CISA Alerts about Potential Cyberattacks on US National Security Infrastructure

October 5, 2020

The Cybersecurity and Infrastructure Security Agency (CISA) released an alert today about the potential for targeted attacks on US national critical infrastructure. While this is in relation to the US, it is a reminder that critical infrastructure makes attractive targets to cybercriminals who wish to harm any country.

Today’s CISA alert about possible state-sponsored attacks against the country’s most sensitive and valuable critical infrastructure is what the cybersecurity community has been warning about for some time. For years, we’ve seen steady momentum of new, targeted attacks against the US that seek to compromise the systems we rely on to function as a modern society. With Covid-19, our reliance on critical infrastructure — from railways to energy to agriculture to pharmaceuticals — has gone into hyperdrive. This dependence is extremely lucrative to cybercriminals looking to wreak havoc.” – Marty Edwards, VP of OT Security, longest-serving director of ICS-CERT and Co-Chair of the Control Systems Interagency Working Group.

Tenable Research: SilentFade Malware Attacks Facebook’s Ad Platform, Facebook Search

October 5, 2020

Facebook released new research today about SilentFade malware that is abusing Facebook’s ad platform. Please find below a comment from Satnam Narang, Staff Research Engineer at Tenable.

Facebook’s SilentFade research speaks to the enormous value in social media services due to their billions of users and the monetization opportunities of their advertising platforms. Cybercriminals have found a more direct way to capitalize on the popularity of social media by using the same microtargeting tools found in advertising platforms used by legitimate businesses.

This research fits squarely in the middle of ongoing debates about content moderation on social media. Cybercriminals are adept at countering efforts to thwart their activities. One would think that dubious advertisement could be quickly detected and deleted but, in reality, cybercriminals have pivoted their tactics to evade detection. By compromising legitimate Facebook accounts instead of creating fake ones, they’re providing themselves a layer of obfuscation from moderators in order to conduct their fraudulent activities. Not only that, but they’re also using these account takeover tactics to actually fund their illicit operations by utilizing stored payment information found on these accounts. The scam is cunning, to say the least, and should serve as a warning to other social media services to be extra vigilant and carefully scrutinize the advertisers and advertisements on their platforms.” Satnam Narang, Staff Research Engineer at Tenable.

%d bloggers like this: