The FBI first identified Ranzy Locker ransomware in late 2020 when the variant began to target victims in the United States. Unknown cyber criminals using Ranzy Locker ransomware had compromised more than 30 US businesses as of July 2021. The victims include the...
Learning & Resource Center
Most Popular Posts
BlackMatter Ransomware
This advisory provides information on cyber actor tactics, techniques, and procedures (TTPs) obtained from a sample of BlackMatter ransomware analyzed in a sandbox environment as well from trusted third-party reporting. Using embedded, previously compromised...
Indicators of Compromise Associated with IcedID
FBI reporting has indicated a recent increase in IcedID malware acting as a “dropper,” infecting victims with additional malware. Examples of ransomware variants dropped by IcedID include Defray777, GlobeImposter, Cuba, Conti, and REvil (aka Sodinokibi). First...
Increase in PYSA Ransomware Targeting Education Institutions
FBI reporting has indicated a recent increase in PYSA ransomware targeting education institutions in 12 US states and the United Kingdom. PYSA, also known as Mespinoza, is a malware capable of exfiltrating data and encrypting users’ critical files and data stored on...
Microsoft IOC Detection Tool for Exchange Server vulnerabilities
Microsoft has released the EOMT.ps1 tool that can automate portions of both the detection and patching process and help your organization check for indicators of compromise (IOCs) by running the Microsoft IOC Detection Tool for Exchange Server Vulnerabilities. In...
APT ACTORS EXPLOITING NEWLY IDENTIFIED CVE-2021-40539 IN MANAGEENGINE ADSELFSERVICE PLUS
This joint advisory is the result of analytic efforts between the Federal Bureau of Investigation (FBI), United States Coast Guard Cyber Command (CGCYBER), and the Cybersecurity and Infrastructure Security Agency (CISA) to highlight the cyber threat associated with...
Malware Analysis – AppleJeus: Dorusio
This Malware Analysis Report (MAR) is the result of analytic efforts among the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Treasury (Treasury) to highlight the cyber threat to cryptocurrency...
Malware Analysis – AppleJeus: Kupay Wallet
This Malware Analysis Report (MAR) is the result of analytic efforts among the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Treasury (Treasury) to highlight the cyber threat to cryptocurrency...
Advisories
AppleJeus: Analysis of North Korea’s Cryptocurrency Malware
Summary This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. This joint advisory is the result of analytic efforts among...
Research & Situational Awareness
Karakurt Data Extortion Group
The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Department of the Treasury (Treasury), and the Financial Crimes Enforcement Network (FinCEN) are releasing this joint Cybersecurity Advisory (CSA) to provide...
CVE-2022-30190 aka Follina
Move over log4j, there is a new 0-day vulnerability being exploited in the wild. The first sample that exploits the vulnerability appeared on VirusTotal on April 12th, 2022. Successful exploitation allows an attacker to run arbitrary code with the privileges of the...
AppleJeus: Analysis of North Korea’s Cryptocurrency Malware
Summary This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. This joint advisory is the result of analytic efforts among...
Company News
Fortify 24×7 Named on CRN’s 2022 MSP 500 List
PORINT ROBERTS, WA., Feb. 15, 2022 /PRNewswire/ -- Fortify 24x7 announced today that CRN®, a brand of The Channel Company, has named them to its Managed Service Provider (MSP) 500 list, in the Pioneer 250 category for 2022. CRN's annual MSP 500 list identifies the...
Fortify 24×7 Named To MSSP Top 250 MSSPs List For 2020
Fourth-Annual List Honors Leading MSSP, MDR, and SOCaaS Cybersecurity Companies Worldwide September 28, 2020, Point Roberts, WA: MSSP Alert, published by After Nines Inc., has named Fortify 24x7 to the Top 250 MSSPs list for 2020 (https://www.msspalert.com/top250)....
Fortify 24×7 Named To ChannelE2E Top 100 Vertical Market MSPs
May 5, 2020, Point Roberts, WA: Fortify 24x7 has been named to After Nines Inc.’s ChannelE2E Top 100 Vertical Market MSPs list and research (https://www.channelE2E.com/top100) for 2020. The annual list and research identify and honor the top 100 managed services...
Scott Schiefelbein, Managing Director and expert in law and tax joins the Enterprise Blockchain Club next Monday, January 9th at 6PM Pacific time. Olympic Mills, 7th floor. Zoom for remote attendees!
http://bit.ly/3QkfBZT

Happy Pi day! Swipe for two jokes since I irrationally couldn’t pick just one. #piday #pi #pi #irrationalnumbers #piday2020

It’s that time of year of again. Everyone is traveling, waits are longer and stress is higher. From Boarding passes to our entertainment, it is all stored on our devices. Having a charge can be crucial but is public USB charging still safe?
.
“Juice-Jacking” from USB charging stations are the latest warning threat. The LA district attorney advisory states, “…they may infect the phones and other electronic devices of unsuspecting users,” it reads. “The malware may lock the device or export data and passwords directly to the scammer.”
.
Here’s the thing though, no one really knows of any known cases on the books except maybe, possibly on the east coast. So why the advisory? The spokesperson said it was part of “an ongoing fraud education campaign.” They go on to say they have seen proof-of-concepts but nothing active. It’s not a crazy concept though. Plug your phone in, boom infection and all your information stolen. .
There will always be new threats so what do you do? Carry your own charging cords. Don’t borrow from a stranger. (hackers can rig a cord). Use an AC power outlet not a USB charging station or have a portable charger. Have 2 Factor Authentication. As we always advise, your devices should be protected with the right software. Reach out to the link our bio to help find the right one for you.
.
#cybersecuritymanaged #fortify24x7 #newtechnology #smarttechnology #techie #fasttechnology #technologynews #technologystats #juicejacking #hacking #holidaytravel #cybersecuritynews #cybersecurity #ai #artificialintelligence #BeCyberSmart #CyberAware

We’re listing some tech apps for your vet.
1. The World War Two Memorial App is on iTunes & Google Play. It helps you explore the World War II Memorial, sharing war stories as part of a virtual tour and offering a database to pull information up on those killed in combat.
2. The Honor Wall website by ancestry.com documents letters home, photos and awards of veterans.
3. Militarybenefits.info lists discounts, sales and everything free for vets and their families, ranging from free dinners to haircuts and oil changes. They`ve even posted a meal guide of deals for not only veterans, but also active duty and retired military.
4. ANC Explorer app is the official app for Arlington National Cemetery. Rich in information you can locate a gravesite, generate pictures of monuments or markers, and self guided tours, along with more.
#cybersecuritymanaged #fortify24x7 #newtechnology #smarttechnology #techie #fasttechnology #technologynews #techforyourvet #vet #happyveteransday #military #vettech #vettechlife #veteransupport
