fbpx
Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Penetration Testing

          Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

FBI: Telephony Denial-of-Service Attacks Can Lead To Loss Of Lives

FBI: Telephony Denial-of-Service Attacks Can Lead To Loss Of Lives

The Federal Bureau of Investigation (FBI) has warned of the harsh consequences of telephony denial-of-service (TDoS) attacks and has also provided the steps needed to mitigate their impact.

The FBI published this warning on Wednesday as an IC3 public service announcement and as a Private Industry Notification issued to private sector organizations in coordination with DHS-CISA.

Attacks on emergency services can lead to loss of lives

TDoS attacks are manual or automated malicious attempts to render telephone systems unavailable by blocking incoming and outgoing calls, which could have terrible consequences when directed at 911 or similar emergency call center operations.

“The objective is to keep the distraction calls active for as long as possible to overwhelm the victim’s telephone system, which may delay or block legitimate calls for service,” the FBI said.

“The resulting increase in time for emergency services to respond may have dire consequences, including loss of life.”

Threat actors can coordinate such attacks for a wide range of reasons including hacktivism, financial gain, or harassment.

While hacktivists can abuse them to promote their social or political convictions, malicious actors can and have launched TDoS attacks to extort government and private organizations.

Also Read: 10 Practical Benefits of Managed IT Services

They’ve also been used in the past to disrupt emergency services from answering emergency calls for legitimate requests for help.

Emergency service agencies also targeted in the past

“The IC3 has become aware of increased coercion tactics used by the subjects, which have created a threat to emergency services across the nation,” the FBI said in a public service announcement from January 2013.

“The threats have now escalated into a Telephony Denial of Service (TDoS) attacks against the victims’ employers, which some have been emergency service agencies.

“The TDoS attacks have tied up the emergency services’ telephone lines, preventing them from receiving and responding to legitimate emergency calls.”

A separate confidential alert sent to public safety answering points (PSAPs) and emergency communications centers and personnel in March 2013 said that “[i]t is speculated that government offices/emergency services are being ‘targeted’ because of the necessity of functional phone lines.”

As the FBI further added in yesterday’s warning, malicious actors provide TDoS services and tools to attackers with varying levels of experience, which drastically lowers the skill level needed to launch such attacks.

TDoS attacks are also challenging to detect, given that attackers spoof the caller ID on every call (in some cases, choosing to spoof the phone numbers of police departments).

This makes it almost impossible to differentiate between malicious and legitimate calls.

FBI’s recommendations

FBI’s list of recommendations includes measures to take before TDoS attacks, during them, and information on how to report the attacks to the authorities.

Also Read: Limiting Location Data Exposure: 8 Best Practices

The FBI also shared info on how to prepare for 911 outages:

  • Before there is an emergency, contact your local emergency services authorities for information on how to request service in the event of a 911 outage. Find out if text-to-911 is available in your area.
  • Have non-emergency contact numbers for fire, rescue, and law enforcement readily available in the event of a 911 outage.
  • Sign up for automated notifications from your locality if available to be informed of emergency situations in your area via text, phone call, or email.
  • Identify websites and follow social media for emergency responders in your area for awareness of emergency situations.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us