<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" media="screen" href="/~d/styles/atom10full.xsl"?><?xml-stylesheet type="text/css" media="screen" href="http://feeds.feedburner.com/~d/styles/itemcontent.css"?><feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:thr="http://purl.org/syndication/thread/1.0" xmlns:feedburner="http://rssnamespace.org/feedburner/ext/1.0">
    <title>Ride The Lightning</title>
    
    <link rel="alternate" type="text/html" href="https://ridethelightning.senseient.com/" />
    <id>tag:typepad.com,2003:weblog-1369410</id>
    <updated>2021-04-20T10:00:00-04:00</updated>
    <subtitle>Ride the Lightning: Electronic Evidence is a blog by Sharon D. Nelson, a noted author and lecturer and President of the digital forensics firm Sensei Enterprises, Inc. It was developed to share electronic evidence news, to report and reflect upon current computer forensics and electronic discovery developments and to offer a light-hearted view of electronic evidence from the trenches, where folks really do “ride the lightning.”</subtitle>
    <generator uri="http://www.typepad.com/">TypePad</generator>
<atom10:link xmlns:atom10="http://www.w3.org/2005/Atom" rel="self" type="application/atom+xml" href="http://feeds.feedburner.com/sensei" /><feedburner:info uri="sensei" /><atom10:link xmlns:atom10="http://www.w3.org/2005/Atom" rel="hub" href="http://pubsubhubbub.appspot.com/" /><entry>
        <title>FireEye’s Mandiant Issues M-Trends 2021 Report</title>
        <link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/sensei/~3/PlGLAWT2UZg/fireeyes-mandiant-issues-m-trends-2021-report.html" />
        <link rel="replies" type="text/html" href="https://ridethelightning.senseient.com/2021/04/fireeyes-mandiant-issues-m-trends-2021-report.html" />
        <id>tag:typepad.com,2003:post-6a00e008daf3e08834027880246e37200d</id>
        <published>2021-04-20T10:00:00-04:00</published>
        <updated>2021-04-19T14:56:43-04:00</updated>
        <summary>The M-Trends 2021 Report was published by FireEye's Mandiant division on April 13 and is free to download. The data is based on Mandiant investigations between October 1, 2019 and September 30, 2020. Some of the highlights: 59% of the...</summary>
        <author>
            <name>Sharon Nelson</name>
        </author>
        
        
<content type="xhtml" xml:lang="en-US" xml:base="https://ridethelightning.senseient.com/"><div xmlns="http://www.w3.org/1999/xhtml"><p>The <a href="https://content.fireeye.com/m-trends/rpt-m-trends-2021?" rel="noopener" target="_blank">M-Trends 2021 Report</a> was published by FireEye's Mandiant division on April 13 and is free to download. The data is based on Mandiant investigations between October 1, 2019 and September 30, 2020.</p>
<p>Some of the highlights:</p>
<p>59% of the cyber incidents Mandiant investigated were discovered by the affected organizations themselves, an improvement of 12% over the previous year's report.</p>
<p>The global median dwell time was 24 days, the first time it has dipped below one month. This may have been caused by flood of ransomware which was quickly identified as such.</p>
<p>Ransomware was involved in 25% of the investigations, up from 14% in the previous year.</p>
<p>What John and I call version 2.0 of ransomware, Mandiant now calls "multifaceted extortion." That works too.</p>
<p>What does it involve?</p>
<p>It still encrypts the victim's data but now it steals the victim's data as well.</p>
<p>The cyber criminals publish the data on a "name and shame" website.</p>
<p>They notify the media.</p>
<p>They notify the people whose data has been stolen, prompting data breach disclosures.</p>
<p>They call and harass employees.</p>
<p>They conduct denial of service attacks on the victim to further disrupt operations.</p>
<p>All of this, you'll be shocked to hear, causes disruption and brand damage.</p>
<p>There is a very long list of proactive steps that organizations can take to reduce their risk. Guaranteed that most of the folks who read those steps won't understand them – and that's the problem with trying to help organizations help themselves!</p>
<p>HT to Dave Ries.</p>
<p><strong>Sharon D. Nelson, Esq., President</strong>, <strong>Sensei Enterprises, Inc.</strong><br />3975 University Drive, Suite 225<strong>|</strong>Fairfax, VA 22030<span style="text-decoration: underline;"><br /></span>Email: <a href="mailto:snelson@senseient.com"> snelson@senseient.com</a> Phone: 703-359-0700<br />Digital Forensics/Cybersecurity/Information Technology<br /><a href="https://senseient.com/" rel="noopener" target="_blank">https://senseient.com</a><br /><a href="https://twitter.com/sharonnelsonesq" rel="noopener" target="_blank">https://twitter.com/sharonnelsonesq</a><br /><a href="https://www.linkedin.com/in/sharondnelson" rel="noopener" target="_blank">https://www.linkedin.com/in/sharondnelson</a><br /><a href="https://amazon.com/author/sharonnelson" rel="noopener" target="_blank">https://amazon.com/author/sharonnelson</a></p><xhtml:img xmlns:xhtml="http://www.w3.org/1999/xhtml" src="http://feeds.feedburner.com/~r/sensei/~4/PlGLAWT2UZg" height="1" width="1" /></div></content>



