The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have identified two malware variants called ELECTRICFISH and BADCALL.
The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA. CISA encourages users and administrators to review the HIDDEN COBRA – North Korean Malicious Cyber Activity page, which contains links to Malware Analysis Reports MAR-10135536-21 (ELECTRICFISH) and MAR-10135536-10 (BADCALL), for more information.
Years ago, attackers would infect a system and inflict damage almost immediately. However, in the current threat environment, attackers attempt to get into a network and remain there for months, or even years. In some cases, they use this access to encrypt all the data in the network with ransomware, and then demand a ransom from the organization. As an example, the city of Riviera Beach Florida decided to approve a payment of about $592,000 in May 2019 to get their data back after a ransomware attack.
The CompTIA Security+: Get Certified Get Ahead: SY0-601 Study Guide is an update to the top-selling SY0-201, SY0-301, SY0-401, and SY0-501 study guides, which have helped thousands of readers pass the exam the first time they took it. It includes the same elements readers raved about in the previous four versions.
Each of the eleven chapters presents topics in an easy to understand manner and includes real-world examples of security principles in action.
You’ll understand the important and relevant security topics for the Security+ exam, without being overloaded with unnecessary details. Additionally, each chapter includes a comprehensive review section to help you focus on what’s important.
Over 300 realistic practice test questions with in-depth explanations will help you test your comprehension and readiness for the exam. The book includes:
A 75 question pre-test
A 75 question post-test
Practice test questions at the end of every chapter.
Each practice test question includes a detailed explanation to help you understand the content and the reasoning behind the question. You’ll be ready to take and pass the exam the first time you take it.
If you plan to pursue any of the advanced security certifications, this guide will also help you lay a solid foundation of security knowledge. Learn this material, and you’ll be a step ahead for other exams. This SY0-601 study guide is for any IT or security professional interested in advancing in their field, and a must-read for anyone striving to master the basics of IT security.
The FBI has high confidence that HIDDEN COBRA actors are using malware with proxy servers to maintain a presence on victim networks. Once in network, the amount of damage that attackers can do can be catastrophic. Because of this, DHS, FBI, and the DoD are trying to raise awareness of current threats. Using their information, administrators can detect potential infections and limit the damage.
Over 385 realistic Security+ practice test questions
At least 10 performance-based questions
All questions include explanations so you’ll know why the correct answers are correct,
and why the incorrect answers are incorrect.
Upgrade Your Resume with the Security+ New Version
Multiple quiz formats to let you use these questions based on the way you learn.
Learn mode – randomized. View each of the questions in random order. Learn mode allows you to keep selecting answers until you select the correct answer. Once you select the correct answer, you’ll see the explanation. Click here to see how learn mode works.
Test mode – randomized. View each of the questions in random order. In test mode, you can only see the correct answers and explanations after you complete the test. Click here to see how test mode works.
Test mode – 75 random questions. View 75 random questions from the full test bank similar to how the Security+ exam has a potential maximum of 75 multiple choice questions.
The ELECTRICFISH report provides an analysis of four malicious executable files. Three are Windows executables that function as proxy servers and implement a “Fake TLS” method. The fourth file is an Android Package Kit (APK) file that will run on Android platforms as a Remote Access Tool (RAT).
The BADCALL report provides analysis of a malicious 32-bit Windows executable file. It implements a custom protocol that allows traffic to be tunneled between a source and a destination Internet Protocol (IP) address.
This information was compiled from the us-cert.gov website which includes a wealth of publicly available information on current and recent threats.
Join our mailing list and get a free excerpt of the CompTIA Security+: Get Certified Get Ahead: SY0-501 Study Guide. This excerpt includes the introduction and Chapter 1.