The Federal Bureau of Investigation sent a private industry notification (PIN) on Monday to partners in the US private sector about the dangers of continuing to use Windows 7 after the operating system reached its official end-of-life (EOL) earlier this year:
“The FBI has observed cyber criminals targeting computer network infrastructure after an operating system achieves end of life status,” the agency said. “Continuing to use Windows 7 within an enterprise may provide cyber criminals access in to computer systems. As time passes, Windows 7 becomes more vulnerable to exploitation due to lack of security updates and new vulnerabilities discovered. “With fewer customers able to maintain a patched Windows 7 system after its end of life, cyber criminals will continue to view Windows 7 as a soft target,” the FBI warned. The Bureau is now asking companies to look into upgrading their workstations to newer versions of the Windows operating system.
The FBI is right. With no security updates coming for this operating system from Microsoft, anyone who is still using Windows 7 is a prime target for cybercriminals. Thus if you are still using Windows 7 for whatever reason, it is in your interest to move to Windows 10 to keep yourself safe. I know that transitioning to a new OS is not a painless process. But it is the right thing to do if you want to stay safe. Microsoft has a blog post that has suggestions on how to make that transition here that can help.
Zeppelin Ransomware Advisory Issued By The FBI and CISA
Posted in Commentary with tags CISA, FBI on August 23, 2022 by itnerdThe CISA and FBI have put out an advisory on Zeppelin ransomware that is very much reading. The advisory goes into great detail about how the ransomware works and includes some threat mitigation strategies.
Dr Darren Williams, CEO and Founder of BlackFog has this comment to share:
“Zeppelin ransomware, a fairly well-known malware strain has been in known use since 2019, often to target a wide range of businesses and critical infrastructure organizations. Zeppelin actors have been known to request ransom payments in Bitcoin, with initial amounts ranging from several thousand dollars to over a million dollars.
Zeppelin’s unique attack path is such that the FBI have observed the attackers executing the malware multiple times in the network, leaving a great big sting on the victim, who needs multiple unique decryption keys to combat the attack.
Attacks on hybrid working companies are nothing new, however it is crucial that employees remember they play a part in protecting themselves and the employer, too.
Attacks from vectors such as Zeppelin often start with a simple phishing email – employers must ensure they educate and remind their employees on cyber security best practices, to minimize attack risk. Standard, good cyber hygiene practice is essential here: remembering to regularly change passwords and use MFA as a basic practice. That said, if a threat actor wants to find their way in, they will! What matters is the data they were able to obtain and leave with…
Most cybercriminal gangs aim for extortion – organizations should also consider anti-data exfiltration to block the attacker and prevent data from being exfiltrated.”
I strongly suggest that you read this advisory because if the FBI and the CSI put out an advisory on this, you need to take it seriously.
Leave a comment »