NCSC Threat Trends And Ransomware Updates

September 20, 2019 Digital Shadows

It’s Harrison and Alex this week for your threat intelligence updates. The guys first dig into the NCSC’s recent threat trends report, the first of these that the NCSC has put out. It’s UK-specific, so just like we’ve shared thoughts around the FBI IC3 annual report in the past, which is heavily geared toward the US, it’s good to look across the pond as well.

The team digs into 3 main areas:

- Office365
- Ransomware trends including updates on Emotet, Ryuk, LockerGoga, Bitpaymer, Nemty, and GandCrab
- Supply Chain Attacks The team also digs into some recent research around B.Wanted.

A few weeks ago, there was a story that Brian Krebs reported on: essentially a user on a dark web forum was offering to sell access to a federal contractor who managed 20+ different federal agencies. Specifically we were looking into the threat actor responsible for selling the access, who goes by the name B.Wanted. The guys dig into some different theories. Finally we round out the episode with some top shows on Netflix to add to your lists. Enjoy your weekends!

 

Get the weekly intelligence summary at https://resources.digitalshadows.com/weekly-intelligence-summary

Resources from this week
NCSC Cyber Threat Trends: https://www.digitalshadows.com/blog-and-research/ncsc-cyber-threat-trends-report-analysis-of-attacks-across-uk-industries/

Nemty Ransomware: https://www.digitalshadows.com/blog-and-research/nemty-ransomware-slow-and-steady-wins-the-race/

Purple Teaming podcast episode with Eliza May Austin: https://dts.podtrac.com/redirect.mp3/podcasts.apple.com/us/podcast/purple-teaming-an-interview-with-eliza-may-austin/id1326304686?i=1000450023564

Previous Post
Envoy on a Mission to Bring Stability to the Criminal Underground
Envoy on a Mission to Bring Stability to the Criminal Underground

All this turbulence has resulted in significant disruption and unrest within the overall cybercriminal scen...

Next Post
Mapping the NIST Cybersecurity Framework to SearchLight: Eating our own BBQ
Mapping the NIST Cybersecurity Framework to SearchLight: Eating our own BBQ

In this edition of “eat your own BBQ,” I want to share how we have mapped SearchLight to the NIST Cybersecu...