Money Mules are people who consciously or innocently serve as intermediaries to move stolen/illegal money using their bank account(s) on behalf of criminals/fraudsters. While we have known of only rare cases in Bhutan, lots of these are happening around the globe. How does it happen: The criminal will get in touch with the victim via email, instant messaging apps, job website, blogs or even phone calls. They will convince the victim into providing their bank account details with either an attractive job , commissions or by seeking sympathy. The Fraudsters will transfer an amount into the victims account. Then...
BtCIRT biannual Report
Overview The report captures all essential activities undertaken by BtCIRT from July to December 2017. The overall mission of BtCIRT is to enhance cyber security in Bhutan by enabling cybersecurity information coordination and by establishing computer security incident handling capabilities within the country. Inline with its mission, BtCIRT has conducted security workshops, published articles and alerts on latest cyber trends, threats, vulnerabilities and best practices. BtCIRT also conducted security awareness program targeting end users, developed security baseline and conducted organisational security assessment of some of the organisations. View Report ...
Meltdown and Spectre Vulnerability
A vulnerability named Meltdown and Spectre is known to affect modern computer processors, whether it is computers, routers,firewalls, servers or mobile devices and its exploitation would allow an attacker to gain access to confidential information such a system password. Systems Affected: While Meltdown vulnerability affects operating systems running Intel CPUs only, the Spectre vulnerabilities affect operating systems running Intel, AMD and ARM CPUs. Mitigation: Please visit following sources for the list of vendors who resolved the vulnerabilities and apply necessary patches: https://www.us-cert.gov/ncas/alerts/TA18-004A https://www.thaicert.or.th/alerts/user/2018/al2018us001.html Patch and be protected...
KRACK Attack
A new type of attack known as KRACK(Key Reinstallation AttaCKs) was discovered by Mathy Vanhoef of imec-DistriNet which, essentially is a vulnerability in the WPA2 protocol, which till date was considered as a secure protocol for Wi-Fi connection. Thus, it affects all products that support WiFi. BtCIRT recommends users and administrators to keep your devices updated with the patch the vendors provide as soon as they are released and make sure to use HTTPS while transmitting sensitive information. More details about the attack are available at: ABC News on KRACK and WiFi KRACK – Key Reinstallation AttaCKs. More Technical...
Browser security
Web Browser is used to access information resources like websites, images, videos from the World Wide Wave(WWW). Google Chrome, Microsoft Edge, Safari, Firefox are some of the commonly used browsers. Since these browsers are installed not only on Computers but also on cell phones, tablets and IoTs, it has become one of the most used channel for cyber attack. Therefore, it is critical to understand the importance of using these browsers in a secure manner. By default, most of the browsers come with minimum security features enabled, thus creating an easy platform for hacker to launch malicious code to get...