Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Security Education Videos Scams & Phishing Your Security Mobile Security Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
Phishing Examples Of  The Current Top Ransomware Threats
Facebook   X   LinkedIn   Email

Phishing Examples Of The Current Top Ransomware Threats

November 7, 2024

Ransomware attacks have become increasingly prevalent and damaging in recent years and they do not discriminate. Every person, industry, or organization is fair game for cybercriminals wanting to make a buck, in most cases, many bucks. Cybercriminals are constantly on the lookout for vulnerabilities they can exploit to gain unauthorized access and deploy ransomware. Here, we highlight some of the most significant vulnerabilities leveraged by ransomware groups, their implications, and the importance of securing these weaknesses.

ProxyShell Vulnerabilities: In August 2021, the cybersecurity community discovered ProxyShell, a chain of critical vulnerabilities affecting on-premises Microsoft Exchange Servers. ProxyShell consists of three vulnerabilities that enable pre-authenticated remote code execution (RCE). Exploiting these vulnerabilities, ransomware groups gained unauthorized access to Exchange Servers, leading to disruptive ransomware attacks. Sectors such as Education, Government, Business Services, and Telecommunications have already experienced the impact of these attacks.

ProxyLogon Vulnerabilities: The ProxyLogon vulnerabilities created significant buzz due to their impact on Microsoft Exchange Server. These vulnerabilities provided threat actors with a pathway to unauthorized access and remote code execution within Exchange Server environments. Ransomware groups like DoejoCrypt and Pydomer exploited ProxyLogon vulnerabilities to infiltrate vulnerable Exchange Servers and deploy ransomware. By bypassing authentication mechanisms, these groups encrypted files and demanded ransoms for their decryption.

Log4Shell: Log4Shell emerged as a major vulnerability in December 2021, impacting the cybersecurity landscape significantly. It is a zero-day vulnerability found in the widely used Apache Log4j logging library, which is utilized by numerous Java applications. Exploiting this allows attackers to execute arbitrary code, potentially leading to system compromise and unauthorized access to sensitive information. Despite initial concerns, the public impact of Log4Shell was less catastrophic than expected. However, ransomware groups like LockBit, Conti, and Alphv/BlackCat capitalized on this vulnerability to carry out attacks to this day.

PrintNightmare: PrintNightmare refers to a critical security flaw in the Windows Print Spooler service, affecting various Windows operating systems. This vulnerability enables remote attackers to execute arbitrary code with system-level privileges, granting them control over affected systems. Ransomware group Black Basta leveraged the PrintNightmare vulnerability to spread laterally across networks, encrypt critical files, and demand ransom payments.

ZeroLogon: ZeroLogon is a critical vulnerability that affects the Windows Netlogon Remote Protocol used by Microsoft Active Directory. By exploiting ZeroLogon, an attacker gains unauthorized access to the domain controller, obtaining administrative privileges over the entire Windows domain network. BianLian Ransomware is one threat actor known to potentially exploit ZeroLogon, compromising network infrastructure and deploying ransomware.

As dark as all of this seems, it’s not all. Additional vulnerabilities gaining attention among ransomware groups include MOVEit Transfer, Fortra GoAnywhere MFT, and 3CX VOIP Desktop Client (SmoothOperator). These vulnerabilities expose organizations to the risk of unauthorized access and potential ransomware deployment.

Ransomware attacks continue to pose a significant threat to organizations worldwide. Understanding and addressing the vulnerabilities most commonly exploited by ransomware groups is essential for effective defense. Organizations must remain vigilant and take measures to mitigate these risks.

Implement strong security measures including having a plan of action in place should one of these attacks hit. Update it annually or whenever someone with a task in the plan leaves.

  • Regularly update systems with the latest software and firmware versions.
  • Never pay a ransom to get data restored. It is unlikely to succeed. Performing regular backups and having them ready to go is the best way to avoid this.
  • Provide cybersecurity awareness training to all employees and staff on a regular basis. This will allow them to know what threats are there and how to react to them.

Do Zero-Day Vulnerabilities Really Get Exploited Or Are You Just Scaring Us?

Corporate Security

Do Zero-Day Vulnerabilities Really Get Exploited Or Are You Just Scaring Us?

Sometimes we hear about an exploit that could cause potential harm to an individual or company and push it aside and perhaps briefly wonder if it ever actually did cause harm. If you have been paying attention to the technology news at all in the past weeks, you will know that they do indeed get exploited. One group is really busy and has made headlines a few times lately. In fact, every day there is a new story about an organization that has been attacked using the MOVEit zero-day. But no doubt, the other vulnerabilities are being abused too. READ FULL STORY

MOVEit Moves  To Colorado--Millions Affected In Recent Attacks

Identity Theft

MOVEit Moves To Colorado--Millions Affected In Recent Attacks

The Colorado Department of Health Care Policy and Financing (HCPF) has reported a breach that compromised the data of more than 4 million individuals. The incident was attributed to IBM, a vendor for the state, which utilizes the MOVEit application for the transfer of HCPF data files. Not standing alone, another organization impacted by this recent breach is Missouri’s Department of Social Services (DSS), which also uses IBM's services. MOVEit just won't move on. READ FULL STORY

Check Point Research Reveals Threats Making a Menace of Themselves in 2023

Your Security

Check Point Research Reveals Threats Making a Menace of Themselves in 2023

Have you heard enough of the Trojan Qbot? Well, that sneaky bot is not going away, nor is it sitting back and being quiet. In fact, per a report by Check Point Research, it’s been hanging around making a cybersecurity menace of itself all throughout the year, thus far. It’s not the only malicious news for the year either. The mobile Trojan SpinOk made its debut and that pesky MOVEit zero-day vulnerability has not moved an inch to stay out of the news. READ FULL STORY

You Better MOVEit To Protect Yourself Against Fraud If You Live In Louisiana

Identity Theft

You Better MOVEit To Protect Yourself Against Fraud If You Live In Louisiana

Officials from Louisiana have revealed that hackers are responsible for a massive cyber-attack targeting driver’s license and state ID holders in the state. This attack, thought to be an exploit of the MOVEit vulnerability, which also affected prominent entities like the U.S. Department of Energy, British Airways, and the BBC, exposed personally identifiable information (PII) of millions of residents. The hackers likely obtained access to further personal details that would enable them to commit fraud using them. READ FULL STORY

Multiple U.S. Government Agencies Targeted: Global Cyberattack Exploits Vulnerability

Your Security

Multiple U.S. Government Agencies Targeted: Global Cyberattack Exploits Vulnerability

According to the U.S. Cybersecurity and Infrastructure Security Agency (CISA), several U.S. federal government agencies have fallen victim to a global cyberattack that exploits a vulnerability in commonly used software. CISA is working diligently to assess the extent of the impact and facilitate timely remediation measures. No specific agencies are being called out in this attack, but government officials have admitted there are a few in this attack involving MOVEit software. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...