US government agencies are falling victim to some very obvious attacks

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • PCHF IT Feeds
    PCHF Bot
    • Jan 2015
    • 54585

    #1

    US government agencies are falling victim to some very obvious attacks

    The use of legitimate remote monitoring and management (RMM) tools among cybercriminals targeting government firms have gotten so widespread that US Federal law enforcement and intelligence agencies have been forced to issue a joint warning.

    In their alert, the NSA, CISA, and MS-ISAC said they discovered malicious activity inside the networks belonging to ā€œmultiple federal civilian executive branch (FCEB) agenciesā€.

    The organizations were prompted to do the analysis after cybersecurity researchers Silent Push published their report in October 2022. To do that, they deployed EINSTEIN - a federal civilian executive branch (FCEB)-wide intrusion detection system (IDS) operated and monitored by CISA, to analyze the state of the networks.

    [HEADING=1]Fake help desk emails[/HEADING]

    What they found was linked to a ā€œwidespread, financially motivated phishing campaignā€ Silent Push had earlier referred to.

    The crooks start by sending fake help desk phishing emails to email addresses belonging to people working for various government institutions.

    ā€œThe authoring organizations assess that since at least June 2022, cyber criminal actors have sent help desk-themed phishing emails to FCEB federal staff’s personal, and government email addresses,ā€ it says in the alert. ā€œThe emails either contain a link to a ā€˜first-stage’ malicious domain or prompt the recipients to call the cybercriminals, who then try to convince the recipients to visit the first-stage malicious domain.ā€

    Read more
    Scammers are spoofing official UK Government Energy Support Scheme websites

    Chinese government hackers apparently stole millions in Covid benefits

    Here’s our list of the best ID theft protection tools right now
    The goal of the campaign is to have the victims download RMM, in an attempt to refund the money accidentally paid for software (the victims never really paid for anything, but that’s part of the fraud scheme). Once they download and run the software, the crooks will try and get them to log into their bank accounts. If that happens, they find a way to steal the money.

    ā€œAlthough this specific activity appears to be financially motivated and targets individuals, the access could lead to additional malicious activity against the recipient’s organization—from both other cybercriminals and APT actors,ā€ the organizations further stated.

    ā€œMalicious cyber actors could leverage these same techniques to target National Security Systems (NSS), Department of Defense (DoD), and Defense Industrial Base (DIB) networks and use legitimate RMM software on both work and home devices and accounts.ā€

    [ul]
    [li]Here is our list of the best firewalls today[/li][/ul]

    Via: BleepingComputer

    Continue reading…
Working...