Written by: Emily Cranston, Senior Cyber Intelligence Analyst & Curt Beall, MS-ISAC Intel Unit Intern
Tech support scams have been around for years: you answer the phone and the person on the other end claims to be working with a well-known tech company. They try to convince you that your computer is sending out error messages, attacking another computer, or infected with viruses. Malicious actors use this scam to cold-call victims, gain access to victims’ computers, install malware, steal information, or receive payment for fraudulent services.
Every year since 2003 October has been recognized as National Cyber Security Awareness Month (NCSAM). This effort was brought to life through a collaboration between the U.S. Department of Homeland Security and the National Cyber Security Alliance. NCSAM was created to ensure that every individual stays safe and secure online.
The Multi-State Information Sharing and Analysis Center (MS-ISAC) is celebrating its 1,000th member – the Village of Boys Town in the state of Nebraska. A unique village, the Boys Town municipality serves a mission of providing care for young men and women through special school programs, foster family services, and more. Since 1917, Boys Town’s mission has been to give at-risk children and families the love, support and education they need to succeed.
By: Ben Spear, Senior Cyber Intelligence Analyst
In order to provide greater insight into the state, local, tribal, and territorial (SLTT) cybersecurity landscape we’re sharing some of the insights MS-ISAC gained from the first six months of 2016.
In the first six months of 2016, MS-ISAC monitored devices generated in excess of 2.76 trillion records for analysis, which resulted in over 20,000 actionable alerts to members. A large portion of these alerts were related to malware infections, with the top culprits being ransomware and click fraud malware associated with the Angler Exploit Kit (EK). As depicted in the chart below, June’s average weekly number of notifications fell to nearly half the activity observed at the start of the year and one-third of the peak activity observed in late March. The blue dashed line shows the overall downward trend in actionable malicious activity.