Email Autoresponder Free

Main Menu

  • Home
  • Email accounts
  • Email marketing
  • Email newsletter
  • Email verifier

Email Autoresponder Free

Header Banner

Email Autoresponder Free

  • Home
  • Email accounts
  • Email marketing
  • Email newsletter
  • Email verifier
Email marketing
Home›Email marketing›Beware of Lapsus$, Email Marketing Threats

Beware of Lapsus$, Email Marketing Threats

By Michael E. McChristian
April 11, 2022
0
0

Business Continuity Management / Disaster Recovery, Critical Infrastructure Security, Cybercrime

Authorities warn health care and public health sectors of latest concerns

Marianne Kolbasuk McGee (HealthInfoSec) •
April 11, 2022

Federal authorities are warning the health and public health sector of potential threats involving Lapsus$ – including those related to the recent hack by identity management provider Okta’s extortion group – and also possible phishing attacks stemming from a recent breach suffered by the email marketing service provider Mailchimp email.

See also: Third party risk: lessons on Log4j

The Ministry of Health and Human Services’ Health Sector Cybersecurity Coordination Center, or HC3, in two separate notices issued on April 7, warns of threats of attacks on the sector by Lapsus$ and also by potential phishing campaigns exploited by “legitimate” email marketing platforms, such as Mailchimp.

Threats Slip$


HC3, in its threat brief, warns the health and public health sector that hacking group Lapsus$ relies on “non-ransomware bribery and extortion” in its attacks, which involve exfiltration and destruction of data in on-premises and cloud systems.

The group claims to be behind recent attacks against several companies, including identity management service provider Okta, as well as Microsoft, Nvidia and Ubisoft (see: Lapsus$ Teens released on bail, due back in court April 29).

The group’s attack on Okta is of particular concern to healthcare and public sector entities, HC3 said. “HC3 is aware of healthcare organizations that have been compromised in this attack. This is a managed service provider attack, which is often used in cyberattacks against the healthcare industry,” warns the opinion.

On March 25, London police announced that they had arrested and charged seven suspected Lapsus$ members, including two teenagers. The teens were released on bail for an undisclosed sum and are due back in court on April 29.

“When you compare Lapsus$ motivations and tactics to health sector operations, the health sector is in their target range,” writes HC3. The group steals data for extortion and targets managed service providers, and their operations are global, warns HC3. “They are looking for targets of opportunity.”

Although law enforcement is pressuring the Lapsus$ group and arresting some suspected members, operations are expected to continue, with other members likely continuing under the Lapsus$ banner or as part of another group, said HC3.

“The geographic diversity of this group will make them particularly difficult to eliminate permanently. Their diversity of tactics and lack of confidence in specific malware variants make them very difficult to detect or stop,” writes HC3.

“They have already compromised health organizations and have no reason to stop.”

Health sector entities attacked by Lapsus$ include the Brazilian Ministry of Health. Lapsus$ defaced its website in December, according to HC3 (see: Portugal’s main news sites remain offline after attacks).

Unpredictable threat

Partly because Lapsus$ can be exploited by teenagers, the threats posed by the group are volatile and particularly difficult to predict compared to other cybercriminal gangs, according to some experts.

“Ransomware gangs or other financially motivated cybercriminals typically follow a fairly standard process to extract money from the target,” says Brett Callow, threat analyst at security vendor Emsisoft.

“In other words, they are predictable, which means that organizations can plan for incidents. This is obviously not the case with Lapsus$, and suppliers may find themselves faced with situations that are not covered by their playbooks.”


Defenses and mitigations


To help protect against Lapsus$ attacks, HC3 advises healthcare and public sector entities to take several steps, including:

  • Require multi-factor authentication for all users;
  • Leverage authentication options such as OAuth or SAML for virtual private networks;
  • Implement zero trust, where appropriate, across the enterprise;
  • Deploy network segmentation, including protecting sensitive data from Internet exposure;
  • Ensure that critical data is backed up;
  • Educate and test employees on social engineering.


Mailchimp Infringement Notice

HHS HC3, in its Mailchimp alert, says that on April 4, the email marketing platform provider confirmed a breach affecting one of the company’s internal tools used by its customer support and support teams. administration of accounts.

“Although Mailchimp disabled compromised employee accounts after learning of the breach, threat actors were able to view approximately 300 Mailchimp user accounts and obtain audience data from 102 of them, according to the company’s CISO,” says HC3.

Threat actors were also able to access application programming interface keys for an undisclosed number of clients, which would allow them to create personalized email campaigns such as phishing campaigns and send to mailing lists without accessing the Mailchimp customer portal, according to HC3.

“While HC3 is currently only aware of one phishing campaign abusing this unauthorized access to send fake data breach notification emails to users in the cryptocurrency and finance industries – which was allegedly executed with exceptional sophistication and planning – the healthcare and public health industry should remain wary of suspicious emails from legitimate email marketing platforms such as Mailchimp,” it said. ‘notice.

The Mailchimp data breach came to light when cryptocurrency hardware wallet provider Trezor launched a recent investigation after customers reported receiving sophisticated phishing emails containing their registered Trezor email addresses. The investigation uncovered a data breach at its third-party email marketing company Mailchimp, which it says likely leaked the email addresses of Trezor customers (see: Mailchimp Targeted Breach Affects Trezor Crypto Customers).

In its advisory, HC3 reminds the healthcare and public sectors that advanced persistent threat groups have previously leveraged legitimate direct mail services in malicious email campaigns to target a wide variety of organizations and industries. vertical.

Reduction measures

To help mitigate threats from the Mailchimp incident, educating users about phishing scams and social engineering is critical, especially in campaigns where emails come from a legitimate sender, HC3 says.

Additional mitigations include implementing anti-malware and network intrusion prevention systems and restricting web content that may not be necessary for business operations.

“Anti-spoofing and email authentication mechanisms can also be implemented to filter messages based on sender domain validity checks – using Sender Policy Framework or SPF – and message integrity – using mail-identified domain keys, or DKIM,” explains HC3.

“Enabling these mechanisms within an organization – through policies such as Domain-Based Message Authentication, Reporting, and Compliance, or DMARC – can allow recipients – intra-organization and cross-domain – perform filtering and validation of similar messages.”

Categories

  • Email accounts
  • Email marketing
  • Email newsletter

Recent Posts

  • How to start an email newsletter
  • Email Marketing and Marketing Automation: The Differences Explained
  • 4 Ways to Use Video in Your Email Marketing Campaigns
  • 5 Best ConvertKit Alternatives for Email Marketing Campaigns
  • Here’s why email marketing is (still) important in 2022

Archives

  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • September 2020
  • June 2020
  • May 2020
  • December 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • March 2018
  • January 2018
  • September 2017
  • November 2016
  • July 2016
  • October 2015
  • April 2015
  • July 2014
  • March 2014
  • June 2013
  • September 2011
  • July 2011
  • Privacy Policy
  • Terms and Conditions