SIGforum.com    Main Page  Hop To Forum Categories  The Lounge    Cyber-Security heads up to everyone
Go
New
Find
Notify
Tools
Reply
  
Cyber-Security heads up to everyone Login/Join 
blame canada
Picture of AKSuperDually
posted
I've been contacted by all my large vendors (financial institutions) multiple times over the past few weeks to batten down the hatches on cyber-security. One of my contacts recommended that businesses unplug their routers at night and when not in use. I just received another alert from a large bank client which included a link to the Known Exploited Vulnerabilities Catalog.

https://www.cisa.gov/known-exp...nerabilities-catalog

I was just looking through the list and saw the vulnerabilities of firefox browsers (which like many of you, I just got done installing and setting up with the blaze plugin).

I don't understand much about these lists, but I know several people here do. We've had emails and calls from our vendors, and I've seen back-line banking software taken offline at night and weekends as they're constantly battling attacks. My personal contact says they're working around the clock to repel and stay ahead of attacks right now. His recommendation last week was that you change all your passwords to everything. He also recommended unplugging work servers from the interwebs at night and when closed or not needed.

I've been telling my people to be especially careful what links and emails they open and click on. I've noticed my chaplain phone which has a widely disseminated number, is getting 4-5 texts and MMS' a day now that are spam and phishing.


~~~~~~~~~~~~~~~~~~~~~~~~~
"The trouble with our Liberal friends...is not that they're ignorant, it's just that they know so much that isn't so." Ronald Reagan, 1964
~~~~~~~~~~~~~~~~~~~~~~~~~~
"Arguing with some people is like playing chess with a pigeon. It doesn't matter how good I am at chess, the pigeon will just take a shit on the board, strut around knocking over all the pieces and act like it won.. and in some cases it will insult you at the same time." DevlDogs55, 2014 Big Grin
~~~~~~~~~~~~~~~~~~~~~~~~~~

www.rikrlandvs.com
 
Posts: 14000 | Location: On the mouth of the great Kenai River | Registered: June 24, 2007Reply With QuoteReport This Post
blame canada
Picture of AKSuperDually
posted Hide Post
This link was shared with us and encouraged to be shared:

https://www.cisa.gov/shields-up

I hope this helps.


~~~~~~~~~~~~~~~~~~~~~~~~~
"The trouble with our Liberal friends...is not that they're ignorant, it's just that they know so much that isn't so." Ronald Reagan, 1964
~~~~~~~~~~~~~~~~~~~~~~~~~~
"Arguing with some people is like playing chess with a pigeon. It doesn't matter how good I am at chess, the pigeon will just take a shit on the board, strut around knocking over all the pieces and act like it won.. and in some cases it will insult you at the same time." DevlDogs55, 2014 Big Grin
~~~~~~~~~~~~~~~~~~~~~~~~~~

www.rikrlandvs.com
 
Posts: 14000 | Location: On the mouth of the great Kenai River | Registered: June 24, 2007Reply With QuoteReport This Post
Get my pies
outta the oven!

Picture of PASig
posted Hide Post
quote:
Originally posted by AKSuperDually:
One of my contacts recommended that businesses unplug their routers at night and when not in use



Uhhh

Doesn’t that kinda defeat the whole purpose of a router?

I’ve never heard advice like that before.


 
Posts: 35040 | Location: Pennsylvania | Registered: November 12, 2007Reply With QuoteReport This Post
Optimistic Cynic
Picture of architect
posted Hide Post
Please, everyone, take a deep breath, and get a grip.

If you react to the threat of a cyber attack by initiating a DoS (denial of service) on yourself, your adversary has won without firing a shot.

Personal security measures (responsible password management, web surfing, and recognition of phishing and other thought-malware) has little to nothing to do with protocol-based network attacks on server software. Be suspicious of any "alert" that conflates these very different threat profiles, be aware that it is more likely an attempt to alarm and confuse, rather than a legitimate warning. A panicked response to a poorly-understood "threat" is as apt to lead to a negative outcome as the threat itself. Those of us in the self-defense community should be able to draw parallels to debates around appropriate responses to armed attackers.

I am far from saying "do nothing, everything will be alright," but threats are not new, and "activity" is always there. It doesn't have to be at "threat level == midnight" for bad shit to happen, or for responsible parties to take protective measures.
 
