• Latest
  • Trending
  • All
  • News
Canadian Cybersecurity Agency and FBI Warn of Surge in ‘Truebot’ Cyberattacks

Canadian Cybersecurity Agency and FBI Warn of Surge in ‘Truebot’ Cyberattacks

August 6, 2023
Preparing for Quantum-Powered Attacks: A Guide for Businesses

Preparing for Quantum-Powered Attacks: A Guide for Businesses

October 2, 2023
The Impending Threat of 'Steal Now, Crack Later' Quantum Computing

The Impending Threat of ‘Steal Now, Crack Later’ Quantum Computing

September 25, 2023
The Dominance of Email as the Primary Attack Vector

The Dominance of Email as the Primary Attack Vector

September 18, 2023
Devastating Ransomware Attack Paralyzes Danish Cloud Provider

Devastating Ransomware Attack Paralyzes Danish Cloud Provider

September 11, 2023
The Future Landscape of Ransomware Business Models: Examining Realistic Scenarios and Emerging Threats

The Future Landscape of Ransomware Business Models: Examining Realistic Scenarios and Emerging Threats

September 4, 2023
Understanding the GoAnywhere Data Breach and its Implications

Understanding the GoAnywhere Data Breach and its Implications

August 24, 2023
Safeguarding Your Identity: A Comprehensive Guide to Detecting Identity Theft

Safeguarding Your Identity: A Comprehensive Guide to Detecting Identity Theft

August 23, 2023
Identity Theft: Steps to Take in Case of a Breach

Identity Theft: Steps to Take in Case of a Breach

August 22, 2023
Enhancing Organizational Security Posture through Encryption: Key Tips

Enhancing Organizational Security Posture through Encryption: Key Tips

August 22, 2023

Understanding the Potential Threat of ‘Steal Now, Crack Later’ Attacks in Quantum Computing

August 21, 2023
Business Email Compromise Attack: A Costly Threat That Surpasses Ransomware Losses

Business Email Compromise Attack: A Costly Threat That Surpasses Ransomware Losses

August 21, 2023
The Challenges of Patching Vulnerabilities and the Importance of Prioritization

The Challenges of Patching Vulnerabilities and the Importance of Prioritization

August 20, 2023
  • About
  • Advertise
  • Privacy & Policy
  • Contact
26 °c
Ashburn
28 ° Thu
26 ° Fri
24 ° Sat
24 ° Sun
24 ° Mon
24 ° Tue
REPORT NEW Vulnerability
Tuesday, October 3, 2023
No Result
View All Result
  • Login
  • Register
Innocent Michael
  • Home
  • Solutions
  • Our Lab
    • Threat Scanner
    • Virus
    • Malware
    • Spyware
  • News
  • Products
    • Domains – Search, Register & Transfer
      • Overview
      • Register Domain
      • Transfer domain
      • Domain Renewal
      • My Domains
    • AntiVirus Protection Plan
    • Website Design Assist
    • Professional Streaming Studio
    • Legal Office Management Tool
    • Auto Attendant – Virtual Business Phone Numbers & Phone System
  • Businesses
  • Information
  • Company
  • Legal
Innocent Michael
No Result
View All Result
Home Uncategorized

Canadian Cybersecurity Agency and FBI Warn of Surge in ‘Truebot’ Cyberattacks

Cyber Intelligence by Cyber Intelligence
2 months ago
in Uncategorized
245 8
A A
0
Canadian Cybersecurity Agency and FBI Warn of Surge in ‘Truebot’ Cyberattacks
491
SHARES
1.4k
VIEWS
Share on FacebookShare on Twitter

The Canadian Centre for Cyber Security, in collaboration with the FBI and other American agencies, has sounded the alarm over a spike in cyberattacks using the “Truebot” malware.

As of a July 6 report, the primary targets of the hackers are corporate networks in Canada and the U.S. They exploit a loophole in security software to access and pilfer sensitive information, aiming for financial benefits. Over 7,000 establishments, spanning the insurance, healthcare, legal, and financial industries, depend on the compromised software, known as Netwrix Auditor.

