It can be so frustrating to lose track of a workout because the fitness app has stopped running in the background. It happens when you turn off the screen or have another app in the front to listen to music or watch a video during the workout. Talk about all of your sweat and effort going to waste!

Fitness apps work by recognizing and displaying the user’s workout status in real time, using the sensor on the phone or wearable device. They can obtain and display complete workout records to users only if they can keep running in the background. Since most users will turn off the screen, or use other apps during a workout, it has been a must-have feature for fitness apps to keep alive in the background. However, to save battery power, most phones will restrict or even forcibly close apps once they are running in the background, causing the workout data to be incomplete. When building your own fitness app, it’s important to keep this limitation in mind.

Source de l’article sur DZONE

Last year we saw the launch of a new Web programming language Dart – Structured Web Programming from Google. A very interesting approach to support web application development. Not so long after Go, Groovy, Ruby, Scala, << Name your DSL here >>; we see Dart. Is it a good thing to have at least one programming language to solve one problem? The answer is, like we already know, it depends.

Stay Away From “Do it Yourself”

It is your choice as to if you will try to do things yourself or allow the truly seasoned professionals to help out. Some decide that they are going to try to go it alone when they are programming something new, but this often ends up in a less than desirable place. It may even be more expensive than just hiring an expert who can help you get it programmed for you in the first place.

Source de l’article sur DZONE

With the rapid development of the IoT industry, the MQTT protocol is being used by more companies and developers. In the process of learning and using MQTT, a handy client tool can help developers debug IoT applications, explore the features of MQTT, and shorten the development cycle.

There are a wide variety of MQTT client tools with different functional focuses. For beginners and even MQTT experts, it is a challenge to choose a suitable MQTT client tool.

Source de l’article sur DZONE

Live chat is one of the most powerful tools for customer experience in the current marketplace. 

In a world where customers are constantly connected to the online world, online chat is a reliable way of getting quick solutions to common problems. 

Today’s consumers prefer talking to an agent over chat to calling a contact center, and they often feel that live chat is less frustrating than waiting for the right person to answer the phone. 

Of course, like any digital tool, live chat is only effective when using it correctly. Today, we’re going to show you the crucial KPIs you need to consider if you want to ensure that your chat strategy is delivering a tangible return on investment. 

The Most Important Metrics to Measure for Live Chat

These days, implementing live chat tools is easier than ever. 

You don’t necessarily need to hire a professional developer unless you want a specialist widget with specific functions and unique branding. Many plugins and tools for sites built on Shopify and WooCommerce allow you to instantly access chat functions. 

However, just because implementing live chat is easy doesn’t mean that there aren’t countless ways for your strategy to go wrong. Keeping an eye on these crucial KPIs and metrics ensures you’re making the right impression with your chat strategy. 

1. First Response Time

First response time is a crucial live chat metric. This measures how long customers need to wait before someone responds to them. Technically, this metric only refers to how quickly an actual agent responds to your customer, so automated “thanks for getting in touch” messages don’t count. However, immediately responding with one of those messages can convince your audience to stick around for a little longer. 

The faster your agents can respond to messages and solve problems, the better your brand reputation becomes. The good news is that a good live chat strategy can lead to pretty quick response times. The average time for an agent to see a live chat message is around 2 minutes and 40 seconds.

To improve your FRT statistics, make sure you:

  • Invest in chatbots: AI chatbots can support customers 24/7 with handy, self-service functionality. These tools will also filter out the customers waiting for an agent who can find a solution to their problem on your FAQ page.
  • Prepare canned responses: Quick responses to common queries can help you to address a problem much faster. In addition, preparing canned responses will ensure that your team members can quickly respond to more customers. 
  • Increase your resources: Ensure you have the right hand and enough agents to handle peak demand.

2. Average Resolution Time

The first response rate only looks at how quickly someone responds to a customer’s message for the first time. However, it doesn’t show how rapidly you deal with client problems. Average Resolution Time is the metric that helps to measure customer satisfaction by seeing how long it takes to get to a point where your customer can close the chat. 

If it takes too long for your employees to solve problems, there’s an increased risk of your customers becoming annoyed and frustrated. Additionally, the longer agents take dealing with each individual chat, the more other consumers will have to wait for someone to become available. Finally, the longer it takes to resolve an issue, the more customer satisfaction decreases.

The key to success is ensuring that the right agent deals with the correct customer and that everyone on your team is empowered with the appropriate tools and information. Boost resolution time by:

  • Giving customers a quick self-service solution: For common questions, make sure that you have an FAQ section that you can direct your customers to. In addition, a chatbot that can offer quick canned responses to regular queries can save time. Plus, they’re great for reducing the pressure on your agents’ shoulders. 
  • Integrate CRM tools with live chat: Make sure your agents have access to information about each customer as soon as they start the conversation. This information should include the customer’s name, what they’ve purchased before, and if they’ve issued any support tickets. Integrating with the CRM makes it easier for agents to jump straight into the action without needing the customer to explain everything first. 
  • Keep resources handy: Your team members should have instant access to all the information they need to answer customer questions. Ensure that searchable data repositories are available for everyone on your live chat team. 

Remember, routing tools that automatically send customers to the agent with the proper knowledge or skills will also improve response times and reduce the number of times a customer needs to repeat themselves. 

3. Chat to Conversion Rate 

Live chat tools aren’t just an avenue for problem resolution. Although customers can get excellent service through live chat, they also look to chat to collect information before a potential purchase. Around 38% of customers say that they end up purchasing a positive live chat experience. 

The live chat app on your website can provide real-time assistance for sales queries, converting leads, and maximizing your return on investment. However, to determine how successful your chat system is at encouraging sales, you must look at the chat to conversion rate metric. 

Essentially, you measure the number of chats your company has been involved in, then compare that number to the total number of conversions from those customers. It might be helpful to narrow down your results here by using your data and analytics tools to separate your total number of live chats into those intended for sales information and those requiring assistance. 

If your chat to conversion rate isn’t as high as you would like, there are lots of things you can do to start making a positive impact:

  • Automatically launch a chat: As soon as someone comes to your website, launch a chat window with a bot that asks whether you can help your customer. You can even include a list of commonly asked questions so your customer can get help faster. 
  • Follow up on chat conversations: Make sure you follow up on any questions that customers ask on your chat widget with an email. This is a great way to reach out to customers that may have been distracted and ended up abandoning their cart.
  • Personalize suggestions: Use AI insights and information from your customer management tools to determine which products are most likely to appeal to each customer, then suggest those items. Remember to ensure that your tone of voice in the chat matches your brand too. 

Remember, the faster you can answer customer queries and address their concerns with your live chat strategy, the more likely the chat will lead to a sale. Ultimately, customers are convinced to purchase when they believe they can trust your business to deliver excellent experiences. 

4. Customer Satisfaction Score

The customer satisfaction score is probably one of the most critical metrics in any customer experience strategy. It directly measures customer satisfaction levels and gives you an insight into how well you’re doing from the perspective of your target audience. 

The best way to measure CSAT through live chat is to add a survey to the end of the chat session. For instance, you could ask, “How would you rate this session on a scale of 1 to 10”. Then, based on the score, you’d calculate a “Net Promotion Score.” Each score falls into one of three categories: “Detractors 0-6”, “Passives 6-8,” and “Promotors 9-10”.

The more information you collect about your CSAT score, the easier it will be to determine where you’re going wrong with your live chat strategy. On the other hand, if the score is pretty good after a chat session, you’re probably on the right track. To improve your overall score:

  • Encourage feedback: Getting people to leave feedback, even on a live chat app, can be difficult. Offering customers the chance to win something in exchange for their insights could help you to get more data. 
  • Follow up: Connect with your “detractors” to find out what you did wrong. Follow up in the live chat session by asking if they’d like to leave a more comprehensive review. Alternatively, you can send an email asking for additional information. 
  • Reach out to promotors: Connect with the people who give you the most favorable scores to ask them for their insights. Find out what they enjoyed most about the experience and request a review that you can place on your website for social proof. 

5. Missed Opportunities

The longer someone waits for you to answer their question in a live chat or respond to their initial message, the more likely they’ll give up on the conversation. Unfortunately, this means that your company ends up with missed opportunities. You lose the chance to potentially make a sale, delight a customer, and strengthen your brand reputation.

While you might assume that your customers will know you can’t be available to answer all of their questions immediately, that’s not the case. INC tells us that 51% of consumers believe a business should always be open. So every missed chat is another negative mark against your reputation. 

If you discover that your team is missing a lot of chat chances, this could be a sign that you don’t have enough resources available in this area. However, there are a few ways that you can reduce your chances of missed opportunities, such as:

  • Hiring more team members: If you know that there are times of the year or week when you have peaks in demand, ensure that you have the correct number of staff members available. 
  • Using chatbots: Chatbots won’t be able to answer all customer questions, but they can deliver quick responses to commonly asked queries and reduce the risk of lost opportunities.
  • Provide alternative forms of communication: if your customer can’t reach you on live chat, make sure that there are other options available, like a phone number and email address or a form where your customer can automatically submit a ticket. 

