by Dave Finnerty | Jul 25, 2024 | News, Threats
\
North Korean Hackers Shift from Cyber Espionage to Ransomware Attacks
North Korean hackers, specifically the group APT45, known for cyber espionage, are now focusing on ransomware attacks. Google-owned Mandiant reports that APT45 has targeted critical infrastructure in South Korea, Japan, and the U.S. using ransomware like SHATTEREDGLASS and Maui. This shift indicates a broader strategy to generate funds for the North Korean regime. The group’s activities now include targeting healthcare and crop science sectors, reflecting North Korea’s changing geopolitical priorities.
For more details, visit The Hacker News.
Stay secure, everyone!
by Dave Finnerty | Jul 25, 2024 | News, Threats
KnowBe4 Hired a Fake IT Worker from North Korea
Recently, KnowBe4, a well-known cybersecurity firm, discovered they had unknowingly hired a North Korean IT worker posing as a U.S. resident. This individual used stolen identities and falsified documents to secure the position, a tactic employed by many North Korean IT professionals to generate revenue for their authoritarian regime. These workers often take advantage of the demand for IT skills in software and mobile app development, blending into the workforce while secretly funneling earnings back to North Korea.
Despite not always engaging in malicious activities directly, these IT workers use their access to facilitate cyber intrusions, support North Korea’s cyber operations, and fund its weapons programs. The U.S. government has issued multiple warnings about this threat, emphasizing the importance of thorough background checks and vigilance in hiring processes to prevent such incidents.
This incident highlights the critical need for robust incident response policies. Having a clear, written policy ensures that organizations are prepared to handle such breaches effectively, protecting their systems and maintaining trust with clients and stakeholders.
For more detailed insights, you can read the full story on The Record and BleepingComputer.
Stay safe out there!
by Dave Finnerty | Jul 25, 2024 | Best Practices, Education
Incident Response Cheat Sheet
Incident Response Cheat Sheet by TheMadAdmin (AKA Dave)
Step 1: Don’t Panic
- Stay calm and adopt a problem-solving attitude. This will help you and your team respond logically and effectively to the breach.
Step 2: Do Not Pay a Ransom
- Paying ransom often leads to more trouble. Invest in an Endpoint Detection and Response solution to handle ransomware before it executes.
Step 3: Form a Response Team
- Assemble a capable response team including IT staff, HR, and PR. They will investigate, address the breach, and manage communications.
Step 4: Use Backup Servers
- If available, switch to backup servers to maintain operations. Ensure your backups are tested regularly.
Step 5: Isolate the Breach
- Minimize the number of affected systems by isolating the breached area. Test other network segments to ensure they are secure.
Step 6: Investigate & Manage
- Investigate the breach to understand the damage. Address any impacts, especially on employees and your company’s reputation.
Step 7: Document
- Document the breach and your response thoroughly. This helps in refining your response strategy and future prevention.
Step 8: Contact Clients
- Notify affected clients promptly and provide them with necessary information, especially if their private data was compromised.
Step 9: Prevent Future Attacks
- Consider partnering with an external cybersecurity firm if your team struggles with securing your IT infrastructure. Managed Security Services Providers (MSSPs) can be more efficient.
Important Contact Information:
- IT Contact: For remediation efforts
- Legal Counsel: For breach notification and reporting
- PR Contact: For client notifications
- HR Contact: For employee impacts
- Local Law Enforcement: May be needed for insurance claims
- FBI Field Office: www.fbi.gov – Report cyber crimes
Why You Need an Incident Response Policy
Having a written Incident Response policy is crucial as it ensures your organization is prepared for cybersecurity incidents. This policy:
- Provides clear steps to manage and mitigate breaches, minimizing damage.
- Ensures all team members understand their roles and responsibilities.
- Helps maintain client trust by demonstrating a proactive approach to security.
- Assists in regulatory compliance and reduces potential legal liabilities.
Prepared by: TheMadAdmin (AKA Dave)
Having a well-documented policy helps your team stay organized and effective during a crisis, ensuring a swift and controlled response.
by Dave Finnerty | Jul 25, 2024 | Education
The infographic, “The ChatGPT Guide For Jobseekers Part 2,” provides various ways ChatGPT can assist job seekers through Custom GPTs and specific prompts.
Custom GPTs:
- Interview Pro: Offers smart AI interview prep coaching.
- Career Coach: Specializes in resume writing, interview prep, career advice, and more.
- CV Architect Pro: Focuses on optimizing CVs for recruitment algorithms.
- Jobright: Tailors resumes for every role with comprehensive company insights.
- H1B Job Hunter: Searches H1B jobs based on JD and job histories of similar roles.
- Find Jobs: Provides job search capabilities with listings from various sources.
Prompts for Resume Writing:
- Tailoring resumes to job/industry requirements.
- Showcasing skills and achievements.
- Customizing resumes for different roles.
- Incorporating keywords from job descriptions.
- Updating LinkedIn profiles to complement resumes.
Prompts for Interview Prep:
- Preparing for common interview questions.
- Communicating experience effectively.
- Creating compelling career stories.
- Understanding company culture and values.
- Negotiation strategies for salary and benefits.
Prompts for Networking:
- Introducing oneself at networking events.
- Crafting an elevator pitch.
- Asking questions in meetings.
- Using social media for networking.
- Building and maintaining professional relationships.
Prompts for LinkedIn Optimization:
- Enhancing LinkedIn profiles to reflect expertise.
- Showcasing achievements and skills.
- Engaging with the LinkedIn community.
- Utilizing LinkedIn groups for networking.
Prompts for Cover Letters:
- Tailoring cover letters to specific job titles.
- Highlighting key elements and experiences.
- Addressing gaps or career changes.
- Crafting compelling closing paragraphs.
The infographic concludes with an invitation to follow Chris Donnelly and join his newsletter for a high-resolution PDF of the guide.