fbpx
Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Penetration Testing

          Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Russian Sandworm Hackers Only Hit Orgs With Old Centreon Software

Russian Sandworm Hackers Only Hit Orgs With Old Centreon Software

Centreon, the maker of the IT monitoring software exploited by Russian state hackers to infiltrate French companies’ networks, said today that only organizations using obsolete software were compromised.

Today’s Centreon press release comes after a report released on Monday by ANSSI, the French national cyber-security agency, describing a series of attacks that resulted in multiple French IT providers getting breached over four years.

ANSSI said that the first victim was compromised in late 2017, with the attackers continuing to target French information technology providers until 2020.

As revealed by ANSSI, all compromised servers during this series of attacks ran Centreon’s IT monitoring software. Still, the agency didn’t find the vector used to hack the victims’ servers and deploy Exaramel and PAS web shell (aka Fobushell) backdoors.

Also Read: What Is A Governance Framework? The Importance And How It Works

Not a supply-chain attack

Following ANSSI’s report, Centreon says that none of its customers were impacted by the attacks. The affected organizations used an obsolete and free version of its software released in 2014.

Centreon added that, since the outdated version was published, it has released eight more major versions.

“According to discussions over the past 24 hours with ANSSI, only about fifteen entities were the target of this campaign, and that they are all users of an obsolete open source version (v2.5.2), which has been unsupported for 5 years,” Centreon said.

“The campaign described by ANSSI exclusively concerns obsolete versions of Centreon’s open source software. Indeed, the ANSSI specifies that the most recent version concerned by this campaign is version 2.5.2, released in November 2014.

“This version is not only no longer supported for more than 5 years, but has apparently also been deployed without respect for the security of servers and networks, including connections outside the entities concerned.”

The company also added that this was not a supply-chain attack, with the Russian hackers not using its IT platform to deliver malicious code onto Centreon customers’ servers.

“The ANSSI report and our exchanges with them confirm that Centreon did not distribute or contribute to propagate malicious code,” Centreon added. “This is not a supply chain type attack and no parallel with other attacks of this type can be made in this case.”

Centreon’s customer list includes high-profile organizations such as Airbus, Air France KLM, Agence France-Presse (AFP), Euronews, Orange, Arcelor Mittal, Sephora, and several French government orgs including the French Ministry of Justice.

Also Read: Website Ownership Laws: Your Rights And What These Protect

Sandworm APT linked to the attacks

The French cyber-security agency found several similarities to previous Sandworm attacks, including the launch of intrusion campaigns before choosing victims for further compromise.

ANSSI added that the command and control servers used to control malware deployed on the French victims’ compromised machines were also known as Sandworm-controlled machines.

Sandworm (aka BlackEnergy and TeleBots) is an elite Russian-sponsored cyberespionage group active for at least two decades, with members believed to be part of Unit 74455 of the Russian GRU’s Main Center for Special Technologies (GTsST).

This group is linked to the attacks leading to the Ukrainian blackouts of 2015 and 2016 [123], the KillDisk wiper attacks targeting Ukrainian banks, and believed to have also created the NotPetya ransomware that led to billions worth of damage starting with June 2017.

The U.S. Justice Department charged six Sandworm operatives in October 2020 for hacking operations related to the NotPetya ransomware attack, the Pyeongchang Winter Olympics, and the 2017 French elections.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us