Explanation of the Current Alert Level of GUARDED
The alert level is the overall current threat level.
On September 11, the Cyber Threat Alert Level was evaluated and is remaining at Blue (Guarded) due to vulnerabilities in Veeam, SonicWall, Microsoft, Ivanti, Adobe, and Google products. On September 5, the MS-ISAC released an advisory for multiple vulnerabilities in Veeam products, the most severe of which could allow for remote code execution. On September 6, the MS-ISAC released an advisory for multiple vulnerabilities in SonicWall SonicOS Management Access and SSLVPN, the most severe of which could allow for unauthorized resource access. On September 10, the MS-ISAC released three advisories. The first advisory was for multiple vulnerabilities in Microsoft products, the most severe of which could allow for remote code execution. The second advisory was for multiple vulnerabilities in Ivanti products, the most severe of which could allow for remote code execution. The third advisory was for multiple vulnerabilities in Adobe products, the most severe of which could allow for arbitrary code execution. On September 11, the MS-ISAC released an advisory for multiple vulnerabilities in Google Chrome, the most severe of which could allow for arbitrary code execution. Organizations and users are advised to update and apply all appropriate vendor security patches to vulnerable systems and to continue to update their antivirus signatures daily. Another line of defense includes user awareness training regarding the threats posed by attachments and hypertext links contained in emails especially from un-trusted sources.
Latest Advisory
Our MS-ISAC Advisories
Advisories Released (Last 12 Months)
In Q1 2024, the Top 10 Malware observed at the Multi-State Information Sharing and Analysis Center® (MS-ISAC®) changed slightly from the previous quarter. The downloader SocGholish continues to lead as the Top Malware, making up 60% of the Top 10 Malware. ArechClient2, a .Net-based Remote Access Trojan (RAT), came in second, while CoinMiner, a malicious cryptocurreny miner, was the third most-prevalent malware in Q1 2024. Lumma Stealer, Jupyter, and Ratenjay all returned to the list in Q1. Please see below for more detailed malware descriptions and associated indicators of compromise. Windows operating systems.
Top Malware Q2 2024
- SocGholish
- Agent Tesla
- CoinMiner
- NanoCore
- ZPHP
- Mirai
- Magecart
- Arechclient2
- DarkGate
- Lumma Stealer
Take Control of Your Organization's Security
The information on this page is maintained by our Security Operations Center, which is part of MS-ISAC and EI-ISAC.