

Rewterz Threat Advisory – Multiple Google Chrome Vulnerabilites
March 2, 2022
Rewterz Threat Alert – HermeticWiper and IsaacWiper – Active IOCs – Russian-Ukrainian Cyber Warfare
March 2, 2022
Rewterz Threat Advisory – Multiple Google Chrome Vulnerabilites
March 2, 2022
Rewterz Threat Alert – HermeticWiper and IsaacWiper – Active IOCs – Russian-Ukrainian Cyber Warfare
March 2, 2022Severity
High
Analysis Summary
In the Russian and Ukrainian cyber war, the only losers are the people. Anonymous Collective took Ukraine’s side in this cyberwar and now fights on their behalf. In doing so, they have performed DDoS attacks on many Russian websites, government entities, and television networks. The latest attack by the Anonymous-linked group Network Battalion 65 was on the Russian Nuclear Institute. The group released 40,000 files from the institute and are looking for a translator.

Impact
- Data Loss
- File Encryption
- Financial Loss
- Cyber Espionage
Remediation
- Antivirus – Enable antivirus and anti-malware software and update signature definitions in a timely manner.
- 2FA – Enable two-factor authentication.
- Patch – Patch and upgrade any platforms and software timely. Prioritize patching known exploited vulnerabilities.
- WAF – Set up a Web Application Firewall with rules to block suspicious and malicious requests.
- Admin Access – limit access to administrative accounts and portals to only relevant personnel and make sure they are
- not publicly accessible.
- Passwords – Implement strong passwords.
- Logging – Log your eCommerce environment’s network activity and web server activity