{"id":41697,"date":"2020-06-19T20:06:11","date_gmt":"2020-06-19T16:06:11","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=41697"},"modified":"2020-06-19T20:07:05","modified_gmt":"2020-06-19T16:07:05","slug":"news-you-mightve-missed-15-19-june","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/news-you-mightve-missed-15-19-june\/","title":{"rendered":"News You Might&#8217;ve Missed. 15 &#8211; 19 June"},"content":{"rendered":"<p>What's new this week in the news for MSPs?<\/p>\n<p>Google launches a new cloud file storage tier; AWS adds a new data migration device; AWS solves a 2.3 Tbps DDOS attack; fake data breach notification malware caught by Google; and Black Kingdom ransomware hack manipulating Pulse VPN flaws.<br \/>\nLet's see what it's all about.<\/p>\n<h2>Google Launches a New Cloud File Storage Tier<\/h2>\n<p>Google has announced the launch of its new product <a href=\"https:\/\/cloud.google.com\/filestore\/docs\" target=\"_blank\" rel=\"noopener noreferrer\">Filestore High Scale<\/a>, a cloud-based file storage tier for businesses operating high-performance computing workloads. It is said to be the next step in the development of Google's Cloud Filestore service.<\/p>\n<p>With Filestore High Scale, Google has integrated the capabilities of data storage startup Elastifile Ltd., <a href=\"https:\/\/siliconangle.com\/2019\/07\/09\/google-acquires-storage-startup-elastifile-reported-200m\/\" target=\"_blank\" rel=\"noopener noreferrer\">which it acquired in July 2019<\/a>. The new tier lets users send shared file systems that can expand to a capacity that permits hundreds of thousands of input\/output operations per second, with tens of gigabytes per second throughput and hundreds of terabytes.<\/p>\n<p>Google said that other workloads that may benefit from Filestore High Scale's scale-out storage are electronic design automation, financial modeling, genomics, and video processing.<\/p>\n<h2>AWS Adds a New Data Migration Device<\/h2>\n<p><a href=\"https:\/\/press.aboutamazon.com\/news-releases\/news-release-details\/aws-announces-general-availability-aws-snowcone\" target=\"_blank\" rel=\"noopener noreferrer\">AWS Snowcone<\/a> is a new device added by Amazon to its family of data migration devices. This device is small and very portable, weighing only 4.5 pounds and measuring just nine by six by three inches. It provides up to 8 terabytes of storage for businesses using edge computing workloads, where space, power, and cooling features are limited.<\/p>\n<p>AWS Snowcone operates on two central processing units. It has 4 gigabytes of memory for computing operations, a USB-C connection, and an optional battery unit.<\/p>\n<p>In a <a href=\"https:\/\/aws.amazon.com\/blogs\/aws\/introducing-aws-snowcone-small-lightweight-edge-storage-and-processing\/\" target=\"_blank\" rel=\"noopener noreferrer\">blog post<\/a>, Amazon Chief Evangelist Jeff Barr shared that Snowcone's primary objective is data migration, \u201cInternet of Things,\u201d transportation, content distribution and tactical edge computing, logistics, and autonomous vehicles use cases. What's more, the device is tamper-proof, dust-tight, water-resistant, and can transfer data using the AWS DataSync service.<\/p>\n<p>AWS Snowcone will be available first in the AWS East (Northern Virginia) and AWS West (Oregon) regions, and additional regions will be added soon.<\/p>\n<h2>AWS Minimizes a 2.3 Tbps DDOS Attack<\/h2>\n<p>Amazon Web Service reported that it was able to diminish a distributed denial-of-service attack of 2.3 terabits per second in February. It is the most massive DDoS attack on record to date. According to the details given in the <a href=\"https:\/\/aws-shield-tlr.s3.amazonaws.com\/2020-Q1_AWS_Shield_TLR.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">AWS Shield Threat Landscape Report- Q1 2020<\/a>, this attack continued for three days. Those behind the attack failed to knock Amazon cloud services offline.<\/p>\n<p>The method used is the so-called Connection-less Lightweight Directory Access Protocol reflection-based attack. In this type of attack, the attacker sends a CLDAP request to an LDAP server with a spoofed sender IP address \u2014 the target's IP address. The server then mounts a bulked-up response to the target's IP address, causing the reflection attack, hence the name.<\/p>\n<p>The server is unaware of the attack when it receives multiple, apparently legitimate requests to establish communication, <a href=\"https:\/\/www.imperva.com\/learn\/application-security\/syn-flood\/\" target=\"_blank\" rel=\"noopener noreferrer\">according to Imperva<\/a>. From each open port, it answers each attempt with an SYN-ACK packet. This will eventually cause the server's connection overflow tables to flood and genuine clients will be denied access.<\/p>\n<h2>Fake Data Breach Notification Malware Caught by Google<\/h2>\n<p id=\"last\">To distribute malware and scams, bad actors have begun pushing <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/google-alerts-catches-fake-data-breach-notes-pushing-malware\/\" target=\"_blank\" rel=\"noopener noreferrer\">fake notices<\/a> about data breaches at big company names. These direct people to risky websites. The groups behind them are mixing Google Sites, black SEO, and spam pages.