In July 2024, the FBI and CISA issued warnings about increasing Distributed Denial of Service (DDoS) attacks on election infrastructure and related systems. Throughout 2024, SonicWall has tracked a notable rise in DDoS attacks, with a projected 32% increase by year’s end compared to 2023. These attacks, which could be aimed at disrupting public access to crucial election information, are increasingly targeting not only election systems but also broader government agencies. Data from 2024 shows consistent growth in these attacks, with major spikes recorded in May and August, confirming the severity of federal concerns.

Cybersecurity Risks in Everyday Devices: The Hezbollah Pager Attack

The 2024 Hezbollah pager supply chain attack underscores the threat posed by everyday devices with weak security. Attackers have begun targeting these devices to access critical systems, exploiting gaps in cybersecurity and using them as backdoors to initiate widespread attacks. Such methods could easily extend to IP cameras at polling locations like schools and churches, which often have weaker security measures. Attackers might compromise these cameras, potentially accessing sensitive information or even disrupting voting processes.

Potential Impacts on Election Security and Public Trust

If attackers were to sabotage IP cameras at polling places—similar to the tactics in the Hezbollah pager attack—the impact could be devastating. Beyond compromising physical security, such an attack could force evacuations, delay voting, and damage infrastructure. The psychological impact of such incidents could significantly erode public confidence in election integrity, possibly leading to delays, contested results, and heightened social unrest. While many cyber criminals are financially motivated, state-sponsored actors are often driven by disruption and psychological warfare, making these attacks particularly insidious.

Emerging Vulnerabilities in IoT Devices and IP Cameras

IoT devices, like IP cameras, are becoming prime targets for cyberattacks due to their weak security protections. SonicWall has observed over 12.9 million attempts to exploit IP camera vulnerabilities in 2024 alone. Compromised devices can be hijacked to disable surveillance or participate in large-scale DDoS attacks. Hackers, including state-sponsored entities, might target IP cameras in government facilities or election centers to conduct surveillance, manipulate camera feeds, or even disable security systems, posing a significant threat during sensitive operations.

Critical Vulnerabilities in Major IP Camera Brands

IP cameras from brands like Hikvision, Axis, and WIFICAM have known vulnerabilities that hackers exploit to infiltrate networks:

  • Hikvision Command Injection (CVE-2021-36260) allows attackers to inject commands, gaining full control of a device and making it susceptible to espionage and botnet recruitment.
  • Authentication Bypass (CVE-2017-7921) on Hikvision cameras enables attackers to bypass login mechanisms, compromising administrative functions and potentially disrupting surveillance.
  • Wireless IP Camera Weaknesses in P2P-enabled devices with weak authentication are also highly vulnerable, allowing attackers to access video feeds, alter settings, or launch attacks on connected networks.

During election cycles, compromised IP cameras could disrupt security at voting stations or ballot storage facilities, enabling attackers to tamper with feeds or disable cameras. The involvement of threats like the Reaper IoT botnet, which actively seeks out vulnerable devices, amplifies these risks by making coordinated DDoS attacks more feasible.

Mitigation Strategies for IP Camera Security

To safeguard IP cameras and related IoT devices, organizations should consider the following best practices:

  • Regular Firmware Updates: Keep devices updated to protect against recent threats.
  • Network Segmentation: Isolate IP cameras on separate networks to prevent them from being gateways to broader attacks.
  • Zero Trust Network Access (ZTNA): Enforce strict identity and access checks, even on isolated networks, to prevent unauthorized access.
  • Strong Authentication: Use complex, unique passwords and disable default credentials.
  • Monitor Logs and Traffic: Regularly monitor for unusual activities, especially on critical networks.
  • Disable Unnecessary Features: Restrict or disable remote access, particularly P2P functionality, to minimize potential entry points.

These strategies can help organizations better protect IP cameras and other IoT devices, preserving the security of government and election infrastructure against evolving cyber threats.

 

 

The post Rising Threat of Malware and DDoS Attacks on Government Organizations appeared first on Cybersecurity Insiders.

As more businesses move online, establishing an e-commerce channel is essential to meet buyer expectations for speed and convenience. But as more activity is conducted online, businesses face a rising threat that can’t be overlooked: business identity theft. This especially rings true for businesses serving other businesses, or B2B organizations. In 2024, over one-third of online merchants experienced business identity theft, posing a problem for a company’s bottom line, reputation and customer trust. 

Business leaders are more concerned about business payment fraud during the holiday season, and rightfully so, since business payment fraud attempts spike during this time. As criminals continue to get smarter, the damage from these attacks can impact business stability. With 96% of U.S. companies reporting being targeted by at least one payment fraud attempt in the year, it is important that businesses understand the risks and take action. Here are five common challenges businesses face with identity theft, and what you can do to stay ahead.

The Complexity of Business Identity Theft

Business identity theft is far more complex than consumer identity theft. It often involves large-scale financial fraud, tax evasion and supply chain manipulation. One of the simplest and most common tactics is email spoofing, where criminals impersonate a legitimate business email domain to commit wire fraud, attempting to trick companies into transferring funds or shipping goods by appearing as a trusted partner. In these cases, the attackers often have minimal information beyond the email domain itself, relying on deception to prompt quick responses.

Another tactic is the use of shell companies, which criminals create and then let ‘age’ to help appear legitimate. Some fraudsters also leverage recently inactive or defunct business identities to give their schemes a veneer of credibility. This issue is especially challenging in regions like the UK, where public databases make it easier for criminals to identify dormant or expired business identities to exploit. The result is often financial loss and reputation damage for the companies that unknowingly interact with these fraudulent entities. Staying ahead of these tactics requires companies to adopt advanced technologies, like AI and machine learning, to monitor for unusual behavior and detect fraud before it causes damage.

Rising Costs and Financial Repercussions

Business identity theft carries heavy financial consequences, from direct losses to the costs of recovering stolen funds. Unfortunately, many businesses can only recover a fraction of what is lost – most less than 10% of what is stolen. With the increasing sophistication of these crimes, recovery is becoming harder and more costly. Compounding the problem, many cyber and security insurance policies no longer cover wire or payment fraud, reflecting how widespread this threat has become. Business disruptions caused by fraud can also lead to downtime, missed sales opportunities and higher insurance premiums. To protect your bottom line, businesses must invest in solid security solutions.

