Iranian Nation-State APT Groups Black Bo' Leak Overview and Analysis of Exposed Documents: Targets, Plans, and Attack Vectors

May 9, 2019

First stage – attempting to breach the network via a social engineering attack. This attack was unsuccessful as the nobody opened the malicious file. Concurrently, breaching the Linux system used by the website and injecting a shell. Note however that the Linux system had limited capabilities (it is unclear what the attackers meant by this). After considerable efforts the attackers eventually were able to install a hydra system. Afterwards the attackers executed a successful brute force attack on the SMB systems.

Spotlight

Dependable Global Solutions

Dependable Global Solutions (DGS), an 8(a) Certified Small Disadvantaged Business (SDB), has the experience and capability to provide tailored support in three core disciplines; Cyber Security, Intelligence Support, and Mission Assurance services. DGS' Full-Spectrum Information Assurance expertise spans all aspects of security. Our team has extensive experience in providing the full-spectrum of Cyber Security services including CNO, CNA, CND, Forensics, Malware; Mission Assurance including COMSEC, Insider Threat, COOP, Physical Security, and Policy development; and Intelligence centered around providing tailored Technology, Mission/Operations Support, Analysis, and Training in direct support to operations groups and organizations across multiple clients and enterprises. DGS holds a Top Secret Facility Clearance and is an ISSO 9001:2008 certified company.

OTHER WHITEPAPERS
news image

Cyber Security for Business

whitePaper | December 17, 2019

At CGI, cyber security is part of everything we do. For more than 40 years, we have helped clients manage complex security challenges with a business focused approach – protecting what is most valuable to them. As our economy becomes even more digital in nature, securing our organisations against cyber-attacks and data breaches has become one of the most important business issues facing senior management.

Read More
news image

Global Threat Landscape Report A Semiannual Report by FortiGuard Labs

whitePaper | August 16, 2022

Another half-year through unprecedented times has passed. But as unique as these times may feel, we continue to see familiar exploits, names, and attacks taking up space. To help you and your business feel confident in your ability to protect yourself against the threats that continue to come our way, this report looks back on the cyber threat landscape of the first half of 2022 using our global array of sensors monitored by FortiGuard Labs. Here’s what we learned:

Read More
news image

Prevent Advanced Insider Threats With IBM Security Solutions

whitePaper | October 22, 2021

Are you confident that only the right people are getting access to your sensitive business assets? Organizations have to be concerned about privileged insiders compromising security and about outsiders posing as authorized users but who really aren't. Putting effective defenses into place, as a result, requires organizations to look both ways.

Read More
news image

Managing the IT Modernization Elephant A bite-sized approach to digital modernization

whitePaper | June 15, 2022

There’s an old saying, “How do you eat an elephant? One bite at a time.” In some cases, the task of technology modernization is akin to eating an elephant. Government agencies are filled with legacy applications, many of which have been heavily customized over decades of operation.

Read More
news image

Cloud-native security practicesin IBM Cloud

whitePaper | December 15, 2019

IBM Cloud™ is IBM’s high-performing public cloud platform, with data centers around the world that deliver cloud computing options from infrastructure as a service (IaaS), platform as a service (PaaS) to software as a service (SaaS). Security is a fundamental design principle for our cloud platform with market-leading security capabilities enabled for regulatory workloads.

Read More
news image

Aerospace cybersecuirty- Bringing a zero-trust approach to aviation product network design

whitePaper | May 18, 2022

Modern aerospace products are moving into containerization and micro-services. Mounting connected internal micro-services patterns in a product segregates and segments the network to support a zero-trust network security approach. Having weak internal network security of the product allows malicious actors to exploit them and elevate privileges — denying users access, jamming signals, or even shutting them down. Such interference could cause major harm to aircraft safety and operations.

Read More

Spotlight

Dependable Global Solutions

Dependable Global Solutions (DGS), an 8(a) Certified Small Disadvantaged Business (SDB), has the experience and capability to provide tailored support in three core disciplines; Cyber Security, Intelligence Support, and Mission Assurance services. DGS' Full-Spectrum Information Assurance expertise spans all aspects of security. Our team has extensive experience in providing the full-spectrum of Cyber Security services including CNO, CNA, CND, Forensics, Malware; Mission Assurance including COMSEC, Insider Threat, COOP, Physical Security, and Policy development; and Intelligence centered around providing tailored Technology, Mission/Operations Support, Analysis, and Training in direct support to operations groups and organizations across multiple clients and enterprises. DGS holds a Top Secret Facility Clearance and is an ISSO 9001:2008 certified company.

Events