view.sentarahealth.com
Open in
urlscan Pro
13.111.101.80
Public Scan
URL:
https://view.sentarahealth.com/?qs=97fa1e5eb2f7805227f1be0d49d569df4ad46dff322c638f933036faacacf39e42b2a2f87d0a780a2680c8a4dfd6...
Submission: On January 14 via api from US — Scanned from DE
Submission: On January 14 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Important Cyber Security Reminder from the Information Security Office. Web Version What should I do if I receive a USB to use in the mail? Do not install or use any USB from an unknown or untrusted source on your work laptop! See the latest FBI warning below on USBs. FBI warns of wave of cyberattacks driven by mailed USB devices -------------------------------------------------------------------------------- The FBI this morning warned U.S. businesses that the cybercriminal group FIN7 is targeting businesses using mailed USB devices, which then deploy ransomware on to a compromised network using a variety of tools, including Metasploit, Cobalt Strike and PowerShell scripts. The enclosed USB is a commercially available device known as a "BadUSB" or "Bad Beetle USB"; it typically carries a "LilyGO" logo. When plugged into a computer system, the USB device automatically injects a series of keystrokes in order to download and execute a malware payload. The USB devices are usually accompanied by a fictitious letter from a federal agency, including the Department of Health and Human Services, along with information on COVID-19 guidelines or fake gifts with forged Amazon thank you cards and counterfeit gift cards. "This alert serves as a good opportunity to remind staff not to accept USB or other technology 'gifts' which connect to your networks and never to connect any devices to the network which have not been approved by your organization's cybersecurity teams," said John Riggi, AHA's National Advisor for Cybersecurity and Risk. "Organizations may also want to consider 'blacklisting' common penetration testing tools, such as Metasploit and Cobalt Strike, which are frequently exploited by hackers in the execution of high impact ransomware attacks." Regards, Dan Bowden VP & CISO, Information Security Office Sentara Healthcare Sentara Healthcare 6015 Poplar Hall Drive, Norfolk, VA 23502 © 2022 Sentara Healthcare. All rights reserved. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -