Cyber Security Report 2021 Contents
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Distributed Attacks and the Healthcare Industry 01/14/2021
Distributed Attacks and the Healthcare Industry 01/14/2021 Report #: 202101141030 Agenda Image source: CBS News • Overview of distributed attacks • Supply chain attacks • Discussion of SolarWinds attack • Managed Service Provider attacks • Discussion of Blackbaud attack • How to think about distributed attacks • References • Questions Slides Key: Non-Technical: Managerial, strategic and high- level (general audience) Technical: Tactical / IOCs; requiring in-depth knowledge (sysadmins, IRT) 2 Overview: Distributed Attacks What is a distributed attack? Traditional attack = a single compromise impacts a single organization 3 Overview: Distributed Attacks (continued) What is a distributed attack? Distributed attack = a single compromise that impacts multiple organizations Image source: cyber.gc.ca 4 Overview: Distributed Attacks (continued) But what about DDoS (distributed denial of service) attacks? Not a distributed attack in the context of the presentation, since it only targets one organization! Image source: F5 Networks We will be discussing two types of distributed attacks in this presentation, both of which present a significant threat to healthcare: supply chain attacks and managed service provider attacks. We will be analyzing two cases: the SolarWinds attack (supply chain), as well as the Blackbaud breach (managed service provider). This presentation is based on the best information available at the time of delivery – new details will emerge. 5 Supply Chain Attacks Image source: Slidebazaar What is a supply chain? • A supply chain -
Breaking Trust: Shades of Crisis Across an Insecure Software Supply Chain #Accyber
Breaking Trust: Shades of Crisis Across an Insecure Software Supply Chain #ACcyber CYBER STATECRAFT INITIATIVE BREAKING TRUST: Shades of Crisis Across an Insecure Software Supply Chain Trey Herr, June Lee, William Loomis, and Stewart Scott Scowcroft Center for Strategy and Security The Scowcroft Center for Strategy and Security works to develop sustainable, nonpartisan strategies to address the most important security challenges facing the United States and the world. The Center honors General Brent Scowcroft’s legacy of service and embodies his ethos of nonpartisan commitment to the cause of security, support for US leadership in cooperation with allies and partners, and dedication to the mentorship of the next generation of leaders. Cyber Statecraft Initiative The Cyber Statecraft Initiative works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology. This work extends through the competition of state and non-state actors, the security of the internet and computing systems, the safety of operational technology and physical systems, and the communities of cyberspace. The Initiative convenes a diverse network of passionate and knowledgeable contributors, bridging the gap among technical, policy, and user communities. CYBER STATECRAFT INITIATIVE BREAKING TRUST: Shades of Crisis Across an Insecure Software Supply Chain Trey Herr, June Lee, William Loomis, and Stewart Scott ISBN-13: 978-1-61977-112-3 Cover illustration: Getty Images/DavidGoh This report is written and published in accordance with the Atlantic Council Policy on Intellectual Independence. The author is solely responsible for its analysis and recommendations. The Atlantic Council and its donors do not determine, nor do they necessarily endorse or advocate for, any of this report’s conclusions. -
The Emerging Cyber Threat to Industrial Control Systems 03
02 Lloyd’s disclaimer This report has been co-produced by Lloyd's, CyberCube and Guy Carpenter for general information purposes only. While care has been taken in gathering the data and preparing the report Lloyd's does not make any representations or warranties as to its accuracy or completeness and expressly excludes to the maximum extent permitted by law all those that might otherwise be implied. Lloyd's accepts no responsibility or liability for any loss or damage of any nature occasioned to any person as a result of acting or refraining from acting as a result of, or in reliance on, any statement, fact, figure or expression of opinion or belief contained in this report. This report does not constitute advice of any kind. © Lloyd’s 2021 All rights reserved About Lloyd’s Lloyd's is the world's specialist insurance and reinsurance market. Under our globally trusted name, we act as the market's custodian. Backed by diverse global capital and excellent financial ratings, Lloyd's works with a global network to grow the insured world –building resilience of local communities and strengthening global economic growth. With expertise earned over centuries, Lloyd's is the foundation of the insurance industry and the future of it. Led by expert underwriters and brokers who cover more than 200 territories, the Lloyd’s market develops the essential, complex and critical insurance needed to underwrite human progress. About CyberCube CyberCube delivers the world’s leading cyber risk analytics for the insurance industry. With best-in-class data access and advanced multi-disciplinary analytics, the company’s cloud-based platform helps insurance organizations make better decisions when placing insurance, underwriting cyber risk and managing cyber risk aggregation. -
Quarterly Report on Global Security Trends
Quarterly Report on Global Security Trends 3rd Quarter of 2020 Table of Contents 1. Executive Summary ............................................................................................................. 2 2. Featured Topics ..................................................................................................................... 4 2.1. Intensifying attacks on supply chains .................................................................... 4 2.1.1. Supply chain attack .............................................................................................. 6 2.1.1.1. Methods of supply chain attacks ................................................................. 6 2.1.1.2. Danger of supply chain attacks ................................................................. 10 2.1.2. Countermeasures against supply chain attacks ..................................... 11 2.1.2.1. Security measures in software development ....................................... 11 2.1.2.2. Security measures in service entrustment ............................................ 13 2.1.3. Conclusion ............................................................................................................. 14 2.2. Increase of double-extortion ransomware attacks ......................................... 15 2.2.1. Overall status of double-extortion ransomware attacks ....................... 15 2.2.2. Double-extortion ransomware attacks ........................................................ 16 2.2.3. How should we respond to double-extortion -
Kaspersky Lab Threat Predictions for 2018
Kaspersky Security Bulletin: KASPERSKY LAB THREAT PREDICTIONS FOR 2018 Version 1.1. KASPERSKY SECURITY BULLETIN: THREAT PREDICTIONS FOR 2018 CONTENTS Introduction ..................................................................................................3 Advanced Persistent Threat Predictions by the Global Research and Analysis Team (GReAT) .....................4 Introduction .............................................................................................5 Our record ................................................................................................6 What can we expect in 2018? ...........................................................7 Conclusion .............................................................................................18 Industry and Technology Predictions .............................................19 Introduction ..........................................................................................20 Threat Predictions for Automotive ..........................................21 Threat Predictions for Connected Health ........................... 26 Threat Predictions for Financial Services ............................30 Threat Predictions for Industrial Security ........................... 35 Threat Predictions for Cryptocurrencies ........................... 39 Conclusion ............................................................................................42 This report was updated on December 6, 2017 – with additional content for Threat Predictions for Financial Services -
Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Security
Received April 19, 2021, accepted May 10, 2021, date of publication June 7, 2021, date of current version July 9, 2021. Digital Object Identifier 10.1109/ACCESS.2021.3087109 Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Security ABEL YEBOAH-OFORI 1, SHAREEFUL ISLAM2, SIN WEE LEE2, ZIA USH SHAMSZAMAN 3, (Senior Member, IEEE), KHAN MUHAMMAD 4, (Member, IEEE), METEB ALTAF 5, AND MABROOK S. AL-RAKHAMI 6, (Member, IEEE) 1Department of Computer Science and Engineering, University of West London, Ealing London W5 5RF, U.K. 2School of Architecture Computing and Engineering (ACE), University of East London, London E16 2RD, U.K. 3Department of Computing and Games, Teesside University, Middlesbrough TS1 3BX, U.K. 4Visual Analytics for Knowledge Laboratory (VIS2KNOW Lab), Department of Software, Sejong University, Seoul 143-747, South Korea 5Advanced Manufacturing and Industry 4.0 Center, King Abdulaziz City for Science and Technology, Riyadh 11442, Saudi Arabia 6Research Chair of Pervasive and Mobile Computing, Information Systems Department, College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi Arabia Corresponding author: Mabrook S. Al-Rakhami ([email protected]) This work was supported by the Deanship of Scientific Research at King Saud University through the Vice Deanship of Scientific Research Chairs: Chair of Pervasive and Mobile Computing. ABSTRACT Cyber Supply Chain (CSC) system is complex which involves different sub-systems perform- ing various tasks. Security in supply chain is challenging due to the inherent vulnerabilities and threats from any part of the system which can be exploited at any point within the supply chain. This can cause a severe disruption on the overall business continuity. -
Enisa Threat Landscape for Supply Chain Attacks
ENISA THREAT LANDSCAPE FOR SUPPLY CHAIN ATTACKS JULY 2021 ENISA THREAT LANDSCAPE FOR SUPPLY CHAIN ATTACKS July 2021 ABOUT ENISA The European Union Agency for Cybersecurity, ENISA, is the Union’s agency dedicated to achieving a high common level of cybersecurity across Europe. Established in 2004 and strengthened by the EU Cybersecurity Act, the European Union Agency for Cybersecurity contributes to EU cyber policy, enhances the trustworthiness of ICT products, services and processes with cybersecurity certification schemes, cooperates with Member States and EU bodies, and helps Europe prepare for the cyber challenges of tomorrow. Through knowledge sharing, capacity building and awareness raising, the Agency works together with its key stakeholders to strengthen trust in the connected economy, to boost resilience of the Union’s infrastructure, and, ultimately, to keep Europe’s society and citizens digitally secure. More information about ENISA and its work can be found here: www.enisa.europa.eu. CONTACT For contacting the authors please use [email protected]. For media enquiries about this paper, please use [email protected]. EDITORS Ifigeneia Lella, Marianthi Theocharidou, Eleni Tsekmezoglou, Apostolos Malatras – European Union Agency for Cybersecurity Sebastian Garcia, Veronica Valeros – Czech Technical University in Prague ACKNOWLEDGEMENTS We would like to thank the Members and Observers of ENISA ad hoc Working Group on Cyber Threat Landscapes for their valuable feedback and comments in validating this report. We would like to also thank Volker Distelrath (Siemens) and Konstantinos Moulinos (ENISA) for their feedback. LEGAL NOTICE Notice must be taken that this publication represents the views and interpretations of ENISA, unless stated otherwise. -
