Thursday, January 30, 2025
HomeRansomwareRansomware Actors Exploiting Legitimate System Tools to Gain Access - FBI

Ransomware Actors Exploiting Legitimate System Tools to Gain Access – FBI

Published on

SIEM as a Service

Follow Us on Google News

Ransomware attacks are on the rise, causing organizations to lose millions of dollars, restricting them from accessing their data, and possibly disclosing personal information.

According to the FBI Private Industry Notification, ransomware attackers have recently been taking advantage of flaws in vendor-controlled remote access to casino servers. These attackers have hurt businesses by using legal system management tools to gain more access to the network.

In response to these new activity trends, the FBI advises organizations to take action to strengthen their security posture.

The FBI keeps track of reports of third-party vendors and services being used as a point of attack for ransomware attacks. In particular, between 2022 and 2023, they also noticed ransomware attacks that affected casinos through third-party gaming vendors.

Small and tribal casinos were regularly the target of the attacks, which encrypted servers and the personally identifying information (PII) of employees and patrons.

As of June 2023, the Luna Moth, known as the Silent Ransom Group (SRG), was conducting callbackphishing data theft, and extortion attacks. 

Typically, the phishing effort would involve the victim receiving a phone number related to pending charges on their account. 

After the victims dialed the number provided, the malicious actors sent them a follow-up email with a link to join a legitimate system management tool. 

The threat actors then utilized the management tools to install other legitimate system management tools that can be reused for malicious activity. Once the network shared drives and local files were compromised, the actors stole victim data and extorted the companies.

Document
FREE Webinar

Webinar on Cyber Resilience for Financial Sector

Ensure your Cyber Resiliance with the recent wave of cyber-attacks targeting the financial services sector. Almost 60% respondents not confident to recover fully from a cyber attack.

Recommendations from the FBI

Identity and Access Management:

  • Require all accounts with password logins.
  • Phishing-resistant multifactor authentication.
  • Review domain controllers, servers, workstations, and active directories
  • Audit user accounts
  • Implement time-based access for accounts set at the admin level and higher.

Protective Controls and Architecture:

  • Segment networks to prevent the spread of ransomware.
  • Using a networking monitoring tool, locate, identify, and look at unusual behavior and possible malware traversal.
  • Install, regularly update, and enable real time detection for antivirus software.
  • Secure and closely monitor remote desktop protocol (RDP) use.

Vulnerability and Configuration Management:

  • Keep all operating systems, software, and firmware up to date.
  • Disable unused ports. 
  • Adding an email banner to emails received from outside your organization
  • Disable ports and protocols that are unused.
  • Restrict Server Message Block (SMB) Protocol within the network.

The FBI tells network defenders to take the necessary steps to lower the risk of ransomware attacks and to limit the use of common system and network discovery techniques that could be used for bad purposes.

Patch Manager Plus: Automatically Patch over 850 third-party applications quickly – Try Free Trial.

https://gbhackers.com/hackers-using-beta-testing-apps

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

Cybercriminals Exploit Public-Facing IIS, Apache, and SQL Servers to Breach Gov & Telecom Systems

A recent investigation by Unit 42 of Palo Alto Networks has uncovered a sophisticated,...