HomeCyber BalkansFindings of ransomware attacks on Fortinet firewalls and potential defense strategies

Findings of ransomware attacks on Fortinet firewalls and potential defense strategies

Published on

spot_img

In a recent report released by cybersecurity company Forescout, it has been revealed that a threat actor linked to a ransomware campaign is using a familiar set of tools seen in previous ransomware activities while adapting their initial access techniques. The threat actor is believed to be utilizing the LockBit 3.0 builder, which leaked in 2022, for their own independent campaigns. Furthermore, the structure of the ransom note used by this threat actor bears similarities to that of other groups such as the now-defunct BlackCat/ALPHV ransomware variant, indicating how threat actors rebrand and adapt over time as their motivations and associations change.

This latest research underscores the growing trend of edge devices, such as routers and VPN gateways, becoming prime targets for threat actors. Sai Molige, Forescout’s senior manager of threat hunting, emphasized the importance for Chief Information Security Officers (CISOs) and their security teams to take proactive measures to identify and assess potential risks posed by these devices in their environment.

Molige suggested that conducting threat modeling on edge devices can provide valuable insights into the level of exposure and potential impact of an intrusion. By gaining a comprehensive understanding of how these edge devices are implemented and function within the network, security teams can effectively mitigate risks and enhance their security posture. In addition to threat modeling, security teams can take further steps to secure edge devices, such as:

1. Implementing strong access controls and monitoring mechanisms to detect suspicious activity.
2. Regularly updating and patching edge device firmware to address known vulnerabilities.
3. Deploying intrusion detection and prevention systems to detect and block malicious traffic targeting edge devices.
4. Enforcing network segmentation to limit the lateral movement of threat actors within the network.

Molige also highlighted the importance of continuous security monitoring and incident response planning to swiftly respond to and contain any security incidents involving edge devices. By staying vigilant and proactive in addressing security risks associated with edge devices, organizations can effectively defend against emerging threats and safeguard their sensitive data and assets.

As threat actors continue to evolve and adapt their tactics, organizations must remain diligent in securing their edge devices and enhancing their overall cybersecurity posture. Collaborative efforts between security teams, threat intelligence analysts, and industry experts are essential in staying ahead of cyber threats and ensuring the resilience of critical infrastructure and systems against cyber attacks. By implementing robust security measures and staying informed about the latest threat trends, organizations can effectively mitigate risks and protect their digital assets from malicious actors.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...