This week shows that the DNC was not the only victim in the latest breach from Guccifer 2.0, affecting also The Clinton Foundation, ransomware is continuing to hit local governments as the City of Janesville was experiencing downtime that forced the employees back to pen/paper, and Conflicker is continuing to burrow it's way into networks ranking it most common malware family.

Highlighting the cyber-security news from the past week in a 120 sec. read. Starting now.


Breach at the Clinton Foundation

It’s been reported that the same hackers, Guccifer 2.0, that breached the DNC last week infiltrated The Clinton Foundation.

why is this signficant?

  • The team Guccifer 2.0 is threatening to publish a trove of data incl. personal memos.
  • The following statement clearly raises more questions than answers. After all, if they knew about the compromise months ago then a) why are they disclosing it just now and b) how did the breaches continue to occur also after they detected the threat? “The Clinton Campaign was aware as nearly as April that it had been targeted by hackers with links to the Russian government on at least four recent occasions.”.
  • With elections coming up in November, perhaps this should be a good wake up call to cyber-security. Especially when one recalls that the current government has increased efforts spending $6B on a detection Einstein (US-CERT program). Unfortunately it has a 94% detection failure rate.

Read the full story by the Chicago Tribune

The Cost of Ransomware

City of Janesville in Wisconsin, experienced downtime on their computer network due to a malware that was most likely ransomware.

why is this signficant?

  • Phishing emails are a root cause to the widespread ransomware panic that are targeting local governments and other enterprises on a large scale.
  • The downtime is forcing city officials to go back to pen/paper method while technical support works to get the network back and running.  In most cases, the downtime caused by ransomware has a more detrimental effect on the bottom line, than the ransomware itself.

/**It is possible to prevent the malicious encryption of ransomware in real-time – watch a demo to see how: **/

Read the full story on Channel 3000

Conficker Stays Put

Conficker worm has been around for 8 years and not going anywhere as it has been ranked the most common malware family.

why is this signficant?

  • 8 years have passed since Conficker was first detected and it continues to infect organizations across all industries.
  • Conficker is known to go undetected as it spreads laterally across networks and is not taken as a serious threat initially, which has reflected in it topping the charts for the most common malware.
  • A recent report states that 14% of cyber incidents track back to Conficker. Once Conficker infiltrates a network, the door is left wide open for the cyber thieves to exfiltrate password credentials, financial credentials and intellectual property.
    /** enSilo protects out-of-the-box against the consequences of Conficker**/

Read the full story on SC Magazine