Microsoft December 2021 Patch Tuesday fixes 6 zero-days, 67 flaws
New ransomware now being deployed in Log4Shell attacks
Microsoft fixes Windows AppX Installer zero-day used by Emotet
Log4j vulnerability now used by state-backed hackers, access brokers
Emotet starts dropping Cobalt Strike again for faster attacks
Explore the cloud with this Microsoft Azure certification training
Microsoft to set Windows Terminal as default console in Windows 11
Large-scale phishing study shows who bites the bait more often
Qualys BrowserCheck
Junkware Removal Tool
How to remove the PBlock+ adware browser extension
Remove the Search Redirect
Remove the Search Redirect
Remove the Search Redirect
Remove Security Tool and SecurityTool (Uninstall Guide)
How to remove Antivirus 2009 (Uninstall Instructions)
How to Remove WinFixer / Virtumonde / Msevents / Trojan.vundo
How to remove Google Redirects or the TDSS, TDL3, or Alureon rootkit using TDSSKiller
Locky Ransomware Information, Help Guide, and FAQ
CryptoLocker Ransomware Information Guide and FAQ
CryptorBit and HowDecrypt Information Guide and FAQ
CryptoDefense and How_Decrypt Ransomware Information Guide and FAQ
How to make the Start menu full screen in Windows 10
How to install the Microsoft Visual C++ 2015 Runtime
How to open an elevated PowerShell Admin prompt in Windows 10
How to Translate a Web Page in Google Chrome
How to start Windows in Safe Mode
How to remove a Trojan, Virus, Worm, or other Malware
How to show hidden files in Windows 7
How to see hidden files in Windows
IT Certification Courses
Gear + Gadgets
CISA warns critical infrastructure to stay vigilant for ongoing threats
The Cybersecurity and Infrastructure Security Agency (CISA) warned critical infrastructure organizations today to strengthen their cybersecurity defenses against potential and ongoing threats.
The federal agency also issued guidance to help executives and senior leaders proactively reinforce their orgs’ resilience against threats arising from malicious activity coordinated by nation-state-sponsored threat actors and their proxies.
“In the lead up to the holidays and in light of persistent and ongoing cyber threats, CISA urges critical infrastructure owners and operators to take immediate steps to strengthen their computer network defenses against potential malicious cyber attacks,” the cybersecurity agency said [PDF].
“CISA encourages leadership at all organizations—and critical infrastructure owners and operators in particular—to review the CISA Insights and adopt a heightened state of awareness.”
CISA “strongly” urged orgs from critical infrastructure sectors to increase organizational vigilance, prepare for rapid response, ensure network defenders implement cybersecurity best practices, stay informed about current cybersecurity threats and malicious techniques, and immediately report incidents and anomalous activity.
CISA critical infrastructure warning
While CISA did not detail what these ongoing threats are, they are likely referring to the large-scale Log4j exploitation targeting vulnerable systems worldwide.
As Microsoft Threat Intelligence Center (MSTIC) and Mandiant reported over the weekend, multiple state-backed hackers linked to governments in China, Iran, North Korea, and Turkey have jumped at the occasion to deploy Log4Shell exploits in their attacks.
Microsoft also said that access brokers used by ransomware-as-a-service (RaaS) operations have also joined these ongoing attacks, which means ransomware affiliates will soon start deploying their payloads on networks compromised in Log4Shell breaches.
Bitdefender has already uncovered a ransomware incident orchestrated by a new threat actor dubbed Khonsari, who used a Log4Shell exploit to attack their victim.
In light of the severe risks organizations using products bundling the vulnerable Log4j library face, CISA has already ordered federal agencies to patch their systems before Christmas.
“Sophisticated threat actors, including nation-states and their proxies, have demonstrated capabilities to compromise networks and develop long-term persistence mechanisms,” CISA added.
“These actors have also demonstrated capability to leverage this access for targeted operations against critical infrastructure with potential to disrupt National Critical Functions.”
Two weeks ago, the FBI revealed in a flash alert issued in coordination with CISA that the Cuba ransomware gang alone has compromised the networks of at least 49 organizations from critical infrastructure sectors since it started attacking US targets.
CISA orders federal agencies to patch Log4Shell by December 24th
FBI: Cuba ransomware breached 49 US critical infrastructure orgs
US govt warns of increased ransomware risks during holidays
New ransomware now being deployed in Log4Shell attacks
US, UK warn of Iranian hackers exploiting Microsoft Exchange, Fortinet
Not a member yet? Register Now
Log4j: List of vulnerable products and vendor advisories
Hackers steal Microsoft Exchange credentials using IIS module
To receive periodic updates and news from BleepingComputer, please use the form below.
Terms of Use Privacy PolicyEthics Statement
Copyright @ 2003 – 2021 Bleeping Computer® LLC – All Rights Reserved
Not a member yet? Register Now
Read our posting guidelinese to learn what content is prohibited.


You May Also Like

State-backed hackers increasingly use RTF injection for phishing

FBI seized $2.3M from affiliate of REvil, Gandcrab ransomware gangsEwDoor botnet targets…

FTC: Americans lost $148 million to gift card scams this year

New zero-day exploit for Log4j Java library is an enterprise nightmareALPHV BlackCat…

Medical software firm urges password resets after ransomware attack

State hackers breach defense, energy, healthcare orgs worldwideMediaMarkt hit by Hive ransomware,…

This image looks very different on Apple devices — see for yourself

TellYouThePass ransomware revived in Linux, Windows Log4j attacksCredit card info of 1.8…