Related articles

Nvidia Unveils Next-Generation AI Chip to Enable Trillion-Parameter LLMs

Nvidia Unveils Next-Generation AI Chip to Enable Trillion-Parameter LLMs

2 months ago
1.4k
Discovering the Many Dimensions of Spirituality

The Diversity of Spirituality and Uncovering Your Spiritual Gifts

2 months ago
1.4k

Anil Somayaji, an academic in computer science at Carleton University in Ottawa, highlighted that a compromised security program, given its elevated access level, implies victory for the attackers. Such security breaches are especially harmful when they occur in systems where the protection of data is paramount.

Netwrix, based in Texas, is actively encouraging its client base to update their software and sever any internet connections to systems that have it installed. Gerrit Lansing, Netwrix’s top security officer, clarified the potential danger by stating that this vulnerability, if exploited, could permit hackers to launch enumeration attacks and try privilege escalations – both foundational steps in any cyberattack.

The software, Netwrix Auditor, is promoted as a tool that bolsters IT security, ensuring compliance and optimizing team productivity. But the very mechanics of the malware, being a remote code execution, could provide attackers full access to entire systems, thus endangering the kind of crucial data that Netwrix Auditor is meant to safeguard.

Emphasizing the gravity of the situation, Somayaji noted that once these systems are compromised, the attackers essentially hold the reins, giving them the power to encrypt all data, thereby holding it for ransom.

Key stakeholders including the Communications Security Establishment (CSE) of Canada, the FBI, the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) of the U.S., have jointly warned of this emergent cyber threat.

First detected in 2017, preliminary investigations by private security researchers hint at the Russian-speaking Silence Group’s involvement in the Truebot malware. This group has allegedly aimed its cyberattacks at financial bodies in ex-Soviet nations and beyond. However, a representative from the CSE stated they could not confirm these claims.

A significant shift in the malware’s mode of infiltration was observed. Earlier versions preyed on gullible users via phishing emails. Presently, the attackers exploit a particular vulnerability in the Netwrix Auditor software, eliminating the need for human error.

To combat this, the CSE is advising IT personnel to familiarize themselves with its technical alert and cybersecurity advisory.

Concluding, Somayaji noted that vulnerabilities in security products aren’t new. Various actors, ranging from individuals with personal vendettas to intelligence organizations, could be the culprits.

Share196Tweet123
Cyber Intelligence

Cyber Intelligence

Subscribe
Connect with
Login
I allow to create an account
When you login first time using a Social Login button, we collect your account public profile information shared by Social Login provider, based on your privacy settings. We also get your email address to automatically create an account for you in our website. Once your account is created, you'll be logged-in to this account.
DisagreeAgree
Notify of
guest
I allow to create an account
When you login first time using a Social Login button, we collect your account public profile information shared by Social Login provider, based on your privacy settings. We also get your email address to automatically create an account for you in our website. Once your account is created, you'll be logged-in to this account.
DisagreeAgree
guest
0 Comments
Inline Feedbacks
View all comments
Innocent Michael

Copyright © 2023 Inncent Michael.

Navigate Site

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Follow Us

No Result
View All Result
  • Home
  • Solutions
  • Our Lab
    • Threat Scanner
    • Virus
    • Malware
    • Spyware
  • News
  • Products
    • Domains – Search, Register & Transfer
      • Overview
      • Register Domain
      • Transfer domain
      • Domain Renewal
      • My Domains
    • AntiVirus Protection Plan
    • Website Design Assist
    • Professional Streaming Studio
    • Legal Office Management Tool
    • Auto Attendant – Virtual Business Phone Numbers & Phone System
  • Businesses
  • Information
  • Company
  • Legal
  • Login
  • Sign Up
REPORT NEW Vulnerability

Welcome Back!

Sign In with Google
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
OR

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply
Update Contents