fbpx
Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Penetration Testing

          Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

U.S. Warns Of Increased Cyberattacks Against K-12 Distance Learning

U.S. Warns Of Increased Cyberattacks Against K-12 Distance Learning

K-12 educational institutions in the U.S. are being targeted by malicious actors for extortion, data theft, and general disruption of normal activity. The trend will continue through the 2020/2021 academic year.

The alert comes from the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) based on reports from K-12 institutions incurring cyberattacks.

Ransomware attacks

In a joint advisory today, the three government agencies are warning that ransomware, malware delivery, and DDoS attacks are the main threats for K-12 educational institutions.

Ransomware attacks in the education sector have increased at the beginning of the school year, with cybercriminals stealing data and threatening to leak it unless the ransom was paid (just like in the case of targets in the business and industry sector).

Also Read: The 5 Benefits Of Outsourcing Data Protection Officer Service

“In August and September, 57% of ransomware incidents reported to the MS-ISAC involved K-12 schools, compared to 28% of all reported ransomware incidents from January through July”

– FBI, CISA, MS-ISAC joint advisory

Based on data aggregated from both open-source and third-party incident reports, the most prevalent ransomware families affecting K-12 institutions between January and September were Ryuk, Maze, Nefilim, AKO, and REvil.

Opportunistic attacks

Non-targeted attacks against this sector delivered multiple malware strains, the most common ones being Shalyer, ZeuS, Agent Tesla, NanoCore, and cryptocurrency miners.

malware in attacks against K-12

Shlayer malware for macOS that continues to evolve. Recently, its authors came up with a trick that bypasses Apple’s scanning for malicious code and code-signing issues in software running on macOS 10.15 (Catalina) and above.

Last year, Kaspersky security solutions for Mac detected Shlayer on 1 in 10 systems and this malware strain accounted for 30% of all detections on Apple computers.

ZeuS is a long-standing trojan (first detected in 2007) that has turned into an information stealer (banking/financial information, credentials).

Agent Tesla and NanoCore, are off-the-shelf information stealer and remote access tool, both a common tool in business email compromise (BEC) fraud.

Coinminers, while not malicious, can slow down systems and drive up energy due to increased power required by the mining activity.

Activity disruptions

The alert from the FBI, CISA, and MS-ISAC also warns of DDoS incidents causing disruptions of normal operations in the K-12 sector.

This echoes a report from Check Point in mid-September about a surge of these attacks against education and academic institutions.

The three U.S. agencies say that the reason behind the increased incidence of these attacks is the availability of DDoS-for-hire services that enable “any motivated malicious cyber actor conduct disruptive attacks regardless of experience level.”

Activity disruptions were also caused by uninvited users attending video classroom sessions to verbally harass students and teachers, display unsuited material (violent, pornographic content), and doxing participants.

This was possible by accessing meetings from links exposed to the public or to outside users, or by tricking hosts into accepting their participation by using student names.

Also Read: Key PDPA Amendments 2019/2020 You Should Know

Other risks and mitigations

The FBI, CISA, and MS-ISAC also highlight risks related to social engineering carried through phishing, domain typosquatting, against students, parents, faculty, IT personnel, or other people involved in distance learning.

Cybercriminals could use these attacks to obtain personally identifiable information, passwords, to lure users to malicious websites, or deliver malware.

Defending against most attacks requires little effort. In most cases, applying software updates promptly, correcting misconfiguration, using strong, unique passwords, enabling multi-factor authentication, and disabling ports that are not needed should keep most cybercriminals at bay.

The government alert provides a comprehensive set of actions that K-12 educational institutions should take, along with Snort signatures that CISA created to detect and protect against attacks with observed malware; the rules should complement other defense methods.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us