Logo
    • Hardware - Overview
      • Mobile Computing - Overview
      • Notebooks
      • Mobile Workstations
      • Mobile Thin Clients
      • Tablets
      • Smartphones & Mobile Phones
      • Wearables
      • Mobile Computing Warranties & Services
      • Mobile Computing Accessories
      • Mobile Computing Spare Parts
      • Communication & Conferencing - Overview
      • Conference Systems
      • VoIP Telephony
      • Headsets
      • Webcams
      • Communication Warranties & Services
      • Communication Accessories
      • IT Infrastructure - Overview
      • Servers
      • Storage
      • Uninterruptible Power Supply
      • Network
      • Security
      • Racks
      • IT Infrastructure Warranties & Services
      • IT Infrastructure Accessories
      • IT Infrastructure Spare Parts
      • Computing - Overview
      • PCs
      • Workstations
      • Thin Clients
      • All-in-One PCs
      • Point of Sale & Point of Information
      • Computing Warranties & Services
      • Computing Accessories
      • Computing Spare Parts
      • Peripherals - Overview
      • Monitors
      • Public Displays
      • TVs
      • Projectors
      • Input Devices
      • Audio, Photo & Video
      • Peripherals Warranties & Services
      • Peripherals Accessories
      • Printers & Scanners - Overview
      • Printers
      • Label Printers
      • Disc Duplicators
      • Scanners
      • Barcode Scanners
      • Mobile Data Collection
      • Consumables
      • Warranties & Services
      • Printer & Scanner Accessories
      • Printer Spare Parts
      • Components - Overview
      • SSDs & HDDs
      • Memory
      • Graphics Cards
      • Drives & Enclosures
      • Interfaces & Controllers
      • Storage Media
      • Power Supplies
      • Processors
      • Component Accessories
      • Connectivity - Overview
      • Network Connectivity
      • PC Connectivity
      • USB Connectivity
      • Power Connectivity
      • Phone Connectivity
      • Device Servers
      • Extenders & Splitters
      • Connectivity Accessories
      • Office Equipment - Overview
      • Organisation & Ergonomics
      • Smart Home
      • Cleaning Products
      • Safety, Security & Protection
      • Office Appliances
      • Mounting Solutions
      • Office Furniture
      • Batteries
      • Office Equipment Accessories
    • Software - Overview
      • Storage, Backup & Recovery - Overview
      • Backup, Recovery & Archiving
      • Security Software - Overview
      • Endpoint Security
      • E-mail Security
      • Security Suites
      • Mobile Security
      • Cloud Security
      • Gateway Security
      • Management & Training
      • Development Software - Overview
      • Project Management & Collaboration
      • Collaboration Software - Overview
      • Communication
      • Document Management
      • File Sharing
      • Office Applications - Overview
      • Office Software & Add-ons
      • Creative Design & Publishing
      • Infrastructure Software - Overview
      • Operating Systems
      • Monitoring & Reporting
      • Software Deployment & Maintenance
      • Print Management
      • Optimisation
      • Virtualisation - Overview
      • Desktop Virtualisation
      • Infrastructure & Management
    • IT solutions - Overview
      • Business Applications - Overview
      • Business Intelligence
      • PDM, CAD & CAM
      • Collaboration
      • Customer Relationship Management
      • Product Lifecycle Management
      • Enterprise Resource Planning
      • DMS & ECM
      • Artificial Intelligence
      • Microsoft security for your business
      • Data Centre - Overview
      • Multi Cloud
      • Software Defined Data Centre
      • Modular Data Centre Competence
      • Networking - Overview
      • Data Centre Networking
      • Enterprise Networking
      • Software-Defined Networking
      • Bechtle Networking Services
      • Cloud-based Networking
      • Modern Workplace - Overview
      • Communication and Collaboration
      • Workplace Security
      • Managed Workplace Services
      • IT Security - Overview
      • IT & Cyber Security
      • Data centre Security
      • Cloud Security
      • Application Security
      • Data protection in the company
      • Infrastructure & Perimeter Security
      • Workplace Security
      • Artificial intelligence - Overview
      • NVIDIA – The best performance for artificial intelligence
      • IBM Watson: The innovative AI-platform for enterprises.
      • Microsoft Azure AI and Graph API – AI-tools for developers
      • Artificial intelligence? Machine learning? Deep learning?
      • AI ready with Copilot for Microsoft 365
      • Bechtle Library - Overview
      • Bechtle Pillars
      • Trending Topics
      • Webinars
      • Case Studies
      • Packaged Solutions
      • Bechtle Blog UK
      • Bechtle Journeys
    • Clouds - Overview
    • Cloud consulting
      • Public & Business Cloud - Overview
      • Mobility Services
      • Infrastructure Services
      • Collaboration Services – for Effective Teamwork
      • Business Services – Intelligence and Automation
      • Private Clouds - Overview
      • Virtual Private Clouds
      • Off-Premise – Secure Cloud Solutions by Bechtle
    • Cloud implementation
      • Bechtle Journeys - Overview
      • Security
      • International
      • Hybrid Infrastructure
      • Efficient Procurrement
      • Managed Print
      • Modern Workplace
      • Bechtle Packaged Solutions
    • CSP
    • Bechtle Clouds
    • IT services - Overview
      • Managed Services - Overview
      • Maintenance and Repair
      • Service Desk
      • Financial Services - Overview
      • Financing
      • Structuring
      • Consultation
      • Professional Services - Overview
      • IT-Consulting
    • Training
      • E-Procurement - Overview
      • My Bechtle
      • ERP Connection
      • Digital business documents
      • Quotes
      • Framework agreements
      • Special conditions
      • Bechtle Journeys - Overview
      • Security
      • International
      • Hybrid Infrastructure
      • Efficient Procurrement
      • Managed Print
      • Modern Workplace
      • Bechtle Packaged Solutions
      • Agile Work
      • Software Asset Management
    • Public Sector - Overview
    • OCRE with Bechtle
    • News - Overview
    • Newsroom
      • Bechtle Blog UK - Overview
      • Expertise
      • Modern Workplace
      • Software Updates
      • Public Sector
      • Security
      • Networking
      • Hybrid Infrastructure
      • Sustainability
      • Our authors
    • Corporate News
    • Innovations
    • Bechtle introduces Sustainability Strategy 2030
    • Career - Overview
    • Jobs
    • Career Contact
    • About Bechtle - Overview
      • Company - Overview
      • Management
      • Locations
      • Bechtle Group Companies
      • Company Development
      • Vision 2030
      • Certifications
      • Investors - Overview
      • Bechtle Share
      • Publications
      • Financial Calendar
      • General Meeting
      • Corporate Governance
      • Investors Contact
      • Retail Investors
      • Software revenue according to IFRS 15
      • Sustainability/CSR - Overview
      • Bechtle UK Sustainability
      • Press - Overview
      • Press Releases
      • Downloadservice
      • Press Contact
      • International business with Bechtle - Overview
      • Global IT Alliance
      • Bechtle Events - Overview
      • Webinar Library
      • Case Studies - Overview
      • Wilkin Chapman
      • Bristol Port
      • GA Solicitors
      • Allies & Morrison LLP | Workstation Deployment
      • Gateshead College | Notebook Procurement
      • Docrafts | Installing Servers and Storage
      • A-Z Maps | Introducing a Hyper-Converged solution
      • Shrewsbury School | High Availability Clustering
      • LanesHealth | Service and Workflow Management
      • Nationwide Charity | Delivering Licence Compliance
      • T H White | Office 365
    • Partners
    • Contact
News
Bechtle Blog UK
Security
Security News: 1st February 2022

To see prices, log in or register an account.

Security News UK 02/2022
Security - Feb 1, 2022

Security News: 1st February 2022

by Alice Lee

Join us as we explore some of the biggest news stories in the world of IT security. Read below for a quick overview or click on the links for more information.

Inquiry into two cyber-attacks at Gloucester City Council

An investigation will take place into how a local authority was hit by cyber hackers twice in the past decade. Gloucester City Council became aware of its latest cyber-attack on 20th December, disrupting online revenue and benefits, planning and customer services. It could take months to fix affected servers and systems need to be rebuilt. The National Crime Agency and National Cyber Security are investigating, with insiders believing there could be links to hackers in the former Soviet Union. The software, known as sleeper malware, made its way into the local authority's system embedded in an email that had been sent to a Finance Sector Government Sector Government Sector Copyright© 2020 Exponential-e Ltd | 3 council officer. Services, including online applications forms used to claim housing benefit, test and trace support payments, discretionary housing payments and council tax support, have been delayed or are unavailable.

Solution:

  • Web protection
  • Consultancy Service
  • Awareness Training

find out more


Fantasy Premier League account hack surge prompts plans to introduce extra login checks for football fans

A spate of account takeover hacks has prompted the English Premier League to promise to introduce two factor authentication (2FA) controls to its official Fantasy Premier League game (FPL) from next season. FPL has more than eight million players, who sign up with a standard email address and password, although 2FA is not offered as an option. A wave of hacks this season has seen attackers seemingly targeting successful teams ranked in the top 100,000. The precise number of account takeover attempts is unclear, but simply searching for the term ‘hack’ on FantasyPL Reddit shows many people are claiming to have been affected, and the problem is far from isolated. In some cases, accounts have been deleted and many victims have struggled or failed to get back lost fantasy football league points. The FPL game is free to enter and the chances of winning a prize, such as a trip to see a football game or Premier League merchandise, is slim to none. Nonetheless, many FPL participants devote considerable time in researching and selecting their team over a period of months, in an effort to outscore and outrank their friends and colleagues in the many private leagues that are a feature of the game. The game has also spawned a vibrant community of YouTube channels, discussion, and (several subscription-based) team aid selection websites.

 

Solution:

  • Multi Factor Authentication (MFA)
  • Regularly update passwords and emails
  • Email Protection (Mimecast)

find out more


FBI issues QR code scam warning

The FBI’s Internet Crime Complaint Center (IC3) has issued an alert warning of the malicious use of QR codes. According to the public service announcement, cyber criminals have been tampering with QR codes to redirect users from legitimate websites to fraudulent ones where their data and money is at risk of being stolen. Businesses worldwide have turned increasingly towards using QR codes to continue offering their services, but this mechanism can be exploited and even used to embed malware onto a user’s device. The FBI has published advice to users. Anyone who thinks they have been a victim of cybercrime should report details to their bank and Action Fraud (for England, Wales and Northern Ireland) or Police Scotland (for Scotland).

 

Solution:

  • Multi Factor Authentication (MFA)
  • Antivirus, firewall and patching
  • Web protection

find out more


White Rabbit ransomware threat

A hard to detect form of ransomware, White Rabbit, has been reported on by researchers and linked back to a crime group known for targeting finance. White Rabbit was utilised in December 2021 in an attack against a US bank and researchers at Trend Micro believe the tactics have been seen before with the cybercriminal group, FIN8. The technique is discreet because its payload binary requires a specific command-line password before triggering the ransomware and encryption routine. This means it remains discreet until triggered. The file is also very small (100kb) and appears to show no activity making it harder to spot. Ransomware is a growing threat within cyber security. Criminals can use the attack to lock down files and systems before demanding payment for access, but there’s never a guarantee that paying the ransom will work.

 

Solution:

  • End-point Protection
  • Cyber Consultancy
  • Ransomware Protection

find out more


Want to know more about any of the updates listed above? Contact Alice for more information.
 

Alice Lee

Phone: +44 1249 467 938
E-mail: alice.lee@bechtle.com

Written by

Alice Lee
Alice Lee
Security Business Development Manager

E-Mail: alice.lee@bechtle.com

    This post was published on Feb 1, 2022.

