{"id":52456,"date":"2021-11-30T17:39:25","date_gmt":"2021-11-30T13:39:25","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=52456"},"modified":"2021-12-07T11:47:05","modified_gmt":"2021-12-07T07:47:05","slug":"news-you-mightve-missed-november-2021","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/news-you-mightve-missed-november-2021\/","title":{"rendered":"News You Might&#8217;ve Missed.  November 2021"},"content":{"rendered":"<p>What's new this month in the news for MSPs? New optimized Azure virtual machines from Microsoft; legal pressure allegedly making BlackMatter gang go dark; fake cybersecurity warnings out after hacker accesses FBI server; and Emotet botnet gets resurrected.<!--more--><\/p>\n<p>Let's see what it's all about.<\/p>\n<h2>New Optimized Azure Virtual Machines from Microsoft<\/h2>\n<p>Microsoft is bringing <a href=\"https:\/\/siliconangle.com\/2021\/11\/02\/microsoft-debuts-new-azure-virtual-machines-optimized-confidential-computing\/\"target=\"_blank\" rel=\"noopener noreferrer\">two more sets of virtual machines to its Azure public cloud this month<\/a>. They have designed these specifically to aid confidential computing, a popular method of improving enterprise security apps.<\/p>\n<p>This cybersecurity method allows a server\u2019s CPU to create an isolated data environment from a part of the onboard memory. Access to this data is only through the software using it. The cloud operator owning the server and the operating system on the server cannot access, read, or change the data.<\/p>\n<p>The first set of new virtual machines used in confidential computing are dubbed DCdsv3 and employ Intel-based Xeon processors for servers. Previous virtual machines are known as the DCasv5 and ECasv5 families, and are Advanced Micro Devices-based silicon chips.<\/p>\n<p>These new servers use a technology called SGX, which ships with Intel\u2019s third-generation Xeon processors in the server CPUs. It has one of the most significant upgrades in its Enclave Page Cache, which helps store the code and data that an app will use in a confidential computing workflow.<\/p>\n<p>Another new feature lets the organization encrypt each virtual machine\u2019s memory with an individual encryption key utilizing Intel Total Memory Encryption - Multikey, which enables encryption that is always on and gives protection against other tenants residing on the same node.<\/p>\n<p>The other new set of VMs launched this month are AMD Epyc 7003-based. These chips were introduced by AMD earlier this year and are the latest in AMD\u2019s seven-nanometer Zen 3 core design. These chips contain approximately 64 cores, which run up to 128 processes in total. On average, they provide 19% more instructions per cycle than their predecessors.<\/p>\n<p>Microsoft\u2019s new virtual machines use SEV-SNP technology that AMD includes as a built-in benefit of the Epyc 7003 series to create confidential computing environments. Microsoft plans to make its confidential virtual machines all available as an infrastructure option in the Azure Kubernetes Service.<\/p>\n<h2>Legal Pressure Allegedly Making BlackMatter Gang Go Dark<\/h2>\n<p>The BlackMatter group that emerged from the remains of DarkSide seems to be shutting down again. According to its website, the group says it is closing down operations because of mounting pressure from law authorities.<\/p>\n<p>\u201cDue to certain unsolvable circumstances associated with pressure from the authorities (part of the team is no longer available, after the latest news) - the project is closed,\u201d the VX-Underground message <a href=\"https:\/\/twitter.com\/vxunderground\/status\/1455750066560544769\"target=\"_blank\" rel=\"noopener noreferrer\">posted to its Twitter<\/a> in Russian and English.<\/p>\n<p>The ransomware group, which offers RaaS or ransomware-as-a-service, will permit its systems to continue interacting over mail to businesses for additional information. It also said in its message that it would let its partners continue to get its ransomware decryptors.<\/p>\n<p>The group\u2019s move was likely forced by law enforcement. What\u2019s more, it follows REvil\u2019s announcement that it was shutting down last month after being hacked by a multi-country law enforcement operation.<\/p>\n<p>Many are still skeptical, especially since BlackMatter is a rebranded version of the DarkSide ransomware group known for the Colonial Pipeline attack.<\/p>\n<p>While the group hasn\u2019t said what \u201clatest news\u201d refers to in its website message, many believe it is related to Europol\u2019s <a href=\"https:\/\/www.europol.europa.eu\/newsroom\/news\/12-targeted-for-involvement-in-ransomware-attacks-against-critical-infrastructure\"target=\"_blank\" rel=\"noopener noreferrer\">arrest of 12 people<\/a> reportedly involved in \u201cwreaking havoc across the world with ransomware attacks against critical infrastructure.\u201d<\/p>\n<p>BlackMatter appeared first in July and very quickly made its existence known. In September, it conducted three attacks that included two farming co-ops in the US, the NEW Cooperative in Iowa and Crystal Valley in Minnesota, and the Japanese tech giant Olympus.<\/p>\n<p>Many believe that history may repeat itself, and BlackMatter\u2019s remaining members will probably reorganize and begin their activities anew under a different name.