6. Total Number of Chats and Tickets

Keeping track of the total number of tickets your customers submit, alongside the number of chats your employees engage in, will give you helpful information. First, the total number of conversations shows how many customers are taking advantage of your live chat function on the website. 

You’ll also be able to compare your total number of chats to the number of resolved problems you deal with for your customers. For example, comparing your total number of chats to an unlimited number of tickets shows you how many customers have been left to rely on other sources of communication. You can also see how good your employees are at following up with tickets issued by customers. 

When you’re analyzing your number of tickets and chat sessions, you might notice that many of the queries you dealt with were connected to specific questions or topics. If that’s the case, you might be able to create a new FAQ page for your customers or provide your chatbot with extra information that it can use. 

If you’re getting more support tickets through alternative means than live chat, it might be time to ask yourself what’s wrong with your live chat performance and why your customers choose not to use it. 

Improving Live Chat CX for Your Business

Live chat can be a powerful tool for improving customer experience and an excellent way to strengthen your relationship with existing and potential clients.

Step into the shoes of your customer and discover what it feels like to walk through the whole live chat experience, from the moment that you send a request to the live chat team to the moment when you close down the chat with a solution to your problem. Other quick tips include:

  • Getting the software right: Make sure your live chat app is easy for your end customers and your employees. The chat app you use should be convenient and suit your brand. It also needs to collect information effectively without causing problems like GDPR and regulations. Get a developer involved if you think you have a problem with your chat functionality. 
  • Guide your team: Remember that your team needs to know how to use the live chat tools available effectively if they’re going to deliver the best results to your customers. Make sure you give your employees scripts to deal with problems if needed. In addition, chatbots that can quickly grab information from integrated CRM tools and other solutions could make your agents’ lives much more manageable. 
  • Pay attention to feedback: Ask your customers for feedback on their live chat experiences whenever you can. Ensure you pay attention to what they say they like and dislike about the encounter. If you can listen to your customer’s opinions, they’ll give you a lot of helpful information to work with when you’re enhancing and optimizing your live chat strategy. In addition, listening to your audience shows that you have their best interests at heart.

Remember, as well as customer feedback; you might be able to ask your employees for their insights into how you can improve live chat performance too. Employees also work with these tools regularly, so they know which features are more problematic than others. 

Measuring and Improving Live Chat

Live chat functionality isn’t something that you implement into your website and forget about. Instead, like any form of customer service or engagement tool, your live chat solution should be something you test regularly and constantly update to suit your customers’ needs. 

Knowing which metrics to measure when examining live chat functionality and performance will boost the experience you can give your audience and even open the door for better relationships with clients in the long term.

Source

The post How to Measure Live Chat Performance first appeared on Webdesigner Depot.

Source de l’article sur Webdesignerdepot

Original release date: August 11, 2022

Summary

Actions to take today to mitigate cyber threats from ransomware:

• Prioritize remediating known exploited vulnerabilities.
• Train users to recognize and report phishing attempts.
• Enable and enforce multifactor authentication.

Note: this joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint CSA to disseminate known Zeppelin ransomware IOCs and TTPs associated with ransomware variants identified through FBI investigations as recently as 21 June 2022.

The FBI and CISA encourage organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of ransomware incidents.

Download the PDF version of this report: pdf, 999 kb

Download the YARA signature for Zeppelin: YARA Signature, .yar 125 kb

Download the IOCs: .stix 113 kb

Technical Details

Note: this advisory uses the MITRE ATT&CK® for Enterprise framework, version 11. See MITRE ATT&CK for Enterprise for all referenced tactics and techniques.

Zeppelin ransomware is a derivative of the Delphi-based Vega malware family and functions as a Ransomware as a Service (RaaS). From 2019 through at least June 2022, actors have used this malware to target a wide range of businesses and critical infrastructure organizations, including defense contractors, educational institutions, manufacturers, technology companies, and especially organizations in the healthcare and medical industries. Zeppelin actors have been known to request ransom payments in Bitcoin, with initial amounts ranging from several thousand dollars to over a million dollars.

Zeppelin actors gain access to victim networks via RDP exploitation [T1133], exploiting SonicWall firewall vulnerabilities [T1190], and phishing campaigns [T1566]. Prior to deploying Zeppelin ransomware, actors spend one to two weeks mapping or enumerating the victim network to identify data enclaves, including cloud storage and network backups [TA0007]. Zeppelin actors can deploy Zeppelin ransomware as a .dll or .exe file or contained within a PowerShell loader. [1

Prior to encryption, Zeppelin actors exfiltrate [TA0010] sensitive company data files to sell or publish in the event the victim refuses to pay the ransom. Once the ransomware is executed, a randomized nine-digit hexadecimal number is appended to each encrypted file as a file extension, e.g., file.txt.txt.C59-E0C-929 [T1486]. A note file with a ransom note is left on compromised systems, frequently on the desktop (see figure 1 below).

 

"Figure 1: This is an illustration of a note file with a ransom note is left on compromised systems, frequently on the desktop."

 

The FBI has observed instances where Zeppelin actors executed their malware multiple times within a victim’s network, resulting in the creation of different IDs or file extensions, for each instance of an attack; this results in the victim needing several unique decryption keys.

 

Indicators of Compromise (IOC)

See table 1 below for IOCs as of June 2022 obtained from FBI incident response investigations.

