
Immediate Steps to Take to Mitigate Fortinet Vulnerabilities
The FBI and CISA have urged organizations to take the following steps to mitigate Fortinet vulnerabilities. It is important to note that even organizations that do not use Fortinet products are asked to take specific steps to ensure this on-going situation does not compromise mission-critical cybersecurity resilience. The following mitigation steps have been provided by the FBI and CISA in a bulletin available here. Organizations should take the following steps:- Use multi-factor authentication where possible.
- Regularly change passwords to network systems and accounts, and avoid reusing passwords for different accounts. Implement the shortest acceptable timeframe for password changes.
- Disable unused remote access/Remote Desktop Protocol (RDP) ports and monitor remote access/RDP logs.
- Audit user accounts with administrative privileges and configure access controls with least privilege in mind.
- Install and regularly update antivirus and anti-malware software on all hosts.
- Consider adding an email banner to emails received from outside your organization.
- Disable hyperlinks in received emails.
- Focus on awareness and training. Provide users with training on information security principles and techniques, particularly on recognizing and avoiding phishing emails.
- Immediately patch CVEs 2018-13379, 2020-12812, and 2019-5591.
- If FortiOS is not used by your organization, add key artifact files used by FortiOS to your organization’s execution deny list. Any attempts to install or run this program and its associated files should be prevented.
- Regularly back up data, air gap, and password protect backup copies offline. Ensure copies of critical data are not accessible for modification or deletion from the primary system where the data resides.
- Implement network segmentation.
- Require administrator credentials to install software.
- Implement a recovery plan to restore sensitive or proprietary data from a physically separate segmented, secure location (e.g., hard drive, storage device, the cloud).
- Install updates/patch operating systems, software, and firmware as soon as updates/patches are released.
Crimeware Outlook 2021: Ransomware On the Rise
Crimeware is enjoying a renaissance as of late with the high-profile ransomware variants REvil, Ryuk, Maze and Conti making news in recent months. Steve Morgan, Editor in Chief at Cybercrime Magazine released a report titled 2021 REPORT: CYBERWARFARE IN THE C-SUITE that projects the global market for cyberware will reach a value of $10.5 trillion as early as 2025. Cring is the latest in a string of devastating ransomware attacks to span the globe. Notably, in March, computer giant Acer was targeted by the REvil variant to the tune of $50,000,000. While at present this seems to be the highest ransom requested it is extremely challenging to confirm due to the nature of these attacks and the fact that many organizations have vested interest not to disclose vulnerabilities and exploits leading to events like these.