<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyberаttacks To Remember Archives - 3Cyber-Sec</title>
	<atom:link href="https://3cyber-sec.com/category/cyber%D0%B0ttacks-to-remember/feed/" rel="self" type="application/rss+xml" />
	<link>https://3cyber-sec.com/category/cyberаttacks-to-remember/</link>
	<description>Cyber Security</description>
	<lastBuildDate>Wed, 05 Jan 2022 09:47:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://3cyber-sec.com/wp-content/uploads/2021/05/cropped-profile_custom-32x32.png</url>
	<title>Cyberаttacks To Remember Archives - 3Cyber-Sec</title>
	<link>https://3cyber-sec.com/category/cyberаttacks-to-remember/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What are the biggest cyber attacks and data breaches of 2021?</title>
		<link>https://3cyber-sec.com/2021/12/30/biggest-cyber-attacks-and-data-breaches-of-2021/</link>
					<comments>https://3cyber-sec.com/2021/12/30/biggest-cyber-attacks-and-data-breaches-of-2021/#respond</comments>
		
		<dc:creator><![CDATA[Venelin]]></dc:creator>
		<pubDate>Thu, 30 Dec 2021 09:37:10 +0000</pubDate>
				<category><![CDATA[Cyberаttacks To Remember]]></category>
		<guid isPermaLink="false">https://3cyber-sec.com/?p=1329</guid>

					<description><![CDATA[<p>What are the biggest cyber attacks of 2021? We are here to find out together and present you with some interesting stories that happened.</p>
<p>The post <a href="https://3cyber-sec.com/2021/12/30/biggest-cyber-attacks-and-data-breaches-of-2021/">What are the biggest cyber attacks and data breaches of 2021?</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">2021 is already over and data shows that cybersecurity will become a more vital topic for organisations worldwide. Cybercrime Magazine has already </span><a href="https://cybersecurityventures.com/cybercrime-damages-6-trillion-by-2021/"><span style="font-weight: 400;">published a forecast</span></a><span style="font-weight: 400;"> that cybercrime will cost the world 10,5 trillion dollars annually by 2025. </span></p>
<p><span style="font-weight: 400;">And if that year seems far away to you, let’s look at some data and trends: </span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Nearly ½ of all cyber attacks (43%) are aimed at SMEs. And only 14% of them have a proper cybersecurity strategy in place &#8211; data from </span><a href="https://www.accenture.com/us-en/insights/security/cost-cybercrime-study"><span style="font-weight: 400;">Accenture.com</span></a><span style="font-weight: 400;">;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">A report titled “State of Cybersecurity” by Ponemon Institute, are outlined the 3 biggest threats to organisations &#8211; phishing and social engineering attacks, devices being stolen, and breach of credentials; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Embroker.com published a </span><a href="https://www.embroker.com/blog/cyber-attack-statistics/"><span style="font-weight: 400;">report with cyber attack information</span></a><span style="font-weight: 400;"> for 2021 where they show that the costs of a cyberattack continue to trouble organisations months and years after the incident. </span></li>
</ul>
<p><span style="font-weight: 400;">The fact is that there have been major increases in the numbers and the frequency of the most major types of cyber attacks (check the report from Embroker.com above). In this article in our blog, we will focus on the biggest cyber attacks and data breaches of the year. </span></p>
<p><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-1331" src="https://3cyber-sec.com/wp-content/uploads/2022/01/3Cyber-Sec-Social-Blog-Image-1200-x-630-16.png" alt="" width="1200" height="630" srcset="https://3cyber-sec.com/wp-content/uploads/2022/01/3Cyber-Sec-Social-Blog-Image-1200-x-630-16.png 1200w, https://3cyber-sec.com/wp-content/uploads/2022/01/3Cyber-Sec-Social-Blog-Image-1200-x-630-16-980x515.png 980w, https://3cyber-sec.com/wp-content/uploads/2022/01/3Cyber-Sec-Social-Blog-Image-1200-x-630-16-480x252.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<p><span style="font-weight: 400;">We don’t want to scare anybody. Just put caution in your mind. You are going to pay the price for the level of cybersecurity in your organisation. It is better to be before you get hacked. Here is the list of the most interesting cyber attacks and data breaches we picked for you: </span></p>
<h2><a href="https://3cyber-sec.com/2021/09/27/the-pegasus-spyware-scandal-what-we-know/"><span style="font-weight: 400;">The Pegasys Spyware Scandal</span></a></h2>
<p><span style="font-weight: 400;">2021 was the year marked by the Pegasus Spyware Scandal. The software developed by the NSO group in Israel became a prime news story. Over 50 000 phone numbers worldwide were potential targets of this software. 1000 of them were traced to their owners and guess what – they belonged to people who should not be in the scope of surveillance by the software. They belonged to politicians and high-ranking officials and the already mentioned journalists and human rights activists. It is stated that countries like the UAE, India, Morocco, and Azerbaijan used it to spy on local journalists. The scandal still unfolds and will probably be a major story in 2022 as well. One of the most recent events is related to the fact that Cambridge University halted a deal for over 400 million pounds with the UAE over the findings of the scandal. </span></p>
<h2><a href="https://3cyber-sec.com/2021/11/22/nft-hack-scam-for-330-000/"><span style="font-weight: 400;">NFT hack scam costs a fan of Banksy over 330 000$</span></a></h2>
<p><span style="font-weight: 400;">Some might argue that this is not a major cyberattack or data leak. However, it is one of the biggest in the NFT world. With the growing popularity of NFTs as digital assets, we think it deserves to be showcased. </span></p>
<p><span style="font-weight: 400;">The story got in the news of media like BBC and CNN. And it is very interesting to follow it. Here is what happened: </span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">An art collector paid a large amount of over $330 000 for what he thought was an original Banksy NFT artwork;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Once he made the bid in an auction and it was accepted, the money was transferred and the auction was over. And then the victim realised he was frauded; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">The case caught the attention of the media and became a major news story; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">The money was returned to the victim. </span></li>
</ul>
<p><span style="font-weight: 400;">Yes, there was a happy ending to all of this, but later on, it was found out that probably the website of Banksy was hacked and this was the root of the whole thing. A cybersecurity expert told the BBC that he warned Banksy’s team about vulnerabilities on the website of the artist several times and had no response. And since there is no official comment yet, this seems the most likely scenario. </span></p>
<p><img decoding="async" class="alignnone size-full wp-image-1332" src="https://3cyber-sec.com/wp-content/uploads/2022/01/3Cyber-Sec-Social-Blog-Image-1200-x-630-17.png" alt="" width="1200" height="630" srcset="https://3cyber-sec.com/wp-content/uploads/2022/01/3Cyber-Sec-Social-Blog-Image-1200-x-630-17.png 1200w, https://3cyber-sec.com/wp-content/uploads/2022/01/3Cyber-Sec-Social-Blog-Image-1200-x-630-17-980x515.png 980w, https://3cyber-sec.com/wp-content/uploads/2022/01/3Cyber-Sec-Social-Blog-Image-1200-x-630-17-480x252.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<h2><a href="https://3cyber-sec.com/2021/11/01/the-big-leak-of-vpn-account-passwords/"><span style="font-weight: 400;">The hacker attack and the leak of VPN Account Passwords From 87,000 Fortinet FortiGate Devices</span></a></h2>
<p><span style="font-weight: 400;">This one is particularly interesting because it is most likely a result of negligence in most cases. The breach took place back in September. User names and passwords of around 87 000 users from around the world leaked due to a hacker attack. All of them were 87,000 FortiGate SSL-VPN devices. The leak happened after attackers exploited an unpatched “CVE-2018-13379 at the time of the actor’s scan.” (stated by the company). </span></p>
<p><span style="font-weight: 400;">Fortinet states that this was an old flaw in security they fixed back in 2019. Since then they communicated with their customers to make the needed updates to fix these issues. However, The Hackers News wrote that: </span><i><span style="font-weight: 400;">“CVE-2018-13379 also emerged as one of the topmost exploited flaws in 2020, according to a list compiled by intelligence agencies in Australia, the U.K., and the U.S. earlier this year.”.</span></i></p>
<p><span style="font-weight: 400;">Although the company warned about the problem many times and offered a solution, the customers didn’t seem to take the measures needed. And this made the leak of user names and passwords possible. </span></p>