     

    IT & Cyber Security ▷ Bechtle protects your company

    IT & Cyber Security: For an all-round protection package for every entrepreneur ➥ SIEM ✓ Machine Learning ✓ Forensic Tools ✓ Find out more now at Bechtle.

     

    Infrastructure & Perimeter Security ▷ Securing corporate infrastructure

    Infrastructure Security ➥ For network security and corporate infrastructure security ✓ IT Perimeter Security ✓ View Bechtle's services now

     

    Application Security ▷ Security Solutions from Bechtle

    Application Security ➠ Fully protect critical enterprise applications ✔ Web Application Firewalls ✔ Learn more!

     

    IT Security ▷ Protect your business against threats

    IT security: Arm yourself against modern threats with Bechtle's all-encompassing security offering ➥ Secure the enterprise ✓ Protect yourself today.

     

    Workplace Security ▷ Security solutions from Bechtle

    Companies are working more and more mobile, with employee smartphones and laptops. ➥ We show you how to master the Workplace Security challenge.

     

    Data protection in the company ▷ Securing data professionally

    Data protection in the company ➥ Protecting customer and employee data ✓ Benefiting from external data protection officers ✓ Mastering the GDPR ✓ Learn more

     

    Security for your data centre ▷ Perfectly protected with Bechtle

    Security for your data centre ➥ Protect customer and employee data ✓ Benefit from external data protection officers ✓ Master DSGVO ✓ Learn more

     

    Cyber Essentials (Plus) Enablement Service | A Bechtle packaged solution

    ✓ de-facto standard for Cyber Security benchmarking ✓ handled in accordance ✓ vulnerability scans

     

    Security with Bechtle

    The security of your business is critical and something that needs constant review to ensure changes, both internal and external, are not exposing you to undue risk. How does remote working impact your security boundaries? What new applications are being demanded by users? How are you demonstrating to the business that both external and internal threats are being reduced and planned for?

     

    Penetration Testing | A Bechtle Packaged Solution

    Bechtle’s Penetration Testing services give you the information you need to enhance your protection against ransomware and other cyber-attacks.

     

    Security | The Bechtle Journey

    Bechtle employs a number of tools and processes that can be used to measure systems utilisation, integration and footprint so that you can make the correct decision for each key system and where it is best fit for the future

    Customer story

    ClwydAlyn | Multi-Site Video Camera Surveillance

    Having worked with Bechtle on several projects previously, the IT Technical Manager at ClwydAlyn approached the Bechtle team to help streamline IT services by centralising the procurement and management of video security under the IT team.

     

    Cloud Security ▷ Secure with Bechtle in the Cloud

    Cloud Security ➥ Secure cloud computing in your company ✔ Bechtle's Security as a Service solutions for every risk ✔ See for yourself now

     

    Payment card industry | A Bechtle Packaged Solution

    The Payment Card Industry Data Security Standard (PCI DSS) is an established security standard that applies to any organisation involved in processing, transmitting, and storing debit/credit card information.

     

    Bechtle IT System House Freiburg

    Founded in 1984, the company joined Bechtle as an IT system house in 1999. It delivers IT solutions in client management, server & storage, networking solutions, virtualisation, IT security, software and other specialist services.

    Company

    Bechtle Locations

    Career

    Press

    Investor Relations

    Events

    Certifications

    Payment and Delivery

    Modern Slavery Act

    Help Centre

    Carbon Reduction Plan

     

    Newsletter

    Facebook Bechtle Facebook

    LinkedIn Bechtle LinkedIn

    Products are sold exclusively to commercial end customers and the public sector.

    Price shown in GBP excluding VAT.

    Legal Notice Privacy Policy T&Cs
    Support-ID: d01b692636
    © 2025 Bechtle AG

    Managed Services Terms  Professional Services Terms  Equality and Diversity Policy