Posts: 6891 | Location: NoVA | Registered: July 22, 2009Reply With QuoteReport This Post
Seeker of Clarity
Picture of r0gue
posted Hide Post
1. Know every device you have (inventory).
2. Know every software you have (inventory).
3. Know every account that you have (inventory).

Then: Patch like your livelihood depends upon it. Manage your lifecycle refresh (get rid of old unsupported OS that cannot be patched). Mandate Two-Factor authentication on ever web facing resource. Disable old unused accounts. Teach staff about email-based risks.

There's much more that more advanced organizations can and should do, but if you're taking cybersec advice from the SF Lounge, this is probably a good enough start. I believe would eliminate 80% of your risk. Probably more.

Extra-credit --
Email is your enemy. A whitelist-based border control on email is a great tool. Everything is in quarantine unless it's from a trusted domain at the org level, or it has been added to an individual's whitelist. Checkout ChoiceMail. New sender's have to apply (manual process) to ask to be delivered. User's can ignore most of it and if something seems legit, they have to allow it in. And their radar is up at that point. Solves "similar" domain spoofing.




 
Posts: 11453 | Registered: August 02, 2004Reply With QuoteReport This Post
quarter MOA visionary
Picture of smschulz
posted Hide Post
No doubt using good security fundamentals should are recommended.
I DO NOT think that all of a sudden there is an immediate threat because all of the Ukraine mess.

Remember Y2K ???

Especially for the individual.

Banks and other high profile should be more cautious but who knows what is really happening.
These institutions are promoting the Russia narrative because they get attention and it they don't they will be woke-shamed.
Keep up with good fundamentals on everything from browsing habits, opening emails, backups, hardware and software updates >> all what everyone should be doing anyway.

To be honest what concerns me the most is with all the the super-convenient IOT connections that someday....
....you'll regret it. Maybe not today. Maybe not tomorrow, but soon and for the rest of your life.” - Rick Blaine... Eek
...that someday someone will figure out how to Eff us all.
Everything is connected to the Internet and all that does is give someone else an opportunity (for bad).

Recently, NAS's were hit hard with Ransomware > QNAP, Synology, and others.
They ALL entered with remote access and easy ways to access your stuff remotely.

Everyone bashes updates but it is something that needs to be done and regularly.
Sure some little thing might break and it makes someone whine and complain but overall it should be done.

Use common sense and limit your exposure if possible.
 
Posts: 23336 | Location: Houston, TX | Registered: June 11, 2006Reply With QuoteReport This Post
Seeker of Clarity
Picture of r0gue
posted Hide Post
quote:
Originally posted by smschulz:
No doubt using good security fundamentals should are recommended.
I DO NOT think that all of a sudden there is an immediate threat because all of the Ukraine mess.


There is an increased risk of collateral damage because of this conflict (example: the current wiper threat). There is an increased risk that Russia will use ransomware because of this conflict. Everyone connected to the Internet is at some risk, and now an increased risk. Targeted human driven attacks will not likely fall upon the individual home user. Agreed there. Though these guys have been known to miss. Recently read of a small biz being given the decrypt key when the bad actors realized it wasn't who they thought it was. lol

I'm particularly concerned of them pulling out some shelved zero-day attacks. I'm sure they have some dandy's in their bag.




 
Posts: 11453 | Registered: August 02, 2004Reply With QuoteReport This Post
Member
posted Hide Post
Banks, government agencies, and large Corporations get 1000s of attacks an hour.

Everyone from children trying to get hacker creds to nation-states trying to steal money and secrets.

Nothing new here.

Keep your stuff up to date with patching, have a reasonable and longish password.

Unless you have a reason to be targeted the chances are you will not be noticed.

Random attacks happen especially if you are unpatched and have not changed default passwords.

The bad guys have bots looking for that.

Most decent sized ISPs have stuff in place to protect their customers, but it can't protect you from being stupid.

Clicking on phishing links and downloading questionable stuff will get you compromised easily.

For the most part relax they have bigger fish to try to fry.
 
Posts: 4795 | Registered: February 15, 2004Reply With QuoteReport This Post
  Powered by Social Strata  
 

SIGforum.com    Main Page  Hop To Forum Categories  The Lounge    Cyber-Security heads up to everyone

© SIGforum 2024