{"id":43140,"date":"2020-08-07T18:55:12","date_gmt":"2020-08-07T14:55:12","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=43140"},"modified":"2020-12-22T15:03:11","modified_gmt":"2020-12-22T11:03:11","slug":"news-you-mightve-missed-03-07-august","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/news-you-mightve-missed-03-07-august\/","title":{"rendered":"News You Might&#8217;ve Missed. 03 &#8211; 07 August"},"content":{"rendered":"<p>What\u2019s new this week in the news for MSPs?<\/p>\n<p>Google introduces Certificate Authentication Service in beta in Google Cloud; Canon confirms Maze ransomware cyberattack; Interpol reports American SMBs the target of LockBit ransomware; Garmin pays WastedLocker ransom after cyberattack; and WastedLocker is abusing Windows memory to hide from detection. Let\u2019s see what it\u2019s all about.<\/p>\n<h2><!--more--><br \/>\nGoogle Introduces Certificate Authentication Service (CAS) in Beta in Google Cloud<\/h2>\n<p><a href=\"https:\/\/cloud.google.com\/blog\/products\/identity-security\/introducing-cas-a-cloud-based-managed-ca-for-the-devops-and-iot-world\" target=\"\u201c_blank\u201d\" rel=\"\u201cnoopener\u201d noopener noreferrer\">Google LLC announced<\/a> the introduction of a new cloud-based service to help companies developing applications to create the certificates they require for public key infrastructure (PKI). The general idea is to have trusted entities certify that specific cryptographic keys belong to individual users or devices.<\/p>\n<p>\u201cRecently, we\u2019ve seen increased interest in using public key infrastructure (PKI) in DevOps and device management, particularly for IoT devices. But one of the most fundamental problems with PKI remains\u2014it\u2019s hard to set up Certificate Authorities (CA), and even harder to do it reliably at scale.\u201d<\/p>\n<p>Traditional digital certificates issued by a private Certificate Authority hosted on-premises have an expiration date far off into the future, which is one reason they are problematic. They are generally associated with a device or application-specific certificate enrollment process that happens infrequently. This system is excellent for an IoT device but, where emerging workloads are involved, Google says this is not as suitable. Examples are using private certificates in DevOps that protect software containers, virtual machines, microservices, and service accounts.<\/p>\n<p>This new service will be priced using a pay-as-you-go model once it is released for general availability; however, as of right now, Google says it is free to use.<\/p>\n<h2>Canon Confirms Maze Ransomware Cyberattack<\/h2>\n<p id=\"last\">On July 30th, the Canon website <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/canon-hit-by-maze-ransomware-attack-10tb-data-allegedly-stolen\/\" target=\"\u201c_blank\u201d\" rel=\"\u201cnoopener\u201d noopener noreferrer\">went offline for about six days<\/a>, providing only status updates on the outage until the site was restored to operation on August 4th. According to Maze, they were able to hack the website and steal 10 TB of Canon\u2019s data, including private databases, as part of their attack on the company. When BleepingComputer contacted them, they wouldn\u2019t share any other details about the attack.<\/p>\n<div id=\"slidebox\"><a class=\"close\">\u00a0<\/a><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" data-portal=\"5442029\" data-id=\"4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><span class=\"hs-cta-node hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" id=\"hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<p>Maze is a <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-shares-tactics-used-in-human-operated-ransomware-attacks\/\" target=\"\u201c_blank\u201d\" rel=\"\u201cnoopener\u201d noopener noreferrer\">human-operated ransomware<\/a> that targets enterprises. It gains access in order to compromise a network by gaining control of an administrator account and the system's Windows domain controller, whereupon it stealthily spreads laterally throughout the network. It then steals unencrypted files from servers and backups and uploads them to its own servers. After they have harvested all files possible, they spread their ransomware throughout the network to encrypt all devices.<\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\">\n<div class=\"call-to-action__tag\">ON-DEMAND WEBINAR<\/div>\n<div class=\"call-to-action__title\">Ransomware: Prevent or Recover<\/div>\n<div class=\"call-to-action__text\">Watch the webinar and prepare yourself and your customers with the right approach and the right tools<\/div>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-dcb611f1-612b-448d-8afd-7e3fea1fccc0\" data-portal=\"5442029\" data-id=\"dcb611f1-612b-448d-8afd-7e3fea1fccc0\"><span class=\"hs-cta-node hs-cta-dcb611f1-612b-448d-8afd-7e3fea1fccc0\" id=\"hs-cta-dcb611f1-612b-448d-8afd-7e3fea1fccc0\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/dcb611f1-612b-448d-8afd-7e3fea1fccc0\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-dcb611f1-612b-448d-8afd-7e3fea1fccc0\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/dcb611f1-612b-448d-8afd-7e3fea1fccc0.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<div class=\"call-to-action__right\"><img decoding=\"async\" style=\"max-width: 300px;\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/03\/Ransomware_-Prevent-or-Recover-1.png\" alt=\"Webinar icon\" \/><\/div>\n<\/div>\n<h2>Interpol Reports American SMBs Target of LockBit Ransomware<\/h2>\n<p>According to a <a href=\"https:\/\/www.interpol.int\/content\/download\/15526\/file\/COVID-19%20Cybercrime%20Analysis%20Report-%20August%202020.pdf\" target=\"\u201c_blank\u201d\" rel=\"\u201cnoopener\u201d noopener noreferrer\">report from Interpol<\/a> (International Criminal Police Organization), American medium-sized businesses are the target of LockBit ransomware operators.