Enisa Threat Landscape for Supply Chain Attacks
ENISA THREAT LANDSCAPE FOR SUPPLY CHAIN ATTACKS JULY 2021 ENISA THREAT LANDSCAPE FOR SUPPLY CHAIN ATTACKS July 2021 ABOUT ENISA The European Union Agency for Cybersecurity, ENISA, is the Union’s agency dedicated to achieving a high common level of cybersecurity across Europe. Established in 2004 and strengthened by the EU Cybersecurity Act, the European Union Agency for Cybersecurity contributes to EU cyber policy, enhances the trustworthiness of ICT products, services and processes with cybersecurity certification schemes, cooperates with Member States and EU bodies, and helps Europe prepare for the cyber challenges of tomorrow. Through knowledge sharing, capacity building and awareness raising, the Agency works together with its key stakeholders to strengthen trust in the connected economy, to boost resilience of the Union’s infrastructure, and, ultimately, to keep Europe’s society and citizens digitally secure. More information about ENISA and its work can be found here: www.enisa.europa.eu. CONTACT For contacting the authors please use [email protected]. For media enquiries about this paper, please use [email protected]. EDITORS Ifigeneia Lella, Marianthi Theocharidou, Eleni Tsekmezoglou, Apostolos Malatras – European Union Agency for Cybersecurity Sebastian Garcia, Veronica Valeros – Czech Technical University in Prague ACKNOWLEDGEMENTS We would like to thank the Members and Observers of ENISA ad hoc Working Group on Cyber Threat Landscapes for their valuable feedback and comments in validating this report. We would like to also thank Volker Distelrath (Siemens) and Konstantinos Moulinos (ENISA) for their feedback. LEGAL NOTICE Notice must be taken that this publication represents the views and interpretations of ENISA, unless stated otherwise. -
APT Attacks on Industrial Companies in 2020
APT attacks on industrial companies in 2020 29.03.2021 Version 1.0 APT 33/APT 34 .................................................................................................................................................................................................. 2 Sofacy ...................................................................................................................................................................................................................... 2 APT41/BARIUM/Winnti ................................................................................................................................................................................ 3 PoetRAT .................................................................................................................................................................................................................. 4 Attacks on Israel's water systems ........................................................................................................................................................ 5 Mikroceen ............................................................................................................................................................................................................... 5 Chafer/APT39/Remix Kitten ................................................................................................................................................................... 5 TA410 ........................................................................................................................................................................................................................ -
U.S. Department of Justice FY 2022 Budget Request
U.S. Department of Justice FY 2022 Budget Request Augmenting Cyber Investigations and Cybersecurity (Amount in $000s) Agents/ Component/Initiative Positions Attorneys Amount CYBERSECURITY Federal Bureau of Investigation (FBI) Cybersecurity 22 0 $15,230 Subtotal, FBI 22 0 $15,230 Justice Information Sharing Technology (JIST) Cybersecurity/SolarWinds Incident Response 0 0 $78,786 Subtotal, JIST 0 0 $78,786 United States National Central Bureau (USNCB) INTERPOL Washington IT Modernization 0 0 $2,634 Subtotal, USNCB 0 0 $2,634 Subtotal, Cybersecurity 22 0 $96,650 CYBER INVESTIGATIONS FBI Cyber 155 52 $40,000 Subtotal, FBI 155 52 $40,000 Criminal Division (CRM) COVID-19 Related Fraud 4 4 $1,016 Subtotal, CRM 4 4 $1,016 Office of Justice Programs (OJP) High-tech, White Collar and Internet Crime Prevention 0 0 $13,000 Subtotal, OJP 0 0 $13,000 Subtotal, Cyber Investigations 159 56 $54,016 Total Program Enhancements 181 56 $150,666 National security remains the Department of Justice’s highest priority. Threats are constantly evolving, requiring additional investments to mitigate those threats in innovative ways. Organized crime syndicates use sophisticated cyberattacks as they seek to defraud banks and corporations, such as the May 2021 Colonial Pipeline ransomware attack, and spies seek to steal defense and intelligence secrets and intellectual property. Each threatens our Nation’s economy and security. In December 2020, a Texas-based IT firm, Solar Winds, was reported as the immediate target of a complex and sophisticated cyberattack. Cybercriminals used routine computer updates as a Trojan horse to install malicious software targeting up to 18,000 Solar Winds customers, many of which are Federal agencies, to include parts of the Pentagon, the Department of Homeland Security, the State Department, the Department of Energy, the National Nuclear Security Administration, the Department of Justice, and the Treasury.