The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released detailed information about the misconfigurations and security vulnerabilities that ransomware gangs commonly exploit. This initiative aims to assist critical infrastructure organizations in preventing ransomware attacks. The information was disseminated under CISA’s Ransomware Vulnerability Warning Pilot (RVWP) program, launched in January. The program’s objective is to notify critical infrastructure entities about ransomware-vulnerable devices detected on their networks.
Since the RVWP’s inception, CISA has identified and shared information on over 800 systems with internet-accessible vulnerabilities that ransomware operations frequently target. CISA stated, “Ransomware has disrupted critical services, businesses, and communities worldwide, and many of these incidents are perpetrated by ransomware actors using known common vulnerabilities and exposures (CVE).” To address this, CISA has updated its “known exploited vulnerabilities” catalog to include a column titled “known to be used in ransomware campaigns.” Additionally, CISA introduced a new RVWP resource listing misconfigurations and weaknesses that ransomware campaigns commonly exploit.
This initiative is a continuation of CISA’s broader campaign to combat the rising ransomware threat to critical infrastructure. This threat became particularly evident nearly two years ago when cyberattacks targeted essential infrastructure entities and U.S. government agencies, including Colonial Pipeline, JBS Foods, and Kaseya. In 2021, CISA introduced the Ransomware Readiness Assessment (RRA) to help organizations assess their readiness against ransomware attacks. By August 2021, CISA released guidelines to help entities prevent data breaches from ransomware incidents. Moreover, CISA formed the Joint Cyber Defense Collaborative (JCDC) in partnership with the private sector to protect U.S. infrastructure from cyber threats. CISA also launched StopRansomware.gov, a dedicated portal providing resources to defend against ransomware.
Source: Bleepingcomputer
To mitigate potential threats, it is important to implement additional cybersecurity measures with the help of a trusted partner like INFRA www.infrascan.net or you can try your self using check.website.