Cyware Monthly Threat Intelligence
Monthly Threat Briefing • Feb 1, 2023
This website uses cookies and similar technologies to provide essential functionality and improve your experience. Some features, such as demo scheduling and chat support, require marketing cookies to function. By clicking "Accept All", you consent to all cookies. Alternatively, you can customize your preferences, but note that declining marketing cookies will limit certain website features.
Monthly Threat Briefing • Feb 1, 2023
When thinking about satellite operations and not paying attention to the cyber resilience of ground networks is like sending an open invitation to cyber threats. The final version of the cybersecurity framework concerning the ground segment of space operations was released by the NIST. Cyberattacks on K-12 schools have major implications for teaching and learning. To overcome these challenges, the CISA released a guide to help safeguard K 12 Schools from ever-rising attacks in the sector. That’s not it! The FBI raided and seized Hive’s Tor payment and data leak sites in a major crackdown.
The NIST published the final version of its cybersecurity framework for the ground segment of space operations. The framework is designed to help organizations in the space sector manage their cybersecurity risks by implementing security measures on satellites and other critical infrastructure.
President Joe Biden approved a set of new laws under the VA Cybersecurity Act of 2022 to boost cybersecurity across the Department of Veterans Affairs. As part of the new law, the department needs to conduct an independent audit of its IT systems and cybersecurity programs. This is intended to boost data security for veterans.
The CISA released a report and toolkit to bolster the cyber defense of K-12 schools and districts. The report is mandated by the K-12 Cybersecurity Act and includes three recommendations to help educational institutions build, operate, and maintain resilient cybersecurity programs.
Europol and Eurojust took action against a fake crypto scam that defrauded victims of at least $2.2 million through call centers. They would lure them to invest in fake cryptocurrency schemes. In another major catch, the FBI busted the network of the prolific Hive ransomware gang that raked in over $100 million in cryptocurrency payments.
Cybercriminals continue to up their game with new strategies and tactics to extort from a range of industries. Several top firms and brands, such as PayPal, Toyota, Nissan, Zacks Investment Research, and Solar Industries India, suffered critical breaches in the last month. Healthcare institutions also fell prey to hackers as in the case of the 550 GB data theft from Consulate Health Care. That was the work of Hive before the disruption. BayCare Clinic also exposed the PHI of over 100K individuals, however, that was in light of an online information tracking pixel installed on its partner’s website.
U.S. rail and locomotive company Wabtec Corporation confirmed being hit by the LockBit ransomware gang. The incident took place in June 2022 and impacted its operations in the U.S. Canada, U.K., and Brazil. It was further revealed that the ransomware was introduced onto certain systems as early as March 15, 2022.
The Hive ransomware group leaked 550 GB of data, including employee and customer PII, stolen from Consulate Health Care. The leaked samples include stolen contracts, agreement documents, and the company’s private info. This also included email addresses, phone numbers, credit card details, Social Security numbers, and medical records of employees.
Bay Bridge Administrators notified around 250,000 individuals of a September 2022 data breach. The compromised information includes names, addresses, birth dates, Social Security numbers, ID and driver’s license numbers, and medical and health insurance information.
PayPal disclosed that the login credentials of 35,000 US customers were accessed in an unauthorized manner in a credential-stuffing attack spree between December 6 and 8, 2022. While there has been evidence of unauthorized transactions, threat actors may have also accessed personal information such as names, social security numbers, addresses, and dates of birth of customers.
Toyota Motor Corporation revealed a data breach at Toyota Kirloskar Motor, a joint venture with Indian giant Kirloskar Group, that compromised the personal information of over 290,000 customers. The breach was reported after an access key was left exposed to the public on GitHub for over five years.
Costa Rica’s Ministry of Public Works and Transport (MOPT) suffered another ransomware attack just months after several ministries were crippled in a wide-ranging attack by Conti ransomware. Cybersecurity experts were called in to address the situation.
A data breach at a third-service provider resulted in the compromise of the personal information of roughly 18,000 Nissan customers in North America. The car manufacturer learned about the attack in June 2022. The compromised information includes birth dates and NMAC account numbers.
Nearly one million active and inactive Norton LifeLock accounts have been targeted in multiple credential-stuffing attacks. The attacks started on December 1, with a large number of failed login attempts observed on December 12, 2022. The company took several actions to secure the accounts.
Wisconsin-based BayCare Clinic revealed that the PHI of 134,000 patients was inadvertently disclosed to unauthorized third parties as a result of the use of tracking pixels by its partner, Advocate Aurora Health. Previously Advocate Aurora Health had disclosed that the personal and protected health information of up to three million patients was disclosed to third parties such as Google and Meta.
Zacks Investment Research (Zacks) suffered a data breach that exposed the personal information of 820,000 customers. The incident occurred between November 2021 and August 2022. Upon discovery, the firm took immediate action to implement additional security measures to protect its network.
The BlackCat ransomware group added Solar Industries India to its list of victims. The group claims to have stolen 2TB of data, including secret military data related to weapons production. Other stolen data includes personal information about the company’s employees, blueprints, and engineering documentation of weapons.
Confidential data from 14 U.K schools was leaked online by hackers. These include SEN information and passport scans of children, along with contract details and pay scales of staff members. The attacks and leaks were believed to be perpetrated by the Vice Society ransomware group.
Access to the websites of the Danish Central Bank and seven private banks in the country was briefly disrupted following a DDoS attack. Attackers redirected unwanted traffic to the targeted servers in a bid to knock them offline. Among the banks affected were Jyske Bank and Sydbank.
Cybercriminals are mindful of the fact that they won’t survive unless they innovate. The Gootloader malware received an update weeks after being spotted using SEO poisoning techniques against the Australian healthcare industry. Meanwhile, the cyber landscape witnessed a rise in new RAT deployment in the form of PoweRAT, SparkRAT, SpyNote, and others. Furthermore, some major car brands, including Toyota, Mercedes, and BMW may have exposed car owners’ personal info owing to a sensitive bug.