Category: In The News

With Google’s promotion of their Chrome 86 versions, 35 security fixes are also being rolled out among Windows, Mac, Android and iOS users. The fixes include a critical bug and a feature that checks if users have any compromised passwords.

There is one flaw that remains, however.  Included in the newest browser version is a critical flaw (CVE-2020-15967) existing in Chrome’s payments component.  This can cause an array of malicious impacts, from causing a program to crash, to potentially leading to execution of arbitrary code.

Google won’t disclose further details about the bugs as “access to bug details and links may be kept restricted until a majority of users are updated with a fix,” according to their Tuesday post.

Ransomware Attack Slows Down COVID 19 Clinical Trials

By Amine Mekkaoui,

Ransomware Attack Slows Down COVID 19 Clinical Trials by Croyten

eResearchTechnology, a medical software company that supplies pharma companies with tools for conducting clinical trials – including trials for COVID-19 vaccines, has been hit by a ransomware attack. According to initial investigation, the attackers could be financially motivated or backed by a nation-state looking to gain competitive advantage. Researchers were forced to switch to pen and paper for tracking patient data while the attack went on for almost two weeks. Thanks to data backups, the impact of the attack was limited and the company is now in recovery mode.

It’s known that attacks on organizations leading the medical fight against the coronavirus pandemic have been continuing. Hence, it is crucial to stay safe now more than ever from cyberattacks especially that a huge portion of the world is starting to operate online. 

On a side note, our company Croyten helps in cybersecurity. To know more about us, just click this link:

IRS COVID-19 Relief Payment Gets Prone to Phishing

By Amine Mekkaoui,

IRS-COVID-19-Relief-Payment-Gets-Prone-to-Phishing by Croyten

A credential-phishing email campaign is making the rounds, using the lure of coronavirus tax relief to scam people into giving up their personal information. The data-harvesting cybercriminals are looking to take advantage of the Internal Revenue Service (IRS) deadlines that are approaching for consumers who haven’t received an Economic Impact Payment. Using a SharePoint form, users are asked for email credentials, Social Security numbers, driver’s license numbers and tax ID numbers.

To avoid falling victim, users should remain vigilant, and be wary of entering any personal information – including Social Security numbers and the like – after clicking on a link in an email. If your organization is prone to phishing and other similar attacks, better have your system and employees ready. You may tap an IT Solutions company to help you out, such as Croyten. The company assists organizations in creating IT systems that cannot be penetrated by cyber attackers

Beware of Facebook Grant Scams

By Amine Mekkaoui,

Offering $100 million in cash grants to businesses affected by the coronavirus pandemic, Facebook has been scrammed by scammers through phishing. Knowing that this is such big news, cybercriminals presented the news as if Facebook was handing out money to all users of the social network affected by COVID-19. They created a website similar to the news outlet, CNBC, and asks its victims to fill out and submit a form which gives them access to the users Facebook account — enough to trick their friends into sending money. The real CNBC site does indeed have an article about Facebook grants, but for businesses — the real beneficiaries of the program. 

On a different note, if your organization needs assistance with your IT and cyber security, feel free to check the services we offer at Croyten. 

Joker Trojan Attacks Android Ecosystem

By Amine Mekkaoui,

More variants of the Joker Android malware are cropping up relentlessly targeting Android mobile platforms, Google Play. Zscaler have found 17 different samples of Joker being regularly uploaded during September. The Joker malware is a mobile trojan that carries out a type of billing fraud advertising themselves as legitimate apps. Once installed, they simulate clicks and intercept SMS messages to subscribe victims to unwanted, paid premium services. Recent variants exhibited some new tricks, such as the use of AES encryption, and code injection into Android’s “content provider” function.

Croyten will recommend and help you build defenses from any type of malwares. Now that more cyber attacks are coming in, it is crucial that your company stands resilient against them.

A report by NTT Ltd shows the root cause of the cybersecurity threat having substantially increased is perhaps the obsolete or aging devices. According to the report, on an average, an obsolete device has twice as many vulnerabilities per device (42.2 percent) compared to aging (26.8 per cent) and current devices (19.4 percent). These devices create security vulnerabilities and put businesses at risk of cyber attacks with people logging in from co-working spaces and remote work locations. The report suggests increase in investment in on-premises infrastructure and cloud spending.

Events like this are addressed by our company, Croyten, by reviewing your cybersecurity controls and recommending changes so that your critical system will be hard to penetrate by cyber attackers. Learn more about the services we offer.

APT28 Mounts Rapid, Large-Scale Theft of Office 365 Logins

By Amine Mekkaoui,

APT28. a Russia-linked threat group has changed up its tactics to include Office 365 password-cracking and credential-harvesting. The attacks have been aimed mainly at U.S. and U.K. organizations directly involved in political elections and have been going on since April.

Microsoft telemetry shows that the group launched credential-harvesting attacks against tens of thousands of accounts at more than 200 organizations between last September and June. 

Organizations and individuals can protect themselves by applying multi factor authentication (MFA) and actively monitoring for failed authentications for the cloud service.

Events like this are addressed by our company, Croyten, by designing your cyber systems into something that’s impenetrable by cyber attackers. Learn more about the services we offer.

A series of ransomware attacks and other cyber threats have plagued back-to-school plans.  Just last week, Hartford’s ransomware attack caused an outage of critical systems, including the school district’s software system that delivers real-time information on bus routes. The attacks include Zoom-bombing, a trend that began earlier in 2020 which occurs when a bad actor gains access to the dial-in information and “crashes” a Zoom session – often sharing adult or otherwise disturbing content. As students prepare to return to school virtually, school districts should prepare and step up their security in battling these virtual classroom hijacking attacks.

To further learn about Ransomware you can check our full article on the said topic at {insert link}. If you need IT solutions or assistance with your cyber security, feel free to check out our company, Croyten.

Remote Workers: At-Risk for Cyber Attacks

By Amine Mekkaoui,

Recently, a cyber attack on Twitter took place when a 17 year old hacker posed as a trusted colleague and tricked a Twitter employee into sharing user credentials by using basic hacking techniques. The hacker was then able to spoof the Twitter employee’s phone number through SIM swapping obtaining personal information and intercepted the one-time passwords (OTPs) used for multi-factor authentication (MFA) and quickly elevated his privileges inside the company.

With so many businesses shifting to remote work, the days of the IT-controlled security perimeter are long gone. Cybercriminals are fully aware of the mass work-from-home shift, and they’re crafting their attacks accordingly. If things like this can exist in big companies like Twitter, it could like work in yours too.

If you want to strengthen the security of your organization’s cyber system and have employees that are cyber-competent, it might be interesting for you to check out our company, Croyten. We specialize in IT solutions and cybersecurity.

WhatsApp Commits To More Transparency About App Flaws

By Amine Mekkaoui,

WhatsApp update flaws

Facebook-owned WhatsApp has fixed six previously undisclosed vulnerabilities in its chat platform. Some of the bugs were:

1) a URL-validation issue that caused the recipient of a sticker message containing deliberately malformed data to load an image from a sender-controlled URL without user interaction; and

2) an input-validation issue that could have allowed cross-site scripting if a user clicked on a link from a specially-crafted live location message. WhatsApp have patched these bugs as soon as they were discovered, and said that they will keep “with industry best practices” and conduct “necessary fixes”.