Wednesday, September 28, 2022
HomeCyber SecurityQuick Firm CMS Hack Raises Safety Questions

Quick Firm CMS Hack Raises Safety Questions



Quick Firm, the business-news publication, has taken its web site offline after cyberattackers compromised its content material administration system (CMS). They used the entry to ship out two obscene and racist push notifications to its Apple Information subscribers.

The incident follows an identical defacement assault on the FastCompany.com homepage on Sunday, the place the attackers posted comparable language. The outlet changed its web site with an announcement in a single day on Tuesday, which stays in place at press time.

“The messages are vile and are usually not consistent with the content material and ethos of Quick Firm,” the corporate mentioned within the discover. “Quick Firm regrets that such abhorrent language appeared on our platforms and in Apple Information, and we apologize to anybody who noticed it earlier than it was taken down.”

The corporate is investigating the scenario and dealing to wash the positioning, it mentioned. Whereas no particulars of the assault are but accessible, James McQuiggan, safety consciousness advocate at KnowBe4, famous that the objective was clearly model assassination, maybe with a aspect of flexing.

“Whereas cybercriminals at all times go for the cash, every so often, they wish to exhibit their boldness by displaying they’ve entry to delicate or publicly viewable techniques by posting one thing outdoors of the traditional scope of data shared,” he mentioned in an emailed assertion.

Highlighting the Want for Higher Safety

Christopher Budd, senior supervisor of menace analysis at Sophos, tells Darkish Studying that that is simply newest instance of an assault in opposition to PR and information infrastructure to ship false info, with one other latest instance being a pretend press launch claiming Walmart was to start accepting bitcoin.

The assault “highlights the fragility of PR and information infrastructure, and showcases how assaults like these may doubtlessly be carried out for extra malicious functions that lead to extra dire penalties,” he says. “Finally, this assault exhibits how information channels kind a vital info infrastructure, and that this infrastructure must be secured in ways in which match its criticality.”

On a broader degree, Jason Kent, hacker in residence at Cequence Safety, suspects a credential-stuffing assault could possibly be in play, indicating that the “credentials weren’t terribly subtle and never backed up by multifactor auth or VPN necessities,” he says.

“Credential-stuffing assaults are a few of the most pervasive assaults we see each day,” he provides. “Attackers try to guess passwords for legitimate accounts, and if they’re profitable the attacker will make the most of the total permission of these credentials. Privileged entry must be intently monitored as as soon as the attacker has these, they’ll carry out all method of havoc.”

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments