Borough of Westwood falls victim to malware attack.
On June 25, 2019, the Borough of Westwood revealed in a notice that malware was injected into its systems by unknown hackers. Financial account information, Social Security numbers, and driver license numbers or state identification numbers were stored in the systems.
What happened?
On December 22, 2018, the Borough of Westwood detected some unusual activity in its network. Westwood immediately hired a third-party forensics provider to investigate the incident. It concluded that unauthorized hackers gained entry and installed malware in the systems. However, there was no evidence suggesting that the hackers managed to steal the stored information.
Neverthless, Westwood has taken steps to ensure that its network is protected from such attacks in the future with the help of the third-party cybersecurity provider it hired. The Borough of Westwood has reported the incident to the FBI, the New Jersey State Police, and the Bergen County Prosecutor’s Office. All affected individuals have also been advised to review their accounts for any suspicious activity.
Cyberthreats are everywhere, and it's important to be prepared. If you want to avoid cybersecurity disasters like this, investing in a comprehensive SIEM solution like Log360 is key. Download a 30-day, free trial to start combating internal and external security attacks.
How ManageEngine can help:
Log360, our comprehensive SIEM solution, can help your organization by:
- Alerting security teams in real time about events that require their immediate attention, such as network attacks, unauthorized file or folder access attempts, security group membership changes, and account lockouts.
- Detecting unauthorized network access attempts with its built-in Structured Threat Information eXpression (STIX/TAXII) feeds processor. Log360 accesses a global IP threat database that can instantly detect known malicious traffic passing through the network, and outbound connections to malicious domains and callback servers. Its global IP threat database contains more than 600 million blacklisted IP addresses collected from trusted open-source threat feeds and is updated daily.
- Uncovering potential insider threats with its user and entity behavior analytics (UEBA) engine that creates a baseline of normal activities specific to each user and notifies security personnel instantly when there's a deviation from this norm. Rather than using static threshold values, Log360 employs a combination of data analytics and machine learning to define dynamic thresholds based on real-world user behavior.
- Obtaining important forensic information about incidents. Collected logs can be securely archived to help prove adherence to compliance standards and reduce potential legal penalties during investigations.
- Automatically raising incidents as tickets to specific technicians in ServiceDesk Plus, JIRA, Zendesk, Kayako, or ServiceNow to create an incident resolution process that's swift and accountable.
Download a free trial of Log360 to see the tool in action for yourself.
Latest Ransomware attacks
Latest Data breach attacks
Latest Email Phishing attacks
Latest DoS and DDoS attacks
Latest Brute force attack
Latest Advanced persistent threat (APT)