CyberSecurity SEE

Findings of ransomware attacks on Fortinet firewalls and potential defense strategies

Findings of ransomware attacks on Fortinet firewalls and potential defense strategies

In a recent report released by cybersecurity company Forescout, it has been revealed that a threat actor linked to a ransomware campaign is using a familiar set of tools seen in previous ransomware activities while adapting their initial access techniques. The threat actor is believed to be utilizing the LockBit 3.0 builder, which leaked in 2022, for their own independent campaigns. Furthermore, the structure of the ransom note used by this threat actor bears similarities to that of other groups such as the now-defunct BlackCat/ALPHV ransomware variant, indicating how threat actors rebrand and adapt over time as their motivations and associations change.

This latest research underscores the growing trend of edge devices, such as routers and VPN gateways, becoming prime targets for threat actors. Sai Molige, Forescout’s senior manager of threat hunting, emphasized the importance for Chief Information Security Officers (CISOs) and their security teams to take proactive measures to identify and assess potential risks posed by these devices in their environment.

Molige suggested that conducting threat modeling on edge devices can provide valuable insights into the level of exposure and potential impact of an intrusion. By gaining a comprehensive understanding of how these edge devices are implemented and function within the network, security teams can effectively mitigate risks and enhance their security posture. In addition to threat modeling, security teams can take further steps to secure edge devices, such as:

1. Implementing strong access controls and monitoring mechanisms to detect suspicious activity.
2. Regularly updating and patching edge device firmware to address known vulnerabilities.
3. Deploying intrusion detection and prevention systems to detect and block malicious traffic targeting edge devices.
4. Enforcing network segmentation to limit the lateral movement of threat actors within the network.

Molige also highlighted the importance of continuous security monitoring and incident response planning to swiftly respond to and contain any security incidents involving edge devices. By staying vigilant and proactive in addressing security risks associated with edge devices, organizations can effectively defend against emerging threats and safeguard their sensitive data and assets.

As threat actors continue to evolve and adapt their tactics, organizations must remain diligent in securing their edge devices and enhancing their overall cybersecurity posture. Collaborative efforts between security teams, threat intelligence analysts, and industry experts are essential in staying ahead of cyber threats and ensuring the resilience of critical infrastructure and systems against cyber attacks. By implementing robust security measures and staying informed about the latest threat trends, organizations can effectively mitigate risks and protect their digital assets from malicious actors.

Source link

Exit mobile version