<p><span style="font-weight: 400;">For the cherry on top, we left the top 3 data breaches for the year, according to </span><a href="https://www.securitymagazine.com/articles/96667-the-top-data-breaches-of-2021"><span style="font-weight: 400;">securitymagazine.com</span></a><span style="font-weight: 400;">:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.businessinsider.com/stolen-data-of-533-million-facebook-users-leaked-online-2021-4"><span style="font-weight: 400;">Facebook</span></a><span style="font-weight: 400;"> — 553 million accounts from 106 countries containing e-mails and other information;</span></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://fortune.com/2021/06/30/linkedin-data-theft-700-million-users-personal-information-cybersecurity/"><span style="font-weight: 400;">LinkedIn</span></a><span style="font-weight: 400;"> &#8211; 700 million users &#8211; almost 93% of all registered accounts; </span></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.darkreading.com/attacks-breaches/cyber-analytics-database-exposed-5-billion-records-online"><span style="font-weight: 400;">Cognyte</span></a><span style="font-weight: 400;"> — Over 5 billion data records. Some of them contained passwords and other information. </span></li>
</ul>
<p><span style="font-weight: 400;">These cases are only a few selected ones. There are many more stories similar to those. Cybercrime will get more vicious and more widespread. However, countermeasures can be taken. You just have to make cybersecurity a priority for your organisation. Remember that this is not a one-time effort. It is a constant and evolving process that needs to adapt to the needs you have. The first step is realizing you need to take measures.</span></p>
<p>The post <a href="https://3cyber-sec.com/2021/12/30/biggest-cyber-attacks-and-data-breaches-of-2021/">What are the biggest cyber attacks and data breaches of 2021?</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://3cyber-sec.com/2021/12/30/biggest-cyber-attacks-and-data-breaches-of-2021/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>NFT hack scam costs a fan of Banksy over 330 000$</title>
		<link>https://3cyber-sec.com/2021/11/22/nft-hack-scam-for-330-000/</link>
					<comments>https://3cyber-sec.com/2021/11/22/nft-hack-scam-for-330-000/#respond</comments>
		
		<dc:creator><![CDATA[Venelin]]></dc:creator>
		<pubDate>Mon, 22 Nov 2021 08:23:17 +0000</pubDate>
				<category><![CDATA[Cyberаttacks To Remember]]></category>
		<guid isPermaLink="false">https://3cyber-sec.com/?p=1278</guid>

					<description><![CDATA[<p>The story is a little bit like the plot of a Guy Ritchie movie - we have a huge amount of money in the transaction, a fake piece of art by a famous artist, and a website hacking.</p>
<p>The post <a href="https://3cyber-sec.com/2021/11/22/nft-hack-scam-for-330-000/">NFT hack scam costs a fan of Banksy over 330 000$</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">You know that in the world of crypto investing, things can change in a second, and new trends emerge constantly. One of the most interesting ones is the rise of NFT. More and more artists are finding ways to capitalize their work by publishing exclusive artworks as NFT. And we are not talking about only young professionals. Artists such as Banksy are also exploring ways to sell their work. And while NFT is here to stay, there is one issue that few people talk about &#8211; cybersecurity. In recent months one news hit all major media like BBC and CNN. The story is a little bit like the plot of a Guy Ritchie movie &#8211; we have a huge amount of money in the transaction, a fake piece of art by a famous artist, and a website hacking.</span></p>
<h2><span style="font-weight: 400;">What happened?</span></h2>
<p><span style="font-weight: 400;">At the beginning of September, </span><a href="https://edition.cnn.com/style/article/banksy-nft-fake-hack/index.html"><span style="font-weight: 400;">CNN reported</span></a><span style="font-weight: 400;"> that an art collector paid a large amount of over $330 000 for what he thought was an original Banksy NFT artwork. A web page on the website of Banksy himself appeared and redirected his fans to an auction on a platform for NFT bidding. The name of the user that listed the item for sale was identical to one that Banksy himself used as a moniker a while back.</span></p>
<p><span style="font-weight: 400;">And since the source of the artwork seemed legit, the art collector made the purchase for over 330 000$ in crypto. Once he made the bid and it was accepted, the money was transferred and the auction was over. And then the victim realised he was frauded. However, the story has a happy end, since the person transferred the money back soon after. </span></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1280" src="https://3cyber-sec.com/wp-content/uploads/2021/12/3Cyber-Sec-Social-Blog-Image-1200-x-630-10.png" alt="" width="1200" height="630" srcset="https://3cyber-sec.com/wp-content/uploads/2021/12/3Cyber-Sec-Social-Blog-Image-1200-x-630-10.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/12/3Cyber-Sec-Social-Blog-Image-1200-x-630-10-980x515.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/12/3Cyber-Sec-Social-Blog-Image-1200-x-630-10-480x252.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<h2><span style="font-weight: 400;">An ethical hack or a hacker that got scared?</span></h2>
<p><span style="font-weight: 400;">When he spoke to CNN, the art dealer assumed that there were two possible scenarios: </span></p>
<ol>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">The whole thing was an ethical hack that was done as a statement; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">The case drew huge attention not only online but from mass media and the hacker decided that it is better to be safe and return the money. </span></li>
</ol>
<p><span style="font-weight: 400;">This is just the tip of the iceberg in such cases. It is quite common that in such auctions the artworks that are sold can be the property of some other author or the artwork itself is not made by the famous artist as claimed. NFT investors should be very careful and do extensive research before they transfer huge amounts of money for digital art. They might not be so lucky to receive them back. </span></p>
<h2><span style="font-weight: 400;">The cybersecurity side of the story</span></h2>
<p><span style="font-weight: 400;">From a cybersecurity point of view, it is interesting to explore how there was a base to commit such fraud in the first place. The art collector suggested both for BBC and CNN that the website of Banksy might have been hacked. However, this has not been confirmed by representatives of the artist. The </span><a href="https://www.bbc.com/news/technology-58399338"><span style="font-weight: 400;">BBC published</span></a><span style="font-weight: 400;"> a comment by a spokesperson for Banksy who told that the artist has no affiliation to NFT auctions in any form. </span></p>
<p><span style="font-weight: 400;">And while there is no official explanation, the scenario of website hacking seems more plausible after a cybersecurity expert told the </span><a href="https://www.bbc.com/news/technology-58437753"><span style="font-weight: 400;">BBC that he warned Banksy’s team</span></a><span style="font-weight: 400;"> about vulnerabilities on the website of the artist several times and had no response. The neglect of these warnings might have led to the NFT scam. </span></p>
<h2><span style="font-weight: 400;">Moral of the story</span></h2>
<p><span style="font-weight: 400;">At the end of the day, there is a happy end. The money is back in the collector and probably after this case, Banksy will get his team to strengthen the cybersecurity of his website. This goes to show that even what seems a legitimate operation can be the cover for a scam. Be aware and pay extra attention to any potential red flags. Better to be safe rather than with an empty wallet. And this goes to show that even the best in their industries need to consider cybersecurity as a priority. If you need a consultation or advice on such matters for your organisation, feel free to </span><a href="https://3cyber-sec.com/contact-us/"><span style="font-weight: 400;">get in touch with us</span></a><span style="font-weight: 400;">. </span></p>
<p>The post <a href="https://3cyber-sec.com/2021/11/22/nft-hack-scam-for-330-000/">NFT hack scam costs a fan of Banksy over 330 000$</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://3cyber-sec.com/2021/11/22/nft-hack-scam-for-330-000/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The big leak of VPN Account Passwords From 87,000 Fortinet FortiGate Devices</title>
		<link>https://3cyber-sec.com/2021/11/01/the-big-leak-of-vpn-account-passwords/</link>
					<comments>https://3cyber-sec.com/2021/11/01/the-big-leak-of-vpn-account-passwords/#respond</comments>
		
		<dc:creator><![CDATA[Venelin]]></dc:creator>
		<pubDate>Mon, 01 Nov 2021 05:10:36 +0000</pubDate>
				<category><![CDATA[Cyberаttacks To Remember]]></category>
		<guid isPermaLink="false">https://3cyber-sec.com/?p=1255</guid>

					<description><![CDATA[<p>Such cases show that cybersecurity measures and policies should be adopted and updated regularly in any organisation - public or private entity.</p>
