{"id":43323,"date":"2020-08-14T17:18:40","date_gmt":"2020-08-14T13:18:40","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=43323"},"modified":"2020-12-10T14:21:10","modified_gmt":"2020-12-10T10:21:10","slug":"news-you-mightve-missed-10-14-august","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/news-you-mightve-missed-10-14-august\/","title":{"rendered":"News You Might&#8217;ve Missed. 10 &#8211; 14 August"},"content":{"rendered":"<p>What's new this week in the news for MSPs?<\/p>\n<p>Pentagon asks for more time on the JEDI contract; SANS Institute data breach; Agent Tesla upgraded to steal passwords; Dharma ransomware being exploited by hackers in attacks; and Microsoft allowing Office 365 admins to manage phishing simulations. Let's see what it's all about.<\/p>\n<p><!--more--><\/p>\n<h2>Pentagon Asks for More Time on the Jedi Contract<\/h2>\n<p>The US Department of Defense has been reviewing the award of a contract to Microsoft Corp. It has requested <a href=\"https:\/\/siliconangle.com\/2020\/08\/10\/pentagon-asks-time-consider-jedi-contract-reevaluation\/\" target=\"\u201c_blank\u201d\" rel=\"\u201cnoopener\u201d noopener noreferrer\">a thirty-day extension<\/a> before it gives its final decision.<\/p>\n<p>The Joint Enterprise Defense Infrastructure (JEDI) project entails an infrastructure for cloud computing for the Pentagon. This project will create a link between many military systems and put them under an individual, unified architecture. According to the Department of Defense (DOD), artificial intelligence projects under JEDI will move ahead to the next level.<\/p>\n<p>The award of JEDI to Microsoft Corp. ahead of a bid by Amazon Web Services, Inc. that experts say was the favorite, has been a matter of controversy.<\/p>\n<p>Amazon and Microsoft have been at loggerheads since the award. Last May, Drew Herdener, VP for AWS, commented that the award decision was \"fatally flawed on all six of the technical evaluation factors.\" Frank Shaw, Microsoft's corporate VP of communications, <a href=\"https:\/\/siliconangle.com\/2020\/05\/08\/amazon-files-new-protest-fatally-flawed-jedi-cloud-computing-contract-award\/\" target=\"\u201c_blank\u201d\" rel=\"\u201cnoopener\u201d noopener noreferrer\">responded, claiming<\/a> Amazon was \"trying to bog down JEDI in complaints, litigation and other delays\" to overcome its failed bid.<\/p>\n<h2>Sans Institute Data Breach<\/h2>\n<p>The SANS Institute, a cybersecurity training and certification firm, <a href=\"https:\/\/www.sans.org\/dataincident2020\" target=\"\u201c_blank\u201d\" rel=\"\u201cnoopener\u201d noopener noreferrer\">confirmed in a statement<\/a> this week that it had suffered a data breach. According to the announcement, the hackers took the records of approximately 28,000 clients. The breach began from a phishing attack on an employee which contained an infected Office 365 attachment.<\/p>\n<p>In its statement, SANS revealed that it had detected the breach on August 6th. It then \"quickly stopped any further release of information\" from the compromised account. The email account was forwarding the data to a suspicious external email address.<\/p>\n<p>The company suggested that there was no evidence that it was a targeted attack.<\/p>\n<p>Tim Wade at Vectra AI, Inc., a threat detection and response firm, said in a comment to SiliconANGLE, \"The real hallmark of modern security is about resilience to attacks \u2013 the capacity to perform timely detection and response before material damage is done even after preventative controls have failed.\"<\/p>\n<p>Ilia Kolochenko, from ImmuniWeb, also noted, \"Attackers will now gradually focus their attention on cybersecurity companies and organizations to get their clients' privileged information or credentials.\" He also offered praise for the SANS Institute's response to the incident.<\/p>\n<h2>Agent Tesla Upgraded to Steal Passwords<\/h2>\n<p id=\"last\">Agent Tesla, an information-scraping trojan, has new variants that have modules aimed at stealing credentials from applications. Some of the apps include VPN software, web browsers, and also FTP and email applications.<\/p>\n<div id=\"slidebox\"><a class=\"close\">\u00a0<\/a><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" data-portal=\"5442029\" data-id=\"4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><span class=\"hs-cta-node hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" id=\"hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<p>Agent Tesla is a .Net-based trojan with password-stealing and key-logging abilities. It has been active since 2014, according to most experts.<\/p>\n<p>Currently, the malware is trending among business email compromise (BEC) gangs. They use it to record keystrokes and take screenshots of compromised systems of their victims. Another way it is used is to steal victims\u2019 clipboard contents data, kill anti-malware software and analysis processes, and collect system information.<\/p>\n<p>According to Jim Walter, a senior threat researcher from Sentinel One, \"The malware can extract credentials from the registry and related configuration or support files.\"<\/p>\n<p>At present, Agent Tesla seems to be one of the more active malware strains in use in attacks that target both business and home users, according to a list of the top 10 malware variants <a href=\"https:\/\/twitter.com\/anyrun_app\/status\/1292697938070773761\" target=\"\u201c_blank\u201d\" rel=\"\u201cnoopener\u201d noopener noreferrer\">analyzed by Any.Run.