{"id":42331,"date":"2020-07-10T19:38:00","date_gmt":"2020-07-10T15:38:00","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=42331"},"modified":"2020-07-10T20:03:10","modified_gmt":"2020-07-10T16:03:10","slug":"news-you-mightve-missed-6-10-july","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/news-you-mightve-missed-6-10-july\/","title":{"rendered":"News You Might&#8217;ve Missed. 6 &#8211; 10 July"},"content":{"rendered":"<p>What\u2019s new this week in the news for MSPs?<\/p>\n<p>Amazon launches AWS Outposts support for its Relational Database Service; ransomware used by hackers to attack and threaten victims for GDPR breaches is targeting MongoDB users; MSP Xchanging suffers ransomware attack; Office 365 users hit by phishing attacks through OAuth apps; and more. Let\u2019s see what it\u2019s all about.<\/p>\n<h2><!--more-->Amazon Launches AWS Outposts Support for Its Relational Database Service<\/h2>\n<p>Amazon <a href=\"https:\/\/siliconangle.com\/2020\/07\/06\/aws-outposts-adds-support-fully-managed-cloud-database-services\/\" target=\"\u201c_blank\u201d\" rel=\"\u201cnoopener\u201d noopener noreferrer\">recently announced<\/a> that it has added support for its Amazon Relational Database Service in AWS Outposts. The addition will allow customers to include RDS database instances in their data centers.<\/p>\n<p>The announcement came during the company\u2019s recent re:Invent conference, held in December 2019. AWS Outposts is used by Amazon customers to extend native AWS or VMware cloud deployments in their data centers.<\/p>\n<p>AWS Outposts is most suitable for workloads requiring low-latency access to on-premise systems or apps. According to Amazon\u2019s announcement, it may be applicable to those that work with real-time IoT data or databases used to run manufacturing plants.<\/p>\n<p>Still, there are a few areas where customers should be wary. For example, AWS Outposts can\u2019t store all data locally yet and cannot manage or replicate data across regions for high availability and disaster recovery uses. These shortcomings may be addressed in future updates.<\/p>\n<h2>Ransomware Used by Hackers to Attack and Threaten Victims for GDPR Breaches Is Targeting MongoDB Users<\/h2>\n<p>22,900 MongoDB databases have been <a href=\"https:\/\/siliconangle.com\/2020\/07\/02\/ransomware-targeting-mongodb-databases-threatens-report-victims-gdpr-breach\/\" target=\"\u201c_blank\u201d\" rel=\"\u201cnoopener\u201d noopener noreferrer\">the target of an unknown hacker<\/a> in a ransomware attack where victims are threatened with being reported for breaching the European Union General Data Protection Regulations unless they pay.<\/p>\n<p id=\"last\">This attack was discovered by security researcher Victor Gevers from the Dutch Institute for Vulnerability Disclosure and was first noticed in April. ZDNet reported that the hackers are employing a script that searches for unsecured active MongoDB installations. The script proceeds to remove the contents of the database and delivers a ransom note requiring payment of 0.015 in bitcoin ($137) within 48 hours in order to get the transferred data returned.<\/p>\n<div id=\"slidebox\"><a class=\"close\">\u00a0<\/a><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" data-portal=\"5442029\" data-id=\"4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><span class=\"hs-cta-node hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" id=\"hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<p>\u201cIn case of refusal to pay, we will contact the General Data Protection Regulation, GDPR and notify them that you store user data in an open form and is not safe,\u201d the ransom note reads in somewhat broken English. \u201cUnder the rules of the law, you face a heavy fine or arrest.\u201d<\/p>\n<p>Although these types of attacks are commonplace, this attack is unusual because the 22,900 databases represented 47 percent of all MongoDB databases accessible online and were successfully targeted.<\/p>\n<h2>US Secret Service Issues an Advisory Warning for MSPs<\/h2>\n<p>An<a href=\"https:\/\/www.msspalert.com\/cybersecurity-research\/us-secret-service-hackers-increasingly-target-msps\" target=\"\u201c_blank\u201d\" rel=\"\u201cnoopener\u201d noopener noreferrer\"> advisory warning was issued<\/a> for MSPs by the US Secret Service due to the increase in cyberattacks against managed service providers. The attacks are being conducted to compromise the customer companies of the MSPs, according to the advisory.<br \/>\nIt was noted that MSPs are usually compromised through their own tools, and these include enterprise applications in addition to open-source software.<br \/>\nThese applications and their vulnerabilities are the targets of these bad actors, allowing them to penetrate the MSPs\u2019 IT infrastructure.<\/p>\n<p>The attacks that use this method include point-of-sale intrusions and business email compromise (BEC), in addition to various ransomware attacks. The US-based Xchanging MSP is one of the latest victims, and their attackers are still unknown.<\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\">\n<div class=\"call-to-action__tag\">ON-DEMAND WEBINAR<\/div>\n<div class=\"call-to-action__title\">Ransomware: Prevent or Recover<\/div>\n<div class=\"call-to-action__text\">Watch the webinar and prepare yourself and your customers with the right approach and the right tools<\/div>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-dcb611f1-612b-448d-8afd-7e3fea1fccc0\" data-portal=\"5442029\" data-id=\"dcb611f1-612b-448d-8afd-7e3fea1fccc0\"><span class=\"hs-cta-node hs-cta-dcb611f1-612b-448d-8afd-7e3fea1fccc0\" id=\"hs-cta-dcb611f1-612b-448d-8afd-7e3fea1fccc0\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/dcb611f1-612b-448d-8afd-7e3fea1fccc0\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-dcb611f1-612b-448d-8afd-7e3fea1fccc0\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/dcb611f1-612b-448d-8afd-7e3fea1fccc0.