<p>The post <a href="https://3cyber-sec.com/2021/11/01/the-big-leak-of-vpn-account-passwords/">The big leak of VPN Account Passwords From 87,000 Fortinet FortiGate Devices</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">Back in September, one major breach took place &#8211; the user names and passwords of around 87 000 users from around the world leaked due to a hacker attack. All of them were 87,000 FortiGate SSL-VPN devices, according to an article on </span><a href="https://thehackernews.com/2021/09/hackers-leak-vpn-account-passwords-from.html"><span style="font-weight: 400;">The Hacker News</span></a><span style="font-weight: 400;"> that covered the incident. </span></p>
<p><span style="font-weight: 400;">The user credentials were for people and entities from all over the world, with the leading number of accounts from the USA. Among other countries are France, Italy, India, and Taiwan. </span></p>
<p><span style="font-weight: 400;">The leak itself came after attackers exploited an unpatched </span><i><span style="font-weight: 400;">“CVE-2018-13379 at the time of the actor&#8217;s scan.”</span></i><span style="font-weight: 400;">, the company stated. </span><a href="https://www.fortinet.com/blog/psirt-blogs/malicious-actor-discloses-fortigate-ssl-vpn-credentials"><span style="font-weight: 400;">According to Fortinet</span></a><span style="font-weight: 400;">, </span><i><span style="font-weight: 400;">“this incident is related to an old vulnerability resolved in May 2019. At that time, Fortinet issued a PSIRT advisory and communicated directly with customers.”</span></i><span style="font-weight: 400;">. Despite encouraging the customers to upgrade the affected devices, a lot of them didn’t. The company provided instructions on how people and companies with affected devices can protect themselves and directed them to recommended upgrades. </span></p>
<h2><span style="font-weight: 400;">Who is Fortinet and what are FortiGate devices?</span></h2>
<p><span style="font-weight: 400;">Fortinet is one of the biggest network security providers. It was founded back in 2000 in California and provides security services for large enterprises, service providers, and even government organisations. According to their </span><a href="https://www.fortinet.com/corporate/about-us/about-us"><span style="font-weight: 400;">website</span></a><span style="font-weight: 400;">, </span><i><span style="font-weight: 400;">“Fortinet ranks number one in the most security appliances shipped worldwide and more than 500,000 customers trust Fortinet to protect their businesses.”. </span></i></p>
<p><span style="font-weight: 400;">FortiGate is one of the products of the company, </span><a href="https://www.nouveau.co.uk/content-hub/complete-guide-to-fortigate-firewalls/"><span style="font-weight: 400;">presented</span></a><span style="font-weight: 400;"> as a “next-generation firewall”. The devices come in different series, according to the needs of the business clients and how big they are. The function of this firewall is like a filter &#8211; scanning all the data that comes in and letting only the safe and good information reach the business that uses it. In the </span><a href="https://www.nouveau.co.uk/content-hub/complete-guide-to-fortigate-firewalls/"><span style="font-weight: 400;">presentation</span></a><span style="font-weight: 400;"> from Fortinet’s platinum partner, it is mentioned that the firewall can protect from various cyber threats from malware, through blended network attacks and up to Intrusions. </span></p>
<p><span style="font-weight: 400;">Fortinet also offers VPN through FortiGate to its clients with FortiClient. In multiple reviews, it is stated to be one of the most secure solutions. </span></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1257" src="https://3cyber-sec.com/wp-content/uploads/2021/11/3Cyber-Sec-blog-image-1200-x-600-6.png" alt="" width="1200" height="600" srcset="https://3cyber-sec.com/wp-content/uploads/2021/11/3Cyber-Sec-blog-image-1200-x-600-6.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/11/3Cyber-Sec-blog-image-1200-x-600-6-980x490.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/11/3Cyber-Sec-blog-image-1200-x-600-6-480x240.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<h2><span style="font-weight: 400;">How did the leak happen and how big is it?</span></h2>
<p><span style="font-weight: 400;">As we mentioned before in the article, the leak was a result of an unpatched vulnerability that the devices had. And although an updated version was available, a lot of the clients didn’t bother to upgrade to a safe version that would fix this problem. It is interesting to note that this bug was fixed in May 2019 and yet </span><a href="https://thehackernews.com/2021/09/hackers-leak-vpn-account-passwords-from.html"><span style="font-weight: 400;">The Hackers News</span></a><span style="font-weight: 400;"> wrote that: </span><i><span style="font-weight: 400;">“CVE-2018-13379 also emerged as one of the topmost exploited flaws in 2020, according to a list compiled by intelligence agencies in Australia, the U.K., and the U.S. earlier this year.”.</span></i></p>
<p><span style="font-weight: 400;">The leaked 87 000 login credentials look like the cherry on top. The leak was first noted after a post was made on the dark web. It was on a private cybercrime forum and contained a free copy of a small portion of the list with VPN log information. The online media “The Record” mentioned in an </span><a href="https://therecord.media/fortinet-warns-customers-after-hackers-leak-passwords-for-87000-vpns/"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;"> about the breach that </span><i><span style="font-weight: 400;">“sources familiar with the existence of this collection told The Record the list had been compiled more than a year ago and had been sold in private circles to different threat actors, including groups who carried out ransomware attacks.”.</span></i></p>
<p><span style="font-weight: 400;">The affected accounts are from 74 different countries around the world. </span></p>
<h2><span style="font-weight: 400;">Prevention measures and lessons learned</span></h2>
<p><span style="font-weight: 400;">There are a few things here worth mentioning &#8211; the company claims that it warned the clients multiple times to upgrade to a new version after the flaw from May 2019 was fixed: </span><i><span style="font-weight: 400;">“This incident is related to an old vulnerability resolved in May 2019. At that time, Fortinet issued a PSIRT advisory and communicated directly with customers. And because customer security is our top priority, Fortinet subsequently issued multiple corporate blog posts detailing this issue, strongly encouraging customers to upgrade affected devices. In addition to advisories, bulletins, and direct communications, these blogs were published in August 2019, July 2020, April 2021, and again in June 2021.”.</span></i></p>
<p><span style="font-weight: 400;">On the other hand, this issue remained one of the most exploited (as you have seen above). That suggests that a lot of the clients of Fortinet may not have followed the instructions to upgrade their devices and that left them vulnerable. We are yet to see how this will affect the market and if there are going to be further similar cases down the road. </span></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1258" src="https://3cyber-sec.com/wp-content/uploads/2021/11/3Cyber-Sec-blog-image-1200-x-600-7.png" alt="" width="1200" height="600" srcset="https://3cyber-sec.com/wp-content/uploads/2021/11/3Cyber-Sec-blog-image-1200-x-600-7.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/11/3Cyber-Sec-blog-image-1200-x-600-7-980x490.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/11/3Cyber-Sec-blog-image-1200-x-600-7-480x240.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<h2><span style="font-weight: 400;">Cybersecurity &#8211; a top priority for any organisation</span></h2>
<p><span style="font-weight: 400;">Such cases show that cybersecurity measures and policies should be adopted and updated regularly in any organisation &#8211; public or private entity. Nowadays, cyber-attacks are getting more frequent and more vicious. However, a little prevention can go a long way. You can protect your business with measures such as </span><a href="https://3cyber-sec.com/penetration-testing/"><span style="font-weight: 400;">penetration testing</span></a><span style="font-weight: 400;">, </span><a href="https://3cyber-sec.com/vulnerability-assessment/"><span style="font-weight: 400;">vulnerability assessment</span></a><span style="font-weight: 400;">, and </span><a href="https://3cyber-sec.com/staff-awareness/"><span style="font-weight: 400;">staff awareness training</span></a><span style="font-weight: 400;">. In 3Cyber-Sec, you will find a trusted partner with a lot of experience and flexibility, that will help you build up your cybersecurity defenses with tailor-made solutions to your needs.</span></p>
<p>The post <a href="https://3cyber-sec.com/2021/11/01/the-big-leak-of-vpn-account-passwords/">The big leak of VPN Account Passwords From 87,000 Fortinet FortiGate Devices</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://3cyber-sec.com/2021/11/01/the-big-leak-of-vpn-account-passwords/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Pegasus Spyware Scandal: What We Know So Far?</title>
		<link>https://3cyber-sec.com/2021/09/27/the-pegasus-spyware-scandal-what-we-know/</link>
