{"id":41012,"date":"2020-05-22T18:48:50","date_gmt":"2020-05-22T14:48:50","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=41012"},"modified":"2020-05-22T19:51:53","modified_gmt":"2020-05-22T15:51:53","slug":"news-you-mightve-missed-18-22-may","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/news-you-mightve-missed-18-22-may\/","title":{"rendered":"News You Might&#8217;ve Missed. 18 &#8211; 22 May"},"content":{"rendered":"<p>What's new this week in the news for MSPs?<br \/>\nGoogle Wins DOD Secure Cloud Management Solution Contract; Google Announces Cloud Next OnAir Event; EasyJet Is Hacked and Loses Nine Million Customer Records; New PipeMon Malware Using Windows Print Processors; NetWalker Ransomware Group Moving to Target Enterprises Only; and Texas Department of Transportation Hit by Ransomware Attack. Let's see what's going on.<\/p>\n<p><!--more--><\/p>\n<h2>Google Wins DOD Secure Cloud Management Solution Contract<\/h2>\n<p>Google LLC announced that the US Department of Defense has awarded them a contract to build a secure cloud management solution. According to <a href=\"https:\/\/www.axios.com\/google-cloud-deal-defense-department-da619f1b-4d84-4d57-8e5d-4ddc1c0bf46b.html\" target=\"_blank\" rel=\"noopener noreferrer\">a report from Axios<\/a>, the deal is valued at over seven figures. To develop the solution, the department has commissioned Google to work with the cybersecurity startup Netskope, Inc.<br \/>\nThe project's overall goal is to help the DOD \"detect, protect against, and respond to cyber threats worldwide,\" Google said in the announcement.<br \/>\nGoogle's top cloud rivals, AWS and Microsoft, are currently embroiled in <a href=\"https:\/\/siliconangle.com\/2020\/05\/07\/aws-files-another-protest-jedi-cloud-computing-contract-award\/\" target=\"_blank\" rel=\"noopener noreferrer\">a high-profile legal battle<\/a> over another DOD deal. Their dispute started last year, after Microsoft was awarded the DOD's $10m JEDI project.<\/p>\n<h2>Google Announces Cloud Next OnAir Event<\/h2>\n<p>If you've been waiting for Google's announcement about their annual cloud event, it's still on. Get ready, because Google LLC's annual cloud event is going digital and, in addition to its new date, has a new name and an expanded format that will extend over no less than nine weeks.<br \/>\nBeginning on July 14th, Google Cloud Next OnAir will run until Sept 8th, with more than 200 sessions covering a host of topics. Google had initially planned to hold the event in San Francisco in April; however, the coronavirus pandemic forced them to cancel it.<br \/>\nGoogle Cloud CMO Alison Wagonfeld said that virtual attendees would get access to a Digital Showcase to view cloud offerings. \"Immerse yourself in our newest products and solutions in the Digital Showcase. Play games, watch real-world demos, and experience the latest Google Cloud technology,\" Wagonfield wrote in <a href=\"https:\/\/cloud.google.com\/blog\/topics\/google-cloud-next\/announcing-google-cloud-next20-onair\" target=\"_blank\" rel=\"noopener noreferrer\">a blog post<\/a>.<\/p>\n<h2>EasyJet (UK) Is Hacked and Loses Nine Million Customer Records<\/h2>\n<p>Following discussions with the UK Information Commissioner's Office, EasyJet disclosed details regarding the hacking.<br \/>\nIn <a href=\"http:\/\/otp.investis.com\/clients\/uk\/easyjet1\/rns\/regulatory-story.aspx?cid=2&amp;newsid=1391756\" target=\"_blank\" rel=\"noopener noreferrer\">its notice<\/a> of the cybersecurity incident, easyJet describes the attack as originating from a highly sophisticated source. It also said that the email addresses and travel details of about nine million customers had been accessed. What's more, the credit card details of 2,208 customers were also stolen.<br \/>\n\"Since we became aware of the incident, it has become clear that, owing to COVID-19, there is heightened concern about personal data being used for online scams,\" easyJet Chief Executive Officer Johan Lundgren commented in his statement. \"As a result, and on the recommendation of the ICO, we are contacting those customers whose travel information was accessed and we are advising them to be extra vigilant, particularly if they receive unsolicited communications.\"<br \/>\nAnurag Kahol, CTO at the cloud security firm Bitglass, Inc., commented that, even if it's not clear how the hackers infiltrated easyJet's systems, the company's description of a \"highly sophisticated\" attack shows that cybercriminals are continually advancing their attack methodologies. \"As such, companies must have full visibility and control over their data by implementing tools that detect and remediate misconfigurations, enforce real-time access control, encrypt sensitive data at rest, manage the sharing of data with external parties, and prevent the leakage of sensitive information,\" he said.<\/p>\n<h2>New PipeMon Malware Using Windows Print Processors<\/h2>\n<p>Video game companies are once again victims of the Winnti hacking group. The group uses<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-pipemon-malware-uses-windows-print-processors-for-persistence\/\" target=\"_blank\" rel=\"noopener noreferrer\"> new malware<\/a> that researchers have called PipeMon. PipeMon is a piece of modular backdoor malware uncovered earlier this year.<br \/>\nThis threat actor is well known for supply-chain attacks and has trojanized software used by millions of users (Asus LiveUpdate, CCleaner) or in the financial sector (NetSarang).