BtCIRT has been recently reported of few instance of system files being encrypted by a ransomware family called GandCrab, therefore we urge all users to be alerted and take precaution. 1. Description: GandCrab is a Ransomware that encrypts almost all file types on affected system with a ransom message displayed insisting to make payment using crypto currency to decrypt the data. 2. Distribution mechanism: Email attachment , cracked softwares, websites, fake software updaters, trojans, exploit kits and untrustworthy software download sites are some of the means used to infect and then exploit vulnerabilities in installed, outdated softwares of the […]
The report captures all essential activities undertaken by BtCIRT in the year 2018. The overall mission of BtCIRT is to enhance cyber security in Bhutan by enabling cybersecurity information coordination and establishing computer security incident handling capabilities within the country. Please click here to read the Report.
Everyday thousands of otherwise sensitive information is being exchange over email or stored on disk not even realising that someone could intercept it on transit or while on rest, causing devastating consequences. Securing sensitive data in either state is imperative as attackers find increasingly sophisticated tools and techniques to compromise systems and gain access. While different tools and techniques are available that can be used to protect data in either state, encryption plays a vital role in maintaining data confidentiality. Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is used […]
SSH is a software package that enables system administrators to securely administer their systems from a remote network with user authentication, commands, output, and file transfers being encrypted to protect against attacks in the network. While it is much more secure than common login services such as telnet, ftp, rlogin, rsh, and rcp, its default installation isn’t hardened. This advisory covers some of the hardening measures you can take to secure ssh. For details Securing SSH
Description Memcache is temporary data storage service used to improve the overall performance of the website by storing chunks of data in a cache. If misconfigured memcached on port 11211 UDP & TCP is used to cause reflection DOS attack (send a spoofed packet to a device and have it reflected back). Memcached allows access to the data stored in the cache without any form of authentication and the attacker can easily access data in the corresponding caches and even modify them. How to Fix: Bind the Memcache server to a particular Source IP Only. Don’t expose this service in the […]