Reputational Damage and Long-Term Impacts

The fallout from business identity theft goes beyond financial loss. When fraud occurs, it can shake the confidence of customers, partners and suppliers, undermining trust in the business. Once a company has been targeted, it may even face repeated attacks as stolen data is often resold and reused, sometimes resurfacing in new fraud attempts even years later. 

As many as 66% of consumers report they would not trust a company following a data breach. In some cases, legal or regulatory penalties can follow, adding further strain on a company’s reputation. Recovery can take years, and for some businesses, the trust they’ve lost is often never fully restored. This lasting damage to a brand, especially in a competitive market, can significantly impact growth and customer loyalty. Addressing identity theft is not only about preventing immediate loss but also about protecting the long-term health of the business.

Balancing Security with Customer Experience

Businesses must strike a delicate balance between enhancing security and maintaining a smooth customer experience. Adding layers of security, like multi-factor authentication, identity verification and fraud detection measures, can slow down the transaction process, potentially frustrating customers. However, neglecting these safeguards leaves businesses open to attacks. A common protective measure is limiting shipping locations to verified business addresses and preventing changes in transit—methods often used to deter fraudsters who gain access to accounts via business email compromise. In these cases, attackers may phish an employee to obtain access, then use the compromised account to place orders.

The challenge is to integrate these security measures in ways that don’t disrupt the customer’s journey, such as using fraud detection systems that work in the background without interfering with purchases. This balance is especially critical as flexibility in payment options plays a huge role in customer satisfaction—78% of buyers say invoicing is a must, and over half would switch to a different merchant if they offer flexible net terms. Balancing security and customer needs keeps your business safe while building loyalty and average order volume. In fact, TreviPay company research found that retaining a business buyer for seven years can lead to a 150% increase in revenue per customer, jumping to 240% after ten years.

Finding the Right Fraud Prevention Expert

Fighting fraud requires a lot of work. Given the complexity of identity theft and the increasingly sophisticated tactics used by criminals, businesses can benefit from partnering with external fraud prevention experts. These specialists can provide the expertise and tools needed to safeguard against emerging threats while allowing companies to focus on their core business operations. Leveraging third-party providers for real-time decision-making, credit risk assessments and transaction monitoring can help businesses stay one step ahead of fraudsters. As fraudsters use increasingly advanced technology to outsmart existing defenses, having a trusted partner with deep industry knowledge and the right technology is critical to ensuring long-term protection and peace of mind.

To ensure end-of-year sales are safeguarded during the busy holiday season, companies must recognize business identity theft is present, complex and can have long-standing impacts on customer trust and public reputation. Leveraging partners with fraud prevention tools and expertise can also help quickly combat suspicious transactions, while allowing business leaders to focus on driving revenue and meeting buyer payment preferences. By offering seamless, consistent and financially secure experiences, businesses can boost buyer loyalty and order values for the holidays and beyond.

 

 

The post 5 Identity Theft Challenges Every Business Needs to Tackle appeared first on Cybersecurity Insiders.

Ransomware attacks have become a regular fixture in the headlines, wreaking havoc across industries, leaving organizations racing to restore operations, and customers worrying about the safety of their data. The fallout from a ransomware incident reaches well beyond operational disruptions—reputational damage, sharp declines in stock prices, and the risk of significant fines— creating a nightmare scenario for any organization. 

Between Q1 and Q2 of 2024, there was a 20% surge in the number of organizations listed on ransomware leak sites, underscoring the escalating threat of ransomware attacks. Although there is no way to predict cybercriminal behavior or ensure the safe recovery of compromised data, organizations can use emerging insights and trends to remain vigilant and strengthen their defenses against these ever-evolving threats.

One common way that ransomware can infiltrate an organization’s systems is through phishing attacks and the use of malware delivering ransomware. Threat actors craft deceptive phishing emails designed to trick individuals into clicking a malicious link or downloading an infected attachment. The number of malicious emails bypassing security systems rose by an alarming 104.5% last year alone. As Secure Email Gateways (SEGs) struggle to keep pace with evolving and increasingly sophisticated phishing campaigns, it’s crucial to understand the common methods by which malware delivering ransomware makes its way into users’ inboxes. 

Malware: The First Step in the Attack 

Ransomware begins its journey into a system via malware, or more specifically, Remote Access Trojans (RATs) or Loaders. Think of RATs as a type of malware that gives hackers a backdoor into your computer. Once inside, they can steal information, take control, or install dangerous ransomware. RATs are some of the most generalized malware in terms of capabilities, however they often require more effort to set up and maintain than simple information stealers or keyloggers. 

A prominent example of a RAT often used for delivering ransomware is the DarkGate RAT. This malware was most commonly seen being delivered in attached Office documents, prompting victims to click a malicious script link that downloads the DarkGate RAT binary. This Malware-as-a-Service (MaaS) is capable of the typical RAT functions as well as cryptocurrency mining, focused credential theft, loader capabilities, and anti-analysis behavior. It has been utilized by ransomware groups including BlackBasta to deploy ransomware, making it a notable factor in the threat landscape. 

The novel use of Office Documents with embedded URLs makes this RAT particularly effective in bypassing SEGs. Not only that, but since Office files are commonly exchanged via email in business environments, they can be difficult to detect as malicious by unsuspecting users. 

Other common RATs observed bypassing SEGs in 2024 that are capable of delivering Ransomware include Async RAT, Remcos RAT, XWorm RAT, and ConnectWise RAT. All of which are widely used by threat actors due to their free availability online and ease of use, allowing even inexperienced attackers to leverage basic malware to great effect. The most popular RATs seen in SEG protected environments are Async RAT and Remcos RAT. Async RAT is commonly delivered via a script that is downloaded from a link embedded in the email or in an attached PDF. Remcos RAT on the other hand is delivered through legitimate file-sharing sites that download a password-protected archive. The use of legitimate file-sharing websites allows emails delivering Remcos RAT to bypass a wide variety of SEGs. 

While these just serve as examples of the various ways RATs can be delivered through email, it is important to note the common use of trusted online sharing tools and embedded links in these campaigns. The use of legitimate file sharing platforms including Microsoft Office and Google Drive make it harder to differentiate malicious behavior, underscoring the need for caution when interacting with any unexpected links or downloads. 

