

Mounir Hahad
Head feature_status*/ ?>
Juniper Threat Labs, Juniper Networks
Comments Dotted :
22
November 25, 2020
Think twice about signing on through Google or a social media account.
To protect themselves on Black Friday, Cyber Monday, and throughout the holiday shopping season, here are three ways consumers can protect their online security.
- Don’t register at every website – they don’t need to host your PII or payment data.
- Think twice about signing on through Google or a social media account – this gives away much more data than many would care to share.
- It’s difficult at this time of year to remember every website you use, but try and keep track of those .....Read More

November 20, 2020
Magecart is more of a threat in 2020 than ever before.
E-commerce and retailers are at substantial and increased risk of Magecart attacks this year, largely because the site plug-in providers are a vast, unmonitored and leaky supply chain for most online retail websites. The average online retailer website has 39-40 external sources of Javascript alone, not counting CSS code. In most organizations, no one person tracks who added them or why and through what vetting process, if any.
The ecosystem at website-level continually expands, forming a.....Read More

November 13, 2020
The only caveat to that is the social engineering tactics used to perform SIM swapping, transferring your phone number to someone else illegitimately.
I wouldn’t sound the alarm for everyone using phone-based 2FA. No security is perfect. A determined and well-funded actor with lots of time and resources can indeed defeat such 2FA security for worthy targets. But it does not mean everyone needs to worry about their bank’s 2FA using phones. It requires much more access than what a cybergang member in a foreign country would have access to. The only caveat to that is the social engineering tactics used to perform SIM swapping, which would.....Read More

November 05, 2020
Their decision of communicating with victims through email only seems again like a poor choice.
Going after virtual disks seems like a niche market for threat actors. Most ransomware does not need to deal with virtual disks to pose a threat.
Their decision of communicating with victims through email only seems again like a poor choice. It is true that picking an Iceland-based email provider gives them some privacy, but it doesn’t protect against criminal activity. Once Ctemplar takes action and closes their email account, their victims will be left hanging to dry with no contact with.....Read More

November 02, 2020
Fortunately, the harm that can come from this kind of data breach is limited and nowhere near what a threat actor can do with the same information.
We often think of data breaches as the consequence of a threat actor infiltrating a network and gaining access to a sensitive data set. The majority of data breaches are small in the number of records exposed and are caused by human error when either policies are set wrong or data is sent to the wrong people. Fortunately, the harm that can come from this kind of data breach is limited and nowhere near what a threat actor can do with the same information.

October 20, 2020
It is indeed unlikely the password hashes would be reusable on some other site where you have used the same username and password.
Most professionals wouldn’t look twice at a game portal data breach that only exposed usernames and password hashes. It is indeed unlikely the password hashes would be reusable on some other site where you have used the same username and password. But the attacker had access to the users’ profiles, which includes email addresses and that’s a bit more valuable to mount future phishing attacks.

October 01, 2020
Mounir Hahad, head of the Juniper Threat Labs at Juniper Networks
Swatch watchmaker’s CIRT team gets it: time is of the essence, no pun intended. Responding quickly to what seems a bit off on an InfoSec console screen can make the difference between staring at a ransom note and saving the day.

August 18, 2020
Credentials reuse is a big issue.
Credentials reuse is a big issue getting a lot of smart people to think about getting rid of passwords as an authentication method altogether. But we’re not there yet, so I’m glad the government of Canada was able to spot the brute force attempt quickly. Can you imagine if this was perpetrated slowly over months instead of hours? It is possible that the attack would go undetected.

August 12, 2020
The anonymity of TOR comes from its distributed nature and its ephemeral relay servers.
People think that TOR is a bullet proof anonymity tool. It’s not. It has been known that sometimes even authorities run TOR exit nodes just to monitor traffic. The anonymity of TOR comes from its distributed nature and its ephemeral relay servers. But if someone manages to throw enough servers into the mix, they might just control enough of the traffic to get a pretty good idea of what’s flowing though the network.

August 06, 2020
This data could have been sitting in this hacker’s treasure trove for a number of months until they decided to publish it.
The immediate focus of every organization should be to ensure no future unauthorized logins occur. Anyone who had run the vulnerable version of Pulse VPN after the disclosed vulnerability should force all users to change passwords immediately and invalidate those passwords that do not get changed in a 24 hour window. Admins should also change their passwords and ssh keys on the Pulse VPN devices.
It is true that the list seems to have been put together starting June 27, 2020, but that is not.....Read More
