{"id":50733,"date":"2021-04-30T20:16:03","date_gmt":"2021-04-30T16:16:03","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=50733"},"modified":"2021-04-30T20:16:28","modified_gmt":"2021-04-30T16:16:28","slug":"news-you-mightve-missed-26-29-apr","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/news-you-mightve-missed-26-29-apr\/","title":{"rendered":"News You Might&#8217;ve Missed. 26 &#8211; 29 Apr"},"content":{"rendered":"<p>What's new this week in the news for MSPs? Google launches new cybersecurity features for Google Cloud and Workspace; Washington, DC Police Department ransomware attack; and Prometei botnet leveraged by hackers in Microsoft Exchange exploits.<!--more--><\/p>\n<p>Let's see what it's all about.<\/p>\n<h2>Google Launches New Cybersecurity Features for Google Cloud and Workspace<\/h2>\n<p>This week Google <a href=\"https:\/\/siliconangle.com\/2021\/04\/28\/google-cloud-workspace-get-new-batch-cybersecurity-features\/\"target=\"_blank\" rel=\"noopener noreferrer\">began the rollout of a new set of cybersecurity features<\/a> for Google Cloud and the Workspace suite, which include machine learning models that will prevent data leaks. This update comes following cybersecurity updates to Google\u2019s Cloud Spanner database.<\/p>\n<p>What\u2019s more, the machine learning models being rolled out are also being included in Cloud DLP, a service that lets businesses find documents that have sensitive information and limit their access.<\/p>\n<p>More upgrades will be rolled out to Google Cloud\u2019s VPC service soon, they say. This product lets businesses isolate apps they host and other internal workloads, so as to keep them out of the public web.<\/p>\n<p>The security upgrades for Google\u2019s productivity suite, Workspace, are aimed at the Vault tool. Administrators can manage business files that employees store in Workspace services such as Drive, using Vault. It now comes loaded with tooltips that will provide pointers to administrators on how to set up retention policies and holds.<\/p>\n<h2>Washington, DC Police Department Ransomware Attack<\/h2>\n<p>A group known as Babuk <a href=\"https:\/\/www.msspalert.com\/cybersecurity-breaches-and-attacks\/ransomware\/ransomware-attacks-washington-dc-police-department-report\/\"target=\"_blank\" rel=\"noopener noreferrer\">has leaked data from Washington, DC Police Department<\/a>, according to a New York Times article this week. The data includes reports from the department\u2019s chief, details on persons of interest, and lists of arrests.<\/p>\n<p>A spokesperson for the department said that they are aware of the unauthorized access to its server that was mentioned in the New York Times article. They are reviewing the unauthorized activity and have requested the FBI to look into the incident.<\/p>\n<p>The Babuk hackers said in a post on the dark web that they downloaded 250 gigabytes of data from the police department. The hackers have said they will release the data if the ransom demand is not met within three days.<\/p>\n<p>They also say they will release information about department informants to criminal gangs and will continue to attack members of the state sector, such as the FBI and CISA (Cybersecurity and Infrastructure Security Agency), among others.<\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\" style=\"width: 40%;\"><img decoding=\"async\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/06\/Ransomware-Awareness-Poster-Pack-2.png\" alt=\"Poster Pack\" \/><\/div>\n<div class=\"call-to-action__right\" style=\"width: 60%;\">\n<div class=\"call-to-action__title\">MSP's Ransomware Awareness Poster Pack<\/div>\n<div class=\"call-to-action__text\">\n<p>4 white-label posters to help you educate your end-users on how not to get hit by ransomware.<\/p>\n<\/div>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-38530902-54cb-489c-9f02-772612f0072d\" data-portal=\"5442029\" data-id=\"38530902-54cb-489c-9f02-772612f0072d\"><span class=\"hs-cta-node hs-cta-38530902-54cb-489c-9f02-772612f0072d\" id=\"hs-cta-38530902-54cb-489c-9f02-772612f0072d\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/38530902-54cb-489c-9f02-772612f0072d\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-38530902-54cb-489c-9f02-772612f0072d\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/38530902-54cb-489c-9f02-772612f0072d.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<\/div>\n<h2>Prometei Botnet Leveraged by Hackers in Microsoft Exchange Exploits<\/h2>\n<p>Vulnerabilities in Microsoft Exchange servers <a href=\"https:\/\/www.msspalert.com\/cybersecurity-breaches-and-attacks\/botnet\/prometei-botnet-microsoft-exchange-users\/\"target=\"_blank\" rel=\"noopener noreferrer\">have been targeted by several hackers<\/a>. Both of these have been linked to Hafnium, a state-sponsored threat actor first reported in March 2021.<\/p>\n<p>Now, cybercriminals are using the Prometei botnet to exploit these vulnerabilities, according to <a href=\"https:\/\/www.cybereason.com\/\"target=\"_blank\" rel=\"noopener noreferrer\">Cybereason<\/a>.<\/p>\n<p>Prometei attackers are using Exchange vulnerabilities, which permit them to infiltrate networks. Once in, they begin malware deployment, credential theft, and other nefarious activities. The businesses they are targeting span a variety of industries. These include insurance, finance, retail, manufacturing, travel, utilities, and construction.<\/p>\n<p>Prometei first attempts to install the Monero miner component across Exchange users\u2019 endpoints. It uses exploits such as BlueKeep and EternalBlue to do this. Then it collects credentials and uses varied techniques that let it extend its reach across a network.<\/p>\n<p>Prometei is also designed to interact with four C2 (command and control) servers. This capability makes its infrastructure stronger and it is less vulnerable to takedowns.<\/p>\n<p>The best way to protect your organization is by using the Exchange patches released by Microsoft after the Hafnium attacks were discovered. A few other things that organizations can do to protect themselves against the Prometei and other types of botnet attacks are to monitor network activities, track failed login attempts, and keep all software and systems up to date.<\/p>\n<p>Educating employees about botnets and other cyber-threats helps them do their part to fight these hazards.<\/p>\n<h2>That's a Wrap for News You Might've Missed<\/h2>\n<p>I hope this update has been helpful. MSP360 is your resource for MSP news. Stay home, stay safe and healthy, and remember to check back next month for more highlights.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What&#8217;s new this week in the news for MSPs? Google launches new cybersecurity features for Google Cloud and Workspace; Washington, DC Police Department ransomware attack; and Prometei botnet leveraged by hackers in Microsoft Exchange exploits.<\/p>\n","protected":false},"author":84,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,885],"tags":[],"class_list":["post-50733","post","type-post","status-publish","format-standard","hentry","category-blog-articles","category-other"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/50733","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/84"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=50733"}],"version-history":[{"count":2,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/50733\/revisions"}],"predecessor-version":[{"id":50735,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/50733\/revisions\/50735"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=50733"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=50733"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=50733"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}