response.” 

Wyden sent the DoD a slide from a 2017 DHS event (not included in the documents) that identified the “primary countries reportedly using telecom assets of other nations to exploit U.S. subscribers. Those countries, according to the DHS presentation, are Russia, China, Israel and Iran.” 

Wyden said Russia, China, Israel and Iran had also used telecom assets of countries in Africa, Central and South America, Europe, the Middle East, and Africa to “attack US subscribers … indicating that these foreign governments are using SS7 to target U.S. users, and that these SS7 attack are being routed through 3rd country networks.” 

Asked if it agreed with those assessments, the DoD replied that it “is not in a position to render an assessment without access to the underlying data that informed this presentation.” 

CISA’s Encrypted Messaging Guidance 

With that background, CISA’s guidance issued this week merits particularly close attention by anyone engaged in sensitive communications, especially those who may come under international roaming. 

The CISA document includes specific recommendations for Android and iPhone devices, but general guidance includes: 

  • Using a free messaging application for secure communications that guarantees end-to-end encryption, such as Signal or similar apps. 

  • Enable Fast Identity Online (FIDO) phishing-resistant authentication. 

  • Take inventory of valuable accounts, including email and social media and review any accounts where information leakage would benefit threat actors 

  • Enroll each account in FIDO-based authentication, especially Microsoft, Apple, and Google accounts. Once enrolled in FIDO-based authentication, disable other less secure forms of MFA. 

  • For Gmail users, enroll in Google’s Advanced Protection (APP) program to strengthen defenses against phishing and account hijacking. 

  • Migrate away from Short Message Service (SMS)-based MFA and disable SMS as a second factor for authentication. 

  • Use a password manager to store all passwords. 

  • Set a Telco PIN and MFA for mobile phone accounts to protect against SIM-swapping techniques. 

The post CISA Recommends Encrypted Messaging Apps as Telecom Security Questioned  appeared first on Cyble.

Blog – Cyble – ​Read More

Acrobat out-of-bounds and Foxit use-after-free PDF reader vulnerabilities found

Acrobat out-of-bounds and Foxit use-after-free PDF reader vulnerabilities found

Cisco Talos’ Vulnerability Research team recently disclosed three out-of-bounds read vulnerabilities in Adobe Acrobat Reader, and two use-after-free vulnerabilities in Foxit Reader.  

These vulnerabilities exist in Adobe Acrobat Reader and Foxit Reader, two of the most popular and feature-rich PDF readers on the market. 

The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence to Cisco’s third-party vulnerability disclosure policy. Adobe’s patched this in version 24.005.20320, and Foxit’s patch appears in PDF Editor version 12.1.9/11.2.12.

For Snort coverage that can detect the exploitation of these vulnerabilities, download the latest rule sets from Snort.org, and our latest Vulnerability Advisories are always posted on Talos Intelligence’s website.  

Out-of-bounds read Adobe Acrobat Reader Vulnerabilities 

Discovered by  KPC.  

Specially crafted font files embedded into a PDF can trigger out-of-bounds memory reads in TALOS-2024-2076 (CVE-2024-49534), TALOS-2024-2070 (CVE-2024-49533), and TALOS-2024-2064 (CVE-2024-49532), which could lead to the disclosure of sensitive information and further exploitation. An attacker must trick the user into opening a malicious file to trigger these vulnerabilities. 

Foxit object use-after-free vulnerabilities 

Discovered by KPC. 

Two use-after-free vulnerabilities exist in the way Foxit Reader handles certain objects. TALOS-2024-2093 (CVE-2024-49576) and TALOS-2024-2094 (CVE-2024-47810) can be triggered by malicious JavaScript code in a PDF file. An attack needs to either trick a user into opening the malicious file, or the user must navigate to a maliciously crafted website while the Foxit browser extension is enabled. This vulnerability can lead to memory corruption and result in arbitrary code execution. 

Cisco Talos Blog – ​Read More

Welcome to the party, pal!

Welcome to the party, pal!

Welcome to the final Threat Source newsletter of 2024. 

Watching “Die Hard” during the Christmas season has become a widely recognized tradition for many, despite ongoing debates about its classification as a Christmas movie. I know it isn’t everyone’s cup of tea. Whether you like the movie or not, let me share a story about what didn’t quite go as planned in my family last year.  

When  some celebrities had their social media accounts compromised, I saw it as the perfect opportunity to introduce my family to the world of multi-factor authentication (MFA) for their online accounts. Our home IT setup is diverse— With Linux, Macs, Windows; Androids, iOS, we needed something cross-platform. Also, we needed a user-friendly solution as we have both standard users and IT experts (never underestimate your users). From my professional standpoint, I decided to go “all in” with hardware tokens – they work cross platform and “survive” one or the other OS installs from scratch. Providing two for each person was mandatory in case one got lost, which had happened to me already. So it wasn’t a cheap exercise. In my defense, this was before the side-channel attack EUCLEAK was discovered, which has since expanded to affect more products as noted in the first release. 

In the spirit of John McClane : “Now I know what a TV dinner feels like.” 

The kids found the gift “boring” and almost a year later, the adoption rate is still only 30%. Fortunately, my wife had the foresight to prepare real presents for the family, saving Christmas Eve from being a “bad guys win” scenario. (Only John Thor can drive somebody that crazy.) 

I share this anecdote not to discourage you, but to help you avoid making the same mistake and risking your celebrations. Unless everyone gathered around the Christmas tree is an infosec professional, it might not be the time to go “Yippee-ki-yay Mr Falcon” with tech gifts.  

However, spending time with loved ones is a great opportunity to discuss the trends and importance of cybersecurity. We’ve been highlighting compromised credentials for a long time, as seen in our previous posts [here], [here], [here] and [here]. For the fourth consecutive time in over a year, the most observed means of gaining initial access was the use of valid accounts, making it clear identity-based attacks are becoming more prevalent, and wont be gone anytime soon. 

 Advocate for the use of a password managers—there are paid versions with family plans on one end, and excellent open-source alternatives on the other. Avoid storing credentials in browsers, as they can be extracted by info-stealers. Consider using passkeys where possible. According to the fido alliance, more than 20% of the world’s top 100 websites support passkeys already. If passkeys are not yet enabled for one of your services? Any MFA is better than none. Even using “just” TOTP in a software container is a significant improvement over just a password. 

But it’s not just about enabling MFA. As Martin wrote last week, we need to close the gap by communicating and understanding the the threat landscape. When it comes to stolen credentials, share resources like https://haveibeenpwned.com/ or https://sec.hpi.de/ilc/?lang=en with your loved ones so they can check if their email has been part of a breach.   

If you decide not to bother your friends & famliy (though I strongly believe Mbappe, Sweeny and Odenkirk would have preferred a more secure account) with Account/Password Hygiene, there are some more work related recommendations in Hazel’s “How are attackers trying to bypass MFA” 

Whichever is your idea of Christmas, then, like Argyle said, “I gotta be here for New Year’s!”  

We look forward to seeing you in 2025!   

The one big thing

At the time of writing, our Vulnerability Research Team Disclosed 207 Vulnerabilities, and had another 93 reported to the respective Vendor in 2024.  Di you know  Talos has a team which investigates software and operating system vulnerabilities in order to discover them before malicious threat actors do? Every day, they try to find vulnerabilities that have not yet been discovered, and then work to provide a fix for those before a zero-day threat could ever be executed. 

Why do I care? 

We see threat actors exploiting known vulnerabilities constantly. Sometimes those CVEs are Years old.  

So now what? 

Maybe you want to check for some CVEs or conduct a network security assessments. 
You can our team’s reports,roundups,spotlights and deep dives on our blog. 

Top security headlines of the week 

 Blackhat Europe 2024 took place Dec 9-12 in London, UK. Loaded with a lot of interesting Sessions, my favorites are “Vulnerabilities in the eSIM download protocol” and “Over the Air: Compromise of Modern Volkswagen Group Vehicles” both showing how far an attack surface can possibly extend.  

Germany’s Federal Office for Information Security (BSI) says it blocked communication between appr. 30.000 Android IoT Devices which were sold with BadBox malware preinstalled, and their command and control (C2) infrastructure by sinkholing DNS queries (Bleeping Computer)  

Law enforcement agencies worldwide disrupted a holiday tradition for cybercriminals: launching Distributed Denial-of-Service (DDoS) attacks. Booter and stresser websites were taken down, administrators were arrested and over 300 users were identified for planned operational activities. (Europool

The Willow chip is not capable of breaking modern cryptography,” Google’s director of quantum tells The Verge.

