Sunday, November 24, 2024

An American Warning Against Widespread Piracy Through Microsoft Mail

Date:

The top US cybersecurity official told lawmakers on Wednesday that the federal government is monitoring “widespread” hacking attempts using recently discovered vulnerabilities in a Microsoft email application, while researchers revealed that nearly one dozen hacking groups have used this flaw to attack a variety of organizations.

Brandon Wells, Acting Director of the Cybersecurity and Infrastructure Security Agency (CISA), testified before the House of Representatives Subcommittee on Homeland Security that previously unknown vulnerabilities in Microsoft’s email Exchange server have been exploited globally. .

Wells added that the agency “recognizes the widespread exploitation of vulnerabilities, and trusted partners have observed malicious actors using these vulnerabilities to reach specific organizations in the United States and around the world.”

Wells warned that once adversaries accessed an email server, “they could access and control a corporate network even after fixing security holes,” adding that the process could range from “stealing information to implementing physical attacks. of ransomware until the infrastructure is destroyed. ” “

Wells’s testimony came a week after the Cybersecurity and Infrastructure Security Agency issued an emergency directive directing all federal agencies to investigate signs of a violation and, if found, those involved must correct their security systems. immediate to avoid exploitation.

This move came shortly after Microsoft announced that a Chinese state-sponsored group of hackers known as “Hafnium” was using vulnerabilities to attack US organizations.

Eric Goldstein, the CIA’s deputy executive director for cybersecurity, testified Wednesday that while no U.S. federal agency has been confirmed to have been hacked due to the incident, the investigation is still ongoing.

“We are working with individual agencies to evaluate the results of their forensic analysis, and at this stage there are no federal civilian agencies that have been confirmed to have been violated,” Goldstein told the same House subcommittee.

While US federal agencies have not been violated due to these loopholes, thousands of other organizations have been compromised, and the Wall Street Journal reported earlier this week that as many as 250,000 groups may have been compromised across the world.

Cybersecurity group “FireEye” revealed in a blog it published last week that hackers have been on at least one customer system since January, and they have been chasing “retail stores in the United States, local governments, a university and an engineering company. “

And there are likely to be other international victims, as the National Internet and Information Security Office in the Czech Republic issued a statement on Friday, saying it was helping affected organizations.

alreadyLoaded_facebookConnect = false;

$(window).load(function () {

//$(window).bind('mousemove' , function(){ // $(window).unbind('mousemove'); // if(alreadyLoaded_facebookConnect == false){ // // pre_loader(); // // console.log("test"); // } //});

if ($(window).scrollTop() != 0 && alreadyLoaded_facebookConnect == false) {

alreadyLoaded_facebookConnect = true; (function (d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.async = true; js._https = true; js.src = "https://connect.facebook.net/en_US/all.js#xfbml=1&appId=148379388602322"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); // pre_loader(); // $(window).unbind('mousemove'); // console.log(" loaded"); //setTimeout(function(){ // $('#boxTwitter').html(""); //}, 3000);}}); //$(window).bind('scroll '); $ (window) .scroll (function () {if (alreadyLoaded_facebookConnect == false) {alreadyLoaded_facebookConnect = true ; // $ (window) .unbind ('scroll'); // console.log ("scroll loaded"); (function (d, s, id) {var js, fjs = d.getElementsByTagName (s)[0]; if (d.getElementById (id)) return; js = d.createElement (s); js.id = id; js.async = true; js._https = true; js.src = "https://connect.facebook.net/en_US/all.js#xfbml=1&appId=148379388602322"; fjs.parentNode.insertBefore (js, fjs); } (document, 'script', 'facebook-jssdk')); // pre_loader (); // $ (window) .unbind ('mousemove'); // setTimeout (function () {// $ ('# boxTwitter'). html (""); //}, 3000); var scriptTag = document.createElement (" script "); scriptTag.type =" text / javascript "scriptTag.src =" https://news.google.com/scripts/social. js "; scriptTag.async = true; document.getElementsByTagName (" head ")[0].appendChild (scriptTag); (function () {$ .getScript ("https://news.google.com/scripts/social.js", function () {});}); }}); //$(window).load(function () {// setTimeout (function () {// // add the returned content to a newly created script tag // var se = document.createElement ('script'); / / se.type = "text / javascript"; // //se.async = true; // se.text = "setTimeout (function () {pre_loader ();}, 5000);"; // document. getElementsByTagName ('body')[0].appendChild (se); //}, 5000); //});

Ebenezer Robbins
Ebenezer Robbins
Introvert. Beer guru. Communicator. Travel fanatic. Web advocate. Certified alcohol geek. Tv buff. Subtly charming internet aficionado.

Share post:

Popular

More like this
Related

Practice Acrylic Nail Techniques Without Needing a Fake Hand

When you're starting your journey with acrylic nails, practice...

Inside the World of Common Snapping Turtles: Behavior and Habitat

The common snapping turtle (Chelydra serpentina) is one of...

How to Use Video Marketing to Promote B2C Products?

Video marketing has emerged as a powerful tool for...

Adapting to Change: The Future for Leopard Tortoise Environments

Leopard tortoises, known for their striking spotted shells and...