<br \/>\nWinnti has been developing its arsenal of malicious agents and carrying out attacks for the past ten years. It continues with its preference for games companies and supply-chain type attacks, as can be seen in its recent activities.<\/p>\n<blockquote><p>Learn about common ransomware attack scenarios and what to do if one of these attacks affects your clients:<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/ransomware-attack-scenarios-and-how-to-be-protected\/\">Ransomware Attack Scenarios<\/a><\/p>\n<h2><\/h2>\n<\/blockquote>\n<h2>Netwalker Ransomware Group Moving to Target Enterprises Only<\/h2>\n<p>As a ransomware-as-a-service (RaaS) operation, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/netwalker-adjusts-ransomware-operation-to-only-target-enterprise\/\" target=\"_blank\" rel=\"noopener noreferrer\">NetWalker<\/a> relies on partners to disseminate the malware. Now, the NetWalker ransomware group is moving away from phishing for malware distribution. It has adopted a network-intrusion model focusing on huge businesses only.<br \/>\n\"The collective is selectively choosing the affiliates it collaborates with, creating an exclusive group of top-tier network intruders to execute its new RaaS business model,\" said Yelisey Boguslavskiy, director of security research at Advanced Intelligence (AdvIntel).<\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\">\n<div class=\"call-to-action__tag\">ON-DEMAND WEBINAR<\/div>\n<div class=\"call-to-action__title\">Ransomware: Prevent or Recover<\/div>\n<div class=\"call-to-action__text\">Watch the webinar and prepare yourself and your customers with the right approach and the right tools<\/div>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-dcb611f1-612b-448d-8afd-7e3fea1fccc0\" data-portal=\"5442029\" data-id=\"dcb611f1-612b-448d-8afd-7e3fea1fccc0\"><span class=\"hs-cta-node hs-cta-dcb611f1-612b-448d-8afd-7e3fea1fccc0\" id=\"hs-cta-dcb611f1-612b-448d-8afd-7e3fea1fccc0\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/dcb611f1-612b-448d-8afd-7e3fea1fccc0\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-dcb611f1-612b-448d-8afd-7e3fea1fccc0\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/dcb611f1-612b-448d-8afd-7e3fea1fccc0.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<div class=\"call-to-action__right\"><img decoding=\"async\" style=\"max-width: 300px;\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/03\/Ransomware_-Prevent-or-Recover-1.png\" alt=\"Webinar icon\" \/><\/div>\n<\/div>\n<h2>Texas Department of Transportation (TxDOT) Hit by Ransomware Attack<\/h2>\n<p id=\"last\">Texas is having a bad month. Less than a week ago, the Texas courts were victim to a ransomware attack, and now the state's Department of Transportation (TxDOT) has been hit by <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ransomware-attack-impacts-texas-department-of-transportation\/\" target=\"_blank\" rel=\"noopener noreferrer\">a similar incident<\/a>. In a brief announcement on social media, TxDOT said that it detected the attack on Thursday, May 14th. Further investigation revealed that the event was part of a ransomware occurrence.<\/p>\n<div id=\"slidebox\"><a class=\"close\">\u00a0<\/a><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" data-portal=\"5442029\" data-id=\"4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><span class=\"hs-cta-node hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" id=\"hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<p>Immediate action was taken to isolate affected computers from the network and block further unauthorized access. Executive Director James Bass says that the agency is \"working to ensure critical operations continue during this interruption.\"<br \/>\nThere is no information that points to the two incidents being connected in any way. Neither TxDOT nor OCA has said anything about a ransom demand, or files being encrypted or stolen.<\/p>\n<h2>That's a Wrap<\/h2>\n<p>That's the news in summary for MSPs this week. I hope it has been helpful. MSP360 is your resource for MSP news. Stay home, stay safe and healthy, and remember to check back next week for more highlights.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What&#8217;s new this week in the news for MSPs? Google Wins DOD Secure Cloud Management Solution Contract; Google Announces Cloud Next OnAir Event; EasyJet Is Hacked and Loses Nine Million Customer Records; New PipeMon Malware Using Windows Print Processors; NetWalker Ransomware Group Moving to Target Enterprises Only; and Texas Department of Transportation Hit by Ransomware [&hellip;]<\/p>\n","protected":false},"author":84,"featured_media":41014,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,884],"tags":[],"class_list":["post-41012","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-articles","category-msp-business-articles"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/41012","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/84"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=41012"}],"version-history":[{"count":0,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/41012\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media\/41014"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=41012"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=41012"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=41012"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}