{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


linkedin facebook twitter instagram
Russian military hackers are applying brute force in a two-year campaign, U.S. and U.K. agencies say. DHS is touting hundreds of cyber hires. And a House panel is aiming more money at CISA. This is CyberScoop for July 2, 2021.

Fancy Bear up to its fearsome old habits

U.S. and U.K. cyber agencies say that Russian military hackers have been going after hundreds of government and private sector targets worldwide, using Kubernetes clusters to launch brute force attacks. In a joint alert, the agencies said GRU hackers (also known as Fancy Bear or APT28) have been bombarding targets with commonly known passwords since mid-2019 to gain access to their networks with the idea of stealing data. They've been particularly fond of going after organizations relying on Microsoft Office 365 cloud services. Tim Starks reports.

A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.

More about that Russian cyber-espionage activity…

Fancy Bear’s attack last year on the Norwegian parliament involved the theft of “sensitive content” from some lawmakers’ email accounts. More than 10 Norwegian organizations were part of the same campaign, police in Oslo said at the time, though the spying effort likely was part of a broader initiative also aimed at targets dating back to 2019. Relations between Russia and Norway had grown more tense in recent months after Norwegian authorities expelled a Russian diplomat because of his alleged connection to an espionage case, and Russia retaliated by expelling a Norwegian diplomat. Sean Lyngaas covered the news at the time.

DHS cybersecurity hiring spree gets department 12% closer

Department of Homeland Security Secretary Alejandro Mayorkas said the department's "Cybersecurity Workforce Sprint" netted nearly 300 hires, more than the two-month goal of 200. That's 12% of the more than 2,000 cybersecurity vacancies at DHS, however. Still, the department has extended another 500 offers. DHS cybersecurity hiring has endured years of criticism. Tim has this one, too.

Plan to boost CISA funding moves ahead

A funding bill that would allocate $2.4 billion for the Cybersecurity Infrastructure and Security Agency is headed to the House Appropriations Committee after passing unopposed through that subcommittee Wednesday. The bill is aimed at funding the larger DHS — including cash for immigration issues, for instance — but the latest version includes $288 million more for CISA than President Joe Biden had requested. “If we are going to stop the current wave of ransomware and prevent another SolarWinds-like hack, Congress must step up to the plate and adequately fund CISA,” said Rep. Jim Langevin, D-R.I. We've been expecting this.

Crucial ransomware code surfaces

Some rare good news for security personnel trying to stop the spread of digital extortion: Malware used to carry out Babuk ransomware attacks leaked online, proving the good guys with a glimpse into how to stop it. An unidentified contributor added the code to VirusTotal, a popular security repository, earlier this week. The code also generates decrypts, meaning Babuk victims have a means of unlocking their data. "Hopefully this can be used to drive research on detection and decryption," tweeted Kevin Beaumont, a leading mind on the issue. Here are more of his thoughts.

Tweet Of The Day


Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}