<\/p>\n<div id=\"slidebox\"><a class=\"close\">\u00a0<\/a><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" data-portal=\"5442029\" data-id=\"4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><span class=\"hs-cta-node hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" id=\"hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<p>Google Alerts, which uses predefined terms set by users to monitor search results, has helped in the spread of these false notifications. Some companies found in the notifications include Dropbox, Hulu, Ceridian, Shein, PayPal, Target, Chegg, EA, Canva, HauteLook, Mojang, InterContinental Hotels Group, and Houzz. These companies have suffered a data breach at some point in the past.<\/p>\n<p>If a user follows any of these links picked up by Google Alerts, they find themselves on landing on pages with download offers for undesired extensions and malware, and fake giveaways.<\/p>\n<p>Aside from using compromised websites, these groups also make their own pages. In many instances, they have used Google Sites to host their content.<\/p>\n<p>A fake giveaway of iPhone 11 devices was one of the malicious links used as a redirect, claiming to have been set up by Google for its \u201cMembership Rewards\u201d program.<\/p>\n<p>Using spam pages to redirect users to pages that pose a risk is not new; this is just the latest example by a malware group.<\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\">\n<div class=\"call-to-action__tag\">ON-DEMAND WEBINAR<\/div>\n<div class=\"call-to-action__title\">Ransomware: Prevent or Recover<\/div>\n<div class=\"call-to-action__text\">Watch the webinar and prepare yourself and your customers with the right approach and the right tools<\/div>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-dcb611f1-612b-448d-8afd-7e3fea1fccc0\" data-portal=\"5442029\" data-id=\"dcb611f1-612b-448d-8afd-7e3fea1fccc0\"><span class=\"hs-cta-node hs-cta-dcb611f1-612b-448d-8afd-7e3fea1fccc0\" id=\"hs-cta-dcb611f1-612b-448d-8afd-7e3fea1fccc0\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/dcb611f1-612b-448d-8afd-7e3fea1fccc0\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-dcb611f1-612b-448d-8afd-7e3fea1fccc0\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/dcb611f1-612b-448d-8afd-7e3fea1fccc0.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<div class=\"call-to-action__right\"><img decoding=\"async\" style=\"max-width: 300px;\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/03\/Ransomware_-Prevent-or-Recover-1.png\" alt=\"Webinar icon\" \/><\/div>\n<\/div>\n<h2>Black Kingdom Ransomware Hack Manipulating Pulse VPN Flaws<\/h2>\n<p>Businesses with unpatched Pulse Secure VPN software or initial access on the network are the target of the operators of the <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/us-bank-customers-targeted-in-ongoing-qbot-campaign\/\" target=\"_blank\" rel=\"noopener noreferrer\">Black Kingdom ransomware<\/a>. The malware was captured in a honeypot computer system that let security researchers examine and document its methods of operation.<br \/>\nA Pulse Secure VPN (CVE-2019-11510) critical vulnerability affecting earlier versions of its software was <a href=\"https:\/\/doublepulsar.com\/big-game-ransomware-being-delivered-to-organisations-via-pulse-secure-vpn-bd01b791aad9\" target=\"_blank\" rel=\"noopener noreferrer\">leveraged by the malware operators<\/a>.<\/p>\n<p>Researchers noted that the ransomware built endurance by mimicking a legitimate scheduled task for Google Chrome. According to <a href=\"https:\/\/blog.redteam.pl\/2020\/06\/black-kingdom-ransomware.html\" target=\"_blank\" rel=\"noopener noreferrer\">REDTEAM.PL's analysis<\/a>, it's likely that a scheduled task runs base64-encoded string code in a hidden PowerShell window to get a script named \u201creverse.ps1\u201d, and then opens a reverse shell on the infected host.<\/p>\n<p>Security researcher GrujaRS first spotted Black Kingdom ransomware in February, when it appeared to have appended a .DEMON extension to encrypted files.<\/p>\n<p>The sample examined communicated with the same IP address seen in REDTEAM.PL's report. The ransom note sought $10,000, to be deposited to a bitcoin wallet, and threatened that failure to do so would lead to the data being destroyed or sold.<\/p>\n<blockquote><p>Learn about common ransomware attack scenarios and what to do if one of these attacks affects your clients:<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/ransomware-attack-scenarios-and-how-to-be-protected\/\">Ransomware Attack Scenarios<\/a><\/p><\/blockquote>\n<h2>That's a Wrap<\/h2>\n<p>I hope this update has been helpful. MSP360 is your resource for MSP news. Stay home, stay safe and healthy, and remember to check back next week for more highlights.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What&#8217;s new this week in the news for MSPs? Google launches a new cloud file storage tier; AWS adds a new data migration device; AWS solves a 2.3 Tbps DDOS attack; fake data breach notification malware caught by Google; and Black Kingdom ransomware hack manipulating Pulse VPN flaws. Let&#8217;s see what it&#8217;s all about. Google [&hellip;]<\/p>\n","protected":false},"author":84,"featured_media":41699,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,885],"tags":[],"class_list":["post-41697","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-articles","category-other"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/41697","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/84"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=41697"}],"version-history":[{"count":0,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/41697\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media\/41699"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=41697"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=41697"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=41697"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}