MD5

SHA1

 SHA256

981526650af8d6f8f20177a26abb513a

4fee2cb5c98abbe556e9c7ccfebe9df4f8cde53f

001938ed01bfde6b100927ff8199c65d1bff30381b80b846f2e3fe5a0d2df21d

c25d45e9bbfea29cb6d9ee0d9bf2864d

eaeff8d315cca71e997063a2baec5cc73fad9453

a42185d506e08160cb96c81801fbe173fb071f4a2f284830580541e057f4423b

183b6b0c90c1e0276a2015752344a4cf

1cb5e8132302b420af9b1e5f333c507d8b2a2441

aa7e2d63fc991990958dfb795a0aed254149f185f403231eaebe35147f4b5ebe

9349e1cc3de7c7f6893a21bd6c3c4a6b

db398e38ee6221df7e4aa49d8f96799cca4d87e1

a2a9385cbbcfacc2d541f5bd92c38b0376b15002901b2fd1cc62859e161a8037

c8f75487d0d496a3746e6c81a5ecc6dc

4b91a91a98a2f0128c80f8ceeef0f5d293adf0cd

54d567812eca7fc5f2ff566e7fb8a93618b6d2357ce71776238e0b94d55172b1

477eedb422041385e59a4fff72cb97c1

9892cc90e6712d3548e45f34f14f362bccedf0be

fb59f163a2372d09cd0fc75341d3972fdd3087d2d507961303656b1d791b17c6

5841ef35aaff08bb03d25e5afe3856a2

ffd228b0d7afe7cab4e9734f7093e7ba01c5a06e

1e3c5a0aa079f8dfcc49cdca82891ab78d016a919d9810120b79c5deb332f388

d6c4b253ab1d169cf312fec12cc9a28f

0f47c279fea1423c7a0e7bc967d9ff3fae7a0de8

347f14497df4df73bc414f4e852c5490b12db991a4b3811712bac7476a3f1bc9

fba7180ad49d6a7f3c60c890e2784704

f561f9e3c949fe87f12dbfa166ffb2eb85712419

7d8c4c742689c097ac861fcbf7734709fd7dcab1f7ef2ceffb4b0b7dec109f55

bc6c991941d9afbd522fa0a2a248a97a

a243ce234fc8294e2e2e526418b4eaadc2d6c84f

37c320983ae4c1fd0897736a53e5b0481edb1d1d91b366f047aa024b0fc0a86e

f3490951ae51922cb360a3d76a670159

e2cb60be111716e32db7ca2365ad6e73c30f0e21

894b03ed203cfa712a28ec472efec0ca9a55d6058115970fe7d1697a3ddb0072

e4f1f05c2e6c3fc2f3336a8c8799ffb4

dbd9fcf2b05e703d34181c46f4c22392b9fcc1da

307877881957a297e41d75c84e9a965f1cd07ac9d026314dcaff55c4da23d03e

aa2048271f0aef3383480ce4a7c93b52

512b16ea74027fa4d0055831de5e51278812c8de

bafd3434f3ba5bb9685e239762281d4c7504de7e0cfd9d6394e4a85b4882ff5d

f66b738e1bfe1f8aab510abed850c424

571f50fee0acad1da39fe06c75116461800cc719

faa79c796c27b11c4f007023e50509662eac4bca99a71b26a9122c260abfb3c6

bb30f050546f5d6e61fafc59eaf097c3

ee44179f64918f72a8d2e88a5074d89efab3d81b

e48cf17caffc40815efb907e522475722f059990afc19ac516592231a783e878

78621f1e196497d440afb57f4609fcf9

eed7c3bb3fc5181b88abeed2204997f350324022

4a4be110d587421ad50d2b1a38b108fa05f314631066a2e96a1c85cc05814080

f4e0ee0200de397691748a2cdcd7e34a

bd3f6b878284a63c72e8354e877e3f48d6fca53c

9ef90ec912543cc24e18e73299296f14cb2c931a5d633d4c097efa372ae59846

cf5a358a22326f09fd55983bb812b7d8

1addcffae4fd4211ea24202783c2ffad6771aa34

dd89d939c941a53d6188232288a3bd73ba9baf0b4ca6bf6ccca697d9ee42533f

7afe492a38ca6f27e24028aab68406b5

5870a3adbce9737319f3c9461586d5f2afbc7adb

79d6e498e7789aaccd8caa610e8c15836267c6a668c322111708cf80bc38286c

1da1c0115caca5ebf064380eb7490041

5edb8b651c7013ebaba2eb81c87df76a1e0724d6

b22b3625bcce7b010c0ee621434878c5f8d7691c2a101ae248dd221a70668ac0

8c3c663ffcf363d087f4e114a79945ca

905726d178962dd1d7fe87504d051aca440740b8

961fbc7641f04f9fed8391c387f01d64435dda6af1164be58c4cb808b08cc910

17c5cae3bce5832dd42986fe612517d9

6f70e73c53d7622d8c4808ae7849133df1343484

d618c1ccd24d29e911cd3e899a4df2625155297e80f4c5c1354bc2e79f70768c

bfe7f54f1f0640936dd7a3384608b1f6

9436ccee41c01ca3cb4db55c10884615aba76d19

8170612574f914eec9e66902767b834432a75b1d6ae510f77546af2a291a48a2

f28af04ef0370addfebfdd31f1ec25ed

cfcfa995c15d9f33de21d0dd88d3b95d0f91d6bc

5326f52bd9a7a52759fe2fde3407dc28e8c2caa33abf1c09c47b192a1c004c12

f3bcad5358f89df1eb0294ef53f54437

eb036759beb28f86ee981bdca4fad24152b82d8c

6bafc7e2c7edc2167db187f50106e57b49d4a0e1b9269f1d8a40f824f2ccb42b

b1f6370582fbaf5c51e826fecef53cd7

4b2d0127699f708a8116bff8f25c9d6140033197

f7af51f1b2b98b482885b702508bd65d310108a506e6d8cef3986e69f972c67d

de785ed922d4e737dc0fa0bb30a4de8b

4d280105e724db851f03de8fc76409ef4057ff2c

bc214c74bdf6f6781f0de994750ba3c50c0e10d9db3483183bd47f5cef154509

7a296f7c1ac4aeee18d4c23476735be7

c13542310f7a4e50a78247fc7334096ca09c5d7f

ed1548744db512a5502474116828f75737aec8bb11133d5e4ad44be16aa3666b

37f18b38e1af6533d93bbb3f2ddb86dc

d3929331d9bc278dea5607aec1574012a08de861

cf9b6dda84cbf2dbfc6edd7a740f50bddc128842565c590d8126e5d93c024ff2

291de974e5cbe5e3d47e3d17487e027f

def93f18aaf146fe8f3c4f9a257364f181197608

21807d9fcaa91a0945e80d92778760e7856268883d36139a1ad29ab91f9d983d

99d59c862a082b207a868e409ce2d97c

908a9026d61717b5fa29959478a9bd939da9206f

0d22d3d637930e7c26a0f16513ec438243a8a01ea9c9d856acbcda61fcb7b499

d27125d534e398f1873b7f4835a79f09

1862f063c30cd02cfea6070d3dba41ac5eee2a35

6fbfc8319ed7996761b613c18c8cb6b92a1eaed1555dae6c6b8e2594ac5fa2b9

4534f2afe5f7df1d998f37ad4e35afeb

e2cc94e471509f9fa58620b8bb56d77f2cfe74b0

e8596675fef4ad8378e4220c22f4358fdb4a20531b59d7df5382c421867520a9

7ab0676262c681b8ec15bdada17d7476

2f1803d444891abb604864d476a8feac0d614f77

353e59e96cbf6ea6c16d06da5579d3815aaaeeefacabd7b35ba31f7b17207c5b

d7d3d23a5e796be844af443bda5cd67e

a9771c591f6ccc2f3419d571c64ab93228785771

85f9bf4d07bc2ac1891e367f077dd513d6ca07705bffd1b648d32a7b2dc396f5

0a1cd4efda7543cec406a6822418daf6

af4f8d889d6a2049e7a379ea197f8cd361feb074

614cb70659ef5bb2f641f09785adc4ab5873e0564a5303252d3c141a899253b2

23eda650479fc4908d0ddff713508025

b1e6527c10f68586f7f1a279ed439d46c3f12a06

fb3e0f1e6f53ffe680d66d2143f06eb6363897d374dc5dc63eb2f28188b8ad83

6607d8c1a28d7538e2a6565cf40d1260

f618879c011cde344066072949f025827feea663

594df9c402abfdc3c838d871c3395ac047f256b2ac2fd6ff66b371252978348d

caa7a669da39ffd8a3a4f3419018b363

44538b7f8f065e3cef0049089a8522a76a7fccc6

2dffe3ba5c70af51ddf0ff5a322eba0746f3bf3ae0751beb3dc0059ed3faaf3d

48b844494a746ca96c7b96d6bd90f45f

7bf83b98f798f3a8f4ce85b6d29554a435e516e3

45fba1ef399f41227ae4d14228253237b5eb464f56cab92c91a6a964dc790622

9c13ab7b79aec8dc02869999773cd4b2

4b4d865132329e0dd1d129e85fc4fa9ad0c1d206

774ef04333c3fb2a6a4407654e28c2900c62bd202ad6e5909336eb9bc180d279

450e5bf4b42691924d09267ac1a570cb

665a563157f4aa0033a15c88f55ac4fa28397b49

677035259ba8342f1a624fd09168c42017bdca9ebc0b39bf6c37852899331460

51104215a618a5f56ad9c884d6832f79

801580a46f9759ceeeebbce419d879e2ed6943fe

26ec12b63c0e4e60d839aea592c4b5dcff853589b53626e1dbf8c656f4ee6c64

73627cbe2ba139e2ec26889a4e8d6284

1116dc35993fce8118e1e5421000a70b6777433f

37efe10b04090995e2f3d9f932c3653b27a65fc76811fa583934a725d41a6b08

935f54b6609c5339001579e96dc34244

a809327d39fab61bfcfac0c97b1d4b3bfb9a2cfe

a5847867730e7849117c31cdae8bb0a25004635d49f366fbfaebce034d865d7d

ba681db97f283c2e784d9bb4969b1f5a

5d28acf52f399793e82ec7e79da47d372d9175d7

e61edbddf9aed8a52e9be1165a0440f1b6e9943ae634148df0d0517a0cf2db13

c1ab7b68262b5ab31c45327e7138fd25

b8c74327831e460d2b2a8eb7e68ee68938779d8d

746f0c02c832b079aec221c04d2a4eb790287f6d10d39b95595a7df4086f457f

f818938b987236cdd41195796b4c1fb5

bfed40f050175935277c802cbbbce132f44c06ec

b191a004b6d8a706aba82a2d1052bcb7bed0c286a0a6e4e0c4723f073af52e7c

0a1cd4efda7543cec406a6822418daf6

af4f8d889d6a2049e7a379ea197f8cd361feb074

614cb70659ef5bb2f641f09785adc4ab5873e0564a5303252d3c141a899253b2

d7d3d23a5e796be844af443bda5cd67e

a9771c591f6ccc2f3419d571c64ab93228785771

85f9bf4d07bc2ac1891e367f077dd513d6ca07705bffd1b648d32a7b2dc396f5

7ab0676262c681b8ec15bdada17d7476

2f1803d444891abb604864d476a8feac0d614f77

353e59e96cbf6ea6c16d06da5579d3815aaaeeefacabd7b35ba31f7b17207c5b

4534f2afe5f7df1d998f37ad4e35afeb

e2cc94e471509f9fa58620b8bb56d77f2cfe74b0

e8596675fef4ad8378e4220c22f4358fdb4a20531b59d7df5382c421867520a9

d27125d534e398f1873b7f4835a79f09

1862f063c30cd02cfea6070d3dba41ac5eee2a35

6fbfc8319ed7996761b613c18c8cb6b92a1eaed1555dae6c6b8e2594ac5fa2b9

99d59c862a082b207a868e409ce2d97c

908a9026d61717b5fa29959478a9bd939da9206f

0d22d3d637930e7c26a0f16513ec438243a8a01ea9c9d856acbcda61fcb7b499

 

MITRE ATT&CK TECHNIQUES

 Zeppelin actors use the ATT&CK techniques listed in Table 2.