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<div class=\"call-to-action__right\"><img decoding=\"async\" style=\"max-width: 300px;\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/03\/Ransomware_-Prevent-or-Recover-1.png\" alt=\"Webinar icon\" \/><\/div>\n<\/div>\n<h2>MSP Xchanging Suffers Ransomware Attack<\/h2>\n<p>Global IT services and solutions provider DXC Technology disclosed <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ransomware-attack-on-insurance-msp-xchanging-affects-clients\/\" target=\"\u201c_blank\u201d\" rel=\"\u201cnoopener\u201d noopener noreferrer\">an attack on systems of its MSP subsidiary Xchanging<\/a>. Xchanging is mainly known as a managed service provider for companies in the insurance industry; nevertheless, companies from financial services, aerospace and defense, automotive, education, consumer packaged goods, healthcare, and manufacturing fields also appear on its list of customers.<\/p>\n<p>When DXC Technology reported the incident on July 5th, it expressed confidence that it hadn\u2019t spread beyond the Xchanging network.<\/p>\n<p>The cyberattack affected an undisclosed number of customers. According to the company\u2019s notification, the attack resulted in a denial of access to their operating environment. DXC Technology is working with law enforcement and authorities on the investigation, which is usual in cases like this.<\/p>\n<blockquote><p>Learn about common ransomware attack scenarios and what to do if one of these attacks affects your clients:<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/ransomware-attack-scenarios-and-how-to-be-protected\/\">Ransomware Attack Scenarios<\/a><\/p><\/blockquote>\n<h2>Office 365 Users Hit by Phishing Attacks Through OAuth Apps<\/h2>\n<p>With the increase in the number of employees shifting to remote work, customers are becoming exposed to additional security threats. One of these is consent phishing, which comes in addition to conventional credential theft and email phishing attacks.<\/p>\n<p>Consent phishing is similar to an application-based attack, where <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-warns-of-office-365-phishing-via-malicious-oauth-apps\/\" target=\"\u201c_blank\u201d\" rel=\"\u201cnoopener\u201d noopener noreferrer\">the targets are scammed by malicious Office 365 OAuth applications<\/a> (web apps registered by the attackers with an OAuth 2.0 provider) and provide access to their Office 365 accounts.<\/p>\n<p>After successfully getting access to the target\u2019s account, the attackers can access their email, contacts, notes, profile, and files. These may include sensitive information and resources, and anything kept on their corporate SharePoint document management\/storage system or OneDrive for Business cloud storage.<\/p>\n<p>\u201cWhile application use has accelerated and enabled employees to be productive remotely, attackers are looking at leveraging application-based attacks to gain unwarranted access to valuable data in cloud services,\u201d Microsoft Partner Group PM Manager Agnieszka Girling said.<br \/>\nMicrosoft has also classified \u2014 by evaluating and monitoring trillions of signals \u2014 and disabled malicious Office 365 OAuth apps to block users from accessing them, besides taking legal action to take down domains used in consent phishing attacks.<\/p>\n<h2>New Phishing Scam Using Fake ZoomSuspension Alerts Targets Office 365 Users<\/h2>\n<p>A new phishing campaign that uses fake Zoom alerts is <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/persuasive-office-365-phishing-uses-fake-zoom-suspension-alerts\/\" target=\"\u201c_blank\u201d\" rel=\"\u201cnoopener\u201d noopener noreferrer\">targeting Microsoft Office 365 users<\/a>. These alerts warn people working in business environments that their Zoom accounts have been suspended, with the aim of stealing their Office 365 logins.<\/p>\n<p>The phishing campaign portrays itself as automated Zoom account-suspension alerts and has landed in 50,000 mailboxes, according to data from researchers from Abnormal Security who identified these continuing attacks.<\/p>\n<p>The emails use a spoofed email address and an email body that is nearly free of grammar errors or typing mistakes (aside from a visible \u2018zoom\u2019 rather than \u2018Zoom account\u2019), which makes the phishing messages more convincing and potentially a lot more effective.<\/p>\n<p>The targets are warned that their Zoom accounts have been temporarily suspended and are directed to click on an activation button embedded within the message in order to restore their account. After they click on the \u201cActivate Account\u201d button, they are redirected to a fake Microsoft log-in page. The victims are asked to input their Outlook credentials in the phishing landing page, in such a way that their account details can be extracted to servers controlled by the attackers.<\/p>\n<blockquote><p>For more information about phishing please refer to our guide on the topic:<\/p>\n<p><span class=\"further-reading \">Further reading<\/span>\u00a0<a href=\"https:\/\/www.msp360.com\/resources\/blog\/anti-phishing\/\" rel=\"bookmark\">Anti-Phishing Guide<\/a><\/p><\/blockquote>\n<h2>That\u2019s a Wrap<\/h2>\n<p>I hope this update has been helpful. MSP360 is your resource for MSP news. Stay home, stay safe and healthy, and remember to check back next week for more highlights.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What\u2019s new this week in the news for MSPs? Amazon launches AWS Outposts support for its Relational Database Service; ransomware used by hackers to attack and threaten victims for GDPR breaches is targeting MongoDB users; MSP Xchanging suffers ransomware attack; Office 365 users hit by phishing attacks through OAuth apps; and more. Let\u2019s see what [&hellip;]<\/p>\n","protected":false},"author":84,"featured_media":42333,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,885],"tags":[],"class_list":["post-42331","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-articles","category-other"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/42331","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/84"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=42331"}],"version-history":[{"count":0,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/42331\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media\/42333"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=42331"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=42331"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=42331"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}