Skip Navigation

Critical Infrastructure News

The world looked quite different just over a year ago. Not only has the world gone through an event unprecedented in its scale but it has fundamentally repositioned many aspects of the global economy, technology and our lives. IT, telecommunications and the cyber-threat landscape have transformed considerably. Our reliance on telecommunications has deepened significantly and cybercriminals have evolved in kind.

DDoS gangs appear to have taken a real interest in telecoms over the last few years, reaching its high watermark over the last year. This is at least partially fueled by the ever increasing need the wider world has for connectivity and the resultant reliance on telecommunications to provide that connectivity. Hackers see an opportunity here. The greater the need for a thing, the greater a price one can extract for withholding it. That’s one potential reason, Ransom DDoS attacks on Telecoms targets have spiked in the last year.

Read more: Telecoms

CISA and the Federal Bureau of Investigation (FBI) continue to respond to the recent supply-chain ransomware attack leveraging a vulnerability in Kaseya VSA software against multiple managed service providers (MSPs) and their customers. CISA and FBI strongly urge affected MSPs and their customers to follow the guidance below.

CISA and FBI recommend affected MSPs:

  • Download the Kaseya VSA Detection Tool. This tool analyzes a system (either VSA server or managed endpoint) and determines whether any indicators of compromise (IoC) are present.    
  • Enable and enforce multi-factor authentication (MFA) on every single account that is under the control of the organization, and—to the maximum extent possible—enable and enforce MFA for customer-facing services.
  • Implement allowlisting to limit communication with remote monitoring and management (RMM) capabilities to known IP address pairs, and/or
  • Place administrative interfaces of RMM behind a virtual private network (VPN) or a firewall on a dedicated administrative network.

Read more: Cybersecurity and Infrastructure Security Agency