view.sentarahealth.com Open in urlscan Pro
13.111.101.80  Public Scan

URL: https://view.sentarahealth.com/?qs=97fa1e5eb2f7805227f1be0d49d569df4ad46dff322c638f933036faacacf39e42b2a2f87d0a780a2680c8a4dfd6...
Submission: On January 14 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Important Cyber Security Reminder from the Information Security Office.

Web Version

What should I do if I receive a USB to use in the mail?

Do not install or use any USB from an unknown or untrusted source on your work
laptop! See the latest FBI warning below on USBs.

FBI warns of wave of cyberattacks driven by mailed USB devices

--------------------------------------------------------------------------------

The FBI this morning warned U.S. businesses that the cybercriminal group FIN7 is
targeting businesses using mailed USB devices, which then deploy ransomware on
to a compromised network using a variety of tools, including Metasploit, Cobalt
Strike and PowerShell scripts. The enclosed USB is a commercially available
device known as a "BadUSB" or "Bad Beetle USB"; it typically carries a "LilyGO"
logo. When plugged into a computer system, the USB device automatically injects
a series of keystrokes in order to download and execute a malware payload. The
USB devices are usually accompanied by a fictitious letter from a federal
agency, including the Department of Health and Human Services, along with
information on COVID-19 guidelines or fake gifts with forged Amazon thank you
cards and counterfeit gift cards.

"This alert serves as a good opportunity to remind staff not to accept USB or
other technology 'gifts' which connect to your networks and never to connect any
devices to the network which have not been approved by your organization's
cybersecurity teams," said John Riggi, AHA's National Advisor for Cybersecurity
and Risk. "Organizations may also want to consider 'blacklisting' common
penetration testing tools, such as Metasploit and Cobalt Strike, which are
frequently exploited by hackers in the execution of high impact ransomware
attacks."

Regards,

Dan Bowden 
VP & CISO, Information Security Office 
Sentara Healthcare 

Sentara Healthcare
6015 Poplar Hall Drive, Norfolk, VA 23502
© 2022 Sentara Healthcare. All rights reserved.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -