<p>It was a banner week for cybercriminals and a challenging one for defenders. Hundreds of organizations saw threat actors exploit critical flaws in their Microsoft SharePoint servers, with more malicious hackers piling on and attacks still ongoing.</p>
<div class=”ad-wrapper ad-embedded”>
<div id=”halfpage” class=”ad ad-hp”>
<script>GPT.display(‘halfpage’)</script>
</div>
<div id=”mu-1″ class=”ad ad-mu”>
<script>GPT.display(‘mu-1’)</script>
</div>
</div>
<p>Meanwhile, just two months after a major FBI takedown, Lumma <a href=”https://www.techtarget.com/searchsecurity/tip/How-to-protect-against-malware-as-a-service”>malware-as-a-service</a> operations not only appear to have fully recovered, but are stealthier and more effective than ever. And the innovative Coyote banking Trojan has broken new technical ground by weaponizing Windows accessibility features against users.</p>
<p>Together, these stories highlight the opportunism, adaptability, resilience and ingenuity of <a href=”https://www.techtarget.com/whatis/34-Cybersecurity-Statistics-to-Lose-Sleep-Over-in-2020″>today’s cyberthreats</a> — and the critical importance of countermeasures, such as <a href=”https://www.techtarget.com/searchsecurity/tip/How-to-build-a-better-vulnerability-management-program”>prompt patching</a> and frequent <a href=”https://www.techtarget.com/searchsecurity/tip/Cybersecurity-employee-training-How-to-build-a-solid-plan”>security awareness training</a>.</p>
<p>Read more about an eventful week in cybercrime.</p>
<section class=”section main-article-chapter” data-menu-title=”Ongoing SharePoint attacks hit hundreds of Microsoft customers”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>Ongoing SharePoint attacks hit hundreds of Microsoft customers</h2>
<p>Microsoft customers with on-premises SharePoint servers are facing a massive wave of ongoing cyberattacks that began in early July and escalated in the past week.</p>
<p>The intrusions exploit an attack chain dubbed ToolShell, a sequence combining remote code injection and network spoofing flaws. Attackers have reportedly used the vulnerabilities to compromise hundreds of SharePoint customers worldwide, including the <a href=”https://www.darkreading.com/cyberattacks-data-breaches/us-nuclear
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: