Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label Cyber Awareness. Show all posts

Building Cyber Resilience in Manufacturing: Key Strategies for Success

 

In today's digital landscape, manufacturers face increasing cyber threats that can disrupt operations and compromise sensitive data. Building a culture of cyber resilience is essential to safeguard against these risks. Here are three key strategies manufacturers can implement to enhance their cyber resilience. 

First, manufacturers must prioritize cybersecurity training and awareness across all levels of their organization. Employees should be educated about the latest cyber threats, phishing scams, and best practices for data protection. Regular training sessions, workshops, and simulations can help reinforce the importance of cybersecurity and ensure that all staff members are equipped to recognize and respond to potential threats. By fostering a knowledgeable workforce, manufacturers can significantly reduce the likelihood of successful cyberattacks. Training should be continuous and evolving to keep pace with the rapidly changing cyber threat landscape. Manufacturers can incorporate real-world scenarios and case studies into their training programs to provide employees with practical experience in identifying and mitigating threats. 

Second, adopting robust security measures is crucial for building cyber resilience. Manufacturers should implement multi-layered security protocols, including firewalls, intrusion detection systems, and encryption technologies. Regularly updating software and hardware, conducting vulnerability assessments, and implementing strong access controls can further protect against cyber threats. Additionally, integrating advanced threat detection and response solutions can help identify and mitigate risks in real-time, ensuring a proactive approach to cybersecurity. It is also vital to develop and maintain a comprehensive incident response plan that outlines specific steps to be taken in the event of a cyberattack. 
This plan should include roles and responsibilities, communication protocols, and procedures for containing and mitigating damage. Regular drills and simulations should be conducted to ensure that the incident response plan is effective and that employees are familiar with their roles during an actual event.  

Third, creating a collaborative security culture involves encouraging open communication and cooperation among all departments within the organization. Manufacturers should establish clear protocols for reporting and responding to security incidents, ensuring that employees feel comfortable sharing information about potential threats without fear of reprisal. By promoting a team-oriented approach to cybersecurity, manufacturers can leverage the collective expertise of their workforce to identify vulnerabilities and develop effective mitigation strategies. Fostering collaboration also means engaging with external partners, industry groups, and government agencies to share threat intelligence and best practices. 

By participating in these networks, manufacturers can stay informed about emerging threats and leverage collective knowledge to enhance their security posture. Moreover, manufacturers should invest in the latest cybersecurity technologies to protect their systems. This includes implementing AI-powered threat detection systems that can identify and respond to anomalies more quickly than traditional methods. Manufacturers should also consider employing cybersecurity experts or consulting firms to audit their systems regularly and provide recommendations for improvement. 

Finally, fostering a culture of cyber resilience involves leadership commitment from the top down. Executives and managers must prioritize cybersecurity and allocate sufficient resources to protect the organization. This includes not only financial investment but also dedicating time and effort to understand cybersecurity challenges and support initiatives aimed at strengthening defenses.

Security Lapse at First American Exposes Data of 44,000 Clients

 


It has been reported that First American Financial Corporation, one of the largest title insurance companies in the United States, was compromised in December when its computer systems were taken down due to a cyberattack that compromised the information of almost 44,000 individuals. Since its founding in 1889, this organization has provided financial and settlement services to real estate professionals, buyers, and sellers involved in purchasing and selling residential and commercial properties. According to the company's report, it generated $6 billion in revenue last year, resulting in over 21,000 employees. 

First American Financial Services announced on December 21 that it had taken some of its systems offline today to contain the impact of a cyberattack, as the financial services company provided little information as to the nature of the attack in a statement provided in the statement. 

First American announced the following day that they had taken their email systems offline as well and that First American Title and FirstAm.com subsidiaries had also been affected by the same. Almost a week later, on January 8, 2024, the financial services firm announced that it was starting to restore some of its systems, but the full restoration of the company's systems was not announced until a week later. 

In December, First American informed the Securities and Exchange Commission (SEC) that the company had suffered a data breach resulting from a computer incident, as well as that certain non-production systems had been encrypted as a result of the data breach. As of May 28, an updated form filed by the company indicates that their investigation into the incident has been completed. A company update reads: "After reviewing our investigation and findings, we have determined that as a result of the incident, we may have been able to access the personally identifiable information of nearly 44,000 individuals without their permission," the statement reads. 

According to the title insurance provider, “the Company will provide appropriate notification to potentially affected individuals and offer those individuals credit monitoring and identity protection services at no charge to them.” Five months later, on May 28, the company announced it would not be providing credit monitoring and identity protection services to potentially affected individuals at no cost to them. 

The US Securities and Exchange Commission (SEC) has confirmed that the attackers gained access to some of its systems and were able to access sensitive information collected by the organization after an investigation into the incident was conducted. A full report of the incident has been prepared. In the meantime, the investigation has been completed and the incident has been resolved by the company. First American has concluded that as a result of our investigation and findings, personal information regarding about 44,000 individuals may have been accessed without authorization," the company stated. 

There will be no costs for affected individuals to use credit monitoring and identity protection services if proper notification is provided to them. The company will provide appropriate notifications to potentially affected individuals. First American Insurance Company, which is considered the second-largest title insurance company in the nation, collects personal and financial information of hundreds of thousands of individuals each year through title-related documents and then stores it in its EaglePro application, which was developed in-house, according to DFS of New York. 

There was a security vulnerability that was discovered by First American senior management in May 2019 that allowed anyone who had access to EaglePro's link to access the application without requiring any authentication to access not just their documents, but those of individuals involved in unrelated transactions as well." Similarly, Fidelity National Financial, a title insurance provider in the United States, was also the target of a "cybersecurity issue" in November of last year. Various levels of disruption to the company's business operations meant that some of its systems were also taken offline to contain the attack, as a result of which some operations were disrupted. An SEC filing made in January confirmed that the attackers had stolen the data of approximately 1.3 million customers using malware that did not self-propagate and that did not spread through network resources.

In an Attack on WebDetective's Servers, Hackers Deleted Victim Data

 


There has been an attack on the makers of a tool that is widely used to track mobile devices, which destroyed all the data that was gathered on the victims and exposed those who were paying for the spyware to buy access to the information.  

According to a recent report on TechCrunch, there are more than 76,000 Android devices, mostly in Brazil, which are compromised by Portuguese language software called WebDetective, a software spy. However white hat hackers claim that they have removed all user data and information from the servers, which could be helpful to thousands of people around the world. 

The report indicates that Web Detective conducted a vulnerability discovery and exploiting effort anonymously in order to exploit vulnerable servers. It has been reported that hackers accessed user databases and downloaded records from the company's software spy by hacking into the web panel of the software spy.

It was discovered and exploited that there were security vulnerabilities in the software by unidentified hackers. The compromise of WebDetective's servers also allowed them to gain access to the clients' databases by hacking into WebDetective's servers. There is also an allegation that the hackers were able to disconnect the connection to the devices of the victims and block the new data from being downloaded from those devices. 

It was reported that the hacking of the panel resulted in the hackers also getting access to the victim's devices through the panel, which allowed them to cut off the connection between their devices and WebDetetive's servers. It was stated by the hackers that the devices would not be able to send new data to WebDetective due to this denial of service attack. 

In recent times, WebDetetive has been hacked more times than other spyware products, including FusionScan. There was a hacking attempt in June 2023 against a Polish phone tracking app LetMeSpy, which resulted in the exposed data on the victims' devices being deleted from the spyware maker's servers. 

An application called WebDetective can provide a variety of services that can be installed without the consent of their owner. Using this software, the content of the user's phone is uploaded invisibly to a server to have access to its contents, including messages, call logs, call records, photos, etc. This is the second spyware attack by hackers within the last few months that has been used to destroy data. LetMeSpy spy app previously became inoperable after it was hacked, resulting in a suspension of service. 

A non-profit organization called DDoSecrets gathered WebDetetive's data and made it available for analysis by submitting it to researchers. According to the information released by WebDetetive, at the time when the leak occurred, 76,794 devices had been compromised by WebDetetive. 

Recently there has been an increase in the number of Android owners in South America, mainly Brazil, that have been victimized by spyware. It should be noted that although this is so, WebDetective is not equipped to analyze customers, as the signup process for WebDetective does not automatically verify an email address from the customer.

There is not much information available about WebDetetive, other than its surveillance capabilities. A significant part of the reputational and legal risks associated with spyware makers is the fact that they normally conceal or obfuscate their real-world identities. 

As it turns out, WebDetetive came from OwnSpy, another popular phone spy app that has roots that can be traced back to OwnSpy. The analysis of network traffic revealed that the WebDetetive app was basically a repackaged version of the OwnSpy spyware, and it was still referred to as OwnSpy in WebDetetive's user agent, and the app was the same thing. 

While it was possible to steal the files of the victims and post them online, instead the group was able to delete them from the spyware's network. In this way, the devices were rendered useless. The infected devices couldn't transmit new data to the spyware's server as it had stopped sending new data to it. According to the group, it executed the attack "because we could." They also created a separate database, which shared information with DDoSecrets, to keep track of the people who used WebDetective's services, as well as the IP addresses of the users. 

The shoddy coding and numerous vulnerabilities associated with these apps are what make them known as "stalkerware" and "spouseware" as well as their many other names. It has been reported that dozens of spyware apps have been found to have security vulnerabilities, putting the data of victims' phones at risk in recent years.

It is becoming increasingly common for antivirus producers to include stalker ware in the list of apps their products detect on computers and phones; victim support groups assist people in determining if their devices are infected and how they can remove the malicious software from their devices; app stores are banning stalker ware and pulling their advertising from the site, and law enforcement is investigating silverware makers and their customers and arresting them. 

It appears that TechCrunch, a technology news site, has launched a free spyware lookup tool that will make it easier for people to detect a family of stalkerware apps that have been investigated by Zack Whittaker. With the help of this tool, users can find out if their Android device has been compromised on a leaked list of compromised devices that has been compiled by TechCrunch. To monitor private messages, voicemails, internet browsing, passwords, and location data, these apps can be secretly installed onto devices or laptops, allowing perpetrators to access these in real time without users knowing or consenting. 

For the tool to be able to match the identification numbers of the device suspected to be infected, users must use devices other than the device that might be infected—the IMEI or unique advertising ID number of the device they suspect is infected. These numbers will be compared to a list of devices that have been compromised by this family of stalkerware apps that have been leaked. There are hundreds of thousands of Android devices on the list, all of which have been infected with one or more of the nine spyware apps the company has developed before April. 

Users will be able to tell whether their device identification numbers match or are likely to match those on the TechCrunch list, if they do not match those numbers, and why they do not match them. Upon suspecting the phone to be infected with stalkerware, users can check the device for signs of lurking stalkerware applications. A guide provided by TechCrunch explains how to find proof of your phone being compromised promptly. 

A guide has also been made available by Cornell Tech's Clinic to End Tech Abuse (CETA), part of its website. The stalkerware apps discovered on your device can easily be removed from your device once they have been found.

As stalkerware is always evolving and changing, survivors of domestic abuse and those who are concerned about stalkerware face a shifting threat landscape when it comes to stalkerware, which can be very frightening. This new research from TechCrunch, as well as the newly launched tool that they have developed, may help many Android users gain peace of mind regarding their security. 

The more researchers monitor the stalkerware ecosystem, the more difficult it will be to spy on Android devices on an impermissible basis and the more expensive it will be to spy on them.