					<comments>https://3cyber-sec.com/2021/09/27/the-pegasus-spyware-scandal-what-we-know/#respond</comments>
		
		<dc:creator><![CDATA[Venelin]]></dc:creator>
		<pubDate>Mon, 27 Sep 2021 11:31:41 +0000</pubDate>
				<category><![CDATA[Cyberаttacks To Remember]]></category>
		<guid isPermaLink="false">https://3cyber-sec.com/?p=1223</guid>

					<description><![CDATA[<p>Pegasys Spyware by the NSO Group showed us that privacy is a thing of the past. Discover how the events unfolded and what is about to come. </p>
<p>The post <a href="https://3cyber-sec.com/2021/09/27/the-pegasus-spyware-scandal-what-we-know/">The Pegasus Spyware Scandal: What We Know So Far?</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">When we were children, and while traveling, we loved to play “I spy with my little eye”. This innocent game has probably been played for years to come by thousands of people around the world. Well, the words from the name of the game don’t sound so innocent in the 21-st century. Nowadays, cybersecurity and privacy breaches are and will become an increasing global problem. One of the most recent scandals on these subjects was related to the Pegasus Spyware software, developed by the NSO Group from Israel. </span></p>
<p><span style="font-weight: 400;">The first sight of Pegasus was almost 5 years ago &#8211; in 2016 when it was detected on the phone of a civil rights defender with the help of Citizen Lab. In 2021, the name of Pegasus was heard again when reports detailing the problems with Pegasus were released by organisations and working on the Pegasus Project. It is an Initiative with 17 different media and the coordinating help of Amnesty International. And </span><a href="https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/"><span style="font-weight: 400;">the first report</span></a><span style="font-weight: 400;"> that started it all was published by them in mid-July this year. A little later the network of journalists Forbidden stories released an </span><a href="https://forbiddenstories.org/pegasus-the-new-global-weapon-for-silencing-journalists/"><span style="font-weight: 400;">in-depth article</span></a><span style="font-weight: 400;"> about the usage of the software to invade the privacy of journalists worldwide. </span></p>
<h2><span style="font-weight: 400;">What is Pegasus Spyware? </span></h2>
<p><span style="font-weight: 400;">If you are coming across the news for the first time, we will brief you a little bit. The Pegasus Spyware is a form of software developed by an Israeli company that goes by the name of NSO Group. The software function, as provided by the company, is to detect and prevent terrorist threats for big governmental institutions. Sounds nice, right? Well, an investigation in which the British media giant &#8211; The Guardian participates gave us another point of view. </span></p>
<p><span style="font-weight: 400;">The software was installed on the phones of people that some governments wanted to be tracked. “With just a single line text, it can bypass your phone’s security and install spyware that grants complete control of your device”, says a representative of The Guardian in a </span><a href="https://www.youtube.com/watch?v=G7H9uo3j5FQ&amp;ab_channel=TheGuardian"><span style="font-weight: 400;">news video</span></a><span style="font-weight: 400;"> that gives details about the scandal. </span></p>
<p><span style="font-weight: 400;">According to the media, Pegasus can gain access to: </span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">All of your texts and messages; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Your GPS and location data; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">The ability to turn on your mic and camera; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">All the files you have; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Do screen recording. </span></li>
</ul>
<p><span style="font-weight: 400;">The worst part? You won’t even notice that this is happening and have no way of detecting it. The Guardian refers to it as “probably the most advanced piece of spyware ever developed”. Here even end-to-end encrypted applications won’t help, since this is on your phone device. The main way of penetration is through zero-day vulnerabilities &#8211; ones that even the companies that made the phones are not yet aware of.</span></p>
<p><span style="font-weight: 400;">“It is effectively the most invasive form of surveillance imaginable”, The Guardian continues. It is proven that Pegasus can infiltrate both main operating systems &#8211; Android and iOS devices. </span></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1226" src="https://3cyber-sec.com/wp-content/uploads/2021/09/3Cyber-Sec-Social-Blog-Image-1200-x-630-2.png" alt="" width="1200" height="630" srcset="https://3cyber-sec.com/wp-content/uploads/2021/09/3Cyber-Sec-Social-Blog-Image-1200-x-630-2.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/09/3Cyber-Sec-Social-Blog-Image-1200-x-630-2-980x515.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/09/3Cyber-Sec-Social-Blog-Image-1200-x-630-2-480x252.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<h2><span style="font-weight: 400;">How big is the scandal and what is it about? </span></h2>
<p><span style="font-weight: 400;">Let’s sum it up. We have a company that created spyware software that can be on your phone and track everything you do and give access to all of your data away. And some governments are clients of that company and want to spy on some people like journalists. When we put these two together we get one of the biggest scandals of 2021. The Guardian stated that some of the governments that bought and used Pegasus were using it for their agenda. </span></p>
<p><span style="font-weight: 400;">It is enough to say that it is used against human rights activists as well as journalists as </span><a href="https://www.youtube.com/watch?v=fGspSmabEa4&amp;ab_channel=AlJazeeraEnglish"><span style="font-weight: 400;">Al Jazeera English</span></a><span style="font-weight: 400;"> says. According to a Bloomberg </span><a href="https://www.bloombergquint.com/technology/israeli-firm-s-spyware-found-on-phones-worldwide-post-says"><span style="font-weight: 400;">report </span></a><span style="font-weight: 400;">that came in mid-July this year over 50 000 phone numbers worldwide were potential targets of this software. 1000 of them were traced to their owners and guess what &#8211; they belonged to people who should not be in the scope of surveillance by the software. They belonged to politicians and high-ranking officials and the already mentioned journalists and human rights activists. </span></p>
<h2><span style="font-weight: 400;">Which countries use Pegasus? </span></h2>
<p><span style="font-weight: 400;">The video story from The Guardian gave us the names of some of the countries that are clients of NSO Group. It is worth mentioning that </span><span style="font-weight: 400;">in some </span><span style="font-weight: 400;">of them there is a form of conflict between the government and the population. It is not clear which ones use the software to spy on members of civil society. Please, keep that in mind as you go down this list:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Hungary; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Azerbaijan; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Kazakhstan;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Rwanda;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Bahrain;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Mexico; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">India; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Morocco;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Dubai;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">UAE;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Saudi Arabia. </span></li>
</ul>
<p><span style="font-weight: 400;">In a tweet, Ashok Swain, Professor of Peace and Conflict Research at Uppsala University pointed out some of the countries where journalists were targets of Pegasus in something he called a “wall of shame”: </span></p>
<ol>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">38 journalists in Morocco; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">48 journalists in Azerbaijan;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">38 journalists in India; </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">12 journalists in the UAE. </span></li>
</ol>
<p><img loading="lazy" decoding="async" class="size-full wp-image-1225 aligncenter" src="https://3cyber-sec.com/wp-content/uploads/2021/09/Screenshot-2021-09-27-14.21.21.png" alt="" width="709" height="625" srcset="https://3cyber-sec.com/wp-content/uploads/2021/09/Screenshot-2021-09-27-14.21.21.png 709w, https://3cyber-sec.com/wp-content/uploads/2021/09/Screenshot-2021-09-27-14.21.21-480x423.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 709px, 100vw" /></p>
<p><span style="font-weight: 400;">Although the software might be used to prevent terrorist attacks and threats as well, we can only assume the agenda of the people spying on government officials and civil society representatives. </span></p>
<h2><span style="font-weight: 400;">What are the reactions and what follows next?</span></h2>
<p><span style="font-weight: 400;">After the scandal went out, the NSO Group told The Guardian that “it will investigate any credible claims of misuse and take appropriate action based on the results of these investigations&#8221;. Some of the governments </span><a href="https://www.theguardian.com/world/2021/jul/18/revealed-leak-uncovers-global-abuse-of-cyber-surveillance-weapon-nso-group-pegasus"><span style="font-weight: 400;">connected to the scandal</span></a><span style="font-weight: 400;"> denied using Pegasus for such activities (Rwanda, Morocco, Hungary, and India), while others (Azerbaijan, Bahrain, Kazakhstan, Saudi Arabia, Mexico, the UAE, and Dubai) did not respond to The Guardian’s request for comment. </span></p>
<p><span style="font-weight: 400;">While the scandal still unfolds, we are about to see what happens next. At the end of July 2021, Euronews </span><a href="https://www.euronews.com/next/2021/07/21/pegasus-spyware-scandal-emmanuel-macron-among-14-heads-of-states-identified-as-possible-ta"><span style="font-weight: 400;">reported </span></a><span style="font-weight: 400;">that one of the potential politicians that were a target was the president of France himself. The French authorities began an investigation into the matter.</span></p>
<p><span style="font-weight: 400;">In mid-September, the MEPs in Strasbourg will discuss the scandal with Pegasus. One of them </span><a href="https://www.euronews.com/2021/09/09/governments-using-pegasus-spyware-should-be-held-responsible-says-mep"><span style="font-weight: 400;">told Euronews</span></a><span style="font-weight: 400;"> that countries that used it should be held accountable.  We are about to see what other actions will follow worldwide. </span></p>
<h2><span style="font-weight: 400;">The end of privacy as we know it?</span></h2>
<p><span style="font-weight: 400;">This statement has been used around in the past 20-30 years a lot. Spyware and Malware software will get more complicated and be harder to track in time. The scandal with Pegasus has shown us that. However, it is important to remain calm &#8211; cybersecurity threats may be on the rise, but there are also good guys in the picture. Professionals in companies like 3cyber-sec have dedicated their professional careers to the detection and prevention of cybersecurity breaches and hacker attacks. Businesses can </span><a href="https://3cyber-sec.com/contact-us/"><span style="font-weight: 400;">rely on them</span></a><span style="font-weight: 400;"> for advice, training, and consulting on how to improve their cybersecurity defenses. </span></p>
<p><span style="font-weight: 400;">In the meantime, remember not to store any sensitive information on your devices. In the meantime, there are </span><a href="https://www.forbes.com/sites/davidbalaban/2021/07/23/how-to-check-if-your-smartphone-is-infected-with-pegasus-spyware/"><span style="font-weight: 400;">already ways to check</span></a><span style="font-weight: 400;"> if your smartphone has been infected by Pegasus. </span></p>
<p>The post <a href="https://3cyber-sec.com/2021/09/27/the-pegasus-spyware-scandal-what-we-know/">The Pegasus Spyware Scandal: What We Know So Far?</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://3cyber-sec.com/2021/09/27/the-pegasus-spyware-scandal-what-we-know/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Curious Case of The SolarWinds Cyberattack</title>
		<link>https://3cyber-sec.com/2021/08/09/the-curious-case-of-the-solarwinds-cyberattack/</link>
					<comments>https://3cyber-sec.com/2021/08/09/the-curious-case-of-the-solarwinds-cyberattack/#respond</comments>
		
		<dc:creator><![CDATA[Krisi]]></dc:creator>
		<pubDate>Mon, 09 Aug 2021 11:13:26 +0000</pubDate>
				<category><![CDATA[Cyberаttacks To Remember]]></category>
		<guid isPermaLink="false">https://3cyber-sec.com/?p=1182</guid>

					<description><![CDATA[<p>After the global media outburst during the last few months, it is safe to say that the SolarWinds cyberattack is fairly popular and many people know about it today. However, this does not change the fact that no one was prepared for the unprecedented hack while it was taking place.</p>
<p>The post <a href="https://3cyber-sec.com/2021/08/09/the-curious-case-of-the-solarwinds-cyberattack/">The Curious Case of The SolarWinds Cyberattack</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">After the global media outburst during the last few months, it is safe to say that the SolarWinds cyberattack is fairly popular and many people know about it today. However, this does not change the fact that no one was prepared for the unprecedented hack while it was taking place.  </span></p>
<p><span style="font-weight: 400;">We’ve witnessed several US federal agencies and thousands of businesses being compromised with (possibly) a single supply chain cyberattack targeting SolarWinds &#8211; a company that provides network monitoring products to top USA state-owned and public organizations. What’s unique about this attack is its sheer magnitude. It was executed in a professional and precise manner with the help of complicated techniques. The cybercriminals behind it were highly knowledgeable and experienced hackers. They used sophisticated methods that enabled them to attack multiple companies while remaining undetected for at least 10 months. </span></p>
<p><span style="font-weight: 400;">While the investigation as to what exactly happened, who is responsible, and what will be the consequences is still ongoing, we’re here to take a look at this curious case and shed light on the key findings available to the public so far.</span></p>
<h2><span style="font-weight: 400;">How was the SolarWinds cyberattack performed, who was compromised, and who is responsible?</span></h2>
<blockquote><p><span style="font-weight: 400;">The SolarWinds hack was a supply-chain attack. </span></p></blockquote>
<p><span style="font-weight: 400;">Cyberattacks of this kind can compromise the security of a given organization through third-party providers who have access to the organization&#8217;s network, systems, and data. In this case, the hacked third-party provider was SolarWinds. As a result, </span><a href="https://whatis.techtarget.com/feature/SolarWinds-hack-explained-Everything-you-need-to-know"><span style="font-weight: 400;">over 18 000 networks, systems, and data were compromised</span></a><span style="font-weight: 400;">. Additionally, more than 200 private businesses (including big names such as Microsoft, Cisco, FireEye, and Intel) and </span><a href="https://www.nbcnews.com/news/us-news/russian-hackers-breach-u-s-government-effort-aimed-agencies-private-n1251057"><span style="font-weight: 400;">several federal agencies</span></a><span style="font-weight: 400;"> including the US Department of Commerce, the US Department of Homeland Security, the US Department of the Treasury, the National Institutes of Health, the US Department of Energy, and the National Nuclear Security Administration were also affected by the attack.  </span></p>
<p><span style="font-weight: 400;">Although it is still not confirmed who is responsible for the hack, </span><a href="https://www.wsj.com/articles/pompeo-blames-russia-for-solarwinds-hack-11608391515"><span style="font-weight: 400;">US government officials</span></a><span style="font-weight: 400;"> and popular media websites such as The </span><a href="https://www.washingtonpost.com/national-security/russian-government-spies-are-behind-a-broad-hacking-campaign-that-has-breached-us-agencies-and-a-top-cyber-firm/2020/12/13/d5a53b88-3d7d-11eb-9453-fc36ba051781_story.html"><span style="font-weight: 400;">Washington Post</span></a><span style="font-weight: 400;">, have claimed that the attack was performed by a <strong>Russian hacking group referred to as APT29 or Cozy Bear</strong>. The idea that the hacking group was state-funded and a part of Russia&#8217;s foreign intelligence service was also mentioned to the public. Donald Trump, on the other hand, </span><a href="https://www.businessinsider.com/solarwinds-software-cybersecurity-breach-trump-russia-china-pompeo-technology-2020-12"><span style="font-weight: 400;">posted a tweet about two weeks after the attack’s</span></a><span style="font-weight: 400;"> discovery in which he expressed his beliefs that China may be the one behind it. That said, for the time being, there is no proof that either of the two countries was involved.</span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-1183 size-full" src="https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-e1628505493189.png" alt="" width="1200" height="492" srcset="https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-e1628505493189.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-e1628505493189-980x492.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-e1628505493189-480x270.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<p><a href="https://www.zdnet.com/article/microsoft-solarwinds-attack-took-more-than-1000-engineers-to-create/"><span style="font-weight: 400;">According to Microsoft</span></a><span style="font-weight: 400;">, there were more than a thousand cybercriminals who participated in the creation of the SolarWinds cyberattack and they must have had incredible skill sets. </span><a href="https://www.kiuwan.com/solarwinds-hack-timeline/"><span style="font-weight: 400;">It is believed</span></a><span style="font-weight: 400;"> that the initial hack took place way back in September 2019 when the attackers used a highly sophisticated malicious software referred to as </span><b>SUNSPOT</b><span style="font-weight: 400;"> to insert the now-infamous </span><b>SUNBURST</b><span style="font-weight: 400;"> malware into SolarWinds’ IT management software product </span><a href="https://www.solarwinds.com/orion-platform"><span style="font-weight: 400;">Orion</span></a><span style="font-weight: 400;">. The cybercriminals were able to replace one of Orion’s source files and add the SUNBURST backdoor code to it, which allowed them to bypass the cybersecurity defense systems that were in place, gain access to SolarWinds’ networks, as well as to SolarWinds’ clients’ networks, transfer files, execute files, profile the system, reboot the machine, and disable system services. As</span><a href="https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html"><span style="font-weight: 400;"> FireEye shares:</span></a></p>