Can’t get enough Talos? 

Upcoming events where you can find Talos 

  Cisco Live EMEA (February 9-14, 2025) 

Amsterdam, Netherlands 

Most prevalent malware files from Talos telemetry over the past week  

SHA256:873ee789a177e59e7f82d3030896b1efdebe468c2dfa02e41ef94978aadf006f 
MD5: d86808f6e519b5ce79b83b99dfb9294d  
VirusTotal:
https://www.virustotal.com/gui/file/873ee789a177e59e7f82d3030896b1efdebe468c2dfa02e41ef94978aadf006f 
Typical Filename: n/a 
Claimed Product: n/a  
Detection Name: Win32.Trojan-Stealer.Petef.FPSKK8  

SHA256:9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507 
MD5: 2915b3f8b703eb744fc54c81f4a9c67f  
VirusTotal:
https://www.virustotal.com/gui/file/9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507  
Typical Filename: VID001.exe  
Claimed Product: n/a  
Detection Name: Win.Worm.Bitmin-9847045-0 

 SHA 256:
7b3ec2365a64d9a9b2452c22e82e6d6ce2bb6dbc06c6720951c9570a5cd46fe5  
MD5: ff1b6bb151cf9f671c929a4cbdb64d86  
VirusTotal: https://www.virustotal.com/gui/file/7b3ec2365a64d9a9b2452c22e82e6d6ce2bb6dbc06c6720951c9570a5cd46fe5 
Typical Filename: endpoint.query  
Claimed Product: Endpoint-Collector  
Detection Name: W32.File.MalParent  

 SHA256:47ecaab5cd6b26fe18d9759a9392bce81ba379817c53a3a468fe9060a076f8ca 
MD5: 71fea034b422e4a17ebb06022532fdde 
VirusTotal: https://www.virustotal.com/gui/file/47ecaab5cd6b26fe18d9759a9392bce81ba379817c53a3a468fe9060a076f8ca 
Typical Filename: VID001.exe 
Claimed Product: n/a  
Detection Name: Coinminer:MBT.26mw.in14.Talos 

 SHA 256: a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91  
MD5:
7bdbd180c081fa63ca94f9c22c457376  
VirusTotal: https://www.virustotal.com/gui/file/a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91 
Typical Filename: IMG001.exe  
Claimed Product: N/A   
Detection Name: Trojan/Win32.CoinMiner.R174018 

 

 

 

 

Cisco Talos Blog – ​Read More

Europe’s Cyber Resilience Act: A New Era of Cybersecurity for Digital Products 

Cyble | Cyber Resilience Act

Europe embarks on a new chapter in cybersecurity with the entry into force of the Cyber Resilience Act (CRA). This marks the first-ever EU legislation addressing cybersecurity across a broad range of digital products. The CRA will have far-reaching implications for everything from simple connected devices like baby monitors and smartwatches to more complex systems supporting critical infrastructure.  

With mandatory cybersecurity requirements imposed on manufacturers and retailers, the Act promises to make Europe’s digital space safer, fostering resilience against cyber threats. The Cyber Resilience Act introduces harmonized rules for products containing digital elements, aiming to ensure high levels of cybersecurity standards throughout their entire lifecycle. 

This means manufacturers and retailers must meet strict cybersecurity standards at every stage of the product’s journey—from design and production to maintenance and eventual disposal. The goal is to enhance transparency, reduce vulnerabilities, and strengthen overall security for products connected to or interacting with other networks and devices. 

The CRA’s requirements apply to all products with digital components, with a few exclusions such as medical devices and aviation equipment. By December 2027, any product sold in the EU containing digital elements will need to meet these cybersecurity standards and bear the CE marking, signifying compliance. The CE marking is a symbol that indicates a product meets EU safety and regulatory standards, and for the first time, it will also assure consumers that the product adheres to stringent cybersecurity measures. 

The Cyber Resilience Act (CRA) Will Impact All Economic Operators 

The CRA targets all economic operators placing products with digital components on the European market, meaning it applies to manufacturers, importers, and retailers. Some of the key factors of the act are:  

  • Additional Guidance for SMEs: Microenterprises and small businesses (SMEs) will receive extra guidance to help them comply with the Cyber Resilience Act (CRA) requirements. 