From RATs to Ransomware: The Next Stage of the Attack

Understanding how these RATs spread through email is crucial, but it’s only part of the equation. Ransomware is most often delivered through the use of Initial Access Brokers (IABs). Threat actors will install a RAT that is capable of downloading additional malware, and then sell access to the infected computers. Ransomware groups will then buy access to specific infected machines, spreading laterally across the infected network to deploy ransomware to all systems within an organization. 

Some ransomware groups intentionally target high-value enterprises. These groups are well-organized and highly strategic, knowing which targets will yield the most significant payouts. Some notable ransomware groups that were observed bypassing SEG’s in the last six months include LockBit 3.0, BlackCat, BianLian, Akira, and BlackSuit. Each of these groups has distinct associations and focuses on specific industries, demonstrating the varied and adaptive nature of modern ransomware attacks.

Prevention Through Awareness 

Sadly, human error is one of the biggest vulnerabilities in any organization against these ransomware threats. Even with all the right defenses in place, it only takes one individual clicking an embedded link or downloading a malicious document to spread ransomware in an organization. This is why one of the most effective steps a company can take to bolster its proactive defenses is the implementation of security awareness training. Basic cyber literacy is becoming more common, but truly instilling a sense of suspicion when it comes to online interactions and activities takes time and a serious investment on the company’s part. 

Additionally, security teams should closely examine real-world examples of malware that bypass SEGs, along with the tactics, techniques, and procedures used by ransomware groups, to gain a deeper understanding of the current threat landscape. Leveraging these attacks to inform both security strategies and awareness training will better prepare organizations to defend against real-world scenarios.

 

The post The Growing Threat of Ransomware in 2024: What You Need to Know appeared first on Cybersecurity Insiders.

The landscape of API security is evolving rapidly, driven by increasing complexities in IT environments, the proliferation of third-party APIs, and the rise of generative AI applications. These factors are expanding the attack surface and introducing new vulnerabilities that traditional security measures struggle to address. The 2025  State of API Security Report by Traceable AI highlights these challenges, revealing that 57% of organizations have suffered API-related breaches in the past two years, with many experiencing multiple incidents. This comprehensive study, based on insights from over 1,500 IT and cybersecurity professionals, underscores the urgent need for more robust, purpose-built API security solutions.

The new 2025 State of API Security Report provides a detailed analysis of the latest trends, challenges, and best practices in API security. It examines the increasing prevalence of bot attacks and fraud, the risks associated with third-party APIs, and the security implications of generative AI applications. The report also highlights the inadequacy of traditional security solutions like Web Application Firewalls (WAFs) and API gateways in protecting against these evolving threats. By offering a thorough overview of how organizations are addressing these critical security challenges, the report aims to equip security leaders with the knowledge needed to make informed decisions and prioritize their API security efforts effectively.

Key Findings:

  • API-Related Data Breaches Remain a Major Issue: Over  the past two years, 57% of organizations experienced an API-related data breach, with 73% of these facing three or more incidents. Alarmingly, 41% reported five or more breaches, highlighting a widespread failure in API defenses and underscoring the need for dedicated API security solutions.
  •  
  • Traditional Security Measures Fall Short for API Protection: Despite the use of various security tools, including legacy WAFs, CDNs, and Gateways, only 19% of organizations consider their defenses to be highly effective. Additionally, 53% acknowledge that traditional solutions like WAFs and WAAPs are inadequate for detecting or preventing fraud at the API level.
  •  
  • Generative AI Applications Introduce New Security Challenges:  A significant 65% of organizations believe that generative AI applications pose a serious to extreme risk to their APIs. Furthermore, 60% indicate that the additional API integrations required for these applications increase their attack surface, with the same percentage expressing concerns about sensitive data exposure and unauthorized access.
  •  
  • Bot Attacks and Fraud are Pervasive: More than half  (53%) of organizations have encountered one or more bot attacks targeting their APIs, and 44% identify bot mitigation as a primary challenge. Fraud is also a major concern, ranking as the second most common cause of API-related data breaches among respondents.
  •  
  • Third-Party APIs Present Significant Risks: Organizations  now utilize an average of 131 third-party APIs, a slight increase from last year’s 127. However, only 16% report a high capability to mitigate these external risks, leaving a substantial portion of their attack surface vulnerable.

Traceable’s annual research provides a comprehensive overview of the constantly changing API security landscape, highlighting key risks and emerging trends. By meticulously tracking these developments, the report hopes to guide security leaders with critical insights needed to make strategic decisions and address the most pressing security challenges. The goal is to ensure that as APIs remain integral to business operations, organizations are equipped with the knowledge to effectively safeguard their vital assets.

 

The post 2025 Global State of API Security Report – New Data Shows API Breaches Continue to Rise Due to Fraud, Bot Attacks, and GenAI Risks appeared first on Cybersecurity Insiders.

With the new year fast approaching, organizations are beginning to plan for 2025 and draft budgets to help these plans come to fruition. Managing risk was central last year in both planning and budgeting – and there is no sign that that trend is slowing down. Because of new laws, managing an organization’s risk increasingly means mitigating the risks of doing business with other organizations. If you operate a business, a weak point in a vendor’s or partner’s security posture might as well be a weakness in your security. Your partners’ security and transparency problems are now yours, thanks to new regulations. Concerns about geopolitics and its effect on supply chains also mean risk management may be an even bigger consideration next year.

For these reasons, the way organizations practice third-party risk management (TPRM) is rapidly evolving. Last year was a big one when it came to managing third-party risks. Still, organizations will likely find that 2025 will require the same laser focus on business resilience, sustainability, and transparency.

With this in mind, here are seven predictions for how third-party risk management will evolve and change in 2025:

1. Predictive and Comparative Reporting and Accelerated Assessment and Documentation Workflows Will Become Possible Thanks to AI

AI made its presence felt in TPRM last year, and there is every reason to believe it will play a critical role in 2025 and beyond as organizations better understand their AI deployment over time and use the technology to automate risk assessments, improve their decision-making, and spot any problems faster.