Table 2: Zeppelin Actors Att&ck Techniques for Enterprise

Initial Access

Technique Title

ID

Use

Exploit External Remote Services

T1133

Zeppelin actors exploit RDP to gain access to victim networks.

Exploit

Public-Facing Application

T1190

Zeppelin actors exploit vulnerabilities in internet-facing systems to gain access to systems

Phishing

T1566

Zeppelin actors have used phishing and spear phishing to gain access to victims’ networks.

Execution

Technique Title

ID

Use

Malicious Link

T1204.001

Zeppelin actors trick users to click a malicious link to execute malicious macros.

Malicious File Attachment

T1204.002

Zeppelin actors trick users to click a malicious attachment disguised as advertisements to execute malicious macros.

Persistence

Technique Title

ID

Use

Modify System Process

T1543.003

Zeppelin actors encrypt Windows Operating functions to preserve compromised system functions.

Impact

Technique Title

ID

Use

Data Encrypted for Impact

T1486

Zeppelin actors have encrypted data on target systems or on large numbers of systems in a network to interrupt availability to system and network resources.

 

DETECTION

Download the YARA signature for Zeppelin: YARA Signature, .yar 125 kb

Mitigations

The FBI and CISA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques and to reduce the risk of compromise by Zeppelin ransomware:

  • Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (i.e., hard drive, storage device, the cloud).
  • Require all accounts with password logins (e.g., service account, admin accounts, and domain admin accounts) to comply with National Institute for Standards and Technology (NIST) standards for developing and managing password policies.
    • Use longer passwords consisting of at least 8 characters and no more than 64 characters in length;
    • Store passwords in hashed format using industry-recognized password managers;
    • Add password user “salts” to shared login credentials;
    • Avoid reusing passwords;
    • Implement multiple failed login attempt account lockouts;
    • Disable password “hints”;
    • Refrain from requiring password changes more frequently than once per year. Note: NIST guidance suggests favoring longer passwords instead of requiring regular and frequent password resets. Frequent password resets are more likely to result in users developing password “patterns” cyber criminals can easily decipher.
    • Require administrator credentials to install software.
  • Require multifactor authentication for all services to the extent possible, particularly for webmail, virtual private networks, and accounts that access critical systems. 
  • Keep all operating systems, software, and firmware up to date. Timely patching is one of the most efficient and cost-effective steps an organization can take to minimize its exposure to cybersecurity threats. Prioritize patching SonicWall firewall vulnerabilities and known exploited vulnerabilities in internet-facing systems. Note: SonicWall maintains a vulnerability list that includes Advisory ID, CVE, and mitigation. Their list can be found at psirt.global.sonicwall.com/vuln-list
  • Segment networks to prevent the spread of ransomware. Network segmentation can help prevent the spread of ransomware by controlling traffic flows between—and access to—various subnetworks and by restricting adversary lateral movement. 
  • Identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware with a networking monitoring tool. To aid in detecting the ransomware, implement a tool that logs and reports all network traffic, including lateral movement activity on a network. Endpoint detection and response (EDR) tools are particularly useful for detecting lateral connections as they have insight into common and uncommon network connections for each host. 
  • Install, regularly update, and enable real time detection for antivirus software on all hosts.
  • Review domain controllers, servers, workstations, and active directories for new and/or unrecognized accounts.
  • Audit user accounts with administrative privileges and configure access controls according to the principle of least privilege. 
  • Disable unused ports.
  • Consider adding an email banner to emails received from outside your organization.
  • Disable hyperlinks in received emails.
  • Implement time-based access for accounts set at the admin level and higher. For example, the Just-in-Time (JIT) access method provisions privileged access when needed and can support enforcement of the principle of least privilege (as well as the Zero Trust model). This is a process where a network-wide policy is set in place to automatically disable admin accounts at the Active Directory level when the account is not in direct need. Individual users may submit their requests through an automated process that grants them access to a specified system for a set timeframe when they need to support the completion of a certain task. 
  • Disable command-line and scripting activities and permissions. Privilege escalation and lateral movement often depend on software utilities running from the command line. If threat actors are not able to run these tools, they will have difficulty escalating privileges and/or moving laterally. 
  • Maintain offline backups of data, and regularly maintain backup and restoration.  By instituting this practice, the organization ensures they will not be severely interrupted, and/or only have irretrievable data. 
  • Ensure all backup data is encrypted, immutable (i.e., cannot be altered or deleted), and covers the entire organization’s data infrastructure.