<\/p>\n<h2>Fake Cybersecurity Warnings Out After Hacker Accesses FBI Server<\/h2>\n<p>The Federal Bureau of Investigation\u2019s external email system was compromised by hackers earlier this month, resulting in thousands of fake warning emails being sent to people and companies. According to the FBI, the hackers distributed the fake emails from its Law Enforcement Portal system used to communicate with state and local officials. It\u2019s not part of its more extensive corporate email service.<\/p>\n<p>Cybersecurity professionals close to the situation say that, since the emails didn\u2019t include infected attachments, it could mean the hackers accidentally stumbled on the vulnerability in the portal, with no plan to exploit it.<br \/>\nThe <a href=\"https:\/\/twitter.com\/spamhaus\/status\/1459452609979371520\"target=\"_blank\" rel=\"noopener noreferrer\">Spamhaus Project<\/a>, an international watchdog that tracks spam and related cyber-threats, such as botnets, malware, and phishing campaigns, posted a copy of the alleged spam email on its Twitter account.<\/p>\n<p>According to the post, the subject line was: \u201cUrgent: Threat actor in systems.\u201d The email portrayed itself as a warning from the Department of Homeland Security about a cyberattack. The hackers scraped the email addresses from the American Registry for Internet Numbers (ARIN) database, a nonprofit that manages the distribution of Internet addresses for North America.<\/p>\n<p>The emails referenced an international hacking group known as the Dark Overlord, which allegedly steals data in order to demand significant ransoms for its return. The group reportedly stole episodes of Netflix shows in 2017, and students\u2019 records in several US states.<\/p>\n<p>Cybersecurity professionals say it could have gone much worse, and the FBI most likely dodged the bullet.<\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\" style=\"width: 60%;\">\n<div class=\"call-to-action__title\">MSP's Educational Posters on Password Security<\/div>\n<div class=\"call-to-action__text\">\n<p>The poster pack includes:<\/p>\n<ul>\n<li>Best practices for creating strong passwords<\/li>\n<li>Reminders on how secure passwords should look like<\/li>\n<li>A chart to check if your password is secure enough<\/li>\n<\/ul>\n<\/div>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-88fb277b-8296-40db-9698-b362eb68ccaa\" data-portal=\"5442029\" data-id=\"88fb277b-8296-40db-9698-b362eb68ccaa\"><span class=\"hs-cta-node hs-cta-88fb277b-8296-40db-9698-b362eb68ccaa\" id=\"hs-cta-88fb277b-8296-40db-9698-b362eb68ccaa\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/88fb277b-8296-40db-9698-b362eb68ccaa\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-88fb277b-8296-40db-9698-b362eb68ccaa\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/88fb277b-8296-40db-9698-b362eb68ccaa.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<div class=\"call-to-action__right\" style=\"width: 40%;\"><img decoding=\"async\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/04\/MSPs-Educational-Posters-on-Password-Security.png\" alt=\"Whitepaper icon\" \/><\/div>\n<\/div>\n<h2>Emotet Botnet Gets Resurrected<\/h2>\n<p>The Emotet botnet was once referred to as \u201cthe world\u2019s most dangerous malware.\u201d It has reportedly returned and is being installed on Windows computers with TrickBot malware.<\/p>\n<p>The name Emotet denotes both malware and the botnet used to deliver it. It used to be a regular news item, due to its many malware campaigns and, finally, a US Department of Homeland Security (CISA) warning. Up to July of this year, the botnet had been silent since 2020.<\/p>\n<p>This time around, the malware is back through the TrickBot botnet. TrickBot is another botnet, which Microsoft thought it had taken down in October 2020. According to researcher Luca Ebach from the German cybersecurity firm G Data, Emotet is installed using Trickbot on targeted systems.<\/p>\n<p>Emotet\u2019s return was also detailed by the <a href=\"https:\/\/isc.sans.edu\/diary\/28044\"target=\"_blank\" rel=\"noopener noreferrer\">Internet Storm Center<\/a>. The malware part of Emotet is shared through the use of malicious attachments, such as Excel, Word, and Zip files.<\/p>\n<p>Experts say its return was not unexpected. While there have been some successes that have halted operations for a while, it doesn\u2019t usually last.<\/p>\n<h2>That's a Wrap for News You Might've Missed<\/h2>\n<p>I hope this update has been helpful. MSP360 is your resource for MSP news. Stay home, stay safe and healthy, and remember to check back next month for more highlights.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What&#8217;s new this month in the news for MSPs? New optimized Azure virtual machines from Microsoft; legal pressure allegedly making BlackMatter gang go dark; fake cybersecurity warnings out after hacker accesses FBI server; and Emotet botnet gets resurrected.<\/p>\n","protected":false},"author":84,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,885],"tags":[],"class_list":["post-52456","post","type-post","status-publish","format-standard","hentry","category-blog-articles","category-other"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/52456","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/84"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=52456"}],"version-history":[{"count":2,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/52456\/revisions"}],"predecessor-version":[{"id":52458,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/52456\/revisions\/52458"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=52456"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=52456"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=52456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}