DEFENSESTORM
Thought leadership and customer testimonials are some of the many ways we build a community of trust. These cybersecurity resources highlight our recent research and success stories.


Threat Alerts
DefenseStorm is aware of an incident involving AnyDesk and the compromise of some of their production systems. The incident was reported by AnyDesk on 2/2/2024. We have not been able to locate any usable technical details or IOCs at this time. AnyDesk is a widely used remote desktop software that allows users to access and control computers from anywhere in the world.

Insights
Cyber scams and election season just go together, and as election season begins to ramp up, so will cyber scams and the variety of tactics that bad actors will deploy in the attempt to obtain your personal information.

Insights
Banking trojans continue to evolve and succeed due to their ability to persist, bypass security, and evade detection on mobile devices. As investment from fast-moving threat actors continues to increase, traditional security practices are unable to keep up.

Case Studies
Pasadena Federal Credit Union was consistently disappointed in their previous IT vendors, so they began the daunting task of shopping around for a cyber risk management solution. The wanted a relationship- a partner, and DefenseStorm was the obvious choice for them. Within a few months of signing, a simple phone call from DefenseStorm proved a real return on investment in their new partnership.

Insights
DefenseStorm has made a cyber security software update to our GRID Active Governance Program with new functionalities, further enhancing its capabilities as a powerful cyber risk management solution. Organizations now can link dashboards to task schedules for scheduling and documenting report reviews.

Webinars & Videos
Learn how DefenseStorm helps your credit union drive change, and enable growth without compromising safety, by approaching cybersecurity with the same risk management disciplines you use in other areas of business.

Insights
DefenseStorm’s cyber risk assessment solution has recently been updated with new functionalities, further enhancing its capabilities as a powerful cyber risk management solution with GRID Active Risk Assessment Exceptions.

Insights
Keeping up with cyber security alerts is important and Apple just rolled out a new default feature for iPhone and Apple watch that allows nearby users to share contact information with one another. This feature has sparked some concern in online social communities and even prompted law enforcement agencies to release statements and privacy warnings over the last few days due to the concern that people could “drop” information on another user’s phone at random, which seems scary.

Insights
Cyber security asset management is a critical concern for any organization, regardless of its size or industry. For financial institutions (FIs), it’s vital due to the sensitive data and valuable assets they are entrusted to safeguard. While there are many aspects to consider in building a robust cybersecurity program, one crucial component is effective asset management.

Insights
SIM Swapping is nothing new and if you stay up to date with cybersecurity news and events, you are likely bombarded with technical analysis of the latest in ransomware, malware, dropper, trojan, or vulnerability that was exploited by bypassing controls and using “living off the land” techniques.
While these tactics, techniques, and analyses are incredibly important and useful, we can often forget that it’s sometimes the simple, age-old ways of getting your information and property that can also harm us.

Threat Alerts
A recent vulnerability has been discovered for Confluence Server and Data Center and is being tracked as CVE-2023-22518. At this time of this writing, this vulnerability is NOT known to have been exploited; however, Atlassian is recommending that those impacted take immediate action. The below information was taken directly from the Atlassian FAQ page for CVE-2023-22518, and the page was last updated on November 1, 2023.

Insights
In our final entry into our series, The Impact of AI on Cybersecurity, we will explore how DefenseStorm utilizes AI in our own built-for-banking technology.

Datasheets
DefenseStorm Cyber Threat Surveillance Operations (CTS Ops) team is an extension of your cybersecurity team to bolster your cyber defenses and ensure your FI is threat ready. Our team’s professional expertise and certifications make them your ally in the fight against cybercrime, diligently working to stop threats from becoming costly and destructive attacks.

Insights
Innovations in technology and security are top of mind for banks and credit unions, and when it comes to firewall security, it is critical to strengthen the weakest link in your cybersecurity efforts. As cyber risks evolve, institutions of all asset sizes must prioritize and invest in strengthening cybersecurity efforts.

Threat Alerts
Xenomorph, an Android banking trojan, has resurfaced in a more advanced form. Originally discovered in early 2022, this malicious software was initially targeted at European banks using screen overlay phishing techniques and was distributed through Google Play. However, the latest iteration of Xenomorph has expanded its scope to include over 35 financial institutions in the United States and various cryptocurrency applications.

Insights
In Part 2 of our series – the Impact of AI on Cybersecrity – we will take a look at the the role of AI in financial services. The industry has been pushed to be more dynamic to meet the demands of customers, regulatory requirements, and security threats, and remain competitive while safeguarding customer data and assets.

Threat Alerts

Insights
Business email compromise (BEC) is a type of cyberattack that usually occurs through some type of social engineering campaign where the criminals assume the identity of a trusted person or organization and attempt to influence their victims into providing money through transfers or other digital payments, divulging personal information, making phony purchases, providing credentials to accounts, etc

Threat Alerts
With the recent natural disasters that have occurred, it’s important to be aware that bad actors will attempt to leverage those devasting incidents for gain. CISA has released a warning urging users to be aware of malicious activity when these types of incidents occur. Please read the below alert from CISA.

Insights
In the final installment of our Redefining Cybersecurity series, we explore what it means to be Cyber Risk Aware. While the deployment of new technology is critical to ensuring cyber risk readiness, a lack of training and awareness is a significant liability to any institution.

Insights
The role of AI on cybersecurity is tremendous. AI is transforming daily business practices and enhancing the customer experience for most industries, but it is imperative to effectively balance technological advancement with close oversight while these technologies are rolled out.

Insights
NCUA Cyber Incident Notifications Requirement goes into effect September 1, 2023. The final rule requires that covered institutions notify the NCUA as soon as possible, and no later than 72 hours, after the credit union reasonably believes it has experienced a reportable cyber incident or received a notification from a third party regarding a reportable cyber incident.

Threat Alerts
While nothing official has been published by LinkedIn at the time of this post, accounts on the platform appear to be coming under attack in some type of hacking campaign of unknown origin. Users are reporting on multiple other outlets that their accounts have been taken over, locked out of their accounts, and having difficulty resetting accounts to regain access

Insights
Part 4 of our Redefining Cyber Security series explores the power of a buyer’s guide, a vendor-neutral tool created by DefenseStorm to help FIs efficiently shop for new cyber security risk management solutions.

Threat Alerts
Internal communication applications, IE: Slack, MS Teams, etc. Criminals are establishing domains that appear to be from legitimate technical support entities and then attempting to reach out to individuals to gain access to target users’ devices. The below article was authored by Microsoft Threat Intelligence and taken from Microsoft directly and provides additional detail and threat actor attribution for these types of attacks.

Insights
An effective cyber risk management strategy requires everyone within the FI to work together with a unified goal for budget allocation and solution implementation.

Insights
Military, law enforcement, and first responders train constantly to be prepared for anything that they may face during their careers, so when those particular situations arise, they are confident, efficient, and knowledgeable about how to deal with and resolve the incident. Cyber incident response is no different.

Insights
With a deeper understanding of this shift in ideology from reactive to proactive solutions, the question arises about your financial institution’s (FI’s) level of cyber security risk readiness.

Threat Alerts
Earlier in June DefenseStorm became aware of a vulnerability disclosure involving MOVEit and posted an article. The casualty list for this vulnerability is growing by the day largely due to exploitation by the Clop Ransomware gang of unpatched instances.
This is an update and reminder to please stay updated on patching and patch for the MOVEit vulnerabilities as soon as possible.

Insights
In this 5 part series, Redefining Cybersecurity, we will walk your FI through the process of evaluating your current state of cybersecurity and risk management so you can employ more efficient solutions to stay threat ready and compliant.