""/
Cyber Tips

How to set up multi-factor authentication

If your organisation is using Microsoft Outlook for email, you can enable and set-up 2FA to protect your email in less than 15 minutes (depending on the number of email accounts).

If you have a policy with us visit Node Prevent and our pre-paid cybersecurity experts will assist. 

Passwords are no longer good enough to protect email accounts. We strongly recommend you implement this simple and cost-effective measure. 2FA protects your organization because it adds another layer of protection to password-protected remote access to your email.

2FA is an authentication method that includes a password (something you know) and a time sensitive token or code (something you have).

In other words, even if the hacker has stolen an employee’s login credentials, 2FA should prevent them from accessing an email account, since they would also need to have the employee’s mobile phone which is being used as the 2nd authentication factor.

""/
Cyber Threat Alert, Cyber Tips, Phishing

Watch out! SolarWinds Hackers return, targeting company emails

Microsoft just released new information on a widespread malicious email campaign by Nobelium, the same hackers behind the massive SolarWinds incident.

This active campaign has already targeted 3,000 email accounts across 150 organizations. Microsoft reports the emails are crafted to look like they are from the United States Agency for International Development (USAID), including some that read “special alert” and “Donald Trump has published new documents on election fraud.”

The links go to Nobelium infrastructure and deliver a malicious file which allows hackers “persistent access to compromised machines.” Microsoft published this sample email screenshot from the malicious campaign.

Example email below:

If you receive an email similar to this or purportedly from the USAID, please forward it to your IT department and do NOT click on any links in the email.

Node Prevent
When you purchase one of our cyber insurance policies you’ll receive vital cybersecurity updates such as this and online training courses to keep your employees up-to-date with the current cyber threats.

Cyber Threat Alert, Cyber Tips

Hackers Actively Exploiting Zero-Day Bug in Acrobat Reader – UPDATE NOW!

Adobe just released a security bulletin addressing a zero-day vulnerability, CVE-2021-28550, affecting Adobe Acrobat Reader in both Windows and macOS systems. The affected products include Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat 2020, Adobe Acrobat Reader 2020, Adobe Acrobat 2017, and Adobe Acrobat Reader 2017. The attack exploiting this vulnerability is generally through a malicious PDF attachment to a phishing email. If you receive an unexpected email from an unknown sender with a PDF attachment, verify it is legitimate before opening the attachment!

If you are using an Adobe product, update it as soon as possible. Adobe recommends users update their software to the latest versions.

The latest product versions are available to end users via one of the following methods:

  • Users can update their software manually by choosing Help > Check for Updates.
  • If the auto-update feature is enabled, products will update automatically, without requiring user intervention, when updates are detected.
  • The full Acrobat Reader installer can be downloaded from the Acrobat Reader Download Center.

Review Adobe’s latest security updates.

""/
Cyber Threat Alert, Cyber Tips, Node Chats

New Linux Backdoor Discovered – Attacking Linux Endpoints and Servers

New backdoor malware targeting Linux operating systems has been discovered, hiding as a polkit daemon. It is has been named RedXOR for its network data encoding scheme based on XOR. 

Analysing the Tactics, Techniques, and Procedures (TTPs), RedXOR is thought to be developed by Chinese threat actors. The malware samples have low detection rates in VirusTotal, and is used in targeting attacks against legacy Linux systems.

There are also many similarities between RedXOR and the reported malware associated with Winnti umbrella threat group known as the PWNLNX backdoor, as well as to XOR.DDOS and Groundhog, two botnets attributed to Winnti by BlackBerry. The below samples can be used for reference:

The samples are both unstripped 64-bit ELF files called po1kitd-update-k. Similarities between the samples includes the use of old open-source kernel rootkits, both use the CheckLKM function, and both provide the attacker with a pseudo-terminal using Python pty shells and many other similarities.

The malware makes a remote connection to the command and control server over a TCP socket. The traffic is made to look like HTTP traffic. The command and control server instructs the malware to execute different commands returned in the JSESSIONID cookie. The malware can also be updated by the attacker by sending commands to the malware. The malware can also create new remote shells to get a pseudo-terminal (pty) interface and can perform network tunnelling.

How to Detect and Respond

Use the information below to detect and respond this threat. We suggest using the following indicators of compromise to ensure the RedXOR and the files it creates do not exist in your environment:

Indicators of Compromise

RedXOR Hashes
0a76c55fa88d4c134012a5136c09fb938b4be88a382f88bf2804043253b0559f
0423258b94e8a9af58ad63ea493818618de2d8c60cf75ec7980edcaa34dcc919

Network
update[.]cloudjscdn[.]com
158[.]247[.]208[.]230
34[.]92[.]228[].216

Process name
po1kitd-update-k

File and directories created on disk
.po1kitd-update-k
.po1kitd.thumb
.po1kitd-2a4D53
.po1kitd-k3i86dfv
.po1kitd-nrkSh7d6
.po1kitd-2sAq14
.2sAq14
.2a4D53
po1kitd.ko
po1kitd-update.desktop
S99po1kitd-update.sh


Follow these steps if you are a victim of this malware:

  1. Kill the process.
  2. Delete all files related to the malware.
  3. Make sure your machine is clean and running only trusted code.
  4. Contact the Experts for assistance if needed.

Node Prevent

When you purchase one of our cyber insurance policies you’ll receive vital cybersecurity updates such as this and online training courses to keep your employees up-to-date with the current cyber threats.

""/
Cyber Threat Alert, Cyber Tips

More Microsoft Exchange Vulnerabilities! Patch now!

The U.S. National Security Agency (NSA) recently discovered additional security vulnerabilities in Microsoft Exchange Server 2013 through 2019.

In response, Microsoft released yesterday more security updates for these systems. It is critical that you patch these systems immediately because Microsoft expects threat actors will exploit these vulnerabilities soon. Exchange Online customers are already protected and do not need to act.

Patch Now!
To protect your organization, update your Exchange Server.

You can get the Microsoft updates here.

Interested to learn more? Read our article from the beginning of March which explained what happened.

Cyber Tips, Tech

Happy Thanksgiving! Stay Safe With Our 5 Simple Cyber Tips!

We wish you all the best over the holiday season!

As Black Friday approaches, more people are shopping online than ever before, and consequently, scams and cyber-crime are skyrocketing. 

We would like to share our five useful tips to help identify and avoid cyber scams over the holidays.  

Any last minute submissions? We have underwriters working as usual over the holiday period so don’t hesitate to get in touch. 

Feel free to download and share!

Want more? Drop us an email, we would love to share our creative content with you. 

Recent Comments
    About Node International

    We provide leading comprehensive insurance coverage combined with essential cybersecurity prevention and detection tools.

    Related Links
    Cyber Insurance Newsletter

    Interested in Cyber Insurance?

    Privacy Settings
    We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
    Youtube
    Consent to display content from Youtube
    Vimeo
    Consent to display content from Vimeo
    Google Maps
    Consent to display content from Google
    Spotify
    Consent to display content from Spotify
    Sound Cloud
    Consent to display content from Sound