Cyware Monthly Threat Intelligence
Monthly Threat Briefing • Mar 4, 2024
We use cookies to improve your experience. Do you accept?
Monthly Threat Briefing • Mar 4, 2024
In a move towards enhancing quantum computing security, the Linux Foundation revealed an initiative in collaboration with major global technology corporations. The past month marks a step forward in file-type detection tooling as Google open-sourced its AI-powered tool named Magika. Also, the Biden administration has decided to further bolster the nation’s infrastructure to respond to cybercriminal activities in the marine transportation system.
The Linux Foundation announced a new initiative called the Post-Quantum Cryptography Alliance, with industry partners like Google, IBM, Amazon Web Services, and Cisco. This initiative responds to the potential security threats posed by quantum computing, which could render current cryptographic practices insufficient.
In a coordinated effort labeled Operation Cronos, law enforcement agencies across multiple countries arrested two LockBit ransomware operators, seized over 200 crypto wallets, and created a decryption tool to aid victims. The operation resulted in the takedown of 34 servers worldwide. Additionally, almost 1,000 decryption keys were retrieved.
Google open-sourced Magika, an AI-powered tool for identifying file types to enhance digital security. Magika provides a 30% accuracy boost and up to 95% higher precision on VBA, JavaScript, and Powershell content. Google emphasizes the benefits of deploying AI at scale to strengthen digital security and shift the cybersecurity balance from attackers to defenders.
The Biden administration issued an executive order to strengthen cybersecurity at U.S. port facilities and invest over $20 billion in port infrastructure to bring back manufacturing capacity. The U.S. Coast Guard will have the authority to respond to cyber activity in the marine transportation system. Minimum standards for port cybersecurity are also to be established to address the growing concerns about the stability of the global supply chain.
Amidst a wave of cyber assaults, a prominent European retailer was targeted by an intricate and costly phishing scheme, resulting in significant financial losses. Similarly, loanDepo, UnitedHealth Group, Willis Lease Finance Corporation, Hyundai Motor Europe, Los Angeles International Airport, and others faced diverse attacks. On the De-Fi side, PlayDapp and FixedFloat suffered a combined loss exceeding $300 million.
Pepco Group's Hungarian business was hit by a sophisticated phishing attack, resulting in a loss of approximately €15.5 million (~ $16.8 million). While efforts to recover the funds are underway, the incident does not involve customer, supplier, or employee data. Experts suggest the attack resembles the BEC scam tactic. The group is thoroughly reviewing its systems and processes to bolster security.
The ALPHV/Blackcat ransomware gang claimed responsibility for recently breaching Fortune 500 companies Prudential Financial and loanDepot. loanDepot confirmed a data breach affecting 16.6 million individuals, while the impact on Prudential was still under assessment. ALPHV planned to sell loanDepot's stolen data and release Prudential's data for free.
The outage at UnitedHealth's technology unit was also attributed to the Blackcat ransomware gang. The breach, targeting Change Healthcare's IT systems, disrupted pharmacies nationwide. More than 90% of the nation's 70,000+ pharmacies adopted electronic claim processing to counteract the Change Healthcare cybersecurity issue.
The IntelBroker group compromised a Los Angeles International Airport, database, stealing the confidential data of private plane owners. The breach impacted 2.5 million records containing full names, CPA numbers, email addresses, company names, plane model numbers, and tail numbers. No customer or traveler data was affected. Criminals claimed they exploited a bug in the airport's CRM system.
Ireland's Department of Foreign Affairs (DFA) refuted claims of a cyber breach by the new extortion group Mogilevich that listed the DFA as a target for data sale. The group allegedly is in possession of 7GB of compromised documents but provided no evidence. DFA collaborated with Ireland's NCSC to investigate, finding no breach.
The notorious Akira ransomware group allegedly crippled the municipality of Bjuv in South Sweden, threatening to leak nearly 200GB of stolen data. The data trove included confidential documents and personal HR files. Despite the cyberattack claim, Bjuv Municipality's website remains operational, raising doubts about the authenticity of the threat.
SEIU Local 1000, a major California union, confirmed network disruptions following a cyber incident. The LockBit ransomware group purportedly stole 308GB of sensitive data, including SSNs and financial documents. Despite disruptions, the union asserts continued advocacy for workers' rights amidst ongoing operations, emphasizing resilience against coordinated attacks.
The DNSC announced that the Backmydata ransomware attack on the Hipocrate Information System impacted 26 hospitals across Romania. Another 74 hospitals connected to the system were cut off from the internet. The attackers demanded a 3.5 Bitcoin ransom and reportedly extracted confidential data, prompting hospitals to isolate impacted systems, save ransom notes, and investigate the point of entry.
Security researchers uncovered a significant campaign of repository confusion attacks on GitHub, impacting over 100,000 repositories and potentially millions more. Attackers clone popular repositories, inject them with malware, and upload them on GitHub with identical names. The attack campaign would target developers by tricking them into downloading and using these malicious repositories.
Cybercriminals utilized a stolen private key to mint and steal over $290 million in PLA tokens from the PlayDapp ecosystem, a blockchain-based platform facilitating NFT trading within games. Along similar lines, decentralized cryptocurrency exchange FixedFloat fell victim to a significant data breach resulting in the theft of approximately $26 million worth of BTC and ETH.
Nearly 33 million of France's population was impacted by a significant security breach at healthcare payment servicers Viamedis and Almerys. The breach, disclosed by CNIL, compromised data dates of birth, SSNs, and insurance details. Although banking and medical data remained untouched, the breach marks France's largest cybersecurity incident. Viamedis fell victim to a phishing attack targeting healthcare professionals, while Almerys' breach method remains undisclosed.
Willis Lease Finance Corporation disclosed a cybersecurity incident after Black Basta listed it as a victim on its leak site. While the extent of data compromise is still under assessment, attackers claimed to have stolen 910GB of company data. Black Basta also attacked Hyundai Motor Europe and, allegedly, stole 3TB of corporate data.
The Cactus ransomware group took responsibility for crippling Schneider Electric's network and stealing 1.5TB of data. As proof of its claims, the group leaked 25MB of stolen data on its dark web leak site, including snapshots of American citizens' passports and NDA document scans. The breach occurred on January 17th, targeting Schneider Electric's Sustainability Business division.
With the tax season around, several tax-themed lures have begun to sprout. One cybercrime group unveiled a new info-stealer named TimbreStealer, while the SubdoMailing ad fraud campaign targets unsuspecting victims with fake giveaways and surveys using popular domains and subdomains. Additionally, the Bumblebee malware has resurfaced with updated tactics.