RESOURCES

REPORTING

The FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with Zeppelin actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file. The FBI and CISA do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, the FBI and CISA urge you to promptly report ransomware incidents to a local FBI Field Office, CISA at us-cert.cisa.gov/report, or the U.S. Secret Service (USSS) at a USSS Field Office.

DISCLAIMER

The information in this report is being provided “as is” for informational purposes only. CISA and the FBI do not endorse any commercial product or service, including any subjects of analysis. Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA or the FBI.

References

Revisions

  • August 11, 2022: Initial Version

This product is provided subject to this Notification and this Privacy & Use policy.

Source de l’article sur us-cert.gov

In this post, we will learn to scrape Google organic search results using Node JS.

Requirements

Before we start, we will install these packages, which we will use further in the tutorial:

Source de l’article sur DZONE

Web2 software engineers have benefitted from design standards, mature programming languages, and vulnerability tools to minimize the risks of an attack. Failure to do so can result in a situation similar to my “Equifax Attack: Only a Matter of Time” publication back in 2017.

Those working in Web3 projects find themselves at an exciting stage. Initiatives like bounties and Decentralized Autonomous Organizations (DAOs) drive new opportunities for these pioneers to explore. Unfortunately, the Web3 landscape is not as mature or defined as earlier phases in the web frontier. Compounding the situation is the risk those challenges impose in a decentralized environment — where exploitation can result in losing a large volume of assets, as well as the time it takes to secure an auditing service for smart contract code and the duration of the audit itself

Source de l’article sur DZONE

Hello!

Omar from LightningChart here. As my first article for DZone, I wanted to experiment with how to create different charts available from the lcjs library.

Source de l’article sur DZONE

There’s nothing like a new font or two to breathe new life into your designs. And so, every month, we put together this collection of the fonts that have caught our eye in the past few weeks.

This month we’ve got traditional slab-serifs, some original scripts, a couple of workhorses, and plenty of characterful display faces. Enjoy!

Canora

There are plenty of calligraphic typefaces available, but Canora is a little different. Alongside Canora Frente, which leans to the right, Canora Verso leans to the left for an original look.

Fisterra

Fisterra is an informal serif in two styles. Morte emphasizes the pair’s curves, and Fora accentuates the sharp lines; both share the same elegant skeleton.

King of August

King of August is a single-weight script that’s packed with energy. The extra cut beneath the stroke on characters like the lowercase s and p add a delightful wet-paint feel.

Lithops

This poster-worthy font is Lithops. The pattern forming the letter shapes is reminiscent of seaweed, fine jewelry, and acid flashbacks. Just don’t try setting body text in it.

Sangbleu

Sangbleu is a super-family of typefaces with five complementary voices: Empire, Kingdom, Republic, Versailles, and Sunrise. It’s ideal for demanding editorial work.

Kohinoor One

Kohinoor One claims to be the thinnest font ever produced, with strokes just one unit thick. It’s perfect for those occasions when you need light typographic color at extra large sizes.

Firelli

Firelli is a warm, contemporary slab serif with a range of weights from thin up to a chunky, retro-feeling Black. It works amazingly for both headlines and body text.

UCity

Ideal for signage, branding, and headline text, UCity Pro is a geometric sans-serif with ten styles and a variable font version.

Artex

Artex is an excellent sans-serif with simplified forms that work best when embracing its vast number of styles and weights. It’s also available as a variable font.

Colroy

Colroy is an excellent early-style slab-serif that is superb for setting large runs of text. It was begun in 2009, released in 2014, and has just been re-released with new weights and a variable font.

Fabbrica

Fabbrica is a solid, functional sans-serif that performs exceptionally well at small sizes, including on screen. It has rounded and sharp variations and different weights.

Mule

As the name suggests, Mule is a flexible, hard-working serif with mixed lineage. Its round shapes are friendly and engaging, and its vertical rhythm makes it ideal for extended text passages.

Romano

Romano is a distinctly Roman font. Subtle flares and abrupt angles call to mind carved letterforms and the formal scripts of the renaissance.

Kosmos

Kosmos is an experimental typeface in which multiple horizontal shapes make up the letters. The finest weights are barely visible, and the thicker weights overlap the shapes to create cloud-like forms.

Precise Sans

Precise Sans is an excellent font for dashboards and other complex UI designs. It is clean and modern with simplified shapes. It’s currently in beta.

Source

The post 15 Best New Fonts, Aug 2022 first appeared on Webdesigner Depot.

Source de l’article sur Webdesignerdepot