- FBI, CISA, and MS-ISAC Release #StopRansomware: LockBit 3.0
- Microsoft Releases March 2023 Security Updates
- Adobe Releases Security Updates for Multiple Products
- Mozilla Releases Security Updates for Firefox 111 and Firefox ESR 102.9
- CISA Announces Ransomware Vulnerability Warning Pilot
The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are releasing this joint CSA to disseminate known LockBit 3.0 ransomware IOCs and TTPs identified through FBI investigations as recently as March 2023.
The LockBit 3.0 ransomware operations function as a Ransomware-as-a-Service (RaaS) model and is a continuation of previous versions of the ransomware, LockBit 2.0, and LockBit. Since January 2020, LockBit has functioned as an affiliate-based ransomware variant; affiliates deploying the LockBit RaaS use many varying TTPs and attack a wide range of businesses and critical infrastructure organizations, which can make effective computer network defense and mitigation challenging.
LockBit 3.0 ransomware can cause a company to render their services and have their business locked up at a standstill with a great possibility of revenue loss.
The FBI, CISA, and the MS-ISAC recommend organizations implement the mitigations below to improve your organization’s cybersecurity posture on the basis of LockBit 3.0’s activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful TTPs. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.
FBI, CISA, and MS-ISAC Release #StopRansomware: LockBit 3.0:
#StopRansomware: LockBit 3.0:
Cross-Sector Cybersecurity Performance Goals:
Cyber Hygiene Services:
Ransomware Readiness Assessment:
Microsoft has released updates to address multiple vulnerabilities in Microsoft software.
There are multiple security vulnerabilities affecting Microsoft products and services.
An attacker can exploit some of these vulnerabilities to take control of an affected system.
We encourage users and administrators to review Microsoft’s March 2023 Security Update Guide and Deployment Information and apply the necessary updates.
Microsoft Releases March 2023 Security Updates:
March 2023 List of products to be updated:
Security Update Guide:
Adobe released updates to address multiple vulnerabilities in it’s software.
Possible vulnerabilities can include arbitrary code code execution, privilege escalation and security feature bypass.
An attacker can exploit these vulnerabilities to take control of an affected system.
We encourage users and administrators to review the following Adobe Security Bulletins and apply the necessary updates.
Adobe Security Updates:
Adobe Releases Security Updates for Multiple Products
Creative Cloud Desktop Application:
Substance 3D Stager:
Mozilla has released security updates to address vulnerabilities in Firefox 111 and Firefox ESR 102.9.
By displaying a prompt with a long description, the full-screen notification could have been hidden Firefox for Android by using download popups, resulting in potential user confusion or spoofing attacks.
An attacker could exploit some of these vulnerabilities to take control of an affected system.
We encourage users and administrations to apply the necessary updates.
Mozilla Releases Security Updates for Firefox 111 and Firefox ESR 102.9:
Mozilla Foundation Security Advisory 2023-10 Security Vulnerabilities fixed in Firefox ESR 102.9:
Mozilla Foundation Security Advisory 2023-09 Security Vulnerabilities fixed in Firefox 111:
Threat actors can use known vulnerabilities to launch a ransomware attack. However, most organizations may be unaware that a vulnerability used by ransomware threat actors is present on their network. Through the Ransomware Vulnerability Warning Pilot (RVWP), which started on January 30, 2023, CISA is undertaking a new effort to warn critical infrastructure entities that their systems have exposed vulnerabilities that may be exploited by ransomware threat actors.
Many companies have vulnerabilities but they don’t know that these vulnerabilities will cause ransomware attack.
Because of these known vulnerabilities, hackers can create ransomware and encrypt companies’ data.
We encourage companies to make an immediate remediation when they receive a notification from the CISA RVWP.
CISA Announces Ransomware Vulnerability Warning Pilot:
Ransomware Vulnerability Warning Pilot (RVWP):