CERT-PH Cyber Incident Drill (CCID) 2021

DICT Cybersecurity Bureau thru the National Computer Emergency Response Team (CERT-PH) is inviting Government Agencies and Organizations from the Critical Information Infrastructure (CII) Sectors of BANKING, BUSINESS PROCESS OUTSOURCING, FINANCIAL, and TELECOMMUNICATIONS to register and participate in the upcoming CERT-PH Cyber Incident Drill (CCID) 2021 on August 29, 2021, with the theme: “ENHANCING THE COLLABORATION continue reading : CERT-PH Cyber Incident Drill (CCID) 2021

Zimbra Webmail Server Vulnerabilities (CVE-2021-35208 and CVE-2021-35209)

Zimbra has addressed two vulnerabilities in its webmail server that could allow threat actors to gain unrestricted access to employee’s email accounts. This could lead to attackers having access to confidential information and documents, email contacts, and information, and can be used to conduct phishing and other malicious email campaigns. The vulnerabilities could be chained continue reading : Zimbra Webmail Server Vulnerabilities (CVE-2021-35208 and CVE-2021-35209)

Advanced Persistent Threat Group, LuminousMoth Targeting Government Organizations from the Philippines

An Advanced Persistent Threat (APT) Group, dubbed as LuminousMoth, was observed to be conducting a large-scale campaign targeting government entities and organizations from South East Asian countries, including Myanmar and the Philippines. The APT group is also associated with a known Chinese-speaking threat group, HoneyMyte/Mustang Panda, which was attributed to malicious campaigns targeting local high continue reading : Advanced Persistent Threat Group, LuminousMoth Targeting Government Organizations from the Philippines

State-Sponsored Threat Group, TAG-22, Targeting Government and CII Sectors

A Chinese state-sponsored group, tracked as Threat Activity Group 22 (TAG-22), was observed to be targeting telecommunications, academia, research and development, and government organizations in Nepal, the Philippines, Taiwan, and more historically, Hong Kong. In its recent activities, the threat group was monitored to be targeting vulnerable GlassFish servers and uses open-source tools to gain continue reading : State-Sponsored Threat Group, TAG-22, Targeting Government and CII Sectors

Kaseya Supply‑Chain Attack

Kaseya, an IT systems management solution provider, had disclosed that it suffered a sophisticated cyberattack affecting multiple managed service providers (MSPs) and their clients. The attack was attributed to REvil gang, an infamous cybercriminal group that is known to operate via Ransomware-as-a-Service, wherein the group compromised both providers and their clients’ system with their ransomware. continue reading : Kaseya Supply‑Chain Attack