Page 5 - Threat Intelligence 12-13-2019
P. 5

Security News












        Ransomware attack hits major US data center provider. CyrusOne, one of the biggest data center providers in
        the US, has suffered a ransomware attack, ZDNet has learned. In an email after this article's publication, a
        CyrusOne spokesperson confirmed the incident and said they are currently working with law enforcement and
        forensics firms to investigate the attack, and help customers restore systems impacted systems. "Six of our
        managed service customers, located primarily in our New York data center, have experienced availability issues
        due to a ransomware program encrypting certain devices in their network," CyrusOne told ZDNet. "Our data
        center colocation services, including IX and IP Network Services, are not involved in this incident. Our
        investigation is on-going and we are working closely with third-party experts to address this matter," the
        company said. According to details ZDNet received in a tip, the incident took place yesterday and was caused
        by a version of the REvil (Sodinokibi) ransomware. This is the same ransomware family that hit several
        managed service providers in June, over 20 Texas local governments in early August, and 400+ US dentist
        offices in late August.

                Source: https://www.zdnet.com/article/ransomware-attack-hits-major-us-data-center-provider/



        ThreatList: 90% of SMBs Believe Nation-State Actors Are Targeting Them. While APT activity is generally
        considered to be aimed at large enterprises housing valuable intellectual property, military-industrial entities,
        dissidents and civil society, and organizations of strategic importance to governments, the vast majority of
        small- and medium-sized businesses (SMBs) are concerned that they may be on the target list. A full 93
        percent of all SMB executives in a recent survey from AppRiver believe that nation-state-backed attackers are
        attempting to use businesses like theirs to breach the country’s digital security. And, this already-high figure
        jumps to 97 percent among larger SMBs with 150–250 employees. The reasoning goes that APTs see SMBs as
        entry points into a supply chain through which they can access larger game.

                Source: https://threatpost.com/smbs-nation-state-actors-apts-targeting/150836/



        RevengeHotels: cybercrime targeting hotel front desks worldwide. RevengeHotels is a targeted cybercrime
        malware campaign against hotels, hostels, hospitality and tourism companies, mainly, but not exclusively,
        located in Brazil. We have confirmed more than 20 hotels that are victims of the group, located in eight states
        in Brazil, but also in other countries such as Argentina, Bolivia, Chile, Costa Rica, France, Italy, Mexico, Portugal,
        Spain, Thailand and Turkey. The goal of the campaign is to capture credit card data from guests and travelers
        stored in hotel systems, as well as credit card data received from popular online travel agencies (OTAs) such as
        Booking.com. The main attack vector is via email with crafted Word, Excel or PDF documents attached. Some
        of them exploit CVE-2017-0199, loading it using VBS and PowerShell scripts and then installing customized
        versions of RevengeRAT, NjRAT, NanoCoreRAT, 888 RAT and other custom malware such as ProCC in the
        victim’s machine. The group has been active since 2015, but increased its attacks in 2019.

                Source: https://securelist.com/revengehotels/95229/








                                                    www.accumepartners.com
                                                                                                                     5
   1   2   3   4   5   6   7   8   9   10