Saturday, April 13, 2024

New Destructive Malware Targeting Government Agencies & Organizations

The cybersecurity researchers at Microsoft have recently reported that on the websites of some Ukrainian organizations and government agencies, hackers are constantly attacking with malicious software and malware.

It has been noted that the malicious software used looks like ransomware, but without a ransom mechanism. In short, it is used by the attackers to disrupt the affected systems only, not to demand any ransom payments.

While since January 13 Microsoft has recorded similar software and malware on dozens of systems. However, till now in the group that is behind these attacks, there is no substantial overlap between the unique characteristics has been detected.

But, Microsoft has confirmed that they are still continuing their investigation and tracking each activity.  

Affected organizations

Due to these attacks and malware, several organizations were affected and here they are:-

  • Government agencies that provide critical executive branch or emergency response functions.
  • An IT firm that operates websites for clients of both the public and private sectors.
  • Websites Government agencies.

Here’ what Microsoft stated:-

“We are aware of current geopolitical developments in Ukraine and other regions. But, we have also notified each of the impacted organizations we have identified so far, partnered with other cybersecurity providers to share what we know, and notified appropriate government agencies in the United States and elsewhere.”

But, Microsoft has already alerted all the affected organizations, and strongly recommended them to execute a brief investigation of the incident. As of now, there are no accusations or speculation have been confirmed about who is behind these attacks.

Moreover, after identifying this malware Microsoft has promptly deployed all the necessary protections into the following products:-

  • Microsoft 365 Defender Endpoint Detection (EDR)
  • Anti-virus (AV) protections

While so far there no such trace has been detected or reported about the exploitation of this vulnerability in the products and services of Microsoft.

Website

Latest articles

Alert! Palo Alto RCE Zero-day Vulnerability Actively Exploited in the Wild

In a recent security bulletin, Palo Alto Networks disclosed a critical vulnerability in its...

6-year-old Lighttpd Flaw Impacts Intel And Lenovo Servers

The software supply chain is filled with various challenges, such as untracked security vulnerabilities...

Hackers Employ Deepfake Technology To Impersonate as LastPass CEO

A LastPass employee recently became the target of an attempted fraud involving sophisticated audio...

Sisence Data Breach, CISA Urges To Reset Login Credentials

In response to a recent data breach at Sisense, a provider of data analytics...

DuckDuckGo Launches Privacy Pro: 3-in-1 service With VPN

DuckDuckGo has launched Privacy Pro, a new subscription service that promises to enhance user...

Cyber Attack Surge by 28%:Education Sector at High Risk

In Q1 2024, Check Point Research (CPR) witnessed a notable increase in the average...

Midnight Blizzard’s Microsoft Corporate Email Hack Threatens Federal Agencies: CISA Warns

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive concerning a...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Top 3 SME Attack Vectors

Securing the Top 3 SME Attack Vectors

Cybercriminals are laying siege to small-to-medium enterprises (SMEs) across sectors. 73% of SMEs know they were breached in 2023. The real rate could be closer to 100%.

  • Stolen credentials
  • Phishing
  • Exploitation of vulnerabilities

Related Articles