DDoS Attacks Target Major U.S. Airports

Some major U.S. airports’ websites were inaccessible early on Monday, October 10, 2022, due to a coordinated denial-of-service assault orchestrated by professional hackers. However, officials said flights were unaffected.

The assaults, in which participants bombard sites with garbage data, were planned by a mysterious organization named Killnet. The group posted a target list on its Telegram channel the day before the attacks.

Even though DDoS attacks are highly visible and meant to have the most psychological impact possible, they are mostly a nuisance. This differs from hacking, which involves breaking into networks and can cause severe damage.

John Hultquist, vice president of intelligence analysis at Mandiant, tweeted on Monday that both the state government and airport assaults “are what we make of them,” describing the DDoS impact as superficial, brief, but highly noticeable. However, the post added that he is concerned that we may be entering a new phase of increased targeting in the U.S. that might include more severe incidents.

Hultquist also stated, “These are not the serious impacts that have kept us awake.” Most of the time, these attacks show that webmasters aren’t doing enough to protect their sites, which now includes using a DDoS protection service.

The Los Angeles International Airport has issued a statement saying that flylax.com had some difficulties early this morning. However, the outage was restricted to their website alone, and no internal airport systems were affected. LAX added that it had contacted the Transportation Security Administration and the FBI.

The Atlanta International Airport said that following the DDoS assault, its atl.com website is back operational and that airport operations were never affected.

According to a CISA spokesperson, the agency is aware of reports of DDoS assaults targeting numerous U.S. airport websites and is coordinating with possibly impacted entities and giving help as needed.

One hour before the first airport, Chicago O’Hare, was hit, Killnet announced the assaults on the airports via the Killnet Telegram account at 6:50 a.m. EST.

DDoS attacks are mostly a nuisance but can be disruptive. A group or organization usually carries them out, and target websites are chosen ahead of time. Unfortunately, the U.S. is not the only country to fall victim to these attacks, as they have been happening worldwide. While most of the time, these attacks are not severe, it is essential to be aware of them and take steps to protect websites from being attacked.

 

Cybersecurity Attack Hits U.S. Healthcare System

On October 4th, 2022 a cybersecurity incident has disrupted CommonSpirit Hospitals. With more than 150,000 employees, 20,000 physicians, and serving 21 million patients, CommonSpirit Hospitals is the second-largest nonprofit hospital system in the nation. In 21 states, CommonSpirit operates more than 1,000 care sites and 140 hospitals.

CommonSpirit Hospitals announced it is investigating an “IT security issue.” While the full extent of the attack is unknown, it has already caused significant disruptions for patients and staff at CommonSpirit Hospitals.

Some of MercyOne Des Moines Medical Center’s IT systems, including access to electronic health records, have been shut down. In addition, CHI Health, a subsidiary of CommonSpirit based in Nebraska, reported outages across its Omaha hospitals.

Although it is not entirely clear how the incident occurred or what kind of information was compromised, it does illustrate the vulnerability of the U.S. healthcare system to cyberattacks.

The healthcare system in the United States has been the target of numerous high-profile attacks, including University Medical Center Southern Nevada, Eskenazi Health, and Kaiser Permanente. In 2022, at least 15 U.S. health systems were affected by ransomware, and 12 of those incidents involved compromising personal health information.

Cybersecurity attacks on healthcare facilities can seriously affect patients, staff, and the hospital’s operations. These incidents can lead to the loss of essential data, disruptions in care, and financial damages.

Healthcare organizations can prevent cyberattacks by adopting strong security policies, investing in robust security technologies, and training employees to identify and respond to threats. As a result of these measures, healthcare organizations can reduce the harmful effects of cyberattacks on patients, staff, and facilities.

The Advantages of VoIP for Businesses

Voice over IP, or VoIP, has become increasingly popular among business owners. However, many business owners ask if VoIP is viable in a landscape where many voice systems are either no longer supported or cost a fortune to upgrade.

Your business relies on a consistent and secure communication network. Therefore, choosing the right voice over IP solution is crucial for your business. Here are three things to look for when trying to find a voice over IP solution for your business.

Quality of Service – One of the biggest issues with traditional phone systems is the inconsistent quality of the calls. With VoIP, calls are routed through your internet, so distance no longer matters, and the quality of your calls is far superior.

