2019 Week 40 Security news summary


A couple of big ransomware events have happened this week.  2 school systems were hit with ransomware and this continues a trend that have seen over 500 schools be hit so far this year.  Depending on the reports you read this number could he over 1000!  Note that in 2018 we had around 119 educational incidents with only 11 being ransomware.  This makes schools second only to local government entities in number of attacks on government entities.
International Business Times talks about how the use of Cyber Insurance might be some of the reason for the uptick:  https://www.ibtimes.com/ransomware-hits-hundreds-us-schools-local-governments-study-2837573
KOCO in OKC talks about it from the standopoint of Guthrie being hit:  https://www.koco.com/article/guthrie-public-schools-hit-by-ransomware-attack/29215468
TechExplore also points out the trend is affecting other local government agencies:  https://techxplore.com/news/2019-10-ransomware-hundreds-schools-local.html

A ransomware attack that appears to have been targeted at healthcare entities shunts down an entire healthcare system in the US and multiple locations in Australia.  In the Alabama attack 3 hospitals were on divert only accepting emergency patients and suspending all nonessential operations.  Last week California based Wood Ranch Medial announced that it was going out of business due to its inability to recover from a ransomware attack back in August.


NSA has created a Cybersecurity Directorate to unify their cyber intelligence and defense missions.  This is part of the trend to form partnerships inside and outside of organizations to share cyber techniques and defense. 

There is still discussion about the Voting Village at Defcon 2019.  Long and short, most all the voting machines are very poor on the cyber and physical sides of the domain.  In essence, they are still (in some cases exactly) the same vulnerabilities that were there in previous years that have yet to be corrected.  This should be very alarming for agencies that are using voting machines to collect and tabulate votes.

Click2Gov was hit again and somehow I missed it last week, so I am bringing it up here.  The attacks began in August and so farm at least 8 cities have been hit.  It appears that the initial vector for the attack is a shell being uploaded to a Click2Gov web server.  This points to a continued lack of oversite on the part of CentralSquare on their systems.
Wired has information here to include the list of hit cities:  https://www.wired.com/story/hackers-hit-click2gov-bill-paying-portals/

Juniper Research says that breaches are going to increase nearly 70% over next 5 years.  Cost will raise to more than $5 trillion in 2024.  Like others, they say that the human firewall will continue to be the best defense. 

If you at all pay attention to Cyber Security best practices, the #1 thing that is said over and over is kill RDP.  It is the single best thing you can do to increase your security posture.  Here Vectra joins the bandwagon with their report.

Medical IoT devices have even more vulnerabilities according to the Cybersecurity and Infrastructure Security Agency (CISA). 

27 nations join a cybersecurity Responsible State behavior pledge. 


Legislation:
The U.S. Senate approved the “DHS Cyber Hunt and Incident Response Teams Act” that was sidelined in the last congress.  It would authorize the Department of Homeland Security to develop and fund incident response teams to help public and private organizations battle cyber threats and restore infrastructure affected by attacks.
Threatpost has an article with some quotes from industry insiders:  https://threatpost.com/senate-passes-bill-aimed-at-combating-ransomware-attacks/148779/
In the InformationSecurity article, they point out that Schumer focused on the New York state attacks.  https://www.infosecurity-magazine.com/news/senate-passes-ransomware-law/

California has a ballot initiative called the California Privacy Rights and Enforcement Act that would have the strongest state level privacy regulations.  The biggest impact this would have would be the limits on what advertising “bots” can track about you #youdontownyou.  Of course the pushback from the big tec companies is that this will force them to directly charge for information and services that are currently add support.
CNET article on the California Privacy Rights and Enforcement Act:  https://www.cnet.com/news/new-california-privacy-initiative-proposed-for-2020-ballot/

Pennsylvania is attempting to be the 2nd state to criminalize “cyber-flashing” which is, essentially, sending unsolicited “dick-pics”.  Texas passed a bill (2789) back in August that made it a Class C misdemeanor to send sexually explicit material without the recipient’s consent.
InformationSecurity interviewed the bill author:  https://www.infosecurity-magazine.com/news/pennsylvania-might-criminalize/

In June Texas passed a law to require virtually all government employees to have information security training by June of 2020.  One of the interesting things (considering my day job) was that you could get around the requirement for outside training and certification by hiring your own security office and them to create a training program. 
Since the deadline for certification is this week, Informationsecurity had an article about this:  https://www.infosecurity-magazine.com/news/texas-cybersecurity-training-for/

Comments

Popular posts from this blog

2021 Week 11 Security Roundup

2021 Weeks 32-40 Security Roundup

2021 Week 29 Security Review