Large Language Models (LLMs) and other AI-driven systems are poised to help businesses monitor third-party risk in real-time by analyzing large datasets and identifying patterns that could signal emerging risks. These technologies will also give organizations new capabilities to examine supporting evidence and find any contradictions between assessment responses and documentation.

However, AI will only prove successful if it is underpinned by strong data security, transparency, and governance policies. Its deployment will be held back if these are lacking. Last year, for example, only 5% of companies said they actively used AI in their TPRM programs because of a lack of governance. However, these numbers are likely to change significantly in 2025 as businesses adapt and grow comfortable using AI to automate tasks and reporting.

2. New Regulations Will Coordinate Requirements and Drive Elevated Due Diligence

Around the world, governments and regulators are expected to strengthen third-party risk management requirements, especially around data privacy, ESG (environmental, social, and governance), and business resilience. Cross-border businesses will face more complex compliance challenges, which may be partially alleviated by efforts to harmonize and streamline global rules to simplify compliance. 

Companies must more rigorously assess third-party suppliers and other partners, focusing on resilience and environmental impact. In America, DORA (Digital Operational Resilience Act) may serve as a model in the development of operational resilience standards in the financial sector, aligning with the efforts of the Office of the Comptroller of the Currency. The rise of ESG mandates like the EU CSRD and CSDDD will require businesses to closely evaluate their partners’ sustainability practices, such as carbon emissions, labor practices, and ethical sourcing.

3. Geopolitics Will Prompt Organizations to Assess Concentration and Resilience Risks 

Political instability in the Middle East, East Africa, the South China Sea, and Ukraine is driving companies to monitor their extended ecosystems more closely. Organizations are intensifying their analysis of ultimate business owners (UBOs) and key individuals to better anticipate disruptions and avoid the risk of sanctions. Additionally, they are expanding vendor firmographic data to gain insight into regional and technological concentration risks, aiming to minimize potential downtime.

4. Third-Party Risk Ownership Becomes Embedded into Business Culture

Historically, IT security teams led TPRM programs because of the focus on IT infrastructure risks. However, as cyber threats grow and new risks emerge, TPRM must shift toward a more collaborative, enterprise-wide approach. TPRM will likely become the purview of enterprise risk teams to better integrate it with broader business processes. Procurement teams will also play a larger role, as sourcing, due diligence, and vendor offboarding are increasingly critical to managing risk effectively across the organization. This represents a major change to the way risk is mitigated today.

5. A Consolidated Board Perspective Will Require Centralized GRC and TPRM Risk Reporting 

As third-party risk management (TPRM) becomes more deeply integrated with enterprise risk management, it will expand into broader governance, risk management, and compliance (GRC) functions. Boards and senior management will increasingly demand consolidated, business-impact-focused views of internal or external risks. To prepare, organizations should develop and report on unified key risk indicators accessible to both business and non-technical stakeholders, allowing for clearer insights into risk exposure and impact across the enterprise.

6. Risk Aggregation Improves Focus on Business Resilience

As third-party cybersecurity incidents remain widespread—and are likely to keep proliferating–businesses need to evaluate the collective risk posed by their entire third-party ecosystem. Recognizing how interconnected risks can affect multiple suppliers will be essential for keeping supply chains resilient. 

Organizations can address this issue by adopting continuous, aggregate monitoring across risk domains—such as cyber, operational, reputational, ESG, and financial— —to quickly detect shifts in third-party risk profiles. Real-time data will enable faster, more effective responses to threats, enhancing overall business resilience.

7. The Inflection Point for Third-Party Data Breaches

In the past several years, the number of third-party cybersecurity incidents has grown significantly, jumping from 21% of companies reporting such an incident in 2021 to more than 60% reporting the same in 2024. The breaches have also increased in severity, with millions of people affected. We can expect cybercriminals to double down on these efforts in 2025, targeting third parties that support high-profile and sensitive industries such as healthcare providers, financial services companies, educational institutions, state governments, and manufacturers.

Looking to the Future

The pace of change in how organizations manage third-party risk is speeding up. The heightened focus on business resilience, the rollout of new AI programs, and new regulations will make TPRM programs more dynamic and effective. 

By embracing innovations and staying in front of fast-changing trends, organizations can manage third-party risks effectively —  even in a shifting landscape of business partnerships and regulatory requirements.

 

 

 

The post Third-Party Risk Management: The Top 7 Predictions for 2025 appeared first on Cybersecurity Insiders.

Red Piranha is a leading developer & manufacturer of premium Cyber Security products in Australia. Red Piranha is also an official member of Team Defence Australia that promises to deliver advanced cybersecurity capabilities to its clients. By using automation, world-class technologies, and the best available talent, Red Piranha delivers solutions for information security, delivering maximum defence against the malicious intent of threat actors to organisations of every size and scale.

The smart attackers of today use tricks to slip past those traditional defences, like the EDR (Endpoint Detection and Response) systems. To remain protected now means using the latest solutions that comply with global security standards and are able to provide complete visibility across both network and endpoints.

This is a challenge addressed by Red Piranha’s Crystal Eye TDIR solution. Crystal Eye is designed to offer organizations advanced threat detection and response, capable of protecting against even the most elusive threats. To learn more about how Crystal Eye adheres to the global standards of security to counter the advanced threats, read Red Piranha’s whitepaper titled, “Red Piranha TDIR: Global Compliance, Unmatched Security” 

Meeting the Global Cybersecurity Challenge: Practical Solutions for Today

As cyber threats become more sophisticated, the United States Cybersecurity and Infrastructure Security Agency (CISA) along with other agencies around the world collaborate in an effort to agree on standardized guidelines that promote better detection of threats and response to incidents. The guidelines would therefore involve sophisticated event logging, threat detection, and even safe strategies for responding to incidents within IT, cloud, and OT environments.

In step with these global best practices, Red Piranha’s TDIR solution provides the best-in-class capabilities for event logging, incident management, and network visibility    in order to stay ahead of cyber criminals.

The Rise of EDR Evasion Tools and LOTL Attacks

The major threats of today to any organization are the EDR evasion tools available on underground cybercrime forums. This is a way for attackers to bypass traditional endpoint security, leveraging tactics such as LOTL, where legitimate tools like PowerShell or WMI are used to camouflage malicious activities in a way that makes it difficult for traditional EDR systems to detect.