  • Flexibility for Member States: While the CRA sets minimum cybersecurity standards, Member States have the flexibility to enforce stricter regulations where necessary. 

  • Third-Party Assessments for High-Risk Products: Certain high-risk products, such as firewalls, intrusion detection systems, and cybersecurity tools, will undergo mandatory third-party assessments to ensure compliance with security standards, especially if they are critical to infrastructure or essential services. 

  • Open-Source Software Exemption: Open-source software is not subject to the same strict CRA requirements as commercial products. It is only regulated under the CRA when supplied for commercial use. 

  • Exemption for Non-Commercial Open-Source Software: Software developed by nonprofits or small businesses for non-commercial use is exempt from CRA requirements. 

  • Requirements for Commercial Open-Source Software: Open-source software developed for commercial purposes must adhere to cybersecurity best practices under the CRA. However, it is not required to have a CE marking. 

  • Cybersecurity Standards for Open-Source in Commercial Products: Manufacturers incorporating open-source software into their products must ensure these components meet cybersecurity standards, including regular updates and vulnerability management. 

Strengthening Cybersecurity for Critical Infrastructure 

The Cyber Resilience Act plays a crucial role in protecting Europe’s critical infrastructure. Digital products used by these services must meet established cybersecurity standards to avoid potential disruption from cyberattacks.  

  • Security of Critical Infrastructure: The CRA ensures that products integrated into critical infrastructure, such as power grids and transportation systems, are secure by default. 

  • Complementing Existing Regulations: The CRA complements existing regulations like the EU Cybersecurity Strategy and the NIS2 Directive, creating a unified framework for resilience across various sectors. 

  • Sector-Specific Requirements: Some sectors have additional or specific requirements, with existing EU rules on medical devices and vehicles remaining unaffected by the CRA. 

  • Consistency in Radio Equipment Regulations: The cybersecurity of radio equipment will continue to be governed by pre-existing regulations, ensuring consistency within the EU’s legislative framework. 

  • Focus on Security Updates and Vulnerability Management: Manufacturers must provide security updates for their products throughout their lifespan, addressing vulnerabilities as they arise. 

  • Support Periods for Products: The CRA mandates at least five years of security updates for most products, with longer support periods required for products with longer lifespans, such as industrial systems or hardware. 

  • Vulnerability Reporting and Fixes: If a vulnerability is discovered, manufacturers must promptly inform users and fix the issue. 

  • Incident Reporting Requirements: If a product’s security is compromised, manufacturers must notify relevant authorities and affected users, including mandatory reporting to cybersecurity agencies like ENISA. 

Ensuring Transparency and Market Compliance 

Transparency is a critical element of the Cyber Resilience Act. The Act mandates that products with digital components must be assessed for conformity, with a special focus on those deemed to be higher risk.  

  • Lifecycle Cybersecurity Assessments: Assessments will verify that products meet cybersecurity requirements throughout their lifecycle, ensuring manufacturers handle vulnerabilities responsibly and products are secure by default. 

  • Market Surveillance and Compliance: The CRA provides a framework for market surveillance authorities to ensure that products meet cybersecurity standards. If a product poses significant cybersecurity risks or fails to comply with regulations, authorities can enforce corrective actions, including recalls or withdrawals. 

  • CE Marking as Compliance Indicator: The CE marking will serve as the primary indicator of a product’s compliance with cybersecurity standards, helping consumers make informed purchasing decisions. 

  • Harmonized Standards for Compliance: The CRA encourages the development of harmonized standards to simplify the conformity assessment process. Products meeting these standards will be presumed compliant, streamlining market entry and ensuring consistent security levels across the EU. 

  • Cybersecurity Certifications: The EU Cybersecurity Certification Scheme (EUCC) will be an essential tool for manufacturers to demonstrate compliance with cybersecurity requirements for products sold within the EU. 

  • Role of the European Commission: The Commission will adopt these cybersecurity standards and provide additional technical specifications as needed to support compliance. 

Cybersecurity and the Digital Single Market 

The CRA plays a pivotal role in the EU’s Digital Single Market, which aims to ensure the free flow of digital products and services while maintaining high standards of safety and security. By introducing the CE marking for compliant products, the CRA provides a unified approach that prevents the fragmentation of the digital market. Consumers will have confidence that the digital products they purchase are secure, reducing risks associated with cyberattacks and ensuring the integrity of Europe’s digital economy. 

