Cyber Security News

CISA Releases Advisory to Monitor Networks to Detect Malicious Cyber Actors

The National Security Agency (NSA) has partnered with the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and other entities to release a critical advisory.

This initiative comes in response to the exploitation of major global telecommunications providers by a threat actor affiliated with the People’s Republic of China (PRC).

The advisory is encapsulated in the Cybersecurity Information Sheet (CSI) titled “Enhanced Visibility and Hardening Guidance for Communications Infrastructure.”

This document offers comprehensive defensive strategies designed to enhance the monitoring of networks and reinforce device security.

Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar

It targets engineers and system administrators overseeing communications infrastructure but is also relevant to organizations managing on-premises enterprise equipment.

Dave Luber, NSA Cybersecurity Director, emphasized the importance of vigilance in cybersecurity, stating, “Vigilance is key for defending against network compromise. Always have eyes on your systems and patch and address known vulnerabilities before they become targets.”

The CSI outlines several critical measures aimed at enhancing visibility into network activities. These measures include logging all configuration changes and management connections at network perimeters and setting up alerts for unforeseen activities.

Moreover, the advisory underscores the significance of adopting robust hardening practices, such as disabling unused, unauthenticated, or unencrypted protocols, securing passwords, restricting management connections and privileged accounts, and ensuring timely patching and upgrading of devices.

According to the National Security Agency report, the guidance notably focuses on strengthening Cisco operating systems, which the PRC-affiliated threat actor specifically targeted.

The document provides detailed recommendations to mitigate these vulnerabilities, reducing the risk of malicious cyber activities.

The release of this advisory marks a proactive step towards safeguarding critical infrastructure against evolving cyber threats.

Organizations are encouraged to adopt these guidelines to bolster their defenses and protect sensitive communications networks from potential security breaches.

As cyber threats continue to grow in sophistication, such collaborative efforts are crucial in maintaining the integrity and security of global telecommunications infrastructure.

Analyse Advanced Malware & Phishing Analysis With ANY.RUN Black Friday Deals : Get up to 3 Free Licenses.

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Fake Coinbase Migration Messages Target Users to Steal Wallet Credentials

A sophisticated phishing campaign is currently targeting cryptocurrency investors with fraudulent emails claiming to be…

9 hours ago

Electromagnetic Side-Channel Analysis of Cryptographically Secured Devices

Electromagnetic (EM) side-channel analysis has emerged as a significant threat to cryptographically secured devices, particularly…

9 hours ago

MirrorGuard: Adaptive Defense Mechanism Against Jailbreak Attacks for Secure Deployments

A novel defense strategy, MirrorGuard, has been proposed to enhance the security of large language…

9 hours ago

New ClearFake Variant Uses Fake reCAPTCHA to Deploy Malicious PowerShell Code

A recent variant of the ClearFake malware framework has been identified, leveraging fake reCAPTCHA and…

9 hours ago

New BitM Attack Enables Hackers to Hijack User Sessions in Seconds

A recent threat intelligence report highlights the emergence of a sophisticated cyberattack technique known as…

13 hours ago

Hackers Exploit Hard Disk Image Files to Deploy VenomRAT

In a recent cybersecurity threat, hackers have been using virtual hard disk image files (.vhd)…

13 hours ago