    <feedburner:origLink>https://ridethelightning.senseient.com/2021/04/fireeyes-mandiant-issues-m-trends-2021-report.html</feedburner:origLink></entry>
<entry>
        <title>The Top 21 Cybersecurity Experts to Follow on Twitter in 2021</title>
        <link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/sensei/~3/AWeIWM0HW_8/the-top-21-cybersecurity-experts-to-follow-on-twitter-in-2021.html" />
        <link rel="replies" type="text/html" href="https://ridethelightning.senseient.com/2021/04/the-top-21-cybersecurity-experts-to-follow-on-twitter-in-2021.html" />
        <id>tag:typepad.com,2003:post-6a00e008daf3e088340263e99ef851200b</id>
        <published>2021-04-19T10:00:00-04:00</published>
        <updated>2021-04-18T15:25:21-04:00</updated>
        <summary>I'm sure glad that Security Boulevard published a post, on April 11, of the 21 cybersecurity experts you should follow on Twitter in 2021. People are always asking me who to follow – now I have a hyperlink to give...</summary>
        <author>
            <name>Sharon Nelson</name>
        </author>
        
        
<content type="xhtml" xml:lang="en-US" xml:base="https://ridethelightning.senseient.com/"><div xmlns="http://www.w3.org/1999/xhtml"><p>I'm sure glad that Security Boulevard published a <a href="https://securityboulevard.com/2021/04/top-21-cybersecurity-experts-you-must-follow-on-twitter-in-2021/" rel="noopener" target="_blank">post</a>, on April 11, of the 21 cybersecurity experts you should follow on Twitter in 2021. People are always asking me who to follow – now I have a hyperlink to give them without having done the actual work myself.</p>
<p>HT to Dave Ries!</p>
<p><strong>Sharon D. Nelson, Esq., President</strong>, <strong>Sensei Enterprises, Inc.</strong><br />3975 University Drive, Suite 225<strong>|</strong>Fairfax, VA 22030<span style="text-decoration: underline;"><br /></span>Email: <a href="mailto:snelson@senseient.com"> snelson@senseient.com</a> Phone: 703-359-0700<br />Digital Forensics/Cybersecurity/Information Technology<br /><a href="https://senseient.com/" rel="noopener" target="_blank">https://senseient.com</a><br /><a href="https://twitter.com/sharonnelsonesq" rel="noopener" target="_blank">https://twitter.com/sharonnelsonesq</a><br /><a href="https://www.linkedin.com/in/sharondnelson" rel="noopener" target="_blank">https://www.linkedin.com/in/sharondnelson</a><br /><a href="https://amazon.com/author/sharonnelson" rel="noopener" target="_blank">https://amazon.com/author/sharonnelson</a></p><xhtml:img xmlns:xhtml="http://www.w3.org/1999/xhtml" src="http://feeds.feedburner.com/~r/sensei/~4/AWeIWM0HW_8" height="1" width="1" /></div></content>



    <feedburner:origLink>https://ridethelightning.senseient.com/2021/04/the-top-21-cybersecurity-experts-to-follow-on-twitter-in-2021.html</feedburner:origLink></entry>
<entry>
        <title>FBI Blasts Away Web Shells on US Servers Without Telling Owners</title>
        <link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/sensei/~3/Xqydz8OGI7A/fbi-blasts-away-web-shells-on-us-servers-without-telling-owners.html" />
        <link rel="replies" type="text/html" href="https://ridethelightning.senseient.com/2021/04/fbi-blasts-away-web-shells-on-us-servers-without-telling-owners.html" />
        <id>tag:typepad.com,2003:post-6a00e008daf3e088340263e99df715200b</id>
        <published>2021-04-15T10:00:00-04:00</published>
        <updated>2021-04-14T11:17:39-04:00</updated>
        <summary>ZDNet reported on April 14 that the Department of Justice revealed on April 13 that the FBI had received authorization from a court to remove web shells installed on compromised servers related to the Exchange vulnerabilities. "Many infected system owners...</summary>
        <author>
            <name>Sharon Nelson</name>
        </author>
        
        
<content type="xhtml" xml:lang="en-US" xml:base="https://ridethelightning.senseient.com/"><div xmlns="http://www.w3.org/1999/xhtml"><p>ZDNet <a href="https://www.zdnet.com/article/fbi-blasts-away-web-shells-on-us-servers-in-wake-of-exchange-vulnerabilities/" rel="noopener" target="_blank">reported</a> on April 14 that the Department of Justice revealed on April 13 that the FBI had received authorization from a court to remove web shells installed on compromised servers related to the Exchange vulnerabilities.</p>
<p>"Many infected system owners successfully removed the web shells from thousands of computers. Others appeared unable to do so, and hundreds of such web shells persisted unmitigated," the department said.</p>
<p>"This operation removed one early hacking group's remaining web shells which could have been used to maintain and escalate persistent, unauthorized access to US networks."</p>
<p>Despite the operation, entities that run Exchange servers should still follow Microsoft's advice as well as to ensure servers are properly patched.</p>
<p>"The FBI conducted the removal by issuing a command through the web shell to the server, which was designed to cause the server to delete only the web shell (identified by its unique file path)," the department said.</p>
<p>"This operation was successful in copying and removing those web shells. However, it did not patch any Microsoft Exchange Server zero-day vulnerabilities or search for or remove any additional malware or hacking tools that hacking groups may have placed on victim networks by exploiting the web shells."</p>
<p>Due to each shell having a unique file path and name, the department added it may have been difficult for "individual server owners" to find and remove them. As of the end of March, the department was aware of "hundreds" of shells still working on US servers. Microsoft released its first alerts on the vulnerabilities at the start of March.</p>
<p>If you were running an Exchange server in the United States, it could have been compromised, and somewhat mitigated by the FBI without your knowledge.</p>
<p>The FBI is trying to alert server owners that it removed shells from. Affected users with publicly available contact information will receive an "e-mail message from an official FBI e-mail account (@FBI.gov) notifying the victim of the search", and failing that, ISPs will be contacted to provide notice.</p>
<p>"Today's court-authorized removal of the malicious web shells demonstrates the department's commitment to disrupt hacking activity using all of our legal tools, not just prosecutions," Assistant Attorney General for national security John C. Demers said.</p>
<p>On March 24, Microsoft said 92% of vulnerable servers were patched or mitigated.</p>
<p>Does it unnerve anyone else that the government can go into privately-owned servers, even with good intentions, without prior notice?</p>
<p><strong>Sharon D. Nelson, Esq., President</strong>, <strong>Sensei Enterprises, Inc.</strong><br />3975 University Drive, Suite 225<strong>|</strong>Fairfax, VA 22030<span style="text-decoration: underline;"><br /></span>Email: <a href="mailto:snelson@senseient.com"> snelson@senseient.com</a> Phone: 703-359-0700<br />Digital Forensics/Cybersecurity/Information Technology<br /><a href="https://senseient.com/" rel="noopener" target="_blank">https://senseient.com</a><br /><a href="https://twitter.com/sharonnelsonesq" rel="noopener" target="_blank">https://twitter.com/sharonnelsonesq</a><br /><a href="https://www.linkedin.com/in/sharondnelson" rel="noopener" target="_blank">https://www.linkedin.com/in/sharondnelson</a><br /><a href="https://amazon.com/author/sharonnelson" rel="noopener" target="_blank">https://amazon.com/author/sharonnelson</a></p><xhtml:img xmlns:xhtml="http://www.w3.org/1999/xhtml" src="http://feeds.feedburner.com/~r/sensei/~4/Xqydz8OGI7A" height="1" width="1" /></div></content>



    <feedburner:origLink>https://ridethelightning.senseient.com/2021/04/fbi-blasts-away-web-shells-on-us-servers-without-telling-owners.html</feedburner:origLink></entry>
<entry>
        <title>564% Increase in People Affected by Data Breaches in 1st Quarter of 2021</title>
        <link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/sensei/~3/HMZLojeXWv8/564-increase-in-people-affected-by-data-breaches-in-1st-quarter-of-2021.html" />
        <link rel="replies" type="text/html" href="https://ridethelightning.senseient.com/2021/04/564-increase-in-people-affected-by-data-breaches-in-1st-quarter-of-2021.html" />
        <id>tag:typepad.com,2003:post-6a00e008daf3e0883402788022f280200d</id>
        <published>2021-04-14T10:00:00-04:00</published>
        <updated>2021-04-13T12:30:11-04:00</updated>
        <summary>The Identity Theft Resource Center® reported on April 7 that publicly-reported U.S. data compromises in Q1 2021 are up 12 percent (363) from Q4 2020. The figure that has drawn all the attention is that the number of individuals impacted is up 564 percent...</summary>
        <author>
            <name>Sharon Nelson</name>
        </author>
        
        
<content type="xhtml" xml:lang="en-US" xml:base="https://ridethelightning.senseient.com/"><div xmlns="http://www.w3.org/1999/xhtml"><p>The Identity Theft Resource Center® <a href="https://www.idtheftcenter.org/identity-theft-resource-center-reports-564-percent-increase-in-individuals-impacted-by-data-compromises-in-q1-2021/" rel="noopener" target="_blank">reported</a> on April 7 that publicly-reported U.S. data compromises in Q1 2021 are up 12 percent (363) from Q4 2020. The figure that has drawn all the attention is that the number of individuals impacted is up 564 percent (51 million in Q1 2021 versus eight million in Q4 2020). A primary reason for the gap in compromises and impacts is a 42 percent rise in the number of supply chain attacks compared to Q4 2020, a trend discussed in the <a href="https://notified.idtheftcenter.org/s/2020-data-breach-report" rel="noopener" target="_blank">ITRC's 2020 Data Breach Report</a>.</p>
<p>One hundred and thirty-seven (137) organizations reported being impacted by supply chain attacks in Q1 2021 at 27 different third-party vendors, including IT provider Accellion. The publicly reported supply chain attacks affected seven million people. Nineteen supply chain attack-related compromises were reported in Q4 2020.</p>
<p>More conclusions from the Q1 2021 report:</p>
<p>"<em>Phishing and ransomware attacks continue to be the primary root causes of data compromises. </em></p>
<p><em>The increase in data compromises and impacted individuals was also influenced by 59 data events reported in early Q1 2021 that occurred in late December 2020. </em></p>
<p><em>The 2020 supply chain and ransomware attack against IT provider Blackbaud continues to result in new data breach notices; 62 new notices in Q1 2021 that impacted approximately 146,000 additional individuals. More than 12.8 million people at 555 organizations have now been affected by the attack first reported in mid-2020. </em></p>
<p><em>The report reinforces the trends highlighted by the ITRC, the FBI, and various security vendors that point to a rise in cybercrimes focused on stealing company resources using personal information</em>. "</p>
<p>The hits just keep on coming. Have you reviewed your cybersecurity posture recently? Most businesses have not.</p>
<p><strong>Sharon D. Nelson, Esq., President</strong>, <strong>Sensei Enterprises, Inc.</strong><br />3975 University Drive, Suite 225<strong>|</strong>Fairfax, VA 22030<span style="text-decoration: underline;"><br /></span>Email: <a href="mailto:snelson@senseient.com"> snelson@senseient.com</a> Phone: 703-359-0700<br />Digital Forensics/Cybersecurity/Information Technology<br /><a href="https://senseient.com/" rel="noopener" target="_blank">https://senseient.com</a><br /><a href="https://twitter.com/sharonnelsonesq" rel="noopener" target="_blank">https://twitter.com/sharonnelsonesq</a><br /><a href="https://www.linkedin.com/in/sharondnelson" rel="noopener" target="_blank">https://www.linkedin.com/in/sharondnelson</a><br /><a href="https://amazon.com/author/sharonnelson" rel="noopener" target="_blank">https://amazon.com/author/sharonnelson</a></p><xhtml:img xmlns:xhtml="http://www.w3.org/1999/xhtml" src="http://feeds.feedburner.com/~r/sensei/~4/HMZLojeXWv8" height="1" width="1" /></div></content>