In this context, market surveillance authorities will work together to monitor compliance across Member States, while entities like ENISA and CSIRTs (Computer Security Incident Response Teams) will ensure that cybersecurity incidents and vulnerabilities are effectively reported and managed. 

As the Cyber Resilience Act transitions into full effect by December 2027, Member States will provide support for small businesses and microenterprises to help them comply with the new cybersecurity requirements. This support could include regulatory sandboxes, training programs, and guidance to reduce the burden of compliance for smaller players in the market.  

Additionally, financial aid may be made available to help reduce the costs of third-party conformity assessments, making it easier for smaller manufacturers to meet the high standards of the CRA. 

Penalties for Non-Compliance 

The Cyber Resilience Act (CRA) enforces penalties for non-compliance, emphasizing the importance of adhering to cybersecurity requirements within the European Union.  

  • Penalties for Non-Compliance: Companies failing to meet the CRA’s obligations may face significant fines. Serious violations could result in fines of up to €15 million or 2.5% of the company’s worldwide annual turnover from the previous financial year, whichever is higher. For other breaches, fines could reach €10 million or 2% of annual turnover. 

  • Fines for Misleading Information: Providing incorrect, incomplete, or misleading information to market surveillance authorities or notified bodies may incur fines of up to €5 million or 1% of the company’s worldwide turnover. 

  • Penalty Structure: The penalties are designed to be effective, proportionate, and dissuasive, ensuring strong deterrents against non-compliance. Market surveillance authorities are responsible for enforcing these penalties and can take actions such as requiring corrective measures, restricting non-compliant products, or removing them from the market. 

  • Role of Member States: Each Member State must establish rules for penalties and enforce them effectively, sharing information with other EU countries as necessary. 

  • Factors in Determining Fines: Authorities will consider factors like the nature and severity of the infringement, its consequences, and the company’s size and market share when determining fines. 

  • Combination of Fines and Corrective Actions: Administrative fines may be combined with other corrective measures to ensure that companies comply with cybersecurity standards and protect the digital ecosystem. 

How Cyble, the award winning Cybersecurity firm, help you achieve compliance?

The Cyber Resilience Act (CRA) marks an important milestone in enhancing cybersecurity across Europe, solidifying the EU’s position as a prominent player in the global effort to secure cyberspace. With mandatory requirements for digital products, a focus on transparency in vulnerability management, and a framework for market surveillance, the CRA ensures the safety and security of Europe’s interconnected digital ecosystem. 

To better understand the complexities of compliance and upgrade your cybersecurity efforts, Cyble, a leading provider of threat intelligence solutions, offers powerful tools to help organizations be compliance-ready. Cyble’s flagship platform, Cyble Vision, utilizes AI, machine learning, and human intelligence to monitor and manage digital risks effectively. With features like continuous deep and dark web monitoring, attack surface management, and real-time alerts, Cyble empowers businesses to identify vulnerabilities, mitigate threats, and maintain compliance with the CRA’s stringent requirements. 

By integrating Cyble’s solutions, organizations can ensure secure products, manage vulnerabilities, and provide timely updates, helping them meet the rigorous cybersecurity standards set by the CRA. Cyble’s proactive threat intelligence capabilities and real-time insights enable businesses to protect their digital assets, comply with regulatory obligations, reduce cyberattack risks, and enhance overall resilience in the digital environment. 

The post Europe’s Cyber Resilience Act: A New Era of Cybersecurity for Digital Products  appeared first on Cyble.

Blog – Cyble – ​Read More

Top 10 Industries Targeted by Threat Actors in 2024 

Cyble | Threat Actors

As cyber threats continue to evolve, threat actors are refining their techniques and focusing on industries that hold valuable information or play critical roles in society. From ransomware attacks paralyzing operations to data breaches compromising millions of individuals, no sector is immune to cyberattacks. Drawing from recent reports and insights, this blog explores the top 10 industries targeted by cybercriminals in 2024 and the measures they can adopt to bolster their defenses. 

1.Government and Public Sector: Custodians of National Security 

Government agencies and public sector entities face constant threats, often from nation-state actors seeking strategic advantages or hacktivists with ideological motivations. The sheer volume of citizen data and critical infrastructure managed by these organizations makes them prime targets. 

Major Threats: 

  • Espionage: Stealing sensitive data for strategic or financial advantage. 

  • DDoS Attacks: Overwhelming systems to disrupt public services. 

Mitigation Strategies: 

Government entities need to prioritize inter-agency collaboration and establish centralized cybersecurity frameworks. Investments in AI-based threat intelligence platforms and public-private partnerships can also bolster resilience against sophisticated attacks. 

2. Energy and Utilities: The Backbone of Critical Infrastructure 

The energy and utilities sector plays a pivotal role in national economies and security. This makes it a frequent target for both cybercriminals and nation-state actors, with attacks often aiming to disrupt critical infrastructure. 

Major Threats: 

  • ICS Attacks: Compromise of control systems can lead to widespread outages. 

  • Supply Chain Attacks: Threat actors exploit vulnerabilities in third-party vendors to infiltrate systems. 

Mitigation Strategies: 

To protect against these threats, the sector must prioritize ICS cybersecurity by segmenting operational networks from IT networks. Enhanced supply chain scrutiny, robust third-party risk management to monitor vendor vulnerabilities, and partnerships with government cybersecurity agencies can further strengthen defenses against advanced threats. 

3. Healthcare: Where Lives and Data Intersect 

The healthcare industry is one of the fastest-growing targets for cybercriminals, with a staggering 180% increase in ransomware and database leak incidents compared to 2023. Patient safety, critical care, and sensitive medical data make this sector highly lucrative for attackers. 

Major Threats: 

  • Ransomware: Delays in accessing medical records can have life-threatening consequences. 

  • Database Leaks: Leaked patient records often lead to identity theft and insurance fraud. 

Mitigation Strategies: 

Healthcare organizations must adopt a layered security approach, including data encryption, multi-factor authentication, and comprehensive employee training programs to detect phishing attempts. Regular cybersecurity drills and incident response planning are also essential. 

4. Manufacturing: The Cornerstone of Global Supply Chains 

The manufacturing sector leads the list, experiencing an alarming 377 confirmed attacks in the first half of 2024 alone. Manufacturing remains vital to the global economy, and its reliance on interconnected systems, including Industrial Control Systems (ICS), exposes it to significant risks. 

Major Threats: 

  • Ransomware: By locking critical systems and demanding high ransoms, ransomware attacks in manufacturing can lead to halted production lines, financial losses, and delayed supply chains

  • Database Leaks: Intellectual property, design data, and supply chain information have been prime targets for data exfiltration. 

Mitigation Strategies: 

To mitigate these threats, manufacturers should prioritize securing Industrial Control Systems (ICS) by isolating critical systems, conducting regular vulnerability assessments, and adopting robust endpoint protection solutions. Additionally, incorporating advanced network monitoring tools like Cyble Vision can help detect anomalies before they escalate into breaches. 

5. Financial Services: A Prime Target for Monetary Gain 

The financial services sector consistently ranks among the most targeted industries due to its access to funds and sensitive customer data. In 2024, cybercriminals have adopted sophisticated tactics, leveraging advanced persistent threats (APTs) and exploiting insider vulnerabilities. 

Major Threats: 

  • Ransomware: Demands for multimillion-dollar payments are becoming routine. 

  • Cryptocurrency Exploits: Attackers target blockchain systems and exchanges to siphon off digital assets. 

  • Phishing and Social Engineering: Deceptive tactics to gain unauthorized access to accounts. 

Mitigation Strategies: 

To combat these threats, financial institutions must deploy state-of-the-art AI-driven Threat Intelligence tools. These tools can identify anomalous patterns indicative of fraud or cyberattacks. Additionally, implementing strict access controls and conducting regular security audits are crucial for minimizing risk. 

6. Professional Services: Custodians of Confidential Data 

Professional service firms, including law, accounting, and consulting firms, have witnessed a 15% uptick in cyberattacks compared to 2023. These organizations store highly sensitive client data, making them attractive to threat actors

Major Threats: 

  • Ransomware: Disruption in service delivery can damage client relationships. 

  • Database Leaks: Exposed data can lead to legal liabilities and reputational damage. 

Mitigation Strategies: 

Firms should enforce strict data access controls and encrypt all client information. Regular penetration testing and vulnerability scans can help identify weaknesses before attackers exploit them. Moreover, adopting secure communication platforms can safeguard sensitive exchanges. 

