Weekly threat monitor: March 28th, 2022

In the past week, there were significant developments in cyberspace, with the spotlight on a ransomware group claiming successful cyberattacks and data breaches on high-profile tech companies and allegedly recruiting insiders to make more headlines in the following days. Social engineering, spear-phishing, and malicious files flooded cyberspace in the past week, suggesting an active collaboration among threat actors and groups. Manufacturing, utilities, oil and gas, and enterprises detected a spike in the volume of cyberattacks in the past week, making them targets for coordinated cyberattacks.

From an analysis of the deep web, ‘cyberattacks kits’ can be obtained for less than USD 5, with add ons for tutorials and guided video materials which implies that more threat actors are likely to emerge in the following days. Active collaboration between APT groups across continents has also been detected targeting critical infrastructure with priorities on either controlling systems or disabling safety measures, such as SIS systems.

Conflict zones and conflict-prone areas succumbed to cyberattacks and in some cases, drone strikes on strategic locations over the course of the weekend. Supply chains poisoning brings huge concerns over the safety of an organization with regulatory compliance being one of the key factors in vetting such supply chains.

In the coming days, we urge all to stay vigilant and monitor for any anomalies in your connected network. we also urge all to set up cross logging of internal systems, this can further help detect the lateral movement of malware and bring ample visibility into your network

Weekly advisory

Segments under this list must be on high alert in the coming weeks:
  • Financial Services
  • Manufacturing
  • Critical Infrastructure
  • Water and wastewater treatment facilities
  • Supply chains
  • Energy Sector
  • Oil and gas
  • Utility entities
  • Maritime agencies
  • Healthcare
  • Government Agencies

Leave a Reply

Your email address will not be published. Required fields are marked *

Scroll to Top