    <feedburner:origLink>https://ridethelightning.senseient.com/2021/04/564-increase-in-people-affected-by-data-breaches-in-1st-quarter-of-2021.html</feedburner:origLink></entry>
<entry>
        <title>Businesses Being Attacked Using Their Own Contact Forms</title>
        <link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/sensei/~3/oRVC_2uxN-g/businesses-being-attacked-using-their-own-contact-forms.html" />
        <link rel="replies" type="text/html" href="https://ridethelightning.senseient.com/2021/04/businesses-being-attacked-using-their-own-contact-forms.html" />
        <id>tag:typepad.com,2003:post-6a00e008daf3e0883402788022c19f200d</id>
        <published>2021-04-13T10:00:00-04:00</published>
        <updated>2021-04-12T16:40:10-04:00</updated>
        <summary>Bleeping Computer reported on April 9 that cyber attackers are using legitimate corporate contact forms to send phishing emails that threaten businesses with lawsuits and attempt to infect them with the IcedID info-stealing malware. IcedID is a modular banking trojan...</summary>
        <author>
            <name>Sharon Nelson</name>
        </author>
        
        
<content type="xhtml" xml:lang="en-US" xml:base="https://ridethelightning.senseient.com/"><div xmlns="http://www.w3.org/1999/xhtml"><p>Bleeping Computer <a href="https://www.bleepingcomputer.com/news/security/attackers-deliver-legal-threats-icedid-malware-via-contact-forms/" rel="noopener" target="_blank">reported</a> on April 9 that cyber attackers are using legitimate corporate contact forms to send phishing emails that threaten businesses with lawsuits and attempt to infect them with the IcedID info-stealing malware.</p>
<p>IcedID is a modular banking trojan first spotted in 2017 and updated to deploy second-stage malware payloads, including Trickbot, Qakbot, and Ryuk ransomware.</p>
<p>The attackers can use it to download additional modules after infecting a device, steal credentials and financial information, and move laterally across the victims' networks to compromise more computers and deploy more payloads.</p>
<p>Recently detected by the Microsoft 365 Defender Threat Intelligence Team, this phishing campaign seems to have found a way to bypass contact forms' CAPTCHA protection to target businesses with a flood of phishing messages.</p>
<p>Microsoft threat intelligence analysts Emily Hacker and Justin Carroll observed "an influx of contact form emails targeted at enterprises by means of abusing companies' contact forms."</p>
<p>"This indicates that attackers may have used a tool that automates this process while circumventing CAPTCHA protections," the Microsoft threat analysts said.</p>
<p>Importantly, by using this tactic, the attackers bypass the targeted enterprise's secure email gateways, significantly increasing their phishing messages' chance of landing in a target's inbox instead of getting flagged and sent to the spam folder.</p>
<p>To increase their attacks' success, the would-be hackers threaten their targets with legal action for copyright infringements to pressure them into clicking embedded links directing them to IcedID payloads.</p>
<p>The recipients are told to click on an embedded link to review the attackers' "evidence" but are instead redirected to a Google Sites-hosted website used to deliver the IcedID malware. The targets are asked to log in using their Google accounts to view the content. After logging, an archive containing a heavily obfuscated .js-based downloader is downloaded on their computers. An IcedID payload and a Cobalt Strike beacon are then downloaded on the compromised device using WScript and Powershell.</p>
<p>"While this specific campaign delivers the IcedID malware, the delivery method can be used to distribute a wide range of other malware, which can in turn introduce other threats to the enterprise," the Microsoft analysts added.</p>
<p>This was a new threat to me – time to raise the alarm to make sure law firms and businesses are protected from this attack.</p>
<p>Hat tip to Dave Ries.</p>
<p><strong>Sharon D. Nelson, Esq., President</strong>, <strong>Sensei Enterprises, Inc.</strong><br />3975 University Drive, Suite 225<strong>|</strong>Fairfax, VA 22030<span style="text-decoration: underline;"><br /></span>Email: <a href="mailto:snelson@senseient.com"> snelson@senseient.com</a> Phone: 703-359-0700<br />Digital Forensics/Cybersecurity/Information Technology<br /><a href="https://senseient.com/" rel="noopener" target="_blank">https://senseient.com</a><br /><a href="https://twitter.com/sharonnelsonesq" rel="noopener" target="_blank">https://twitter.com/sharonnelsonesq</a><br /><a href="https://www.linkedin.com/in/sharondnelson" rel="noopener" target="_blank">https://www.linkedin.com/in/sharondnelson</a><br /><a href="https://amazon.com/author/sharonnelson" rel="noopener" target="_blank">https://amazon.com/author/sharonnelson</a></p><xhtml:img xmlns:xhtml="http://www.w3.org/1999/xhtml" src="http://feeds.feedburner.com/~r/sensei/~4/oRVC_2uxN-g" height="1" width="1" /></div></content>



    <feedburner:origLink>https://ridethelightning.senseient.com/2021/04/businesses-being-attacked-using-their-own-contact-forms.html</feedburner:origLink></entry>
<entry>
        <title>Microsoft Releases a Cyberattack Simulator</title>
        <link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/sensei/~3/PuepBBSB8jU/microsoft-releases-a-cyberattack-simulator.html" />
        <link rel="replies" type="text/html" href="https://ridethelightning.senseient.com/2021/04/microsoft-releases-a-cyberattack-simulator.html" />
        <id>tag:typepad.com,2003:post-6a00e008daf3e088340263e99d441f200b</id>
        <published>2021-04-12T10:00:00-04:00</published>
        <updated>2021-04-11T13:10:38-04:00</updated>
        <summary>Bleeping Computer reported on April 8 that Microsoft has released an open-source cyberattack simulator which permits security researchers and data scientists to create simulated network environments and see how they operate against AI-controlled cyber agents. The project is named 'CyberBattleSim'...</summary>
        <author>
            <name>Sharon Nelson</name>
        </author>
        
        
<content type="xhtml" xml:lang="en-US" xml:base="https://ridethelightning.senseient.com/"><div xmlns="http://www.w3.org/1999/xhtml"><p>Bleeping Computer <a href="https://www.bleepingcomputer.com/news/security/microsoft-releases-a-cyberattack-simulator-shall-we-play-a-game/" rel="noopener" target="_blank">reported</a> on April 8 that Microsoft has released an open-source cyberattack simulator which permits security researchers and data scientists to create simulated network environments and see how they operate against AI-controlled cyber agents.</p>
<p>The project is named 'CyberBattleSim' built using a Python-based Open AI Gym interface.</p>
<p>The Microsoft 365 Defender Research team created CyberBattleSim to model how a threat actor spreads laterally through a network after its initial compromise. Nice graphics included in the link above.</p>
<p>The Microsoft Defender Research Team, in new <a href="https://www.microsoft.com/security/blog/2021/04/08/gamifying-machine-learning-for-stronger-security-and-ai-models/" rel="noopener" target="_blank">blog post</a>, says "The environment consists of a network of computer nodes. It is parameterized by a fixed network topology and a set of predefined vulnerabilities that an agent can exploit to laterally move through the network. The simulated attacker's goal is to take ownership of some portion of the network by exploiting these planted vulnerabilities. While the simulated attacker moves through the network, a defender agent watches the network activity to detect the presence of the attacker and contain the attack."</p>
<p>To build their simulated environment, researchers will create various nodes on the network and indicate that services are running on each node, their vulnerabilities, and how the device is protected.</p>
<p>Automated cyber agents (threat actors) are then deployed in the environment, where they randomly select actions to perform against the various nodes to take control over them.</p>
<p>While many of these activities may trigger alerts in an XDR or SIEM system, Microsoft hopes that the security community can use this simulator to better understand how AI can analyze post-breach movements and better defend against them.</p>
<p>Microsoft said, "With CyberBattleSim, we are just scratching the surface of what we believe is a huge potential for applying reinforcement learning to security. We invite researchers and data scientists to build on our experimentation. We're excited to see this work expand and inspire new and innovative ways to approach security problems."</p>
<p>Shall we play a game?</p>
<p>Hat tip to Dave Ries.</p>
<p><strong>Sharon D. Nelson, Esq., President</strong>, <strong>Sensei Enterprises, Inc.</strong><br />3975 University Drive, Suite 225<strong>|</strong>Fairfax, VA 22030<span style="text-decoration: underline;"><br /></span>Email: <a href="mailto:snelson@senseient.com"> snelson@senseient.com</a> Phone: 703-359-0700<br />Digital Forensics/Cybersecurity/Information Technology<br /><a href="https://senseient.com/" rel="noopener" target="_blank">https://senseient.com</a><br /><a href="https://twitter.com/sharonnelsonesq" rel="noopener" target="_blank">https://twitter.com/sharonnelsonesq</a><br /><a href="https://www.linkedin.com/in/sharondnelson" rel="noopener" target="_blank">https://www.linkedin.com/in/sharondnelson</a><br /><a href="https://amazon.com/author/sharonnelson" rel="noopener" target="_blank">https://amazon.com/author/sharonnelson</a></p><xhtml:img xmlns:xhtml="http://www.w3.org/1999/xhtml" src="http://feeds.feedburner.com/~r/sensei/~4/PuepBBSB8jU" height="1" width="1" /></div></content>



    <feedburner:origLink>https://ridethelightning.senseient.com/2021/04/microsoft-releases-a-cyberattack-simulator.html</feedburner:origLink></entry>
<entry>
        <title>Law Firm Breach Results in Michigan Title IX Lawsuits Leak</title>
        <link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/sensei/~3/1ykfMgJCdu0/law-firm-breach-results-in-michigan-title-ix-lawsuits-leak.html" />
        <link rel="replies" type="text/html" href="https://ridethelightning.senseient.com/2021/04/law-firm-breach-results-in-michigan-title-ix-lawsuits-leak.html" />
        <id>tag:typepad.com,2003:post-6a00e008daf3e08834026bdec9aa19200c</id>
        <published>2021-04-08T10:00:00-04:00</published>
        <updated>2021-04-07T16:59:32-04:00</updated>
        <summary>The State News (Michigan) reported on April 6 that Michigan State sent out an email to just under 350 people on April 5 notifying them that Title IX case files from Michigan State were a part of a data breach...</summary>
        <author>
            <name>Sharon Nelson</name>
        </author>
        
        
<content type="xhtml" xml:lang="en-US" xml:base="https://ridethelightning.senseient.com/"><div xmlns="http://www.w3.org/1999/xhtml"><p>The State News (Michigan) <a href="https://statenews.com/article/2021/04/michigan-state-title-ix-case-files-leaked-in-consulting-data-breach" rel="noopener" target="_blank">reported</a> on April 6 that Michigan State sent out an email to just under 350 people on April 5 notifying them that Title IX case files from Michigan State were a part of a data breach of Bricker and Eckler Law Firm, which assisted in Michigan State's Title IX investigations, Michigan State's Title IX Communications Manager Christian Chapman said.</p>
<p>Bricker and Eckler is an Ohio law firm that is the parent company of INCompliance Consulting, which was hired by the University to assist in Title IX investigations and hearings.</p>
<p>Chapman said that because of the investigations into Larry Nassar's abuse, the university was required to work with external investigators to help process cases that were working for policy violations, which could include cases surrounding relationship violence and sexual misconduct as well as anti-discrimination policies.</p>
<p>"INCompliance is the entity that we work with on some of those external investigations," Chapman said. "Bricker and Eckler is their parent company or law firm, so to speak."</p>
<p>Bricker and Eckler was hit by a ransomware attack between Jan. 14 and Jan. 31, which leaked personal information from its clients, including information from INCompliance Title IX investigations that they were a part of at Michigan State.</p>
<p>"So just to be completely clear, none of the MSU systems were accessed," Chapman said. "It was just the Bricker and Eckler systems and the cases that they handled from MSU. So a small subset. It was less than 350 people affected. And the type of information were case files."</p>
<p>Chapman said that none of Michigan State's systems or resources have been affected by the leak and will continue to operate as usual.</p>
<p>Bricker and Eckler <a href="https://www.bricker.com/securityIncident" rel="noopener" target="_blank">posted</a> the following on their website:</p>
<p>"Bricker &amp; Eckler LLP ("Bricker"), a full-service law firm with offices throughout Ohio, was recently the target of a ransomware attack. In the course of Bricker's work on behalf of clients, it is at times provided access to personal information as a part of the client engagement. Bricker receives and utilizes this data solely in its representation of and to provide legal counsel to its clients.</p>
<p><strong>What Happened? </strong></p>
<p>On January 31, 2021, Bricker learned that it was the target of a ransomware attack. Upon learning of the incident, Bricker immediately took measures to contain the incident, launched an investigation, and third-party cybersecurity forensic experts were engaged to assist. Bricker also notified federal law enforcement.</p>
<p>The investigation determined that an unauthorized party gained access to certain Bricker internal systems at various times between approximately January 14, 2021 and January 31, 2021. Findings from the investigation indicate that the party obtained some data from certain Bricker systems during this period. Bricker was able to retrieve the data involved from the unauthorized party and has taken steps to delete the data. At this time, Bricker has no reason to believe this data was further copied or retained by the unauthorized party. Bricker conducted a thorough review of the data to identify individuals whose personal information may have been involved. On or around March 12, 2021, Bricker substantially completed its review of the data and began formally notifying clients of any client-related personal information included in these files.</p>
<p><strong>What Information Was Involved? </strong></p>
<p>The review determined that the data involved contained some personal information, including names, addresses, and in certain instances, medical-related and/or education-related information, driver's license numbers, and/or Social Security numbers.</p>
<p><strong>What We Are Doing </strong></p>
<p>On April 6, 2021, Bricker will begin mailing letters to individuals whose information was involved and for whom Bricker has mailing addresses. Bricker also established a dedicated call center to answer questions about the matter.</p>
<p>To help prevent a similar type of incident from occurring in the future, Bricker implemented additional security protocols designed to enhance the security of Bricker's network, internal systems and applications. Bricker will also continue to evaluate additional steps that may be taken to further increase Bricker's defenses going forward. In addition, Bricker is continuing to support federal law enforcement's investigation."</p>
<p>My constant question is, "Did the bad guys keep a copy of the data?" The law firm says it doesn't believe that they did, but how does one ever really know?</p>
<p><strong>Sharon D. Nelson, Esq., President</strong>, <strong>Sensei Enterprises, Inc.</strong><br />3975 University Drive, Suite 225<strong>|</strong>Fairfax, VA 22030<span style="text-decoration: underline;"><br /></span>Email: <a href="mailto:snelson@senseient.com"> snelson@senseient.com</a> Phone: 703-359-0700<br />Digital Forensics/Cybersecurity/Information Technology<br /><a href="https://senseient.com/" rel="noopener" target="_blank">https://senseient.com</a><br /><a href="https://twitter.com/sharonnelsonesq" rel="noopener" target="_blank">https://twitter.com/sharonnelsonesq</a><br /><a href="https://www.linkedin.com/in/sharondnelson" rel="noopener" target="_blank">https://www.linkedin.com/in/sharondnelson</a><br /><a href="https://amazon.com/author/sharonnelson" rel="noopener" target="_blank">https://amazon.com/author/sharonnelson</a></p><xhtml:img xmlns:xhtml="http://www.w3.org/1999/xhtml" src="http://feeds.feedburner.com/~r/sensei/~4/1ykfMgJCdu0" height="1" width="1" /></div></content>



    <feedburner:origLink>https://ridethelightning.senseient.com/2021/04/law-firm-breach-results-in-michigan-title-ix-lawsuits-leak.html</feedburner:origLink></entry>
<entry>
        <title>Peeping Tom Uses Drone to Look in Woman’s Bedroom Window</title>
        <link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/sensei/~3/G_TOHVBOVrg/peeping-tom-uses-drone-to-look-in-womans-bedroom-window.html" />
        <link rel="replies" type="text/html" href="https://ridethelightning.senseient.com/2021/04/peeping-tom-uses-drone-to-look-in-womans-bedroom-window.html" />
        <id>tag:typepad.com,2003:post-6a00e008daf3e0883402788020fcc5200d</id>
        <published>2021-04-07T10:00:00-04:00</published>
        <updated>2021-04-05T08:38:52-04:00</updated>
        <summary>InsideNoVA reported on March 18 that Prince William County police were searching for a man who used a drone mounted with a camera to look into a woman's bedroom in northern Virginia. The 18-year-old victim told police she was in...</summary>
        <author>
            <name>Sharon Nelson</name>
        </author>
        
        
<content type="xhtml" xml:lang="en-US" xml:base="https://ridethelightning.senseient.com/"><div xmlns="http://www.w3.org/1999/xhtml"><p>InsideNoVA <a href="https://www.insidenova.com/headlines/peeping-tom-uses-drone-to-look-in-woodbridge-womans-bedroom-window/article_2ca064b4-8813-11eb-980d-5b0cf04f6b37.html" rel="noopener" target="_blank">reported</a> on March 18 that Prince William County police were searching for a man who used a drone mounted with a camera to look into a woman's bedroom in northern Virginia.</p>
<p>The 18-year-old victim told police she was in her bedroom changing clothes when she saw the drone outside her window.</p>
<p>"The victim immediately looked out of the window and observed a man holding the controller for a drone standing near a residence on Rainbow Court," Prince William County police spokeswoman Renee Carr said.</p>
<p>Shortly afterwards, the suspect fled the area on foot and the drone flew away. The victim said she had seen the man wearing similar clothing in the area previously.</p>
<p>This story struck us because John and I have long discussed the possibility of drones being used as peeping Toms – but this was the first time we have seen a reported incident at a home. We have seen stories of drones surveilling beaches and people sunbathing on city rooftops. Had drones existed when "Animal House" was filmed, Bluto might have avoided his unfortunate fall with the ladder while peeping into the sorority house!</p>
<p><strong>Sharon D. Nelson, Esq., President</strong>, <strong>Sensei Enterprises, Inc.</strong><br />3975 University Drive, Suite 225<strong>|</strong>Fairfax, VA 22030<span style="text-decoration: underline;"><br /></span>Email: <a href="mailto:snelson@senseient.com"> snelson@senseient.com</a> Phone: 703-359-0700<br />Digital Forensics/Cybersecurity/Information Technology<br /><a href="https://senseient.com/" rel="noopener" target="_blank">https://senseient.com</a><br /><a href="https://twitter.com/sharonnelsonesq" rel="noopener" target="_blank">https://twitter.com/sharonnelsonesq</a><br /><a href="https://www.linkedin.com/in/sharondnelson" rel="noopener" target="_blank">https://www.linkedin.com/in/sharondnelson</a><br /><a href="https://amazon.com/author/sharonnelson" rel="noopener" target="_blank">https://amazon.com/author/sharonnelson</a></p><xhtml:img xmlns:xhtml="http://www.w3.org/1999/xhtml" src="http://feeds.feedburner.com/~r/sensei/~4/G_TOHVBOVrg" height="1" width="1" /></div></content>



    <feedburner:origLink>https://ridethelightning.senseient.com/2021/04/peeping-tom-uses-drone-to-look-in-womans-bedroom-window.html</feedburner:origLink></entry>
<entry>
        <title>The 20 Coolest Careers in Cybersecurity from SANS Institute</title>
        <link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/sensei/~3/kd_WGx7IDjo/the-20-coolest-careers-in-cybersecurity-from-sans-institute.html" />
        <link rel="replies" type="text/html" href="https://ridethelightning.senseient.com/2021/04/the-20-coolest-careers-in-cybersecurity-from-sans-institute.html" />
        <id>tag:typepad.com,2003:post-6a00e008daf3e088340263e99bcdfa200b</id>
        <published>2021-04-06T10:00:00-04:00</published>
        <updated>2021-04-05T09:44:50-04:00</updated>
        <summary>On April 5, SANS Institute posted some stats and the beginning of a countdown to the 20 coolest careers in cybersecurity. Yesterday's countdown began with job #20, Media Exploitation Analyst. Logically enough, the cool jobs are tied to related SANS...</summary>
        <author>
            <name>Sharon Nelson</name>
        </author>
        
        
<content type="xhtml" xml:lang="en-US" xml:base="https://ridethelightning.senseient.com/"><div xmlns="http://www.w3.org/1999/xhtml"><p>On April 5, SANS Institute <a href="https://www.sans.org/blog/the-20-coolest-cyber-security-careers/" rel="noopener" target="_blank">posted</a> some stats and the beginning of a countdown to the 20 coolest careers in cybersecurity. Yesterday's countdown began with job #20, Media Exploitation Analyst.</p>
<p>Logically enough, the cool jobs are tied to related SANS certifications, which is self-promotional of course, but also very helpful. Young folks are always asking me which cybersecurity certifications they should get – and of course that depends on the nature of the job you want.</p>
<p>Here is the job description for a Media Exploitation Analyst.</p>
<p>"If investigating computer crime excites you, and you want to make a career of recovering file systems that have been hacked or damaged, then this may be the path for you. In this position, you will assist in the forensic examinations of computers and media from a variety of sources, in view of developing forensically sound evidence.</p>
<p>Related SANS courses: <a href="https://www.sans.org/course/windows-forensic-analysis" rel="noopener" target="_blank">FOR500</a> (GCFE Certification), <a href="https://www.sans.org/course/advanced-smartphone-mobile-device-forensics" rel="noopener" target="_blank">FOR585</a> (GASF Certification), <a href="https://www.sans.org/course/mac-and-ios-forensic-analysis-and-incident-response" rel="noopener" target="_blank">FOR518</a> and <a href="https://www.sans.org/course/battlefield-forensics-and-data-acquisition" rel="noopener" target="_blank">FOR498</a>"</p>
<p>According to the <a href="https://cybersecurityventures.com/jobs/" rel="noopener" target="_blank">Cyber security Jobs Report</a>, the demand to fill roles within the information security industry is expected to reach 3.5 million unfulfilled positions this year. Further, unemployment in the industry is currently exceptionally low. Research in an annual global survey by the Enterprise Service Group (ESG) found that by 2021, 51% of IT decision-makers said they were struggling to fill open positions.</p>
<p>This statistic is why the World Economic Forum (WEF) named cyber-attacks as the fourth most serious global concern, and data breaches the fifth, but also why those with an interest in, or currently employed in an IT role, should consider learning the skills to become a Cyber Security Professional.</p>
<p>Hat tip to Dave Ries.</p>
<p><strong>Sharon D. Nelson, Esq., President</strong>, <strong>Sensei Enterprises, Inc.</strong><br />3975 University Drive, Suite 225<strong>|</strong>Fairfax, VA 22030<span style="text-decoration: underline;"><br /></span>Email: <a href="mailto:snelson@senseient.com"> snelson@senseient.com</a> Phone: 703-359-0700<br />Digital Forensics/Cybersecurity/Information Technology<br /><a href="https://senseient.com/" rel="noopener" target="_blank">https://senseient.com</a><br /><a href="https://twitter.com/sharonnelsonesq" rel="noopener" target="_blank">https://twitter.com/sharonnelsonesq</a><br /><a href="https://www.linkedin.com/in/sharondnelson" rel="noopener" target="_blank">https://www.linkedin.com/in/sharondnelson</a><br /><a href="https://amazon.com/author/sharonnelson" rel="noopener" target="_blank">https://amazon.com/author/sharonnelson</a></p><xhtml:img xmlns:xhtml="http://www.w3.org/1999/xhtml" src="http://feeds.feedburner.com/~r/sensei/~4/kd_WGx7IDjo" height="1" width="1" /></div></content>



