[INFOGRAPHIC] Inside the Mind of a Threat Actor: Tactics, Techniques, and Procedures Explained
They lure their victims with the bait of a seemingly innocent email or landing page in an attempt to steal their user credentials. And they only need to succeed once to get in. Once they have hooked their victim hooked, a cybercriminal can literally take over an entire network in a matter of minutes. Or worse yet, they can lurk quietly on a connected device for months, unbeknownst to the IT team, plotting how to extract the most profit and/or cause disruption from the now compromised network.
Allentown Struggles with $1 Million Cyber-Attack
According to local paper The Morning Call, the city’s critical systems have been hit by the malware known as Emotet, impacting both financial and public safety operations, according to Mayor Ed Pawlowski. Allentown’s finance department can’t complete any external banking transactions, the city’s 185 surveillance cameras are impacted and the police department can’t access Pennsylvania State Police databases, Pawlowski said.
Government to Implement Tighter Controls on Healthcare Providers Accessing Medicare Card Numbers
The changes will require health professionals to undertake identity checks when patients initially present at a health service to reduce the potential for individuals to fraudulently claim benefits using another person’s Medicare details. Healthcare providers will also need to gain patient consent before accessing Medicare details, and they will have to provide patients with information on how to request a list of people who have sought access to their Medicare card numbers.
Congress Can Act Right Now to Prevent Interference in the 2018 Elections
“It is abundantly clear that we need to get ahead of anyone wanting to interfere with our elections,” Pocan explained in an interview following last week’s indictments and warnings. “We need better protections for our elections, including paper ballots for our voting machines.” Pocan and several of his colleagues are doing more than just talking about what “needs” to be done. They have prepared a legislative response that would work—if congressional leaders would allow it to be debated and enacted.
Homeland Security Chief Touts Effort on Election Cybersecurity
As part of the meetings, Homeland Security and officials with the Office of Director of National Intelligence and the FBI gave state officials a classified briefing on foreign threats to U.S. election infrastructure. According to The New York Times, some state officials were disappointed by the classified briefing on Friday because it did not offer clear information about the Russia threat.
Savannah Still Suffering Effects From Cyberattack
Savannah, Ga., is still in the process of recovering from a malware attack that took place last week that forced the city to shut down part of its computer system in an attempt to limit damage. […] The lingering effects are still being felt with the city saying late last week that it is blocking any emails with attachments in order to thwart any additional attacks. The 911 system not affected, but the city’s finance, purchasing and payroll units were taken temporarily offline at the time of the attack.
Stay up to date on the Public Sector Information Security news that you need to know by signing up for our Public Sector Briefing Here.
Critical Informatics and the Critical Informatics logo are the trademarks of Critical Informatics, Inc. All other brand names, trademarks, service marks and copyrights are the property of their respective owners. © 2017 Critical Informatics, Inc. All rights reserved.