Hackers are leveraging a a two-year-old flaw in a third-party plug-in to infect scores of companies with GandCrab ransomware through their managed service provider (MSP) according to Chris Bisnett at Huntress Labs.
Justin Jett, Director of Audit and Compliance at Plixer:
“One of the most dangerous risks to businesses are the technologies controlled or owned by third parties. Organizations must be vigilant by monitoring network traffic to and from businesses devices and assets. Malicious actors can only gain value from compromised devices if they have communication with that device. This means they have some external device used to communicate like a command-and-control setup. This allows them to leak data, but it also means they expose themselves to businesses that deploy network traffic analytics. While it is impossible to completely control supply chain vulnerabilities, by monitoring network traffic to devices vendors are granted access, businesses can identify anomalous behavior, report the problem to the vendors, and close security loopholes more quickly than if they wait to be informed by the vendor that there was a breach.”
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.