• Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Press Release
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Advisory – Multiple Google Chrome Vulnerabilites
March 2, 2022
Rewterz Threat Alert – HermeticWiper and IsaacWiper – Active IOCs – Russian-Ukrainian Cyber Warfare
March 2, 2022

Rewterz Threat Update – Russian Nuclear Institute Hit by Anonymous Collective – Russian-Ukrainian Cyber Warfare

March 2, 2022

Severity

High

Analysis Summary

In the Russian and Ukrainian cyber war, the only losers are the people. Anonymous Collective took Ukraine’s side in this cyberwar and now fights on their behalf. In doing so, they have performed DDoS attacks on many Russian websites, government entities, and television networks. The latest attack by the Anonymous-linked group Network Battalion 65 was on the Russian Nuclear Institute. The group released 40,000 files from the institute and are looking for a translator. 

Image
advisory-1646201845.png

Anonfiles

Impact

  • Data Loss
  • File Encryption
  • Financial Loss
  • Cyber Espionage

Remediation

  • Antivirus – Enable antivirus and anti-malware software and update signature definitions in a timely manner.
  • 2FA – Enable two-factor authentication.
  • Patch – Patch and upgrade any platforms and software timely. Prioritize patching known exploited vulnerabilities.
  • WAF – Set up a Web Application Firewall with rules to block suspicious and malicious requests.
  • Admin Access – limit access to administrative accounts and portals to only relevant personnel and make sure they are
  • not publicly accessible.
  • Passwords – Implement strong passwords.
  • Logging – Log your eCommerce environment’s network activity and web server activity
  • Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.