I found this interesting article on how drones are becoming a major threat to organization’s physical and cyber security. Designed for recreational use, commercial drones can also be employed in ways that pose a threat to public safety.
Architects, urban planners, engineers, security professionals and key stakeholders must address these potential threats early in the design phase.
I found this article “Conti Ransomware Attacks Surging, US Government Warns” about the double payment ransomware exploit, where malicious cyber actors steal files, encrypt servers and workstations, and demand a ransom payment. The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have observed the increased use of Conti ransomware in more than 400 attacks on U.S. and international organizations. Reconnaissance is the techniques used by this malicious players to actively or passively gathering information that can be used to support targeting. Such information may include details of the victim organization, infrastructure, or staff/personnel. This information can be leveraged by the adversary to aid in other phases of the adversary lifecycle, such as using gathered information to plan and execute Initial Access, to scope and prioritize post-compromise objectives, or to drive and lead further Reconnaissance efforts.
“How drones affect your threat model”
As drones become more and more popular, they will be more widely used. For example, Amazon’s drone delivery service. However, organizations still need to pay attention to the new threats posed by drones. Information can be stolen by installing cameras or monitoring devices on drones. You can even crack the WIFI if you install a WIFI cracking device on the drone. Drones will become very good surveillance, reconnaissance, and attack tools.
For example: A data center has razor wire fences, perimeter instrusion detection systerm or guards, but drones still can easily identified, located, and detained.
By using signal and data transmission, people can remotely control Drones to perform tasks. Some hackers can invade and hijack drones to obtain data.
“What Happened to Facebook, Instagram, & WhatsApp?” — Krebson Security
Yesterday (On October 4th, 2021), Facebook and its acquired companies Instagram and WhatsApp went down for hours that resulted in Mark Zuckerbeg, the owner, losing six billion dollars in a matter of approximately six hours. Facebook did not comment on the outage until 11:32 p.m ET when they published a blog post blaming the events on “a faulty configuration change”. Doug Madory, the director of internet analysis at Kentik, a San Francisco-based network monitoring company, disclosed that earlier in the day, an insider at Facebook made an update on the company’s Border Gateway Protocol (BGP). According to the article, “BGP is a mechanism by which Internet service providers of the world share information about which providers are responsible for routing Internet traffic to which specific groups of Internet addresses”. This also had an effect on employees that were unable to communicate with one another considering they use internal Facebook tools, and employees could not access Facebook buildings since their badges were not working. The New York Times tweeted that it may be possible that Facebook engineers had trouble physically accessing the computer servers needed to upload new BGP records to the global Internet. It is unknown whether these changes were malicious, accidental, or purposeful (planned).
Shubham Patil says
I found this interesting article on how drones are becoming a major threat to organization’s physical and cyber security. Designed for recreational use, commercial drones can also be employed in ways that pose a threat to public safety.
Architects, urban planners, engineers, security professionals and key stakeholders must address these potential threats early in the design phase.
Link: https://www.securitymagazine.com/articles/96179-commercial-drones-and-crime-prevention-through-environmental-design
Oluwaseun Soyomokun says
I found this article “Conti Ransomware Attacks Surging, US Government Warns” about the double payment ransomware exploit, where malicious cyber actors steal files, encrypt servers and workstations, and demand a ransom payment. The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have observed the increased use of Conti ransomware in more than 400 attacks on U.S. and international organizations. Reconnaissance is the techniques used by this malicious players to actively or passively gathering information that can be used to support targeting. Such information may include details of the victim organization, infrastructure, or staff/personnel. This information can be leveraged by the adversary to aid in other phases of the adversary lifecycle, such as using gathered information to plan and execute Initial Access, to scope and prioritize post-compromise objectives, or to drive and lead further Reconnaissance efforts.
https://us-cert.cisa.gov/sites/default/files/publications/AA21-265A-Conti_Ransomware_TLP_WHITE.pdf
Yangyuan Lin says
“How drones affect your threat model”
As drones become more and more popular, they will be more widely used. For example, Amazon’s drone delivery service. However, organizations still need to pay attention to the new threats posed by drones. Information can be stolen by installing cameras or monitoring devices on drones. You can even crack the WIFI if you install a WIFI cracking device on the drone. Drones will become very good surveillance, reconnaissance, and attack tools.
For example: A data center has razor wire fences, perimeter instrusion detection systerm or guards, but drones still can easily identified, located, and detained.
By using signal and data transmission, people can remotely control Drones to perform tasks. Some hackers can invade and hijack drones to obtain data.
https://www.csoonline.com/article/3568452/how-drones-affect-your-threat-model.html
Elizabeth Gutierrez says
“What Happened to Facebook, Instagram, & WhatsApp?” — Krebson Security
Yesterday (On October 4th, 2021), Facebook and its acquired companies Instagram and WhatsApp went down for hours that resulted in Mark Zuckerbeg, the owner, losing six billion dollars in a matter of approximately six hours. Facebook did not comment on the outage until 11:32 p.m ET when they published a blog post blaming the events on “a faulty configuration change”. Doug Madory, the director of internet analysis at Kentik, a San Francisco-based network monitoring company, disclosed that earlier in the day, an insider at Facebook made an update on the company’s Border Gateway Protocol (BGP). According to the article, “BGP is a mechanism by which Internet service providers of the world share information about which providers are responsible for routing Internet traffic to which specific groups of Internet addresses”. This also had an effect on employees that were unable to communicate with one another considering they use internal Facebook tools, and employees could not access Facebook buildings since their badges were not working. The New York Times tweeted that it may be possible that Facebook engineers had trouble physically accessing the computer servers needed to upload new BGP records to the global Internet. It is unknown whether these changes were malicious, accidental, or purposeful (planned).
Link to article: https://krebsonsecurity.com/2021/10/what-happened-to-facebook-instagram-whatsapp/