Skip to main content

Microsoft rolls out a new threat intelligence against COVID-19 attacks


COVID-19 has become a hotspot of cyber attacks and spams as the majority of employees are working from home. These growing numbers of attacks have made security firms and tech industries quite concerned. But Microsoft has come to the rescue, rolling out a new COVID-19 threat intelligence.


Microsoft announced on its blog a new move that will improve security and can be availed easily. The company has introduced a COVID-19 threat intelligence made available from May 14, sharing feeds for Azure Sentinel customers and publicly available for everyone on GitHub. So, even if you are not a Microsoft customer worry not, you can still protect yourself from these COVID-19 based attacks. This data is only available for a limited period only until the pandemic threat looms over our heads.

“Microsoft processes trillions of signals each day across identities, endpoints, cloud, applications, and email, which provides visibility into a broad range of COVID-19-themed attacks, allowing us to detect, protect, and respond to them across our entire security stack,” Microsoft stated in their blog. “Today, we take our COVID-19 threat intelligence sharing a step further by making some of our own indicators available publicly for those that are not already protected by our solutions.”

Users with Microsoft Threat Protection need not go through this, they are already protected with Microsoft Defender Advanced Threat Protection (ATP) and email with Office 365 ATP.

These COVID-19 threat intelligence indicators are available on the Azure Sentinel GitHub via Microsoft Graph Security API.

Best Protection from COVID-19 Threats 

Hackers and Cybercriminals have been using an array of malicious ways from malware to phishing emails for their own gain. This move by Microsoft will shift the balance and go a long way to protect and defend from such threats.

Security researcher Sean Wright says, "Microsoft certainly deserves credit for this. It will be especially useful for those who are struggling at the moment and don’t necessarily have the funds to afford services that organizations would normally have to pay for.”

“This information is going to be very useful to enable many volunteers in the community to help organizations and others. It is the correlation of data—especially threat intelligence—that will go a long way to help stop the threat actors out there who are actively targeting organizations and individuals.”

Some are critical of this announcement by the tech giant pointing out that it is "too little, too late".

 “I’m not saying it’s not welcome but where was this support nine weeks ago?” says Ian Thornton-Trump. 

Ian Thornton-Trump, CISO at Cyjax points out “It’s clever marketing and has some value—although most, if not all, those indicators of compromise (IOCs) will be available from a multitude of cyber threat intelligence sources, feeds and vendors already.”


source https://www.ehackingnews.com/2020/05/microsoft-rolls-out-new-threat.html

Comments

Popular posts from this blog

Betting and Gambling Websites under Cyberattack from Chinese Hackers

Since last year's summers, Chinese hackers have been targeting South Asian companies that own online gambling and betting websites. The gambling companies in South Asia have confirmed the hacks, whereas rumors of cyberattacks on betting websites have also emerged from Europe, and the Middle East, however, the rumors are yet to confirm, says the reports of cybersecurity group Trend Micro and Talent-Jump. Cybersecurity experts claim that no money was stolen in these hacks against the gambling websites. However, hackers have stolen source codes and databases. The motive of the attack was not a cybercrime, but rather espionage intended attack to gain intelligence. According to the experts, a group named ' DRBControl ' is responsible for the cyberattack. According to the reports of Trend Micro, the hacking techniques used in this particular cyberattack incident is similar to methods done by Emissary Panda and Winnti. All of these hacking groups are from China that has launc

Information security experts have warned Russians about bonus card fraud schemes.

Fraudsters several thousand times tried to illegally take advantage of discount bonuses of Russians in 2019. Some attackers gained access to customers' personal accounts, and then bought the products using bonuses, said Alexey Sizov, head of the anti-fraud department of the Application Security Systems Center at Jet Infosystems. According to him, a fraudster can register a personal account on a card that was issued to another person. The victim will accumulate points without knowing about the existence of his profile, and the attacker will write off bonuses, said Sizov. The expert added that this is mainly done by novice scammers. According to him, loyalty programs are poorly protected, unlike banking operations. He said that they are estimated at 50 billion rubles ($760 milliard) for the 30 largest retailers. Alexey Fedorov, Chairman of the Business Russia Trade Committee, said that in 2019, the number of bonus and discount thefts "increased significantly."

Provider Volia reported to the cyber police about the intense cyberattacks on the server

Cable provider Volia appealed to the Cyber Police on the fact of fixing a DDoS attack on the Kharkov servers of the company, which has been ongoing since May 31. "For three days, from May 31 to today, the Volia infrastructure in Kharkov is subjected to cyberattacks. At first, they were carried out only on subscriber subsystems, later they switched to telecommunications infrastructure. As a result, more than 100,000 subscribers experienced problems using the Internet, IPTV, multi-screen platform, and digital TV," said the company. In total, the complete lack of access to Volia's services, according to the provider, lasted 12 minutes on May 31, 45 minutes on June 1. There was also an attack on the website volia.com, but it was managed to neutralize. "DDoS attacks were massive and well-organized. The type of attack is UDP flood and channel capacity overflow with the traffic of more than 200 GB. UDP is a protocol used for online streaming services - streaming, te