    <feedburner:origLink>https://ridethelightning.senseient.com/2021/04/the-20-coolest-careers-in-cybersecurity-from-sans-institute.html</feedburner:origLink></entry>
<entry>
        <title>Before You Get Hit by Ransomware, Print Out Your Incident Response Plan</title>
        <link rel="alternate" type="text/html" href="http://feedproxy.google.com/~r/sensei/~3/fIonTiAc0KY/before-you-get-hit-by-ransomware-print-out-your-incident-response-plan.html" />
        <link rel="replies" type="text/html" href="https://ridethelightning.senseient.com/2021/04/before-you-get-hit-by-ransomware-print-out-your-incident-response-plan.html" />
        <id>tag:typepad.com,2003:post-6a00e008daf3e0883402788020d6f0200d</id>
        <published>2021-04-05T10:00:00-04:00</published>
        <updated>2021-04-04T11:13:42-04:00</updated>
        <summary>Sometimes, paper is a good thing. As ZDNet reported on April 1, there really are firms which have been hit by ransomware and no one could get to the Incident Response Plan (IRP) because it was – of course –...</summary>
        <author>
            <name>Sharon Nelson</name>
        </author>
        
        
<content type="xhtml" xml:lang="en-US" xml:base="https://ridethelightning.senseient.com/"><div xmlns="http://www.w3.org/1999/xhtml"><p>Sometimes, paper is a good thing.</p>
<p>As ZDNet <a href="https://www.zdnet.com/article/hacked-companies-had-backup-plans-but-didnt-print-them-out-why-cybersecurity-still-isnt-being-taken-seriously/" rel="noopener" target="_blank">reported</a> on April 1, there really are firms which have been hit by ransomware and no one could get to the Incident Response Plan (IRP) because it was – of course – encrypted.</p>
<p>Naturally, you could also have the plan on a device that is not connected to the network but having the plan in paper in several readily accessible locations makes a lot of sense. The last thing you need to worry about after a cyber attack is where your emergency plan can be found (with contact information for your data breach lawyer, your insurance company, your digital forensics company, your bank, etc.).</p>
<p>Have you updated your IRP recently? Most IRPs become antiques very quickly as the nature of threats and defenses morph rapidly – and yet studies show that IRPs, once completed, are often allowed to molder, sometimes for years.</p>
<p>Make sure there at least an annual reminder to review/revise the plan. And tabletop exercises which assume the worst has happened should be a regular occurrence. No matter how good your defenses are, you should never assume that you cannot be breached. So be prepared – and if the nightmare comes, hopefully implementing your IRP will mitigate the extent of the damage.</p>
<p><strong>Sharon D. Nelson, Esq., President</strong>, <strong>Sensei Enterprises, Inc.</strong><br />3975 University Drive, Suite 225<strong>|</strong>Fairfax, VA 22030<span style="text-decoration: underline;"><br /></span>Email: <a href="mailto:snelson@senseient.com"> snelson@senseient.com</a> Phone: 703-359-0700<br />Digital Forensics/Cybersecurity/Information Technology<br /><a href="https://senseient.com/" rel="noopener" target="_blank">https://senseient.com</a><br /><a href="https://twitter.com/sharonnelsonesq" rel="noopener" target="_blank">https://twitter.com/sharonnelsonesq</a><br /><a href="https://www.linkedin.com/in/sharondnelson" rel="noopener" target="_blank">https://www.linkedin.com/in/sharondnelson</a><br /><a href="https://amazon.com/author/sharonnelson" rel="noopener" target="_blank">https://amazon.com/author/sharonnelson</a></p><xhtml:img xmlns:xhtml="http://www.w3.org/1999/xhtml" src="http://feeds.feedburner.com/~r/sensei/~4/fIonTiAc0KY" height="1" width="1" /></div></content>



    <feedburner:origLink>https://ridethelightning.senseient.com/2021/04/before-you-get-hit-by-ransomware-print-out-your-incident-response-plan.html</feedburner:origLink></entry>
 
</feed><!-- ph=1 -->
