{"id":40729,"date":"2020-05-08T18:35:58","date_gmt":"2020-05-08T14:35:58","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=40729"},"modified":"2022-05-12T15:49:45","modified_gmt":"2022-05-12T11:49:45","slug":"news-you-mightve-missed-4-8-may","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/news-you-mightve-missed-4-8-may\/","title":{"rendered":"News You Might&#8217;ve Missed. 4 &#8211; 8 May"},"content":{"rendered":"<p>What's new this week in the news for MSPs?<\/p>\n<p>Microsoft VMware Solution preview launches; Fresenius Hospital suffers ransomware attack; Microsoft's Github account allegedly Hacked and 500GB stolen; Cisco Webex hit by phishing scam; GoDaddy data breach exposes 28K hosting accounts; and Layoffs.fyi shares job info and layoffs. Let's see what's going on.<\/p>\n<p><!--more--><\/p>\n<h2>Microsoft Launches VMware Solution Preview<\/h2>\n<p>Microsoft Corporation announced the preview of its Azure VMware Solution. This service will make it easier and cheaper for its customers to migrate VMware applications to the cloud. Jason Zander, executive vice president for Azure, called the service \"an amazing milestone\" for both Microsoft and VMware. He says it will help them to \"meet our customers where they are today on their cloud journey\u201d.<\/p>\n<p>The new <a href=\"https:\/\/siliconangle.com\/2020\/05\/04\/microsoft-debuts-azure-vmware-solution-preview\/\" target=\"\u201c_blank\u201d\" rel=\"\u201cnoopener\u201d noopener noreferrer\">Azure VMware Solution<\/a> lets customers use the same foundation of VMware as they do in their data centers. It makes it possible for Microsoft's customers and partners to make use of their existing skills and toolsets.<\/p>\n<p>Since it is built on top of the VMware Cloud Foundation, this allows VMware workloads to run on Azure natively. Microsoft has more plans to integrate the service with other Azure services in the future, so this is just the beginning.<\/p>\n<h2>Fresenius Hospital Suffers Ransomware Attack<\/h2>\n<p>Fresenius SE &amp; Co. KGaA is Europe's largest private hospital operator and has been struck by a ransomware attack. As a result, treatments for COVID-19 patients have been affected in cases where some of its systems have been restricted.<\/p>\n<p id=\"last\">Fresenius, which also holds 40% of the market for kidney dialysis in the US, since COVID-19 patients often require dialysis, was targeted by Snake ransomware.<\/p>\n<div id=\"slidebox\"><a class=\"close\">\u00a0<\/a><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" data-portal=\"5442029\" data-id=\"4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><span class=\"hs-cta-node hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" id=\"hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<p>Snake ransomware was first discovered in January. Once it infiltrates a system, it will remove Volume Shadow Copies and then kill many processes related to SCADA (short for supervisory control and data acquisition) systems. It will also kill processes for virtual machines, industrial control systems, remote management tools, and network management software, among others.<br \/>\nSubsequently, it goes on to encrypt files across every connected device.<br \/>\nThe scale of the infection at Fresenius is not known, but systems in the US have been said to be infected. Fresenius itself confirmed the attack in <a href=\"https:\/\/www.scmagazine.com\/home\/security-news\/ransomware\/no-reprieve-for-health-care-orgs-as-ransomware-hits-hospital-operator-plastic-surgeons\/\" target=\"\u201c_blank\u201d\" rel=\"\u201cnoopener\u201d noopener noreferrer\">a statement<\/a> in which it said that it \"has detected a computer virus on the company's computers in many areas\u201d.<\/p>\n<p>They have taken the necessary measures to stem the further spread of the attack, and they are continuing business as usual, despite the limitations due to the effects of the attack. They give assurances that their hospital business has not been harmed at all.<\/p>\n<p>Javvad Malik, a security awareness advocate at KnowBe4 Inc., noted that it's even more unfortunate that criminals are attacking and crippling systems belonging to hospitals and other medical facilities during a pandemic. \"It's important for organizations to not slow down in their cybersecurity efforts,\" Malik said.<\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\">\n<div class=\"call-to-action__tag\">FREE WHITEPAPER<\/div>\n<div class=\"call-to-action__title\">Steps for Keeping Backup Data Safe from Ransomware<\/div>\n<div class=\"call-to-action__text\">Find out the main strategies for protecting data backups from ransomware<\/div>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-08a8e1eb-8f5c-442c-9d09-fa18e74ef9a6\" data-portal=\"5442029\" data-id=\"08a8e1eb-8f5c-442c-9d09-fa18e74ef9a6\"><span class=\"hs-cta-node hs-cta-08a8e1eb-8f5c-442c-9d09-fa18e74ef9a6\" id=\"hs-cta-08a8e1eb-8f5c-442c-9d09-fa18e74ef9a6\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/08a8e1eb-8f5c-442c-9d09-fa18e74ef9a6\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-08a8e1eb-8f5c-442c-9d09-fa18e74ef9a6\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/08a8e1eb-8f5c-442c-9d09-fa18e74ef9a6.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<div class=\"call-to-action__right\"><img decoding=\"async\" style=\"max-width: 300px;\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/03\/Group-176.png\" alt=\"WP icon\" \/><\/div>\n<\/div>\n<h2>Microsoft's Github Account Allegedly Hacked and 500GB Stolen<\/h2>\n<p>A hacker known as Shiny Hunters contacted BleepingComputer to inform them that he had hacked into the Microsoft GitHub account. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsofts-github-account-allegedly-hacked-500gb-stolen\/\" target=\"\u201c_blank\u201d\" rel=\"\u201cnoopener\u201d noopener noreferrer\">According to him<\/a>, this gave him full access to Microsoft's private repositories and allowed him to steal 500GB of data.<\/p>\n<p>While Shiny Hunters initially planned to sell the information, he is now just leaking it for free.<br \/>\nBased on BleepingComputer's review of the data, it doesn't appear that there is any sensitive or proprietary information in what he stole.<\/p>\n<p>The Twitter account for \"Under The Breach\" recently tweeted that they believed the data appeared real, but a Microsoft employee, Sam Smith, replied, stating that he thought the leak was fake, as \"Msft has a \u2018rule\u2019 that GitHub repos must be public within 30 days\u201d.<\/p>\n<p>BleepingComputer is waiting for confirmation from Microsoft on whether the files are real or not.<\/p>\n<h2>Cisco Webex Hit by Phishing Scam<\/h2>\n<p>Cisco Webex is a video and team collaboration solution. It helps users set up video conferences, webinars, and online meetings, and share their screens with their colleagues and friends. Right now, the platform is facing an influx of new users due to the unusual increase in remote workers caused by the COVID-19 pandemic.<\/p>\n<p>Recently, a convincing series of <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisco-webex-phishing-uses-fake-cert-errors-to-steal-credentials\/\" target=\"\u201c_blank\u201d\" rel=\"\u201cnoopener\u201d noopener noreferrer\">phishing attacks<\/a> using fake certificate error warnings with graphics and formatting lifted from Cisco Webex emails are making the rounds. The goal is to steal users' account credentials. Phishing emails have already landed in the mailboxes of up to 5,000 targets that use Cisco Webex, according to statistics shared by the email security company Abnormal Security.<\/p>\n<p>The phishing emails appear to come from the Cisco Webex team and warn the targets that they have to reverify their accounts due to SSL certificate errors, and that they are blocked. After this, they are requested to click on an embedded \u201cLog in\u201d hyperlink that lets them sign in to unlock their accounts.<\/p>\n<p>The phishing landing page is a replica of a real Cisco Webex sign-in page and, once the user logs in, their credentials are compromised.<\/p>\n<h2>GoDaddy Data Breach Exposes 28K Hosting Accounts<\/h2>\n<p>GoDaddy noticed unusual activity on some servers late last month that led to the discovery of a data breach. GoDaddy has reached out to the affected customers, <a href=\"https:\/\/threatpost.com\/godaddy-hack-breaches-hosting-account-credentials\/155475\/\" target=\"\u201c_blank\u201d\" rel=\"\u201cnoopener\u201d noopener noreferrer\">according to their statement<\/a>. From what is known, an unknown person was able to access GoDaddy hosting accounts using the Secure Shell (SSH) cryptographic network protocol in October. GoDaddy reset the hosting account log-in information for the customers concerned, in order to prevent further access.<\/p>\n<p>A lot of questions remain about the breach. \"It's unclear whether GoDaddy's reported incident was because of the reuse of old stolen credentials or from brute force attacks,\" said Matt Walmsley, Europe, Middle East, and Africa director at cloud-native protection firm Vectra AI Inc. \"There have also been recent reports of GoDaddy's support employees being successfully phished, which might be connected. Regardless of how the unauthorized access was gained, it's a sharp reminder that the monitoring of how privileged credentials are used, not just granted, can make the difference between detecting an active attack and being blissfully ignorant to a breach.\"<\/p>\n<h2>Layoffs.fyi Provides List of COVID-19 Layoffs by Startups, and Info on Job Seekers<\/h2>\n<p>It appears COVID-19 is resulting in a lot of tech layoffs among startup companies. <a href=\"https:\/\/layoffs.fyi\/\" target=\"\u201c_blank\u201d\" rel=\"\u201cnoopener\u201d noopener\">Layoffs.fyi<\/a> is a site that gives specific information about very skilled tech people who have been laid off and are available for work.<br \/>\nThe site could also help track startups where MSPs have provided services.<\/p>\n<h2>That's a Wrap<\/h2>\n<p>That's the news for MSPs this week in summary. I hope it has been helpful. MSP360 is your resource for MSP news. Stay home, stay safe and healthy, and remember to check back next week for more highlights.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What&#8217;s new this week in the news for MSPs? Microsoft VMware Solution preview launches; Fresenius Hospital suffers ransomware attack; Microsoft&#8217;s Github account allegedly Hacked and 500GB stolen; Cisco Webex hit by phishing scam; GoDaddy data breach exposes 28K hosting accounts; and Layoffs.fyi shares job info and layoffs. Let&#8217;s see what&#8217;s going on.<\/p>\n","protected":false},"author":84,"featured_media":40731,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,884],"tags":[],"class_list":["post-40729","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-articles","category-msp-business-articles"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/40729","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/84"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=40729"}],"version-history":[{"count":1,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/40729\/revisions"}],"predecessor-version":[{"id":53991,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/40729\/revisions\/53991"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media\/40731"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=40729"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=40729"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=40729"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}