<blockquote><p><span style="font-weight: 400;">The malware masked its network traffic as Orion Improvement Program (OIP) traffic and stored reconnaissance results within legitimate plugin configuration files, enabling it to blend in with legitimate SolarWinds activity. </span></p></blockquote>
<p><span style="font-weight: 400;">The SUNBURST backdoor enabled the attackers to introduce another malicious software, which was used to trojanize a series of Orion update fails, which were released by the IT service provider SolarWinds between March 2020 and June 2020, </span><a href="https://www.csoonline.com/article/3601508/solarwinds-supply-chain-attack-explained-why-organizations-were-not-prepared.html"><span style="font-weight: 400;">as CSO shares</span></a><span style="font-weight: 400;">. Once they gained access to the compromised systems, the hacker group was careful not to leave any traces and preferred to steal and use credentials to move laterally through the networks and establish remote access.</span></p>
<h2>Detection and Response</h2>
<p><span style="font-weight: 400;">The hack was first detected by the cybersecurity company FireEye at the beginning of December 2020. </span><a href="https://edition.cnn.com/videos/business/2021/02/24/fireeye-ceo-solarwinds-hack.cnnbusiness/video/playlists/business-cybersecurity/"><span style="font-weight: 400;">FireEye discovered that there has been unauthorized access</span></a><span style="font-weight: 400;"> to their systems and traced back the trail to SolarWinds. On the same day, 13th of December 2020, the USA’s Cybersecurity and Infrastructure Security Agency (CISA) issued an </span><a href="https://cyber.dhs.gov/ed/21-01/"><span style="font-weight: 400;">emergency directive</span></a><span style="font-weight: 400;"> with instructions for mitigating SolarWinds Orion Code Compromise. Furthermore, SolarWinds started informing its clients via </span><a href="https://twitter.com/solarwinds/status/1338325699300651018"><span style="font-weight: 400;">Tweets</span></a><span style="font-weight: 400;"> that they need to immediately upgrade the Orion Platform to another version to address the vulnerability. Shortly after, </span><a href="https://investors.solarwinds.com/news/news-details/2020/SolarWinds-Releases-Updates-to-Address-Vulnerability-Related-to-SUPERNOVA-Malware/default.aspx"><span style="font-weight: 400;">SolarWinds introduced two additional updates</span></a><span style="font-weight: 400;"> that were meant to serve as “hotfixes” along with instructions for their implementation.</span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-1184 size-full" src="https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-1-e1628505816998.png" alt="" width="1200" height="402" srcset="https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-1-e1628505816998.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-1-e1628505816998-980x402.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-1-e1628505816998-480x270.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<p><span style="font-weight: 400;">In mid-December, FireEye discovered a “killswitch”, which could block the functions of the malware and prevent it from doing further harm. However, as </span><a href="https://www.darkreading.com/attacks-breaches/fireeye-identifies-killswitch-for-solarwinds-malware-as-victims-scramble-to-respond/d/d-id/1339746"><span style="font-weight: 400;">darkreading.com shares:</span></a><span style="font-weight: 400;"> </span></p>
<blockquote><p><span style="font-weight: 400;">FireEye’s fix wasn’t effective for networks where the attackers might have already deployed additional persistence mechanisms. </span></p></blockquote>
<p><span style="font-weight: 400;">The scope of the attack became clear by the end of December when the majority of the victims were named in the press. At the beginning of January 2021 </span><a href="https://www.cisa.gov/news/2021/01/05/joint-statement-federal-bureau-investigation-fbi-cybersecurity-and-infrastructure"><span style="font-weight: 400;">a joint statement </span></a><span style="font-weight: 400;">by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Office of the Director of National Intelligence (ODNI), and the National Security Agency (NSA) was released. The statement informed that the National Security Council staff has stood up a task force construct composed of the FBI, CISA, and ODNI and supported by NSA. The task force group was named Cyber Unified Coordination Group and its main purpose was to “</span><i><span style="font-weight: 400;">coordinate the investigation and remediation of this significant cyber incident involving federal government networks</span></i><span style="font-weight: 400;">”. On the 6th of January CISA issued supplemental guidance in relation to the emergency directive for mitigation of the SolarWinds hack. Furthermore, the security agency updated the directive with additional information and instructions once more &#8211; on the 22nd of April. </span></p>
<p><span style="font-weight: 400;">At the end of January 2021, CISA issued a</span><a href="https://us-cert.cisa.gov/ncas/analysis-reports/ar21-027a"><span style="font-weight: 400;"> malware analysis report</span></a><span style="font-weight: 400;"> with technical details about the malicious software used for the attack, while SolarWinds also published a </span><a href="https://www.solarwinds.com/sa-overview/securityadvisory"><span style="font-weight: 400;">security advisory </span></a><span style="font-weight: 400;">with information about the company’s response to the incident. Around one month later, in late February, the national security adviser Jake Sullivan announced during </span><a href="https://edition.cnn.com/2021/02/19/politics/sullivan-solarwinds-khashoggi/index.html"><span style="font-weight: 400;">an interview for CNN</span></a><span style="font-weight: 400;"> that the US administration is working towards addressing those responsible for the attack within weeks: </span></p>
<blockquote><p><i><span style="font-weight: 400;">We are in the process now of working through a series of steps to respond to Solar Winds, including steps that will hold who we believe is responsible for this and accountable, and you will be hearing about this in short order. We&#8217;re not talking about months from now, but weeks from now, that the United States will be prepared to take the first steps in response to solar winds</span></i><span style="font-weight: 400;">.</span></p></blockquote>
<p><span style="font-weight: 400;">The cyberattack was so sophisticated that it became the reason for several council hearings the first of which </span><a href="https://www.reuters.com/article/us-usa-cyber-solarwinds-idUSKBN2AI2NN"><span style="font-weight: 400;">was held </span></a><span style="font-weight: 400;">on the 23rd of February by the US Senate intelligence committee. During the hearing executives from SolarWinds, Microsoft, FireEye, and CrowdStrike discussed the attack. As </span><a href="https://seekingalpha.com/pr/18204767-tech-firms-say-little-doubt-russia-behind-major-hack"><span style="font-weight: 400;">Associated Press</span></a><span style="font-weight: 400;"> informs, the CEO of FireEye, Kevin Mandia, told the Senate that his company has had nearly 100 people working to study and contain the breach since they detected it in December 2020. On February 26th the executives from SolarWinds, FireEye, and Microsoft were summoned once more to testify before a</span><a href="https://www.c-span.org/video/?509349-2/house-hearing-solarwinds-hack"><span style="font-weight: 400;"> joined house hearing</span></a><span style="font-weight: 400;"> held by the US House of Representatives&#8217; Oversight and Homeland Security Committees. The main topics of the hearing were concerned with how and why did the SolarWinds hack happened, was classified government information compromised, and what are the existing vulnerabilities to the cyber supply chain.</span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-1185 size-full" src="https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-2.png" alt="" width="1200" height="600" srcset="https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-2.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-2-980x490.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-2-480x240.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<p><span style="font-weight: 400;">At the beginning of March 2021, CISA issued another set of guides on remediating networks affected by the SolarWinds hacks and encouraged affected organizations to review and apply the necessary guidance. At the end of the same month, news broke that the SolarWinds hacker group also managed to access email accounts belonging to the Trump administration’s head of the Department of Homeland Security and DHS cybersecurity staff members whose jobs included hunting threats from foreign countries, as </span><a href="https://apnews.com/article/solarwinds-hack-email-top-dhs-officials-8bcd4a4eb3be1f8f98244766bae70395"><span style="font-weight: 400;">Associated Press shares</span></a><span style="font-weight: 400;">. </span></p>
<p><span style="font-weight: 400;">One of the last actions in response to the SolarWinds cyberattack was undertaken a couple of weeks ago when on June 21st the US Securities and Exchange Commission started an investigation that aims to determine if any of the compromised companies failed to disclose that they had been affected by the SolarWinds hack, </span><a href="https://www.reuters.com/technology/us-sec-official-says-agency-has-begun-probe-cyber-breach-by-solarwinds-2021-06-21/"><span style="font-weight: 400;">as reported by Reuters</span></a><span style="font-weight: 400;">.</span></p>
<h2>Consequences of the SolarWinds Cyberattack</h2>
<p><span style="font-weight: 400;">Even now, one year and nine months after the initial SolarWinds cyberattack and seven months after the hack’s discovery, the investigation and remediation activities continue.</span><a href="https://www.technologyreview.com/2021/03/02/1020166/solarwinds-brandon-wales-hack-recovery-18-months/"><span style="font-weight: 400;"> According to Brandon Wales</span></a><span style="font-weight: 400;">, the acting director of CISA, officials will have fully secured the compromised government networks not earlier than 2022. Additionally, Wales said that even fully understanding the extent of the damage will take months and it could take up to 18 months before the US government recovers from the SolarWinds hack: </span></p>
<blockquote><p><span style="font-weight: 400;">There are two phases for response to this incident. There is the short-term remediation effort, where we look to remove the adversary from the network, shutting down accounts they control, and shutting down entry points the adversary used to access networks. But given the amount of time they were inside these networks—months—strategic recovery will take time</span><i><span style="font-weight: 400;">.</span></i></p></blockquote>
<p><span style="font-weight: 400;"><strong>Of course, the biggest, scariest, and most obvious outcome of the SolarWinds attack is the fact that thousands of private and several government organizations were compromised.</strong> It shouldn’t come as a surprise that </span><a href="https://www.techrepublic.com/article/how-the-solarwinds-attack-may-affect-your-organizations-cybersecurity/"><span style="font-weight: 400;">according to a survey by Domain Tool</span></a><span style="font-weight: 400;">s, 96% of the 200 respondents, amongst which global security specialists and executives, were concerned by the SolarWinds cyberattack. Furthermore, 60% of the impacted respondents said they were still not sure whether the compromised data was breached and 21% admitted that their sensitive data was in fact breached. </span></p>
<p><span style="font-weight: 400;">It is not a secret that cyberattacks often lead to a damaged reputation and the SolarWinds case isn’t an exception. SolarWinds was planning to spin out SolarWinds MSP &#8211; another service offered by the company which provides monitoring and management IT solutions. After the attack, however, SolarWinds decided to re-brand their MSP business, which is now known as N-able. According to </span><a href="https://www.channele2e.com/news/n-able-spin-out-on-track-for-q2-2021/"><span style="font-weight: 400;">channele2e.com</span></a><span style="font-weight: 400;">, although company officials have stated that the N-able business and associated MSP software were not involved in the Orion attack, the January 2021 sales in the MSP software business were slightly impacted by it.</span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-1186 size-full" src="https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-3.png" alt="" width="1200" height="600" srcset="https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-3.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-3-980x490.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/08/3Cyber-Sec-blog-image-1200-x-600-3-480x240.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<p><span style="font-weight: 400;">The attack is also going to cost a lot of money. According to </span><a href="https://www.msspalert.com/cybersecurity-news/solarwinds-revenue-earnings-after-hack/"><span style="font-weight: 400;">MSSP Alert</span></a><span style="font-weight: 400;">, <strong>SolarWinds said that it already had to pay $3.5 million in one-time expenses</strong> related to the hack. Furthermore, <strong>the company’s executives said that they estimate costs of $20 million to $25 million related to the hack</strong> and going towards upgrading the company’s security posture in 2021. </span></p>
<p><span style="font-weight: 400;">No one is safe against innovative cyberattack methods &#8211; that is the essential lesson to learn from the sophisticated SolarWinds hack. Businesses have to be cautious when trusting third-party providers regardless of how well-known their brands are. Furthermore, cybersecurity experts and companies should continuously strive to better their defense mechanisms so that they can respond adequately and mitigate future risks. Last but not least, organizations need to achieve greater visibility concerning the vulnerabilities of their systems and networks. </span></p>
<p><span style="font-weight: 400;">If you need help with identifying the vulnerabilities of your systems or if you seek expert cybersecurity advice, </span><a href="https://3cyber-sec.com/contact-us/"><span style="font-weight: 400;">contact us for a free consultation</span></a><span style="font-weight: 400;">. 3Cyber-Sec is a boutique cybersecurity consultancy company. Our primary focus lies in the development of cyber and information security control frameworks, infrastructure as well as vulnerability management solutions.</span></p>
<p>The post <a href="https://3cyber-sec.com/2021/08/09/the-curious-case-of-the-solarwinds-cyberattack/">The Curious Case of The SolarWinds Cyberattack</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://3cyber-sec.com/2021/08/09/the-curious-case-of-the-solarwinds-cyberattack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>One Of The Biggest Data Breaches Of The Century: Sina Weibo</title>
		<link>https://3cyber-sec.com/2021/06/21/one-of-the-biggest-data-breaches-of-the-century-sina-weibo/</link>
					<comments>https://3cyber-sec.com/2021/06/21/one-of-the-biggest-data-breaches-of-the-century-sina-weibo/#respond</comments>
		
		<dc:creator><![CDATA[Krisi]]></dc:creator>
		<pubDate>Mon, 21 Jun 2021 10:27:40 +0000</pubDate>
				<category><![CDATA[Cyberаttacks To Remember]]></category>
		<guid isPermaLink="false">https://3cyber-sec.com/?p=904</guid>

					<description><![CDATA[<p>Whether it’s because they are immensely popular and have billions of active users, or because influential people can be easily reached and blackmailed through such platforms, hackers just love to delve into innovative cyberattack methods directed towards social media.</p>
<p>The post <a href="https://3cyber-sec.com/2021/06/21/one-of-the-biggest-data-breaches-of-the-century-sina-weibo/">One Of The Biggest Data Breaches Of The Century: Sina Weibo</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Social platforms are one of the evergreen targets for cybercriminals. Whether it’s because they are immensely popular and have billions of active users, or because influential people can be easily reached and blackmailed through such platforms, hackers just love to delve into innovative cyberattack methods directed towards social media. Facebook, Instagram, Twitter, LinkedIn, and other similar websites also provide the opportunity for paid advertising, which can often reach millions of people thus offering a huge audience to the attacker. <a href="https://www.forbes.com/sites/davidthier/2020/07/05/hackers-are-spreading-trump-propaganda-through-roblox/?sh=5073d92a6aa7">There have been reported cases</a>, in which attackers have even distributed political propaganda within social media and gaming applications. What we’re getting to is: social media was, is, and will continue to be a desirable field for cybercriminals for all sorts of reasons.</p>
