Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Lazarus Group Shifts Gears with Custom Ransomware
Newest First  |  Oldest First  |  Threaded View
jbl0
50%
50%
jbl0,
User Rank: Apprentice
7/29/2020 | 1:16:01 PM
Re: Ransomware will continue to be effective....
To expand on your thought, I believe that the wider gap is business continuity.  Having data copies offline (out of reach of the encrypting mechanism) is a critical component of BC, but you have to have the plans, people, processes and technology to manage, implement and execute recovery before your business can continue.

Some questions that come to mind that might be useful to address for when the business is disrupted:
  • Prioritize: what is most critical to work on first? 
  • Cross-train: are staff prepared to work outside of their specialty to help overloaded teams?
  • Outsource: are third-parties identified who can spin up and spin down capacity on-demand?
  • Backup suppliers: what if primary suppliers are impacted, too?
  • Referral: could a competitor / alternate source meet urgent needs of customers?
  • Off-site plan: what if buildings and/or their controls are impacted?
  • Mobilize / diversify technologies: can we support BYOD or work-from-home?
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
7/29/2020 | 10:17:08 AM
Ransomware will continue to be effective....
Ransomware will continue to be effective as long as businesses continue to not have a sufficient data backup program. Its unfortunate, but I don't see ransomware phasing out for quite some time.


Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Zero Trust doesn't have to break your budget!
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-34812
PUBLISHED: 2021-06-18
Use of hard-coded credentials vulnerability in php component in Synology Calendar before 2.4.0-0761 allows remote attackers to obtain sensitive information via unspecified vectors.
CVE-2021-34808
PUBLISHED: 2021-06-18
Server-Side Request Forgery (SSRF) vulnerability in cgi component in Synology Media Server before 1.8.3-2881 allows remote attackers to access intranet resources via unspecified vectors.
CVE-2021-34809
PUBLISHED: 2021-06-18
Improper neutralization of special elements used in a command ('Command Injection') vulnerability in task management component in Synology Download Station before 3.8.16-3566 allows remote authenticated users to execute arbitrary code via unspecified vectors.
CVE-2021-34810
PUBLISHED: 2021-06-18
Improper privilege management vulnerability in cgi component in Synology Download Station before 3.8.16-3566 allows remote authenticated users to execute arbitrary code via unspecified vectors.
CVE-2021-34811
PUBLISHED: 2021-06-18
Server-Side Request Forgery (SSRF) vulnerability in task management component in Synology Download Station before 3.8.16-3566 allows remote authenticated users to access intranet resources via unspecified vectors.