How Red Piranha’s Crystal Eye TDIR aligns with Global Guidelines?

1. Utilize AI and Machine Learning for Threat Detection

Red Piranha Crystal Eye solutions (with the help of AI/ML-powered analytics) detect subtle anomalies in user behaviour and network traffic. This enables the identification of complex threats to security teams (such as Cobalt Strike or other C2 callouts) that would otherwise remain undetected.

 Crystal Eye (CE) goes one step further than traditional techniques through the analysis of encrypted traffic and the integration of threat intelligence into detection. It therefore allows organisations to stay one step ahead of the threat actors. CE’s next-generation threat detection capabilities, enabled by User & Entity Behaviour Analytics (UEBA), are empowered to identify anomalies in patterns of behaviour that are outside the norm and could signify insider threats or external attacks. 

2. Real-Time Alerts and Incident Response Automation

One of the key features and one of the foundations of the TDIR platform at Red Piranha is real-time alert generation in relation to critical cybersecurity events and Indicator of Compromises (IoCs). In this light, Crystal Eye integrates incident response automated workflows that can help organizations rapidly detect and respond to malicious activities, minimizing the window of exposure. For example, the response system automatically triggers the isolation of the affected systems and mitigates the threat in real time in the event of a LOTL attack. Such proactive measures ensure that an attack is contained well before it spreads, which greatly reduces any potential impact on business operations.

3. Complete Network Visibility with NDR

Traditional EDR tools focus on endpoint data, which attackers can often manipulate. Crystal Eye NDR by Red Piranha goes further—it watches the entire network, tracking east-west traffic to spot anomalies that hint at early attack stages, like privilege escalation or data theft attempts. This network-wide monitoring is key for detecting threats that hide behind legitimate tools (such as PowerShell in LOTL attacks) by adding a critical layer of security beyond traditional endpoint defence.

4. Event Logging and Centralized Log Management

Efficient event logging is key to strong detection and response. Crystal Eye TDIR streamlines log management, gathering logs securely across systems for analysis. It not only captures logs but correlates them from different environments, offering a complete view of security events.

Crystal Eye supports the customization of log retention policies and secures all critical security data in protected storage. Its centralized approach to compliance makes it easier to handle, thus enabling the organization with the visibility it needs to detect complex assaults over time, delivering immediate reaction to them.

Proactive Threat Hunting and Extended Log Retention

Crystal Eye empowers security teams to hunt down threats proactively instead of waiting for alerts. Its automated threat-hunting dashboards constantly optimize detection rules, enabling early discovery and fast action against advanced attacks. Plus, with over 18 months of log retention, it’s equipped to track complex, long-term threats like APTs that might take time to uncover.

Enhanced Incident Response with MDR

The volume of security alerts has become very challenging for almost any organization to manage. Crystal Eye’s MDR service helps alleviate this burden by automating the triaging of alerts, freeing security teams to focus on the most critical threats. Our customers are guaranteed that no critical events will go unnoticed because of expert support around the clock and courtesy of Red Piranha’s Security Operations Centre.

It automates containment and remediation activities involved in incident response, meaning security teams can respond to incidents in minutes versus days. This minimizes the damage an attack can potentially cause and ensures business recovery times are as fast as possible. 

Conclusion 

The accelerating sophistication of cyber threats demands that organisations apply advanced solutions with proactive, real-time defence capabilities. The Crystal Eye TDIR solution offered by Red Piranha is a complete, scalable platform solution that not only meets global cybersecurity compliance standards but also expands threat detection, investigation, and response competencies across the IT, cloud, and OT environments.

 

 

 

The post Detect and Destroy APTs with Crystal Eye TDIR appeared first on Cybersecurity Insiders.

Application programming interfaces (APIs) play a crucial role in modern business, particularly for banks, retailers, and global enterprises, by streamlining financial data transfers. In the financial industry, APIs offer significant advantages, such as reducing IT complexity and simplifying processes for financial transactions. However, as financial organizations increasingly rely on APIs, they must also ensure compliance with regulatory standards.

CFPB 1033’s Impact on Open Banking and APIs

The Consumer Financial Protection Bureau (CFPB) has recently passed rule 1033 which will grant consumers the right to access their financial data held by financial institutions, promoting transparency and consumer control over personal financial information. The rule, which organizations must comply with by April 2026, will also allow consumers to share their financial information with third parties, such as budgeting apps, payment services, or financial advisors.

To make sure financial information flows freely across the U.S., open banking interfaces must be highly available, demonstrating uptime (where the API is accessible and operational) of at least 99.5% of each month. In addition, open banking APIs need to be fast. The rule does not specify exactly how fast open banking APIs need to respond; instead, they say that speed of response will be determined by looking at the speeds of the entire industry, as a “consensus standard.”Comparing each bank against the consensus standard will allow the entire banking ecosystem to improve, and make all open banking transactions faster for everyone over time.

There are also strong security and privacy rules, to ensure consumer financial data is protected. Banks and third parties that access this data must demonstrate that they are using secure transmission protocols, and their data requests can be denied or blocked if they do not demonstrate appropriate security. Indeed, the CFPB 1033 rules will impact how banks and financial technology companies develop and manage APIs, as they must ensure all APIs align with new regulatory requirements for data quality, security, and interoperability, all to protect consumer rights. 

Learning from Open Banking in the UK

In the UK, current open banking regulations require industry regulators to be notified if APIs encounter issues. Notifications are mandated, for example, if an API deviates from its intended specification, provides inaccurate data, or fails to deliver information in the correct format. 

The UK has long led the open banking movement, with regulations in place from 2018. The transaction volumes through Open Banking protocols are growing quickly, and are now utilized by over 11% of UK consumers. Payments APIs, which securely transmit financial information from a device to the internet, and ultimately, to the bank for settlement, have become increasingly robust and reliable. This pioneering approach has set the foundations for API best practices that many other regions are now adopting to develop similar frameworks.

Both the UK and the US open banking rules have requirements for public reporting of compliance. But one area where CFPB have expanded the regulatory framework is in requiring a minimum performance standard. The goal is to ensure that APIs are performant, so they can be reliably built into payments infrastructure to speed transaction flows.