<p>It is not a secret that cyberattacks often aim to cause data breaches. According to the <a href="https://pages.riskbasedsecurity.com/hubfs/Reports/2020/2020%20Q3%20Data%20Breach%20QuickView%20Report.pdf">RiskBasedSecurity report</a>, data breaches exposed 36 billion records in the first three quarters of 2020. And of course, we shouldn’t forget that social platforms also store massive amounts of sensitive data related both to the users and to the particular network as well. Furthermore, personal data was involved in 58% of last year’s breaches, as shared by <a href="https://www.varonis.com/blog/cybersecurity-statistics/">varonis.com</a>. Just a few months ago, a hacker who tackled a vulnerable feature of Facebook in 2019, leaked the personal data of more than 533 million Facebook users for free. As <a href="https://www.businessinsider.com/stolen-data-of-533-million-facebook-users-leaked-online-2021-4">Business Insider shares</a>, the exposed data includes the personal information of users from 106 countries, including over 32 million in the US, 11 million in the UK, and 6 million in India. It includes their phone numbers, Facebook IDs, full names, locations, birthdates, bios, and, in some cases, email addresses.</p>
<p>So we shouldn’t be surprised that one of the biggest data breaches of the century was extremely similar to Facebooks’ sensitive data leak. It targeted the Chinese microblogging website Sina Weibo, which is often referred to as the Chinese Twitter.</p>
<p>&nbsp;</p>
<h2>The Sina Weibo Data Breach</h2>
<p>At the end of March 2020, the former security chief of Alibaba Wei Xingguo announced via a Weibo post that the personal data of more than 538 million of the Twitter-like platform users, including his own, was compromised and leaked online. The breach included details such as real names, usernames, user IDs, number of Weibo tweets, number of followers and accounts users are following, gender, and geographic location. Fortunately, no passwords were leaked, however, this does not mean that the exposed information could not lead to scams, fraud, and other types of impersonation attempts.</p>
<p>To make things worse, the sensitive information of 172 million of all compromised user accounts was sold on the dark web for as little as 1,799 Chinese Yuan or approximately 250 U.S. dollars, as <a href="https://securityboulevard.com/2020/03/stolen-data-of-538-million-weibo-users-for-sale-on-the-dark-market/">Security Boulevard</a> shares. It isn’t hard to believe that the incident resulted in negative public outbursts and was covered by a number of Chinese and international media.</p>
<p>&nbsp;</p>
<h2>Sina Weibo’s Official Statement</h2>
<p>On the 21st of March last year, Sina Weibo posted an <a href="https://weibo.com/2735327001/IzCMJioqC?type=comment">official statement</a> in regards to the breach. The company acknowledged the incident as a severe one and expressed its beliefs that the breach is a result of a so-called dictionary attack. A dictionary attack is a form of brute-force attack which aims to guess a password or another security code by trying thousands or millions of likely possibilities. For example, previously used passwords or lists with key phrases, which are usually obtained from past security breaches.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-906 size-full" src="https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-18.png" alt="" width="1200" height="600" srcset="https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-18.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-18-980x490.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-18-480x240.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<p>Sina Weibo claimed that back in 2011 the company introduced a special service that enabled users to look for other Weibo accounts by matching them to the list of their smartphone contacts. However, the company clarifies that users could only gain information about a given number-related account name. In the same statement, Weibo assured users that their passwords are protected with one-way encryption and are not stored as plain text. The company warned users that although their passwords are safely stored, their Weibo accounts could still be stolen in case their password is used for multiple platforms and websites.</p>
<p>Additionally, according to <a href="https://www.itproportal.com/news/data-of-over-500m-weibo-users-for-sale-on-the-web/">IT Pro Portal</a>, Sina Weibo stated its engineers had identified certain accounts that tried to upload large batches of contacts in late 2018 in order to match them with phone numbers held in the database. It’s interesting that the attack allegedly occurred in 2018, but it was either not noticed for a couple of years, or the information about it was simply silenced. Furthermore, Sina Weibo’s statement is not particularly convincing, because it contains contradictory points. The company claims that passwords were not leaked, however, implies that the attack was initiated because hackers were able to obtain users’ passwords and thus gained access to the leaked information (usernames, gender, location, etc.). As <a href="https://tesonet.com/cybersecurity/a-cautionary-tale-the-biggest-data-breaches-of-the-century/">tesonet.com</a> shares, Chinese security experts also detected technical irregularities with the company’s claims. A definite conclusion hasn’t been reached yet and the question of how the data was obtained is still up for debate.</p>
<p>Weibo’s Director of Information Security Luo Shiyao also commented on the attack, downplaying it as cited by <a href="https://securityaffairs.co/wordpress/100243/data-breach/weibo-data-dark-web.html">Security Affairs</a>:</p>
<blockquote><p><em>“Phone numbers were leaked due to brute-force matching in 2019 and other personal information was crawled on the Internet. When we found the security vulnerability we took measures to fix it. We also reported to the police as soon as possible and submitted related information to them. Besides, we have been investigating the ‘gray industry’ because we take user personal information very seriously, especially when the personal data contains phone numbers. Don’t be credulous. Both password fields and Know Your Customer (KYC) data fields are not shown in the description. Don’t worry too much. Good night.”</em></p></blockquote>
<p>&nbsp;</p>
<h2>The Consequences of Sina Weibo Data Breach</h2>
<p>Soon after the breach was announced, China&#8217;s information technology regulator summoned Sina Weibo for a face-to-face meeting over the leak. The Twitter-like platform was obliged to enhance its internal data security management and eliminate further risks. As <a href="https://www.yicaiglobal.com/news/china-it-ministry-takes-sina-weibo-to-task-over-538-million-user-data-leak">yicaiglobal.com</a> shares, the Chinese Ministry of Industry and Information Technology issued a press release which confirmed that Sina Weibo has taken action in response to the information breach, such as updating its interface security strategy. However, there is no official information about whether Sina Weibo was fined because of the breach or not. As <a href="https://www.varonis.com/blog/cybersecurity-statistics/">varonis.com</a> shares, usually, the average cost of a data breach is $3.86 million as of 2020.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-905 size-full" src="https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-19.png" alt="" width="1200" height="600" srcset="https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-19.png 1200w, https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-19-980x490.png 980w, https://3cyber-sec.com/wp-content/uploads/2021/06/3Cyber-Sec-blog-image-1200-x-600-19-480x240.png 480w" sizes="auto, (min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" /></p>
<p>Even if the company hasn’t been fined yet, it did suffer reputational damages which resulted in a decrease in Sina Weibo users. As reported by <a href="https://www.chinainternetwatch.com/statistics/weibo-mau/">China Internet Watch</a>, users now are 4% less than the same period last year. The average daily users also suffered a 5% year-over-year decrease.</p>
<p>&nbsp;</p>
<h2>Stay Safe</h2>
<p>While your organization may be protected against cybercriminals, the third-party website you use may still propose risks for you and for your company. Cyberattacks on social media can compromise your company’s data if you have created an account for your business. However, you shouldn’t let fear stop you from growing and expanding your organization.</p>
<p>Stay safe by having a thorough cybersecurity program with clear response plans in place. If you need help with keeping your organization safe in the cyber world, don’t hesitate to <a href="https://3cyber-sec.com/contact-us/">contact us</a>. 3Cyber-Sec is a boutique cybersecurity consultant that protects its clients from cyberthreats by crafting tailored security solutions. We use a unique collaborative approach to guide our clients throughout their cyber journeys safely.</p>
<p>&nbsp;</p>
<p>The post <a href="https://3cyber-sec.com/2021/06/21/one-of-the-biggest-data-breaches-of-the-century-sina-weibo/">One Of The Biggest Data Breaches Of The Century: Sina Weibo</a> appeared first on <a href="https://3cyber-sec.com">3Cyber-Sec</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://3cyber-sec.com/2021/06/21/one-of-the-biggest-data-breaches-of-the-century-sina-weibo/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
