Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In June, the team discussed threat intelligence, notable vulnerabilities and trends, threat hunting, security operations center (SOC) engineering insights, and deception technologies.
The Assistant Vice President of Digital Forensics and Incident Response discussed June’s heavy threat activity, particularly ransomware and business email compromise (BEC). Though the tactics and tools may change, the team expects these two types of attacks to continue to evolve.
The Vulnerability Management Program Team Lead reviewed notable vulnerabilities from May and June. Based on 2024 numbers, he estimates that the new normal for disclosed vulnerabilities each month is 2,900, a bump up from 2023. As many as 258 of those vulnerabilities from May were high risk, and seven of those were known to be exploited in the wild on Justice AV Solutions, Google Chrome, and Microsoft products.
In June, CVE-2024-30078 impacted the Microsoft Windows Wi-Fi driver, found in every in-use version of Windows. This easy-to-exploit vulnerability is a zero-click attack that requires no authentication and no user interaction. The threat actor simply sends a specially crafted network packet to the device. Then, any user on the Wi-Fi network at the same time as the threat actor can be exploited. Users who work from public Wi-Fi networks are particularly at risk and can potentially compromise co-workers on the corporate network. This vulnerability can ultimately lead to the threat actor gaining complete control of the system, making it an important patch, though it’s unknown whether the vulnerability is currently being exploited in the wild.
The SOC Director talked about cyber activity that the team is currently monitoring on client networks.
Social engineering tactics. The SOC is seeing an increase in compromises that originate from social engineering help desk calls. The team recommends that organizations use stricter verification procedures for the help desk and any employee who can reset MFA or passwords. Also, as always, user awareness training is essential.
Ransomware is still the most prevalent malware attack, and the team expects this trend to continue for the foreseeable future.
Phishing emails, particularly shipping notification emails with a financial lure, are prevalent but not as common now as during tax season. A majority of these emails link to credential harvesting web pages, and the use of artificial intelligence services, such as ChatGPT, is making phishing emails harder to detect due to more convincing language and correct grammar. To reduce the risk of an attack, the team suggests setting inbox rules to detect any unauthorized activity and hide attacker access and offering user awareness training to employees.
The Senior Manager of SOC Engineering focused on a recent event in the news: a second ransomware demand on UnitedHealthcare. In February, the AlphV BlackCat ransomware group initially breached UnitedHealthcare, and UnitedHealthcare paid a $22 million ransom. The State Department offered a $10 million reward for individuals linked to the threat group, and shortly thereafter, the group went dark. Then, in June, RansomHub demanded a ransom from UnitedHealthcare for the same February breach.
The Senior Manager of SOC Engineering discussed speculation that RansomHub is an affiliate of AlphV and that AlphV should have shared the large ransom payment with RansomHub but didn’t. There’s not much hard evidence that this scenario occurred, but there are reasons to believe it. Both groups use the same ransomware, which was developed by AlphV, and posts on the dark web stated that AlphV sold the ransomware. Also, there’s a theory that AlphV could have installed a backdoor to give RansomHub access to the data.
Overall, the team suggests that it’s best to assume that RansomHub is an affiliate of AlphV until proven otherwise — and it’s an important consideration for an organization being threatened by a ransomware-as-a-service adversary. To minimize risk, the team recommends that organizations continue user awareness training, use MFA, and maintain visibility into all key aspects of their networks. In addition, the team asks clients to share their crown jewels, significant IP addresses, VIP lists, honeytokens, and anything distinct to the network that can give the team an edge against threat actors.
The Detection Engineer talked about basic deception technologies that clients can use as a covert measure to help protect their networks.
The Detection Engineer explained that deception technology is already being used in system environments, as antivirus and endpoint detection and response (EDR) solutions use decoy files. All EDRs that Pondurance deploys have a decoy or deception technology built into them, with the exception of Microsoft Defender. He also discussed other deception technologies that can be created or purchased including QR codes, MySQL or SQL dumps, custom.exe, Raspberry Pi, and more.
The Pondurance team will host another webinar in July to discuss new cybersecurity activity. Check back next month to read the summary.