<\/a><\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\">\n<div class=\"call-to-action__tag\">ON-DEMAND WEBINAR<\/div>\n<div class=\"call-to-action__title\">Ransomware: Prevent or Recover<\/div>\n<div class=\"call-to-action__text\">Watch the webinar and prepare yourself and your customers with the right approach and the right tools<\/div>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-dcb611f1-612b-448d-8afd-7e3fea1fccc0\" data-portal=\"5442029\" data-id=\"dcb611f1-612b-448d-8afd-7e3fea1fccc0\"><span class=\"hs-cta-node hs-cta-dcb611f1-612b-448d-8afd-7e3fea1fccc0\" id=\"hs-cta-dcb611f1-612b-448d-8afd-7e3fea1fccc0\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/dcb611f1-612b-448d-8afd-7e3fea1fccc0\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-dcb611f1-612b-448d-8afd-7e3fea1fccc0\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/dcb611f1-612b-448d-8afd-7e3fea1fccc0.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<div class=\"call-to-action__right\"><img decoding=\"async\" style=\"max-width: 300px;\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/03\/Ransomware_-Prevent-or-Recover-1.png\" alt=\"Webinar icon\" \/><\/div>\n<\/div>\n<h2>Dharma Ransomware Being Exploited by Hackers in Attacks<\/h2>\n<p>Dharma ransomware-as-a-service is <a href=\"https:\/\/www.msspalert.com\/cybersecurity-research\/sophos-hackers-use-dharma-as-a-service-against-smbs\/\" target=\"\u201c_blank\u201d\" rel=\"\u201cnoopener\u201d noopener noreferrer\">trending among cybercriminals<\/a> in attacks on SMBs this year, according to the British cybersecurity company Sophos. The hackers leverage different variants of the Dharma source code that have been offered for sale or dumped online.<\/p>\n<p>According to Coveware, a ransomware recovery company, 85 percent of attacks are using Dharma against SMBs in 2020. The objective of their attacks was to expose access tools like the remote desktop protocol (RDP).<\/p>\n<p>Sophos senior threat researcher Sean Gallagher says that Dharma represents \u201cfast-food franchise ransomware.\u201d He further noted that it uses a mass-market, service-based business model, which puts it in this category. Because of this, Dharma has rapidly grown to be one of the world\u2019s most lucrative ransomware families.<\/p>\n<p>Sophos has these suggestions for SMBs to protect them from Dharma threats:<\/p>\n<ul>\n<li>Update all network devices regularly<\/li>\n<li>Internet-facing RDPs should be deactivated<\/li>\n<li>Use offline storage devices for backups<\/li>\n<li>Be aware of the warning signs of ransomware attacks<\/li>\n<li>Layered security models can help ensure that SMBs are well armed. They equip them to address and identify ransomware and other cyberattacks before they inflict long-term harm.<\/li>\n<\/ul>\n<blockquote><p>Learn about common ransomware attack scenarios and what to do if one of these attacks affects your clients:<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/ransomware-attack-scenarios-and-how-to-be-protected\/\">Ransomware Attack Scenarios<\/a><\/p><\/blockquote>\n<h2>Microsoft Allowing Office 365 Admins to Manage Phishing Simulations<\/h2>\n<p>Microsoft has added new support to allow security admins to run phishing training sessions or simulations. This self-remediation portal permits security admins to select items that could contain threats and land in recipients\u2019 inboxes. They first pass through the Office 365 Exchange Online Protection (EOP) filtering stack.<br \/>\nThe EOP is a cloud-based filtering service. It blocks spam and emails with an infected or malicious attachment from reaching Exchange Online mailboxes.<\/p>\n<p>The primary purpose is to assist their customers in controlling the blocking of simulation emails. The <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/roadmap?filters=Office%20365%2CBC%2COffice%20365%20Advanced%20Threat%20Protection%2CExchange%2CIn%20development&amp;searchterms=61352\" target=\"\u201c_blank\u201d\" rel=\"\u201cnoopener\u201d noopener noreferrer\">new portal<\/a> gives admins a way to allow or block specific types of attachments and URLs in their Office 365 tenants by using the new portal.<\/p>\n<p>They hope to roll out the Tenant Allow\/Block list portal during the third quarter of 2020, and it will be available to all clients with an Advanced Threat Protection plan in all Office 365 environments.<\/p>\n<h2>That's a Wrap<\/h2>\n<p>I hope this update has been helpful. MSP360 is your resource for MSP news. Stay home, stay safe and healthy, and remember to check back next week for more highlights.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What&#8217;s new this week in the news for MSPs? Pentagon asks for more time on the JEDI contract; SANS Institute data breach; Agent Tesla upgraded to steal passwords; Dharma ransomware being exploited by hackers in attacks; and Microsoft allowing Office 365 admins to manage phishing simulations. Let&#8217;s see what it&#8217;s all about.<\/p>\n","protected":false},"author":84,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,885],"tags":[],"class_list":["post-43323","post","type-post","status-publish","format-standard","hentry","category-blog-articles","category-other"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/43323","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/84"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=43323"}],"version-history":[{"count":0,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/43323\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=43323"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=43323"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=43323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}