Malicious Actors Targeted U.S. Agencies in Phishing Campaigns Using Legit RMM Software
Riot Games won't pay ransom, NCSC warns of Iranian, Russian hackers, Kevin Rose lost 40 NFTs in wallet hack, Old Yandex source code leaked, Scams boosted through hacked Robinhood Twitter, much more
Don’t miss my latest CSO column, which reports from Shmoocon on how laws affecting security researchers are improving but areas of concern persist.
The Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Multi-State Information Sharing and Analysis Center (MS-ISAC) issued a joint advisory saying that CISA discovered malicious activity within the networks of multiple federal civilian executive branch (FCEB) aimed at tricking victims into sending the scammers money using legitimate remote monitoring and management (RMM) software.
The activity CISA discovered was linked to the "widespread, financially motivated phishing campaign" reported by Silent Push last October and was detected on "many other FCEB networks" after first being spotted on a single FCEB network in mid-September 2022.
"The authoring organizations assess that since at least June 2022, cyber criminal actors have sent help desk-themed phishing emails to FCEB federal staff's personal, …
Keep reading with a 7-day free trial
Subscribe to Metacurity to keep reading this post and get 7 days of free access to the full post archives.