logo_SVG-01
✕
  • Platform
    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    • Managed Security Services
    • Managed Penetration Testing
  • Services
    • Assess
      • Compromise Assessment
      • Advanced Persistent Threats Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      • SOC Maturity Assessment
      • SOC Model Evaluation
      • SOC Gap Analysis
      • SIEM Gap Analysis
      • SIEM Optimization
      • SOC Content Pack
    • Train
      • Simulated Cyber Attack Exercise
      • Tabletop Exercise
      • Security Awareness and Training
    • Respond
      • Incident Analysis
      • Incident Response
  • Solutions
  • Resources
    • Blogs
    • Press Releases
    • Threat Insights
      • Threat Intelligence Reports
      • Threat Advisories
      • Monthly Threat Insights
  • Why Rewterz?
    • About Us
    • Careers
    • Contact
logo_SVG-01
  • Platform
    xdrLogo
    center_new
    Read More about XDR

    Platform

    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    Rewterz Threat Update – Staying Vigilant: Protection Against Cybersecurity Threats During the Eid Holidays

    Managed Security Services

    • Managed Security Monitoring
    • Remote SOC
    • Onsite SOC
    • Hybrid SOC

    Managed Penetration Testing

    Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.

  • Services

    Assess

    • Compromise Assessment
    • APT Assessment
    • Penetration Testing
    • Architecture Design & Review
    • Red Team Assessment
    • Purple Team Assessment
    • Social Engineering
    • Source Code Review

    Transform

    • SOC Consultancy
    • SOC Maturity Assessment
    • SOC Model Evaluation
    • SOC Gap Analysis
    • SIEM Gap Analysis
    • SIEM Optimization
    • SOC Content Pack

    Train

    • Simulated Cyber Attack Exercise
    • Tabletop Exercise
    • Security Awareness and Training

    Respond

    • Incident Analysis
    • Incident Response
  • Solutions
  • Resources

    Resources

    • Blog
    • Press Releases
    August 25, 2023
    Rewterz
    August 25, 2023
    Rewterz Threat Alert – Young Hackers from Lapsus$ Gang Convicted in High-Profile Cyberattack Cases
    Severity High Analysis Summary In a notable case, an 18-year-old member of the Lapsus$ data extortion group, Arion Kurtaj, has been convicted by a London jury […]
    August 25, 2023
    Rewterz
    August 25, 2023
    Rewterz Threat Alert – Lazarus Group Deploys Stealthy QuiteRAT Malware via Zoho ManageEngine Flaw – Active IOCs
    Severity High Analysis Summary The North Korea-linked threat actor known as Lazarus Group has recently been observed exploiting a critical security vulnerability in Zoho ManageEngine ServiceDesk […]
    August 25, 2023
    Rewterz
    August 25, 2023
    Rewterz Threat Alert – Sodinokibi Ransomware aka Sodin – Active IOCs
    Severity High Analysis Summary REvil/Sodinokibi, also known as Sodin, is a sophisticated ransomware discovered in April 2019. This elusive malware encrypts files and cleverly erases its […]

    Threat Insights

    16
    pdf-file (1)
    Annual Threat Intelligence Report 2022
    • Threat Advisories
    • Monthly Threat Insights
    • Threat Intelligence Reports
  • Why Rewterz?

    About Us

    Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.

    Read More

    play_btn_Smallplay_btn_hover_Small
    leadership

    Our Leadership

    Our leadership team brings together years of knowledge and experience in cybersecurity to drive our company's mission and vision. Our team is passionate about delivering high-quality products and services, leading by example and assisting our clients in securing their organization’s environment.
    help

    CSR

    At Rewterz, we believe that businesses have a responsibility to impact positively and contribute to the well-being of our communities as well as the planet. That's why we are committed to operating in a socially responsible and sustainable way.

    Connect with Us

    • Contact
    • Careers
Get in Touch
logo_SVG-01
  • Platform
    xdrLogo
    center_new
    Read More about XDR

    Platform

    • Rewterz XDR
    • Rewterz Defense
    • Rewterz Threat Intelligence
    Rewterz Threat Update – Staying Vigilant: Protection Against Cybersecurity Threats During the Eid Holidays

    Managed Security Services

    • Managed Security Monitoring
    • Remote SOC
    • Onsite SOC
    • Hybrid SOC

    Managed Penetration Testing

    Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.

