Wednesday , February 19 2025

CERT ISSUE SITUATIONAL ALERT ON CYBER THREATS

In the advent of Eid ul-Adha holidays, Bangladesh Government’s Computer Incident Response Team (BGD e-GOV CIRT) would like to ensure the security of the critical information infrastructures (CII), banks and financial institutions, health care and all sorts of government and private organizations by sharing a list of top threats to be vigilant for any suspicious activities in their infrastructure to prevent any sort of intrusion or disruption to their IT operations and services.

 CERT said on a situational alart on 26 june monday that, We bring your kind attention to combat cyber threats during EID vacation focused with the below mentioned threat considerations:

150 Gov.t Portal affected
Black-Hat SEO Poisoning Indian “.gov.in, .ac.in” domain

Indian government and educational websites, along with reputable financial brands, have experienced SEO poisoning, causing user traffic to be redirected...
Read More
150 Gov.t Portal affected  Black-Hat SEO Poisoning Indian “.gov.in, .ac.in” domain

CVE-2018-19410 Exposes 600 PRTG Instances in Bangladesh

The Cyber Threat Intelligence Unit of BGD e-GOV CIRT has found 600 vulnerable PRTG instances in Bangladesh, affected by the...
Read More
CVE-2018-19410 Exposes 600 PRTG Instances in Bangladesh

Builder claims Rs 150 cr for data loss; AWS faces FIR In Bengaluru

Amazon Web Services (AWS) has been named in an FIR after a builder claimed damages to the tune of Rs...
Read More
Builder claims Rs 150 cr for data loss;  AWS faces FIR In Bengaluru

CISA Warns Active Exploitation of Apple iOS Security Flaw

CISA has issued an urgent warning about a critical zero-day vulnerability in Apple iOS and iPadOS, known as CVE-2025-24200, which...
Read More
CISA Warns Active Exploitation of Apple iOS Security Flaw

Massive IoT Data Breach Exposes 2.7 Billion Records

A major IoT data breach has exposed 2.7 billion records, including Wi-Fi network names, passwords, IP addresses, and device IDs....
Read More
Massive IoT Data Breach Exposes 2.7 Billion Records

SonicWall Firewall Auth Bypass Vulnerability Exploited in Wild

A serious authentication bypass vulnerability in SonicWall firewalls, called CVE-2024-53704, is currently being exploited, according to cybersecurity firms. The increase...
Read More
SonicWall Firewall Auth Bypass Vulnerability Exploited in Wild

AMD Patches High-Severity SMM Vulns Affecting EPYC and Ryzen Processors

AMD has released security patches for two high-severity vulnerabilities in its System Management Mode (SMM). If exploited, these could let...
Read More
AMD Patches High-Severity SMM Vulns Affecting EPYC and Ryzen Processors

Lazarus Group Unleashes New Malware Against Developers Worldwide

Lazarus Group has initiated a complex global campaign aimed at software developers and cryptocurrency users. Operation Marstech Mayhem uses the...
Read More
Lazarus Group Unleashes New Malware Against Developers Worldwide

Daily Security Update Dated : 15.02.2025

Every day a lot of cyberattack happen around the world including ransomware, Malware attack, data breaches, website defacement and so...
Read More
Daily Security Update Dated : 15.02.2025

Salt Typhoon to target Bangladeshi Universities, One identified

RedMike (Salt Typhoon) targeted university devices in Bangladesh, likely to access research in telecommunications, engineering, and technology, especially from institutions...
Read More
Salt Typhoon to target Bangladeshi Universities, One identified
  • Top targeted Organization Type
    1. Govt & Military 
    2. Law Enforcement Agencies 
    3. Banking and NBFI 
    4. Pharmaceuticals 
    5. Retail and Industrial Organizations 
    6. Energy and education sectors 

 Top detected attack types: 

    1. DDOS – Being the most observed attack type in Bangladesh cyberspace 
    2. Ransomware – Bangladesh witnessed a rise in ransomware incidents in 2nd quarter of 2023 
    3. Web Defacements – using web shell injection technique 
    4. Phishing – Observed sophisticated phishing campaigns using AI tools 
    5. Credential theft – ‘Redline stealer’ is the most found stealer in targeted entities 
    6. APT campaigns – emerging groups are launching campaigns actively  

 

  • Top Threat Actors 
    1. South Asian based underground hackers 
    2. Script kiddies with credential harvesting expertise 
    3. Ransomware and APT Threat Actors such as ‘Money Message’ and ‘Akira’ 

 All government, military and financial institutions are requested to take the following measures to ensure their infrastructures’ security: 

  • Ensure strict network and user activity monitoring 24/7, especially during non-office hours, and watch out for any indication of data exfiltration, any sort of repeated patterns that may indicate attempts of lateral movement, discovery, or command and control behavior. 
  • Mobile users should be cautious while browsing internet and refrain from accessing untrusted sites or downloading files from it. 
  • Ensure vital services as such DNS, NTP as well as network middleboxes are securely configured and are not exposed on the internet.  
  • Educate users to abide by password policy best practices, and to refrain from using corporate emails on other platforms. 
  • Ensure proper Information and Cyber Security awareness training among all the employees, customers, and consumers to report issues, if they observe any anomalies and/ or suspicious activities. 
  • Conduct Vulnerability Assessment and Penetration Testing (VAPT) for all the systems on regular basis. 
  • Ensure appropriate controls and minimize attack surface by assessing need-to-know basis. 
  • Enhance your capability to combat growing cyber threats. 
  • Configure and harden web application as per OWASP guideline 

(https://onwasp.onrg/www-pronject-web-security-testing-guide/v41/)  

 

Check Also

Insikt Group

Salt Typhoon Exploits Vulnerable Cisco Devices of Telcoms Globally

Between December 2024 and January 2025, Recorded Future’s Insikt Group discovered a campaign targeting unpatched …

Leave a Reply

Your email address will not be published. Required fields are marked *