Getting API Security Right

Securing APIs is essential as the number of exposed APIs grows, expanding the potential attack surface. Poorly designed or inadequately maintained APIs can introduce vulnerabilities, heightening the risk of exploitation. In the financial secretary, security for transactions is paramount, with many organizations adopting advanced OAuth2.0 or the Financial-grade API (FAPI) as their standards for API security. 

To ensure compliance throughout the entire lifecycle of an API – not just during its initial deployment – regulatory reporting requirements have been implemented. For instance, in the UK, organizations must submit annual API reports and report any breaches immediately. The U.S. rule requires  13 months of reporting to be publicly available, updated at least monthly.

Meeting Compliance Expectations

To meet API compliance requirements, all businesses need to establish effective monitoring systems for their APIs to meet industry standards, particularly within the specific regions where they operate. For companies without the right tools, tracking API compliance can be a slow, labour-intensive process often involving manual steps. In addition, proactive security and governance of APIs are essential for the sustained success of open banking; without these, businesses may encounter issues with regulators and standardization bodies. 

To overcome these challenges, companies should put rigorous controls in place for their API services, including real-time and automated monitoring, access management, testing, and governance checks. Taking a comprehensive approach allows for complete visibility into API performance, enabling early identification and resolution of potential service disruptions, security risks, or compliance issues before they are noticed. 

Ongoing API testing and monitoring are also critical to maintaining compliance and preventing API drift, where APIs diverge from their intended framework over time. Recent studies show that 75% of tested APIs had endpoints that didn’t conform to standards, highlighting the need for continuous oversight. By using tools that consistently test for compliance and monitor API behaviour in real-time, organizations can mitigate security risks and maintain reliable service.

Ultimately, as more regulations like the rule 1033 are enacted, this marks a significant shift in the regulation of financial data access and privacy, with API performance and monitoring at the heart. Indeed, we already see other industries following this path, meaning every organization should take appropriate steps to align with data-sharing requirements, to ensure compliance with privacy and security.

 

The post CFPB Rule Changes Presents New Open Banking Challenge – Ensuring Compliance with API Standards appeared first on Cybersecurity Insiders.

The traditional cybersecurity landscape separated the functions of attack simulation (red teams) and defense (blue teams), with each operating independently. While valuable, this approach can leave organizations vulnerable due to missed communication and a lack of understanding of the attacker mentality.

Enter purple teaming, a revolutionary approach that breaks down these silos and fosters a collaborative environment between red and blue teams. Unlike traditional red vs. blue testing, which can focus on achieving specific results rather than real-world threats, purple teaming prioritizes collaboration and shared knowledge to build a more robust defense. Imagine a scenario where red team ingenuity, informed by blue team knowledge of the organization’s network architecture, identifies a novel phishing campaign targeting specific employees. 

This proactive identification allows blue teams to implement targeted training and security measures, effectively mitigating the threat. Purple teaming isn’t about merging teams, but forging a strong bond that creates a security machine far greater than the sum of its parts.

What is purple teaming and how does it work?

While red and blue teams remain distinct entities, purple teaming bridges the gap through close collaboration. This trust and cooperation hinge on a shared understanding of cyber threats and the effectiveness of defenses. The MITRE ATT&CK framework serves as a common language, enabling both teams to simulate realistic attacks based on observed adversary tactics, techniques, and procedures (TTPs).

Combined with automated breach and attack simulation platforms, purple teaming allows for continuous testing of security controls against likely threats. This leads to a proactive and threat-informed defense strategy, ensuring your organization is prepared for real-world attacks.

Unlocking the benefits of a unified approach

Red and blue teams have unique strengths that, when combined, create a powerful force. Purple teaming optimizes these skillsets and minimizes limitations, leading to several key benefits:

  • Focused red team testing: Blue teams possess deep knowledge of the organization’s business, network, and security architecture. This knowledge is invaluable for red teams, guiding them towards testing the threats that pose the greatest risk and informing mitigation strategies.
  • Enhanced blue team capabilities: Blue teams often struggle to think like cybercriminals. Red teams, trained to exploit vulnerabilities, can provide crucial input – offering a glimpse into the adversary’s mindset and influencing defensive decision-making.
  • Improved security outcomes: Traditional red versus blue exercises can focus on passing tests rather than building real-world defenses. Purple teaming refocuses efforts on addressing genuine threats, ensuring your organization is prepared for the attacks it’s likely to face.

Putting purple teaming into practice

Implementing purple teaming requires a strategic approach. Here are some initial steps to consider:

1.Facilitate collaboration: Build consensus on the most significant threats your organization faces. Red and blue teams should jointly review MITRE ATT&CK attack variants and TTPs, prioritizing adversary techniques for testing.

2.Workshop potential breaches: Organize workshops focused on attacker techniques, your organization’s security controls, and potential responses/mitigations. This collaborative exercise fosters understanding and helps develop solutions for critical security challenges.

3.Automate testing processes: The sheer number of threats necessitates automated testing beyond manual efforts. Invest in an automated security validation platform aligned with MITRE ATT&CK. This platform can continuously emulate probable attack methods in production, ensuring ongoing control effectiveness.

4.Embrace continuous improvement: Purple teaming thrives on a collaborative mindset. Blue teams need to feel confident that they won’t be penalized for control gaps identified during red team tests. CISOs and leaders must foster a supportive environment where both teams see themselves working towards a common goal. Open communication between red and blue teams, as well as management, is crucial for establishing this culture.

A brighter future for cybersecurity

By breaking down silos and fostering collaboration, purple teaming represents a paradigm shift in cybersecurity. It empowers organizations to proactively identify and address vulnerabilities, building a more robust defense against the ever-evolving threat landscape. By harnessing the combined power of red and blue teams, you can unlock a future where your organization is one step ahead of cybercriminals.

 

 

The post Unleashing the Power of Purple Teaming: A Collaborative Approach to Cybersecurity appeared first on Cybersecurity Insiders.

Fortinet® (NASDAQ: FTNT), a global leader in cybersecurity, has broadened its application of generative AI (GenAI) technology across its suite of products by introducing two new capabilities through FortiAI, the company’s GenAI-powered security assistant. These latest enhancements are aimed at optimizing security analysts’ workflows by providing more efficient guidance, automation, and support for threat detection and response.

“Our commitment to AI innovation is reflected in our expansion of generative AI, which now enhances seven different products across our portfolio,” said John Maddison, Chief Marketing Officer at Fortinet. “By integrating FortiAI in such a broad range of solutions, we’re equipping our customers with powerful, adaptive tools that transform how they manage and respond to cyberthreats. As cyber risks continue to grow, we’ll continue to empower our customers with solutions that streamline security processes, improve decision-making, and bolster resilience against evolving threats.”

New FortiAI Integrations Enable Advanced Threat Detection and Response

FortiAI for FortiNDR Cloud is specifically tailored to support threat hunters by simplifying access to detection insights and responses that align with specific threat queries. Security analysts can leverage FortiAI’s interface to understand FortiNDR Cloud’s coverage of emerging threats, threat actor tactics, techniques, and specific vulnerabilities. This feature accelerates threat searches, allowing analysts to better evaluate their defensive posture against attackers.

FortiAI for Lacework FortiCNAPP, on the other hand, is designed to empower SOC teams by providing faster insights into alerts and offering guided remediation steps. With natural language queries, SOC teams can investigate the underlying causes of alerts, assess risks, understand potential attacker pathways, and receive step-by-step instructions for investigating and addressing issues. This integration also allows users to streamline remediation through pre-validated code suggestions.

Comprehensive AI Integration Across Fortinet’s Product Ecosystem

Fortinet’s recent GenAI integrations enhance a growing list of products, building on its broader commitment to AI-driven innovation in cybersecurity. Fortinet’s portfolio now includes the following GenAI-powered solutions:

  • FortiAI for FortiAnalyzer: Delivers real-time threat prioritization and automated response capabilities.
  • FortiAI for FortiManager: Assists in generating network configuration scripts, troubleshooting, and automating vulnerability and network issue resolution.
  • FortiAI for FortiSIEM: Provides contextual intelligence and recommendations for handling security alerts.
  • FortiAI for FortiSOAR: Facilitates guided investigations, remediation workflows, and automated playbook creation.
  • FortiAI for FortiDLP: Summarizes and provides context around data associated with high-risk activities.

Additional Resources

  • Learn more about FortiAI.
  • Explore Fortinet’s free cybersecurity training, covering extensive cyber awareness and product training as part of the Fortinet Training Advancement Agenda (TAA), and learn about the Network Security Expert (NSE) Certification and other training programs through the Fortinet Training Institute.
  • Access FortiGuard Labs threat intelligence, research, and Outbreak Alerts for proactive mitigation strategies.
  • Discover how Fortinet customers are enhancing their organizational security.
  • Follow Fortinet on X, LinkedIn, Facebook, and Instagram, and subscribe to Fortinet’s blog and YouTube channel for the latest updates.

 

The post Fortinet Expands Generative AI Integration Across Cybersecurity Portfolio to Enhance Security Operations appeared first on Cybersecurity Insiders.

ANY.RUN, a leader in interactive malware analysis and threat intelligence, has released a technical analysis authored by RacWatchin8872 documenting new techniques used in multi-stage attacks involving AsyncRAT. The report details how attackers exploit open directories to distribute AsyncRAT, examines the infection mechanisms, and offers indicators of compromise (IOCs) for identifying and mitigating this persistent threat.

 

Overview

AsyncRAT is a type of Remote Access Trojan (RAT) malware designed to stealthily infiltrate systems and give attackers remote control over infected devices. It is commonly used for spying, data theft, and manipulation of compromised systems. 

Recently, two open directories surfaced, each employing unique methods to distribute and infect victims with AsyncRAT. These techniques highlight the persistent threat posed by this malware and its diverse infection strategies.

Technique 1: Infiltration via Open Directory Structure

Open Directory

While investigating malicious open directories exposed to the internet, I discovered one with an unusual structure. 

The directory contained the following files:

  • A text file with an extensive string that turned out to be a VBS script

  • A JPG file that was actually a disguised ZIP archive

Figure 1 – Open directory structure

Analysis of the Txt file

The text file’s extensive string conceals an obfuscated VBS script. It uses random variables to store parts of the text that will be used to download the JPG file.

Figure 2 – Obfuscated VBS code

To make it easier to read we just need to make a few changes:

  1. Replace the variables with the actual text,

  2. Use intuitive names for variables that are used to write or download files.

Figure 3 – Deobfuscated VBS code

Now we see that the VBS script creates an XML file OMjRRRRRRRRRRRRRRRRRRRRvbK.xml located at C:UsersPublic. The content of the XML file contains a PowerShell script that downloads the disguised JPG file, saves it, and extracts it to the same directory.

Once extracted, the process continues by executing another script, TesKKKeLAvaYdAfbBS.vbs. Then, it cleans up by deleting both the XML and ZIP files.

Figure 4 – TesKKKeLAvaYdAfbBS.vbs obfuscated

To make it simple to read, we just need to make a few changes:

  1. Replace the variables with the actual text,

  2. Use intuitive names for variables that are in use,

  3. Delete all the If Statements that execute the same code regardless of the result.

By making these changes, we can transform a 34-line VBS script into a simpler 6-line version that is easier to read.

Figure 5 – Clean TesKKKeLAvaYdAfbBS.vbs

Analyze malware inside ANY.RUN’s Interactive Sandbox for free →

Analysis of the Bat file

The BAT script is also obfuscated, but it is possible to understand its purpose by reading the values stored inside the variables vertically.

Uma imagem com texto, captura de ecrã, software, Software de multimédia

Descrição gerada automaticamente

Figure 6 – KKKKKKllLavIOOOOOtesAA.bat file

Its role is to execute PowerShell without a prompt window. It initiates the next stage by running KiLOvBeRNdautESaatnENn.ps1

Analysis of the PowerShell (PS1) file

The PS1 file is a simple script that creates a scheduled task named ‘tMicNet Work40,’ which runs UhLQoyDAMaCUTPaE.vbs every 2 minutes. 

Uma imagem com texto, captura de ecrã, Tipo de letra, software

Descrição gerada automaticamente

Figure 7 – Scheduled task created by PowerShell

Analysis of the Second VBS file

UhLQoyDAMaCUTPaE.vbs has the same structure as the previous VBS (TesKKKeLAvaYdAfbBS.vbs), so we can use the same technique to make the script easier to read and analyze.