  • Services

    Assess

    • Compromise Assessment
    • APT Assessment
    • Penetration Testing
    • Architecture Design & Review
    • Red Team Assessment
    • Purple Team Assessment
    • Social Engineering
    • Source Code Review

    Transform

    • SOC Consultancy
    • SOC Maturity Assessment
    • SOC Model Evaluation
    • SOC Gap Analysis
    • SIEM Gap Analysis
    • SIEM Optimization
    • SOC Content Pack

    Train

    • Simulated Cyber Attack Exercise
    • Tabletop Exercise
    • Security Awareness and Training

    Respond

    • Incident Analysis
    • Incident Response
  • Solutions
  • Resources

    Resources

    • Blog
    • Press Releases
    August 25, 2023
    Rewterz
    August 25, 2023
    Rewterz Threat Alert – Young Hackers from Lapsus$ Gang Convicted in High-Profile Cyberattack Cases
    Severity High Analysis Summary In a notable case, an 18-year-old member of the Lapsus$ data extortion group, Arion Kurtaj, has been convicted by a London jury […]
    August 25, 2023
    Rewterz
    August 25, 2023
    Rewterz Threat Alert – Lazarus Group Deploys Stealthy QuiteRAT Malware via Zoho ManageEngine Flaw – Active IOCs
    Severity High Analysis Summary The North Korea-linked threat actor known as Lazarus Group has recently been observed exploiting a critical security vulnerability in Zoho ManageEngine ServiceDesk […]
    August 25, 2023
    Rewterz
    August 25, 2023
    Rewterz Threat Alert – Sodinokibi Ransomware aka Sodin – Active IOCs
    Severity High Analysis Summary REvil/Sodinokibi, also known as Sodin, is a sophisticated ransomware discovered in April 2019. This elusive malware encrypts files and cleverly erases its […]

    Threat Insights

    16
    pdf-file (1)
    Annual Threat Intelligence Report 2022
    • Threat Advisories
    • Monthly Threat Insights
    • Threat Intelligence Reports
  • Why Rewterz?

    About Us

    Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.

    Read More

    play_btn_Smallplay_btn_hover_Small
    leadership

    Our Leadership

    Our leadership team brings together years of knowledge and experience in cybersecurity to drive our company's mission and vision. Our team is passionate about delivering high-quality products and services, leading by example and assisting our clients in securing their organization’s environment.
    help

    CSR

    At Rewterz, we believe that businesses have a responsibility to impact positively and contribute to the well-being of our communities as well as the planet. That's why we are committed to operating in a socially responsible and sustainable way.

    Connect with Us

    • Contact
    • Careers
Get in Touch
Rewterz
Rewterz Threat Alert –Threat Alert: Sidewinder APT Group’s Targeted Campaign Against the Pakistani Government – Active IOCs
June 26, 2023
Rewterz
Rewterz Threat Alert – New Variant Of Ducktail Infostealer Targeting Social Media Accounts In Recent Campaign – Active IOCs
June 27, 2023

Rewterz Threat Update – Staying Vigilant: Protection Against Cybersecurity Threats During the Eid Holidays

June 27, 2023

Severity

High

Analysis Summary

Cybercrime poses a significant threat throughout the year, and its impact is particularly heightened during the holiday season. As the long Eid Holidays are approaching, there is a growing concern about the rise in significant cyber-attacks, such as ransomware and DDoS attacks, during holiday periods when many offices are closed. It has been observed that cybercriminals take advantage of these times to carry out their malicious activities. In light of this, it is strongly advised for everyone to assess their current cybersecurity measures and take necessary actions to enhance their defenses against all types of cyber threats.

The recommended approach is to thoroughly examine your cybersecurity posture and ensure that you have implemented the best practices and mitigations suggested by experts. This includes measures to protect against ransomware, DDoS attacks, and other forms of cyber-attacks. By proactively strengthening your defenses and following industry-standard security protocols, you can effectively manage the risks posed by cyber threats and minimize the potential impact on your systems and data.

  • During holidays like Eid ul Azha, individuals and organizations face various cyber threats. Phishing is a common tactic used by attackers to deceive people into revealing sensitive information or performing harmful actions. Attackers impersonate trustworthy entities, sending emails or messages with malicious links or attachments that can lead to malware installation or data disclosure.
  • Another threat during Eid ul Azha is Distributed Denial of Service (DDoS) attacks, which aim to disrupt online services by overwhelming networks with malicious traffic. Reduced staffing levels and limited IT resources during holidays make organizations more vulnerable to such attacks.
  • Ransomware attacks and data breaches are also a significant concern during holidays when businesses may have limited IT support. Ransomware encrypts files until a ransom is paid, while data breaches involve unauthorized access to sensitive information. Attackers exploit the holiday period to target vulnerabilities and compromise data security.

Recommendations

Here are some of recommendations shared by the regulatory to raise awareness and promote diligence in network defense practices leading up to holidays and weekends.