Costs – VoIP may be more expensive than a standard phone system in some cases. However, in many cases, the overall costs of using VoIP will be offset because you will no longer need to pay for the line costs, physical hardware, and hourly labor associated with your current phone system.

Flexibility – VoIP can create flexible networks, changing how employees work and the business operates. In addition to offering internal telephony, VoIP systems allow you to connect multiple offices, make cheap international calls, or even integrate it with your video conferencing solution.

Voice over IP has become increasingly popular among business owners as a viable option to traditional phone systems. VoIP offers many benefits, such as superior call quality, cost savings, and flexibility. In a landscape where many voice systems are either no longer supported or cost a fortune to upgrade, VoIP is a great choice for businesses that need a reliable and flexible communication network.

If you’re wondering whether VoIP is right for your business, the answer is an emphatic yes. If you are considering upgrading your telecommunications infrastructure or are looking for a VoIP solution to improve employee productivity, give our team a call. We are glad to help.

Updated Malware Attacks Point of Sale Devices

This year, security experts have found three updated versions of Prilex malware that target point-of-sale systems.

In 2014, Prilex was a type of malware that targeted ATMs. It switched to PoS (point of sale) devices in 2016, but it wasn’t until 2020 that the malware reached its peak. After that, it faded away in 2021.

Analysts at Kaspersky say that Prilex is back, and it looks like a more advanced and dangerous version of the malware has resurfaced this time. The latest version of this malware can create EMV (Europay, MasterCard, and Visa) cryptograms, which VISA introduced as a transaction validation system to help find and stop payment fraud.

The Kaspersky report explains that it lets threat actors use EMV cryptograms to do “GHOST transactions” with credit cards protected by CHIP and PIN technology.

The infection starts when a spear phishing email pretending to be from a technician from a PoS vendor says that the company needs to update its PoS software. Next, the fake technician goes to the target’s location and installs a malicious upgrade on the PoS terminals. The attackers could also tell the victim to install the AnyDesk remote access tool on their computer and then use it to replace the PoS firmware with a version that has been tampered with.

After the machine is infected, the operators will check to see if the target does enough financial transactions to be worth their time.

The new version of Prilex has a backdoor for communication. The backdoor can do many different things, like open files, run commands, end processes, change the registry, and record the screen. Once the information is encrypted and saved locally on the infected computer, the malware sends periodic requests to the control server.

Kaspersky concluded that the Prilex group knows a lot about how credit and debit card transactions work and how software used for payment processing works. This knowledge allows attackers to keep updating their tools until they find a way to get around the authorization policies and carry out their attacks.

Create a Secure Environment for Remote Workers

Having remote workers in your business is a great way to expand cost-effectiveness and helps your business grow. But, unfortunately, many businesses have issued remote workers limited access to the network to protect important information. Knowing this, hackers are finding creative ways to access networks and steal vital information.

It is important to ensure your remote workers have proper security protections in place not only to protect their personal devices but also to secure networks and data. Here are three ways to help protect your remote workers:

Define Acceptable Usage Policies: First and foremost, it’s important to have clearly defined policies for your work-from-home employees. These policies should address the use of internet browsers, hardware, and recording devices. Then, create clear rules and enforce the policies.

Use encrypted email: Email is the most common form of business communication people use to communicate remotely. Unfortunately, it is also a favorite method of hackers to sneak peeks at sensitive information and compromise your company’s security. Fortunately, solutions exist that can help you eliminate this risk. Encrypted email is a type of email that only the sender and the recipient can read. This ensures that if the email falls into the wrong hands, the hacker will not be able to read its contents.

Use Virtual Private Networks: Virtual Private Networks allow your remote workers to safely connect to your networks without exposing your network to the risk from their devices. VPNs create a secure tunnel between your networks and remote workers. VPNs provide excellent protection and are a very cost-effective solution.

Employers are quickly learning the benefits of having remote workers. With the right security in place, it’s a great way to expand your business and cut costs. However, with hackers getting more creative in their attack methods, it’s important to ensure your remote workers have the proper protections in place. By using these secure means of communicating and protecting your networks, you can feel confident that you can protect your valuable data from prying eyes.