

#FONTY BEAR SOFTWARE#
Practice Better User management. Deploy user management software that helps you wrangle company-issued devices.Strengthen Firewall management. Make sure you have a solid security protocol for incoming/outgoing traffic.Limit physical access. Upgrade your access control protocols and systems at your facilities.By following WLAN security best practices and better managing personal and company-owned devices, you can minimize your risk of damage from groups like Fancy Bear. Having unprotected IoT devices on your enterprise network is like living in Alaska and leaving your backdoor open for…uh… Bears to enter. “This operation is the first step in the disruption of a botnet that provides the Sofacy actors with an array of capabilities that could be used for a variety of malicious purposes, including intelligence gathering, theft of valuable information, destructive or disruptive attacks, and the misattribution of such activities.” Protect Yourself With Better IOT Device Security “The Department of Justice is committed to disrupting, not just watching, national security cyber threats using every tool at our disposal, and today’s effort is another example of our commitment to do that,” said Assistant Attorney General Demers. The FBI has been actively battling Fancy Bear activity as well: Targets were a mix of non-governmental organizations and political organizations (about 20%) and the rest were a mix of tech, government, engineering, education and military organizations (about 80%). Microsoft sent 1,400 notifications to targeted or compromised companies last year.
#FONTY BEAR WINDOWS#
The most recent Fancy Bear attacks in April of 2019 were spotted by Microsoft’s Threat Intelligence Center which has high visibility into thousands of networks using Windows on their machines. They target these soft points, in order to infiltrate secure areas of corporate networks. IoT Device Security and Enterprise NetworksĪs businesses and individuals increase their reliance on IoT devices and voice commands apps like Alexa and Siri, there is an increased risk of evil forces listening, stealing, and corrupting.Īmong the methods of Fancy Bear’s most recent attacks are the infiltration of various devices – mobile, smart and other, any kind of IoT device. Is Fancy Bear trying to adjust your Nest thermostat? Are they coming for your corporate data through that printer on the third floor? Are Russians judging you for asking Alexa to convert 42 ounces to cups? Maybe… But what we do know is that they’ve successfully hacked several networks, including ones in the U.S., by going for really low-hanging fruit: IoT devices.

No one knows the specific reason behind these attacks.

So far they have successfully infected over 500,000 consumer-grade routers across 50 different countries (that we know of). They might have members of the Georgian parliment sweating the integrity of their next vote, but what exactly does this mean for the rest of us? Their attacks were focused on gathering as much business intel and personal info as they could from entities and individuals. They went after military infrastructure–even taking a swipe at Blackwater. Some of their early work included trying to take over or phish embassies, international governments, German parliament and French TV. This group was not always focused on the U.S. The group made global headlines in 2016 for being linked to the hacking of the Democratic National Committee. They’ve successfully hacked and infected hundreds of thousands of home and office (SOHO) routers and gained control over other networked devices. The name might sound cute, but Fancy Bear’s destructive activity has the attention of governments, intelligence agencies and technology giants around the world. What is Fancy Bear?įancy Bear is a state-sponsored Russian hacking group believed to be controlled by Russian military intelligence agency GRU, and operating since the mid-2000s. Network administrators and IT managers face daily challenges from inside and outside their organizations that threaten the stability, speed and security of their enterprise WLANs. One of the latest high-profile security threats to corporate networks comes by way of IoT device hacking from a nefarious and well-known entity called Fancy Bear.
