Wednesday, December 4, 2024
HomeCyber Security NewsCISA Releases Advisory to Monitor Networks to Detect Malicious Cyber Actors

CISA Releases Advisory to Monitor Networks to Detect Malicious Cyber Actors

Published on

SIEM as a Service

The National Security Agency (NSA) has partnered with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and other entities to release a critical advisory.

This initiative comes in response to the exploitation of major global telecommunications providers by a threat actor affiliated with the People’s Republic of China (PRC).

The advisory is encapsulated in the Cybersecurity Information Sheet (CSI) titled “Enhanced Visibility and Hardening Guidance for Communications Infrastructure.”

- Advertisement - SIEM as a Service

This document offers comprehensive defensive strategies designed to enhance the monitoring of networks and reinforce device security.

Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar

It targets engineers and system administrators overseeing communications infrastructure but is also relevant to organizations managing on-premises enterprise equipment.

Dave Luber, NSA Cybersecurity Director, emphasized the importance of vigilance in cybersecurity, stating, “Vigilance is key for defending against network compromise. Always have eyes on your systems and patch and address known vulnerabilities before they become targets.”

The CSI outlines several critical measures aimed at enhancing visibility into network activities. These measures include logging all configuration changes and management connections at network perimeters and setting up alerts for unforeseen activities.

Moreover, the advisory underscores the significance of adopting robust hardening practices, such as disabling unused, unauthenticated, or unencrypted protocols, securing passwords, restricting management connections and privileged accounts, and ensuring timely patching and upgrading of devices.

According to the National Security Agency report, the guidance notably focuses on strengthening Cisco operating systems, which the PRC-affiliated threat actor specifically targeted.

The document provides detailed recommendations to mitigate these vulnerabilities, reducing the risk of malicious cyber activities.

The release of this advisory marks a proactive step towards safeguarding critical infrastructure against evolving cyber threats.

Organizations are encouraged to adopt these guidelines to bolster their defenses and protect sensitive communications networks from potential security breaches.

As cyber threats continue to grow in sophistication, such collaborative efforts are crucial in maintaining the integrity and security of global telecommunications infrastructure.

Analyse Advanced Malware & Phishing Analysis With ANY.RUN Black Friday Deals : Get up to 3 Free Licenses.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Deloitte UK Hacked – Brain Cipher Group Claim to Have Stolen 1 TB of Data

Brain Cipher has claimed to have breached Deloitte UK and exfiltrated over 1 terabyte...

Cloudflare Developer Domains Abused For Cyber Attacks

Cloudflare Pages, a popular web deployment platform, is exploited by threat actors to host...

Hackers Exploit Docker Remote API Servers To Inject Gafgyt Malware

Attackers are exploiting publicly exposed Docker Remote API servers to deploy Gafgyt malware by...

Weaponized Word Documents Attacking Windows Users to Deliver NetSupport & BurnsRAT

The threat actors distributed malicious JS scripts disguised as legitimate business documents, primarily in...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Deloitte UK Hacked – Brain Cipher Group Claim to Have Stolen 1 TB of Data

Brain Cipher has claimed to have breached Deloitte UK and exfiltrated over 1 terabyte...

Cloudflare Developer Domains Abused For Cyber Attacks

Cloudflare Pages, a popular web deployment platform, is exploited by threat actors to host...

Hackers Exploit Docker Remote API Servers To Inject Gafgyt Malware

Attackers are exploiting publicly exposed Docker Remote API servers to deploy Gafgyt malware by...