Figure 8 – UhLQoyDAMaCUTPaE.vbs obfuscated

Using the same technique we will get this result:

Uma imagem com texto, captura de ecrã, Tipo de letra

Descrição gerada automaticamente

Figure 9 – UhLQoyDAMaCUTPaE.vbs deobfuscated

Analysis of The Second BAT file

aaaNOOTKiiiLAViiiiOOs.bat has the same structure as the previous BAT (KKKKKKllLavIOOOOOtesAA.bat), so by reading it vertically, we can figure out what the file does.

Uma imagem com texto, captura de ecrã, software, Website

Descrição gerada automaticamente

Figure 10 – aaaNOOTKiiiLAViiiiOOs.bat

The BAT file executes the last stage, which is a Powershell file.

Analysis of the Last Stage

The final stage is obfuscated by changing the variable names to make the code harder to interpret. Instead of giving a straightforward name to the variable, they break the word into pieces, mix them up, and then call each position to reconstruct the variable name. 

To simplify the analysis, we can deconstruct the code in a similar way, isolating each piece to make the script clearer and easier to understand.

Uma imagem com texto, captura de ecrã, software

Descrição gerada automaticamente

Figure 11 – Analysis of the last stage

The first part of the code is a function that receives a string and converts it from hexadecimal to a 32-bit integer. 

Uma imagem com texto, captura de ecrã, Tipo de letra

Descrição gerada automaticamente

Figure 12 – First part of the final stage

The second part of the code contains two variables with large strings. Both strings use a replace function to retrieve the correct value, which are then sent to the ‘PARSer’ for further processing.

Uma imagem com texto, captura de ecrã, Tipo de letra, software

Descrição gerada automaticamente

Figure 13 – Second part of the last stage

The last part of the final stage is simply loading the files into memory to execute them.

Uma imagem com texto, captura de ecrã, Tipo de letra

Descrição gerada automaticamente

Figure 14 – Last part of the last stage

With the help of CyberChef, we can apply the same technique as shown in the second part of the final stage to retrieve the values inside the two variables and see what they really are:

The first variable is a DLL:

Figure 15 – AsyncRAT DLL

 

The second variable is an EXE:

Figure 16 – AsyncRAT EXE

By running both in ANY.RUN sandbox, it is possible to gather information about the C2, ports, certificates, mutex, and more.

Uma imagem com texto, captura de ecrã, número, Tipo de letra

Descrição gerada automaticamente

Figure 17 – Text report generated by ANY.RUN sandbox

– Second Technique

Open Directory

The structure of the second open directory mirrors the first, containing two files: a TXT file and a JPG file. 

The TXT file, with a shorter name, is a VBS script, while the JPG file hides a PowerShell script in disguise.

Uma imagem com texto, captura de ecrã, software, Tipo de letra

Descrição gerada automaticamente

Figure 18 – Open directory

Analysis of the Txt file

In this case, the TXT file contains a VBS script that is easier to interpret due to its comments. It includes an array storing commands to download the disguised JPG file.

Uma imagem com coser, padrão, tecido

Descrição gerada automaticamente

Figure 19- VBS script

To simplify the script further, we can delete the array and store all the array values in a single variable.

Uma imagem com texto, captura de ecrã, Tipo de letra, file

Descrição gerada automaticamente

Figure 20 – Cleaning VBS script

Analysis of the Powershell file

The PowerShell file performs 2 main functions:

1.File creation and content writing – Creates three files essential to the infection process.

2.Scheduled task setup – Schedules a task to ensure repeated execution, thereby maintaining the AsyncRAT infection.

File Creation

The Powershell creates 3 files:

First file:

This obfuscated file stores and executes the values of EXE and DLL files related to AsyncRAT directly in memory.

Uma imagem com texto, captura de ecrã, software, Tipo de letra

Descrição gerada automaticamente

Figure 21 – First file created by the Powershell file

 

After cleaning the file, it removes ‘%&%’ from both variables, converts them from hexadecimal, and then loads and executes them into memory.

Uma imagem com texto, captura de ecrã, Tipo de letra, número

Descrição gerada automaticamente

Figure 22 – Loading file into memory

By carrying out the above-mentioned processes via CyberChef, we get the following results:

Figure 23 – AsyncRAT Exe

Figure 24 – AsyncRAT DLL

Second file:

The second file triggers PowerShell to execute the previous file (roox.ps1).

Uma imagem com texto, captura de ecrã, Tipo de letra, file

Descrição gerada automaticamente

Figure 25 – Second file created by Powershell file

Third file:

The third and final file runs the previous file roox.bat while keeping the execution hidden from the victim. This ensures that the infection process remains invisible and minimizes any visible indicators, making it harder for the victim to detect the ongoing activity.

Uma imagem com texto, captura de ecrã, Tipo de letra, diagrama

Descrição gerada automaticamente

Figure 26- Third file created by Powershell file

Scheduled Task

The scheduled task, named thepiratMicrosoftEdgeUpdateTask, executes roox.vbs every two minutes, ensuring that the infection persists.

Uma imagem com texto, captura de ecrã, Tipo de letra, número

Descrição gerada automaticamente

Figure 27 – Scheduled task named thepiratMicrosoftEdgeUpdateTask

Upon running the PowerShell script inside the ANY.RUN sandbox, we can see the files being created and executed. We can also gather more information about the command and control (C2) infrastructure.

Uma imagem com texto, captura de ecrã, Tipo de letra, software

Descrição gerada automaticamente

Figure 28- Files created by the Powershell script

Figure 29 – C2 Ip and DNS

Conclusion

Our investigation uncovered two IPs actively spreading AsyncRAT through different methods. The first method follows a multi-stage process, employing several files and scripts to complete the infection. 

Try all PRO features of ANY.RUN’s Interactive Sandbox for free →

The second method uses only two stages, one of which involves generating files that are triggered by a scheduled task, as shown in the image below:

Uma imagem com texto, captura de ecrã, diagrama, Tipo de letra

Descrição gerada automaticamente

Figure 30 – Difference between two methods

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

The post AsyncRAT’s Infection Tactics via Open Directories: Technical Analysis appeared first on Cybersecurity Insiders.