

Description: Nation State threat actors are attempting to infiltrate U.S. companies by planting fake IT workers into their environments to try and gain confidential information. KnowBe4, a popular Cybersecurity training company, hired an engineer who turned out to be a North Korean hacker trying to infiltrate the company from within.
During an investigation conducted by KnowBe4’s Security Operations Center (SOC) after multiple alerts, it was discovered that this newly hired employee was attempting to install malware to his machine that would allow him to move throughout KnowBe4’s internal network. KnowBe4 quickly quarantined the machine and subsequently terminated the employee’s access to company information.
Recommended Actions:
Take Action Now: Perform access reviews and ensure that only legitimate accounts are active across systems, and that least privilege is being followed across your organization.
External Links:
Description: The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) released a joint advisory to disseminate known BlackSuit ransomware IOCs and TTPs identified through FBI threat response activities and third-party reporting as recently as of July 2024. BlackSuit ransomware is the evolution of the ransomware previously identified as Royal ransomware, which was used from approximately September 2022 through June 2023. BlackSuit shares numerous coding similarities with Royal ransomware and has exhibited improved capabilities
BlackSuit ransomware attacks have spread across numerous critical infrastructure sectors including, but not limited to, commercial facilities, healthcare and public health, government facilities, and critical manufacturing.
Recommended Actions:
Take Action Now:
Add the updated IOCs provided by CISA in this advisory to your SIEM tool to aid in the BlackSuit ransomware detection.
External Links:
Description: The Ransomware group, Hunters International, has been seen utilizing a new Remote Access Trojan (RAT) in the wild that is aiming to target IT workers. By masquerading this RAT as the popular IP-based scanner called “Angry IP Scanner”, the ransomware group aims to have users install their RAT and subsequently grant persistent access to their machine to Hunters International.
Once installed, this malware provides persistent access to the machine through an edit to the Windows Registry and installs two directories that provide access to the threat actors.
Recommended Actions:
Take Action Now:
Notify all employees to be vigilant when attempting to utilize third-party software, and implement an approved software list that can be enforced via security tooling.
External Links:
Description: Analysis of current phishing attacks by security researchers have uncovered an increase in the use of trusted shortlink services. According to Barracuda, a wave of phishing attacks is leveraging legitimate URL shortening services to add a layer of obfuscation to their malicious links in emails.
Recommended Actions:
Take Action Now:
Deploy security awareness training sessions for employees on the latest email threats. Teach them to be vigilant every time they interact with an email, an attachment, or a web link.
External Links:
Description: The Cybersecurity & Infrastructure Security Agency (CISA) has released an advisory citing multiple Adobe products with their latest vulnerabilities and associated patches. All software that is present within an organization should be patched immediately to prevent malicious threat actors from exploiting the vulnerabilities against machines.
Recommended Actions:
Take Action Now:
Perform a software inventory check on all listed Adobe products from the associated advisory, and immediately patch affected products and versions.
External Links: