What your IT managers can do
The ACSC has produced the following technical advice for Information Technology managers: Advisory 2020-008: Copy-paste compromises – tactics, techniques and procedures used to target multiple Australian networks.
The advice includes the following mitigation strategies to help reduce the risk of compromise to your systems:
1. Prompt patching of internet-facing software, operating systems and devices
All exploits utilised by the actor in the course of this campaign were publicly known and had patches or mitigations available. Organisations should ensure that security patches or mitigations are applied to internet-facing infrastructure within 48 hours. Additionally organisations, where possible, should use the latest versions of software and operating systems.
2. Use of multi-factor authentication across all remote access services
Multi-factor authentication should be applied to all internet-accessible remote access services, including:
- web and cloud-based email
- collaboration platforms
- virtual private network connections
- remote desktop services.
While no single mitigation strategy is guaranteed to prevent cyber security incidents, implementing the ACSC’s Essential Eight provides baseline protection.
If you have been a victim of a cybercrime, go to ReportCyber and report it.
Should you need any assistance from SenseICT please don't hesitate to contact us via our Contact Page or via 08 63 888 059 during business hours.