SSL.com

Cybersecurity Roundup September 2024

SSL.com and Entrust Form Strategic Partnership 

SSL.com is proud to announce a strategic partnership with Entrust, where SSL.com will support Entrust’s public TLS certificate lifecycle, ensuring seamless, secure, and robust certificate services. Entrust customers will experience a smooth transition with no service interruptions, continuing to manage their accounts through the existing Entrust portal. To maintain trust and security, customers are encouraged to renew their certificates before October 31, 2024, using Entrust’s lifecycle solutions or automation tools. SSL.com will integrate multiple paths with Entrust, including serving as an external Registration Authority (RA) for Identity Validation, aligning with SSL.com’s policies and practices. This partnership underscores SSL.com’s commitment to excellence in digital identity and trust services, ensuring uninterrupted service and security for all customers.  

For full information on the new partnership between SSL.com and Entrust, head over to our dedicated article.  

U.S. Charges Three Iranian Hackers Linked to Trump Campaign Interference 

Federal prosecutors have charged three Iranian hackers—Masoud Jalili, Seyyed Ali Aghamiri, and Yasar Balaghi—for allegedly targeting former President Donald Trump’s campaign in a broad cyber scheme. As members of Iran’s Islamic Revolutionary Guard Corps (IRGC), they used spearphishing and social engineering techniques to compromise accounts linked to the campaign. The indictment includes 18 counts such as wire fraud, identity theft, and conspiracy to provide support to a terrorist organization. This represents a significant escalation in U.S. efforts to combat Iranian interference in the 2024 presidential election.
SSL.com Insights: 

To guard against threats such as spearphishing and social engineering attacks like those described in the article, organizations must focus on multiple layers of protection. One important strategy is to train employees regularly to recognize suspicious emails and ensure they are cautious about clicking on unknown links or providing sensitive information. Additionally, setting up multi-factor authentication systems where each login request is validated using secure tokens or mobile apps can help prevent unauthorized access, even if user credentials are compromised. Monitoring network traffic using tools that inspect and analyze data packets will allow organizations to quickly identify and stop any malicious activity before it can escalate. SSL.com’s S/MIME certificates add a layer of protection by ensuring that email communications are encrypted and authenticated, helping prevent phishing attacks and securing sensitive information from being intercepted.

Secure Your Emails with S/MIME 

Get Protected Now

Chinese Hackers Infiltrate U.S. Internet Providers in Cyber Espionage Campaign

Chinese state-backed hackers, tracked by Microsoft as Salt Typhoon (also known as FamousSparrow and GhostEmperor), infiltrated several U.S. internet service providers (ISPs) in an orchestrated cyber espionage campaign targeting critical infrastructure and sensitive data. The attackers aimed to establish a persistent foothold in the networks, potentially allowing for data harvesting or future attacks. This campaign represents a growing trend of Chinese state-sponsored operations targeting telecommunications and critical infrastructure globally.
SSL.com Insights: 

To defend against nation-state cyber espionage campaigns like those executed by Salt Typhoon, companies should prioritize securing critical infrastructure and network components. Implementing tools that monitor and inspect network traffic in real time can help detect unusual patterns that may indicate an infiltration attempt, especially on essential devices like routers. Hardening the network through segmentation can limit the ability of attackers to move laterally if they do gain access, thereby reducing the potential damage. SSL.com’s Client Authentication certificates provide a crucial layer of defense by ensuring that only verified users can access critical systems, even in the absence of passwords, reducing the risk of unauthorized access by malicious actors. These certificates also facilitate secure and authenticated single sign-on processes, further protecting sensitive data from compromise.

 

Protect Critical Systems with ClientAuth  

Authenticate Securely Now

U.S. Commerce Department Proposes Ban on Automotive Software & Hardware from China and Russia  

The U.S. Department of Commerce has announced a proposed ban on automotive software and hardware from China and Russia used in connected vehicles on U.S. roads. This move comes after a February investigation into potential national security threats posed by foreign-made technology in vehicles. The proposed ban would affect nearly all Chinese vehicles, prohibit testing of self-driving cars by foreign adversaries, and require American automakers to remove certain software and hardware from their vehicles. If approved, the software ban will take effect for the 2027 model year, and the hardware ban by January 2029.
SSL.com Insights: 

In response to the cybersecurity concerns outlined in the proposed ban on foreign automotive software and hardware, organizations should focus on ensuring that software in connected vehicles is thoroughly vetted and secure from potential backdoors. Deploying tools that scan and test software code for vulnerabilities will help prevent malicious actors from exploiting weaknesses. Additionally, network security solutions that monitor and restrict access to critical systems can minimize the risk of remote attacks that could compromise vehicle functionality. SSL.com’s Extended Validation Code Signing Certificates provide an extra layer of assurance by digitally signing automotive software, ensuring its authenticity and integrity. These certificates help prevent tampering and unauthorized code modifications, offering the highest level of security for protecting connected vehicle systems from threats posed by adversarial software.

 

Secure Your Code with Extended Validation Signing  

Sign Code Now

Phishing Espionage Attack Targets US-Taiwan Defense Conference  

Hackers launched a sophisticated phishing attack on the US-Taiwan Business Council ahead of the 23rd US-Taiwan Defense Industry Conference. The attackers sent a forged registration form containing fileless malware designed to execute in memory, making it difficult to detect. The council, experienced with 20 years of similar attacks, quickly identified and mitigated the threat without any data loss or compromise. While the attackers remain unidentified, the incident aligns with past Chinese cyber espionage efforts targeting Taiwanese defense-related entities. 
SSL.com Insights: 

To protect against sophisticated phishing attacks like the one targeting the US-Taiwan Defense Conference, organizations must invest in proactive strategies such as advanced email filtering systems that analyze attachments and embedded links for hidden threats, particularly those designed to execute malicious code directly in memory. Monitoring network traffic for unusual behavior that blends into normal traffic patterns can help identify exfiltration attempts, especially when malware is designed to evade traditional detection methods. It is also vital to educate employees about the dangers of opening unsolicited attachments or clicking on unknown links, especially during periods of heightened geopolitical tension. SSL.com’s S/MIME certificates can further safeguard communication by encrypting and authenticating email messages, ensuring that sensitive information sent between trusted parties is secure and verified, preventing malicious actors from injecting harmful code into forged emails.

 

Safeguard Emails with S/MIME Encryption  

Secure Your Inbox

SSL.com Announcements

Microsoft Intune and SSL.com Integration Now Available for S/MIME Certificate Management

SSL.com now offers seamless integration of its S/MIME certificates with Microsoft Intune, streamlining secure email encryption and digital signatures across multiple devices. This service simplifies certificate management by securely delivering certificates to devices. Intune supports importing PFX certificates, making it easy for organizations to maintain security without compromising on usability. By leveraging Intune, organizations can easily deploy S/MIME certificates to devices running Android, iOS/iPadOS, macOS, and Windows 10/11.  Contact sales@ssl.com for more information on SSL.com-Microsoft Intune integration. 
Exit mobile version