<\/p>\n<p>LockBit is a human-operated operation that is ransomware-as-a-service (RaaS)-based. It surfaced in September 2019, targeting enterprises as a private operation, but was subsequently observed by Microsoft aiming at healthcare and critical services.<\/p>\n<p>The ransomware\u2019s operators use the CrackMapExec penetration-testing tool to move laterally, once inside their victim\u2019s network. Maze has recently partnered with LockBit to create an extortion cartel to exchange tactics and intelligence and share the same data-leak platform during their operations.<\/p>\n<p>Organizations exposed to ransomware attacks are recommended to keep their software and hardware up to date. Interpol also suggests that by backing up their data using offline storage devices, they can thwart ransomware operators from accessing and encrypting them.<\/p>\n<p>Learn about common ransomware attack scenarios and what to do if one of these attacks affects your clients:<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/ransomware-attack-scenarios-and-how-to-be-protected\/\">Ransomware Attack Scenarios<\/a><\/p>\n<h2>Garmin Pays WastedLocker Ransom<\/h2>\n<p><a href=\"https:\/\/news.sky.com\/story\/garmin-paid-multi-million-dollar-ransom-to-criminals-using-arete-ir-say-sources-12041468\" target=\"\u201c_blank\u201d\" rel=\"\u201cnoopener\u201d noopener noreferrer\">Sky News recently revealed<\/a> that Garmin, a fitness brand, has paid millions of dollars in ransom after a cyberattack took its products and services offline last month. Garmin worked with Arete IR, a ransom negotiation company, to make the payment.<\/p>\n<p>Last week, BleepingComputer revealed that Garmin had gotten a decryption key to access their encrypted data and that the initial demand was for $10 million.<\/p>\n<p>The attack began on July 23rd and kept many of Garmin\u2019s products and operations offline for days. On July 27th, Garmin confirmed that it had been the victim of a cyberattack when its services were beginning to be restored. From the beginning, it was believed that WastedLocker was the perpetrator of the attack.<\/p>\n<p>While neither the company nor the negotiation firm will confirm, BleepingComputer believes that Garmin paid the ransom. They point out that WastedLocker has no known weaknesses and, therefore, it would seem the likely way Garmin was able to restore its operations.<\/p>\n<h2>WastedLocker Abusing Windows Memory Management to Hide from Detection<\/h2>\n<p>As we know, WastedLocker ransomware has become notorious since it was linked with the sanctioned Evil Corp group and was involved in the cyberattack on Garmin. Sophos security researchers recently shared how WastedLocker uses the Windows cache manager to evade detection in <a href=\"https:\/\/news.sophos.com\/en-us\/2020\/08\/04\/wastedlocker-techniques-point-to-a-familiar-heritage\" target=\"\u201c_blank\u201d\" rel=\"\u201cnoopener\u201d noopener noreferrer\">a new report shared with BleepingComputer<\/a>.<\/p>\n<p>WastedLocker includes a routine that opens a file, reads it into the Windows cache manager, and then closes the original file to avoid detection by anti-ransomware software. WastedLocker then encrypts the file's contents stored in the cache, instead of the file stored on the file system, since the data is already stored in the Windows cache manager.<\/p>\n<p>The files stored in the Windows cache become \u2018dirty\u2019 when they are modified. The Windows cache manager will write the encrypted cached data back to their original files when enough of the data becomes dirty. Since the Windows cache manager runs as a system process, security software sees the writing of the encrypted data as being from an allowed and legitimate Windows process. This method allows WastedLocker to encrypt all the files and effectively bypass the security solution's ransomware protection modules.<\/p>\n<h2>That\u2019s a Wrap<\/h2>\n<p>I hope this update has been helpful. MSP360 is your resource for MSP news. Stay home, stay safe and healthy, and remember to check back next week for more highlights.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What\u2019s new this week in the news for MSPs? Google introduces Certificate Authentication Service in beta in Google Cloud; Canon confirms Maze ransomware cyberattack; Interpol reports American SMBs the target of LockBit ransomware; Garmin pays WastedLocker ransom after cyberattack; and WastedLocker is abusing Windows memory to hide from detection. Let\u2019s see what it\u2019s all about.<\/p>\n","protected":false},"author":84,"featured_media":43142,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,885],"tags":[],"class_list":["post-43140","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-articles","category-other"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/43140","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/84"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=43140"}],"version-history":[{"count":0,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/43140\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media\/43142"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=43140"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=43140"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=43140"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}