Press "Enter" to skip to content

Security: law enforcement moves, convictions, and iOS

Lots of Security to talk about.

Law enforcement across Europe and North America coordinated to take down the Emotet botnet.   Law enforcement and judicial authorities took down the entire infrastructure after gaining control of its servers earlier this week.   It was several hundreds of servers located around the world, an entirely distributed organization.     This infrastructure was the “primary door opener” for these hackers, heavily using malicious emails.   There is a website to query if you want to know if your email address was compromised.

Another win for law enforcement – a hacker pled guilty to hacking and blackmailing several US companies and paid $600,000 for his crimes.   He picked targets based on their Alexa traffic rankings, blackmailed, bluffed or extorted them after breaking into their systems.   

Google has warned of a “novel social engineering method” used to hack security researchers.    While there aren’t complete details, the suggestion is that the targets now are researchers themselves.  Using fake blogs and Twitter accounts, the actors are building credibility in the security community to then leverage in attacks – such as then sending over code for collaboration that instead holds malware.

Plus, news you can use today.  Apple released an update for iOS on Wednesday, and reports say it patches an exploit that is actively being used.     Experts say the three bugs are used together to lure a user to a malicious site and run system level code.  Thus, the compromise.

Why do we care?

Patch those iOS devices.  Simple start.    

The best outcomes I report on the show involve shutting down criminal activities.  The theme to those – law enforcement.    Each story has an embedded element of police getting involved.  

Thinking about the question “What should you do?” more than just why do we care, I will ask – how many MSPs and IT services companies have a specific procedure for reporting and interacting with law enforcement?   Do you even have the contact procedure ready without Googling it?   (I included a link in the show notes to get you started).  Does the procedure include the information you need to have ready? 

While obvious, I suspect if I spoke with 90% of providers they would look at me with a blank stare.     It’s something that is known conceptually, but not practically.   

So today – what should you do… is get that in process.  Have your forms and your documentation and your procedure ready, because the only way this slows is when the cost of doing business is too high for the criminals.

Source: Bleeping Computer

Source: The Verge, The Verge

Source: ZDNet

FBI