Skip to main content

Alerts and Advisories

Good Practices to Protecting your Instagram account

12 Mar 2022

Instagram is one of the most popular social media used in Negara Brunei Darussalam, with almost half of the population is using it for communicating. Losing access to your account can be a nightmare scenario for users.

See more

Organisations are encouraged to urgently strengthen cyber security posture

1 Mar 2022

Cyber threats are expected to increase globally as a result of the current conflict in Europe. All organizations in Brunei Darussalam are advised to increase awareness and strengthen all critical systems to safeguard data against potential cyber-attacks, such as website defacement, distributed denial of service (DDoS), and ransomware attacks.

See more

Fake Windows 11 upgrade installs malware

11 Feb 2022

Hackers have created websites impersonating Microsoft, offering a fake Windows 11 upgrade. The fake websites look genuine, and are being promoted via forums and social media posts or instant messages.

See more

SysJoker Malware

13 Jan 2022

A multi-platform malware called SysJoker creates backdoors and gives the attacker the ability to run commands, as well as download and upload files. Written in C++, each variant is designed for the targeted operating system, and are all undetected on VirusTotal, an online malware scanning site that uses 57 different antivirus detection engines.

See more

Emergency fix for Exchange Y2K Bug

4 Jan 2022

Microsoft has released an emergency fix for a year 2022 bug that is breaking email delivery on on-premise Microsoft Exchange servers. Email is getting stuck in the queue, and these errors are caused by Microsoft Exchange checking the version of the FIP-FS antivirus scanning engine and attempting to store the date in a signed int32 variable.

See more

“Log4Shell” Log4j2 Vulnerability

13 Dec 2021

This vulnerability allows an attacker to execute code on a remote server; a so-called Remote Code Execution (RCE). Because of the widespread use of Java and log4j this is likely one of the most serious vulnerabilities on the Internet. The effect of the RCE can potentially be very large and there are complicating and mitigating factors involved.

See more

FluBot malware

6 Dec 2021

FluBot is a malware which is used to steal banking credentials, payment information, text messages and contacts from infected devices. After infecting an Android device, FluBot spreads by spamming text messages to contacts and instructing them to install malicious apps.

See more

Telephone Interview for Population and Housing Census (BPP) 2021

15 Nov 2021

BruCERT has received a number of reports from concerned members of the public regarding the legitimacy of phone calls from the Department of Economic Planning and Statistics (JPES).

See more

BIBD phishing COVID-19 relief fund

9 Nov 2021

BruCERT has received reports of a phishing email which claims to be from "BIBD Bank Darussalam Brunei" offering a COVID-19 relief fund to its customers.

See more

Brunei Postal Services Dept Phishing Scam

1 Nov 2021

BruCERT has received a report of a phishing scam involving Brunei Postal Services Department. An SMS message which appears to be from "Brunei Post" informs the recipient that their package has been relocated to a post office branch due to unpaid postage fees. The message includes a shortened link which will redirect the user to a fake website post-bn.com where they will be asked to enter their full name and credit card details.

See more

School Website Compromised with Trojan in Phishing Attack

23 Sep 2021

BruCERT has received a report of a phishing website which claims to be St Andrew's School Brunei. The link which appears as https://saintandrew.edu.bn/wp-content/plugins/wp-embed- uses a common WordPress vulnerability which has been tested and found that it is able to run malicious activities in the system background.

See more

Fake COVID-19 Relief Fund

18 Sep 2021

BruCERT has received reports of scam text messages shared via WhatsApp, offering a COVID-19 relief fund from the government. The message includes a malicious link which appears as http://bit.ly/COVID19_SUPPORT-FUND

See more