7. Technology: Guardians of Innovation 

Technology companies, encompassing software developers, IT services, and hardware manufacturers, remain high-value targets. Although a slight decline in attacks was noted in 2024, this sector is still vulnerable due to the sensitivity of its intellectual property. 

Major Threats: 

  • Data Breaches: Proprietary technology, source codes, and user data are often exfiltrated. 

  • Ransomware: Cybercriminals lock critical software systems, halting innovation pipelines. 

Mitigation Strategies: 

Incorporating advanced AI-driven cybersecurity solutions can detect and neutralize threats in real-time. Technology firms should also implement bug bounty programs to uncover vulnerabilities before malicious actors exploit them. 

8. Retail and E-commerce: A Treasure Trove of Consumer Data 

Retailers and e-commerce platforms process massive volumes of personal and payment information, making them a lucrative target for threat actors. In 2024, both online and physical operations have faced increased attacks. 

Major Threats: 

  • POS Malware: Point-of-sale systems are compromised to steal cardholder data. 

  • Credential Stuffing: Attackers exploit reused passwords to breach user accounts. 

Mitigation Strategies: 

Retail businesses must adopt end-to-end encryption for payment data, deploy multi-factor authentication for account access, and regularly monitor systems for unusual activity. Cybersecurity awareness campaigns targeting both employees and customers can further reduce risks. 

9. Education: Hubs of Knowledge and Innovation 

Educational institutions, particularly universities, are increasingly targeted for their intellectual property, personal data, and operational vulnerabilities. Attackers often aim to disrupt operations or monetize stolen data on the dark web

Major Threats: 

  • Dark Web Exploitation: Selling stolen academic research and personal data. 

  • DDoS Attacks: Crippling online learning platforms and administrative systems. 

Mitigation Strategies: 

Educational institutions must implement robust cybersecurity frameworks, including identity management systems and regular security awareness training. Strong network segmentation and frequent system updates can also help reduce exposure to cyber threats

10. Small Businesses: The Underdogs in Cybersecurity 

Small and medium-sized businesses (SMBs) are often perceived as easy targets due to their limited cybersecurity budgets and expertise. Despite their size, the impact of a breach on SMBs can be devastating. 

Major Threats: 

  • Phishing: Cybercriminals manipulate employees to gain access to sensitive data. 

  • Ransomware: Locking systems and demanding ransoms can cripple operations. 

Mitigation Strategies: 

SMBs should focus on implementing basic yet effective cybersecurity measures, such as routine software updates, secure data backup solutions, and employee training programs to recognize phishing attempts. Outsourcing cybersecurity to managed service providers (MSPs) can also offer cost-effective protection. 

Emerging Trends in Cybersecurity Attacks Across Industries 

While the above industries remain top targets, certain emerging trends in cyberattacks warrant attention across sectors: 

  • Supply Chain Vulnerabilities: Attackers increasingly target third-party vendors to infiltrate larger organizations. 

  • AI-Driven Threats: Threat actors are using AI to automate attacks and evade traditional security measures. 

  • Deepfake and Impersonation Scams: These new-age tactics are used to manipulate trust and extract sensitive information. 

Key Takeaways for 2024 

  1. Ransomware Dominates: Nearly every industry has faced ransomware attacks, underscoring the need for robust backup and recovery strategies. 

  1. Employee Awareness is Crucial: Phishing and social engineering remain the primary methods of attack. Training employees to recognize these threats can significantly reduce risks. 

  1. AI-Powered Defense is Essential: As attackers become more sophisticated, industries must leverage AI and machine learning to stay ahead. 

Conclusion 

The evolving cyber threat landscape in 2024 underscores the importance of vigilance, innovation, and collaboration in cybersecurity. Whether it is the manufacturing sector grappling with ICS vulnerabilities or small businesses struggling with limited resources, all industries must adopt a proactive stance. By prioritizing security investments, fostering a culture of awareness, and leveraging cutting-edge technologies, organizations can safeguard their operations, customers, and reputations in an increasingly connected world. 

The road ahead demands resilience, adaptability, and a unified effort against cyber adversaries. Let 2025 be a year of strengthened defenses and collective action to combat the relentless tide of cyber threats. 

The post Top 10 Industries Targeted by Threat Actors in 2024  appeared first on Cyble.

Blog – Cyble – ​Read More