Cyber Risk Governance Insights | November 11, 2024
WEEK IN HEADLINES
NATIONAL SECURITY - Ministry of National Security Breached, Exposing Sensitive Data
Radwan Cyber Pal, an anti-Israel hacker group that operates anonymously, communicates largely in Arabic, and aligns with pro-Palestinian groups, claimed responsibility for a cyberattack on Israel’s Ministry of National Security. The breach exposed the personal data of over 5,000 Israeli settlers and soldiers, along with classified documents. The incident raises significant concerns about the security measures within the Ministry.
INSIGHT: Two comments here.? First, it shows that alignment of opposing political positions can be a threat to nations, it doesn't have to be nation-state v nation-state.? The second is that specifically for government agencies (at all levels) and critical infrastructure, Zero Trust is key.? That does not mean that is of little value to your organization - it places you on a higher level of cognizance of your cyber posture and can be a great investment for your customer base.
FINANCIAL SERVICES - Customers Warned After Credit Card Merchant Breached
A data breach at an unnamed US merchant compromised Mastercard account numbers and financial data between August 2023 and May 2024. Eagle Bank alerted customers to monitor their statements for unauthorized transactions. The breach did not affect Eagle Bank’s internal security, but banks are urging customers to monitor their statements closely and are reissuing debit cards.
INSIGHT: While details are still limited, these types of incidents are best prevented with data-at-rest encryption, as most financial services use Point-to-Point Encryption (P2PE) for data in transit.? As we suggested in another account, API Security Gateway might have been a more comprehensive security layer for this merchant.
SOFTWARE - User Trust Compromised by Fraudulent Invoices
Hackers exploited a vulnerability in DocuSign’s API to send fake invoices, deceiving recipients into making payments to fraudulent accounts. The attack leveraged legitimate DocuSign accounts, bypassing traditional detection methods. This incident underscores the need for enhanced security measures in digital signature services
INSIGHT: API Security Gateway monitors and controls API traffic, processing only legitimate requests. It can detect and block suspicious activities, such as unauthorized access attempts or abnormal usage patterns. In this case, API Security Gateway validates IDs for accessing data. If DocuSign had deployed API SG, it would have spotted the hackers’ behavior and blocked them faster than you can say “fraudulent invoice.” Simple, effective, and no more surprise bills!
GOVERNMENT - City Network Breached in Ransomware Attack
The City of Sheboygan, Wisconsin, is responding to a cyberattack involving unauthorized network access and a ransom demand. Officials detected the breach on November 7, promptly isolating the network and engaging cybersecurity experts and law enforcement. While the full scope of the incident is under investigation, city services remain accessible. Officials assert that no evidence of compromised personal information has been found but commit to notifying affected individuals if such evidence emerges. The city is cooperating with law enforcement regarding the ransom demand and emphasizes its commitment to transparency and public trust (which has been damaged).
INSIGHT: Hopefully, the city leaders in Sheboygan learned lessons from those in Columbus, OH. Transparency would be a good place to start, then accept responsibility for not having protected the data of your citizens, and for those in other cities, find the budget to secure your data so you don't have to deal with same fallout & repercussions
MALWARE - New Malware Evades Detection with Rare Programming Language
The Pronsis Loader malware, utilizing the rare JPHP programming language, has been identified by Trustwave SpiderLabs. This malware evades traditional detection methods by employing advanced obfuscation and encryption techniques. It installs silently, mimicking legitimate processes, and can deploy various payloads, including ransomware and spyware.
INSIGHT: Behavioral analytic systems keep an eye on what programs are doing, rather than just looking for known threats. This means they can spot suspicious activities of users and devices, like weird file changes or unauthorized access, no matter what programming language is used. In the case of Pronsis Loader, a U&DBA system would have noticed the abnormal behavior during installation and operation, stopping the malware before doing any damage.
HEALTHCARE - 2 Doctors’ Offices Leak Patient Medical History, But Hey, Free Credit Monitoring!
South West Family Medicine Associates in Texas and Sango Family Dentistry in Tennessee reported data breaches in August 2024. The breaches exposed sensitive patient information, including Social Security numbers, medical histories, and health insurance details. Both organizations have notified affected individuals and are offering credit monitoring services.
INSIGHT: If these clinics had bothered with Multi-Factor Authentication, the cyber thieves would have been left fumbling outside of their networks, unable to waltz in and grab all the patient info. It’s not rocket science, folks—just an extra step to keep your secret and private data safe.?
INSIGHTS & EXPERT PERSPECTIVES
Cyber Risk Governance Live: From Alert Overload to 90% Faster Response
A Security Automation Success Story?
Join Stanley Li and Sean Mahoney from Netswitch Technology Management alongside Tim MalcomVetter from ?Wirespeed for an exclusive deep-dive into one security team’s transformative journey.?
Discover how they eliminated alert fatigue, improved response times by 90% and saved $655K over three years.?
Event Highlights:
Who Should Attend:?
??? Event Details:?
November 26, 2024?@ 10am Pacific / 1pm Eastern?
45 minutes: Live Technical Session
REPORT: Rising Cyber Threats Target Elderly and Youth
The Ministry of Information Communication Technologies (ICT) in Antigua and Barbuda has issued a warning about the increasing frequency of cyberattacks, particularly targeting the elderly and youth. The findings of the ICT Ministry are consistent with trends observed globally. Cybersecurity threats targeting the elderly and youth. Many nations report similar vulnerabilities among these demographics due to factors like varying levels of digital literacy and susceptibility to social engineering tactics.
Recent incidents involving WhatsApp groups highlight the sophisticated social engineering tactics employed by hackers. The Ministry emphasizes the importance of public awareness and proactive measures to safeguard personal information.
Highlights:
INSIGHT: The elderly face significant challenges with technology. As online tools and services become more integrated into our lives, older adults often struggle to keep informed due to several factors:
If your organization serves the elderly, you can help protect them by:
While we often recommend MFA, it is a bit confusing for some elderly which would then lock them out of their accounts.? As a company that serves the elderly, you need targeted cybersecurity education and protective measures to protect the most vulnerable, but also all age groups.
Netswitch Sharpen Your Cyber Edge with Netswitch
Master Compliance & Minimize Risks:
Deepen Your Knowledge:
Don't wait.
Contact Netswitch Technology Management today to take control of your cyber risk.
Disclaimer: The information and links provided in this newsletter are for informational purposes only. Netswitch does not warrant the accuracy or completeness of such information and is not liable for any damages arising from its use.
Entrepreneurial Leader & Cybersecurity Strategist
1 周Great breakdown of the latest headlines! The Radwan Cyber Pal attack on Israel’s Ministry of National Security is a stark reminder that cyber threats aren’t just limited to nation-state actors but can be amplified by political groups