Binary code interspersed with locked and unlocked padlocks

Security | Cybersecurity News 12-2022

We take your security seriously.

While First Northern Bank and Trust’s Information Technology Department works diligently to stay ahead of the latest digital security threats, we often come across insights, news, and resources worth sharing. We hope you find this information helpful and, if you ever have specific questions, contact us for more information. 

1: What’s the most important lesson in cybersecurity?

In today’s digital world, there is a war going on between businesses and criminals, and a balance between the new open communications of the modern business landscape and the hackers trying to exploit them. Although the information and tools required to fight cyberthreats are out there, they’re useless if companies don’t pay attention or refuse to act. 

2: Which browser flaw was recently fixed in Google Chrome? 

Read what the National Institute of Standards and Technology’s National Vulnerability Database has to say about this new zero-day flaw. A zero-day flaw, also called a "zero-day vulnerability" or a "zero-day exploit", is an undiscovered software vulnerability that can be exploited by malicious actors.

3: What is CryWiper Data Wiper malware?

All organizations, even large governmental agencies, are vulnerable to cyberattack by criminals using ransomware. Russia’s woes dealing with CryWiper demonstrate that paying the ransom cannot save you. Ransomware is a form of malicious software that cybercriminals use to hold an individual or organization's computer data hostage. By encrypting the data, ransomware attackers deny access until the victim pays a ransom. It typically spreads through phishing emails containing malicious attachments or links, downloads from untrustworthy websites, and drive-by downloads from infected webpages.

4: How did North Korean hackers spread AppleJeus malware? 

Because of its newness and lack of regulation and oversight, cryptocurrency users are particularly vulnerable to malware attacks. Various trojans and other crypto malware have been introduced and have made their way to users, in particular the AppleJeus malware, spread via the fake crypto trading site BloxHolder. Malware comes in many forms including viruses, worms, trojans, keyloggers, ransomware, and spyware. Viruses replicate themselves throughout a system after they have been executed by a user. Worms create copies of themselves that travel across networks and computers without user action, and trojans make it possible for someone else to access your computer without permission. Keyloggers record your keystrokes so hackers can gain access to secure accounts, ransomware locks up files until you pay a fee, and spyware collects data on your browsing habits and sends it back to its creator.

5: Interested in protecting yourself against phishing attacks?

Phishing is the method of fraudulently tricking individuals into revealing personal, financial, or confidential information like passwords, security question answers, account numbers, and so on. These methods change and evolve over time. Here are some ways to protect yourself from becoming a victim.