– Offline Backup

  • Assign IT security employees for weekends and holidays to be available in case of incidents or ransomware attacks.
  • Create and maintain encrypted offline backups of data, regularly testing their effectiveness. Conduct backups on a regular basis and ensure they are stored offline to protect against ransomware variants that target accessible backups.
  • Review backup schedules to account for the risk of disruptions during weekends or holidays.

– Secure and monitor Remote Desktop Protocol (RDP) and other risky services

  • Limit internal network access, especially by restricting RDP and utilizing virtual desktop infrastructure. If external RDP access is necessary, authenticate via VPN.
  • Monitor remote access/RDP logs, enforce account lockouts after a specified number of attempts, log RDP login attempts, and disable unused remote access/RDP ports.
  • Ensure devices are properly configured with enabled security features.
  • Disable unused ports and protocols, such as RDP Transmission Control Protocol Port 3389, that are not necessary for business purposes.
  • Disable or block outbound Server Message Block (SMB) protocol and remove/disable outdated versions, as threat actors exploit SMB for malware propagation.
  • Assess the security posture of third-party vendors and interconnected systems, monitoring and reviewing all connections for suspicious activity.
  • Implement application and remote access listing policies that only allow known and permitted programs to execute under established security policies.
  • Open document readers in protected viewing modes to prevent the execution of active content.

– Maintain a high alert and increased monitoring during long holidays and weekends

  • Utilize endpoint detection and response tools (EDR, XDR) for enhanced real-time threat detection, monitoring, and security of individual endpoints such as desktops, laptops, services, and mobile devices.

– Update your operating system (OS) and software; scan for vulnerabilities

  • Upgrade software and OSs to currently supported versions, especially if they are no longer supported by vendors.
  • Regularly patch and update software to the latest versions available.
  • Prioritize timely patching of internet-facing servers and software processing internet data (e.g., web browsers, plugins, document readers) for known vulnerabilities.
  • Consider implementing a centralized patch management system.
  • Automatically update antivirus and anti-malware solutions, and conduct regular virus and malware scans.
  • Perform regular vulnerability scanning to identify and address vulnerabilities, particularly on internet-facing devices.

– Use strong passwords and multi-factor authentication (MFA)

  • Ensure the use of strong passwords and challenge responses.
  • Avoid password reuse across multiple accounts and storing passwords on systems accessible by adversaries.
  • Require MFA for all services, particularly for remote access, virtual private networks, and critical system accounts.

– Secure your networks and user accounts

  • Implement network segmentation with multiple secure layers, prioritizing critical communications in the most reliable layer.
  • Filter network traffic to block communication with known malicious IP addresses and prevent user access to malicious websites through URL blocklists or allowlists.
  • Scan networks for open and listening ports, closing unnecessary ports.
  • Regularly audit administrative user accounts and configure access controls based on least privilege and separation of duties principles.
  • Conduct regular log audits to ensure the legitimacy of new user accounts.

– Have an incident response plan

  • Develop, maintain, and exercise a basic cyber incident response plan that includes procedures for response and notification in a ransomware incident and plans for the possibility of critical system unavailability for a period of time.

Rewterz Threat Advisories keeps you up to date on the newest cybersecurity threats, cyber attacks, cyber events, and reported vulnerabilities that may have an impact on your organization. Organizations can take measures by helping their staff and customers informed and take the necessary precautions to mitigate the risk of the cyber attacks by using constant notifications.

Rewterz offers a variety of data protection and recovery solutions that ensure your organization’s data recovery from destructive cyberattacks.

Platform

  • Rewterz XDR
  • Rewterz Defense
  • Rewterz Threat Intelligence

Managed Security Services

  • Managed Security Monitoring
  • Remote SOC
  • Onsite SOC
  • Hybrid SOC

Assess

  • Compromise Assessment
  • APT Assessment
  • Penetration Testing
  • Architecture Design & Review
  • Red Team Assessment
  • Purple Team Assessment
  • Social Engineering
  • Source Code Review

Transform

  • SOC Consultancy
  • SOC Maturity Assessment
  • SOC Model Evaluation
  • SOC Gap Analysis
  • SIEM Gap Analysis
  • SIEM Optimization
  • SOC Content Pack

Train

  • Simulated Cyber Attack Exercise
  • Tabletop Exercise
  • Security Awareness and Training

Respond

  • Incident Analysis
  • Incident Response

Threat Insights

  • Threat Advisories
  • Monthly Threat Insights
  • Threat Intelligence Reports

Resources

  • Blog
  • Press Releases

Connect With Us

  • Contact
  • Careers
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.
Get a Demo