Cyware Monthly Threat Intelligence
Monthly Threat Briefing • Dec 4, 2023
We use cookies to improve your experience. Do you accept?
Monthly Threat Briefing • Dec 4, 2023
Crafting robust cyber policies is pivotal against evolving threats. Over 18 countries, including the U.S. and the U.K, introduced a non-binding agreement outlining general guidelines for secure AI design and deployment. The U.S. Navy also unveiled its comprehensive cyber strategy, emphasizing seven key areas focusing on strengthening cyber posture, defending critical infrastructure, and collaborating with allies. Along similar lines, the Shields Ready campaign has been introduced by federal agencies. It aims to proactively build resilience and prepare for potential disruption of critical infrastructure entities.
The CISA released its first-ever Secure by Design alert to raise awareness of malicious cyber activities against web management interfaces. The document recommends organizations implement security best practices, eliminate classes of vulnerabilities arising from software design, and align their work to Secure by Design principles to prevent the exploitation of vulnerabilities in their web management interfaces. As part of the recommendations, software manufacturers should identify common patterns in design and configuration that lead to compromised systems
The U.S. Navy released its first cyber strategy as part of an effort to revamp the security posture across its services. Touted to be a more detailed version of the two-page Navy Cyberspace Superiority Vision, the strategy will focus on multiple areas. These include securing critical infrastructure and weapon systems, improving and supporting the cyber workforce, conducting cyber operations, and defending enterprise, IT, data, and networks against threats while bolstering collaboration and cooperation with allies and partners.
The DHS and the CISA released the first Roadmap to AI to ensure the secure development and implementation of AI capabilities across public and private organizations. As part of the effort, the roadmap outlines five strategies to help organizations build a resilient digital ecosystem while leveraging AI tools. These include using AI responsibly to support CISA’s mission, assessing and assuring AI systems, protecting critical infrastructure from malicious AI use, collaborating on key AI efforts, and expanding AI expertise in the workforce.
The DHS, along with the CISA and the FEMA, launched a new project named Shields Ready to bolster the security of critical infrastructure. This initiative, complementing Shields Up, addresses cyber threats, physical security risks, and natural disasters. It encourages organizations to enhance resilience by identifying critical assets, assessing risks, and improving incident response plans. The CISA provides resources, including cybersecurity guidance and operational resilience evaluations, to support preparedness efforts.
The FBI dismantled the IPStorm botnet proxy network and its infrastructure after the hacker behind the operation pleaded guilty. The botnet was taken down along with its 23,000 proxies from all over the world. The convict allegedly sold illegitimate access to the infected devices and made a profit of at least $550,000. In a similar move, the Ransomed.vc gang claimed to shut down its operations after six of its affiliate members were arrested.
Once again, the actions of cybercriminals unfolded in a realm devoid of ethical boundaries. Paying ransom didn’t turn out a great step for an American on-demand moving and furniture delivery service as adversaries still leaked the stolen data. The PLAY ransomware group extended its list of victims by adding 17 new organizations, with 14 located in the U.S. Separately, around two dozen energy firms in Denmark suffered a breach owing to zero-day vulnerabilities in Zyxel firewalls.
The infamous PLAY ransomware group extended its list of victims by adding 17 new names of companies based in the U.S., the U.K, the Netherlands, and Canada. Some of the impacted organizations were Single Point Outsourcing, Thillens, Elston Nationwide, American Insulated Glass, Moore Co., Continental Shipping Line, Sparex, Retailer Web Services, Byfod, SurvTech Solutions, EDGE Realty Partners, Noble Mountain Tree Farm, Unitransfer, SC Hydraulic Engineering, Labtopia, OLA Consulting Engineers, and Canderel Management.
Holding Slovenske Elektrarne, Slovenia's largest power generation company, experienced a ransomware attack that encrypted its files, however, did not disrupt power production. The attack reportedly occurred last Wednesday, with containment achieved by Friday. While no ransom demand has been received, unofficial information suggests the involvement of the Rhysida ransomware gang; the group is known for targeting high-profile organizations.
The Qilin ransomware group claimed responsibility for a recent cyberattack on Yanfeng Automotive Interiors, one of the world's largest automotive parts suppliers. The attack reportedly disrupted production at Stellantis' North American plants. The ransomware gang has threatened to release stolen data, including financial documents and internal reports, in the coming days. Yanfeng's website was inaccessible during the incident.
The LockBit ransomware group leaked over 43GB of data stolen from Boeing after the latter refused to pay the ransom. Most of the data listed on the leak site was backup data for various systems, the most recent of which dated back to October 22. The data included configuration backups, audit logs for IT management software, and logs for monitoring and auditing tools. Citrix backups were also listed in the leaked data.
Denmark’s CSIRT disclosed that Russian GRU exploited zero-day vulnerabilities in Zyxel firewalls to coordinate attacks on 22 energy companies in Denmark. The first wave of attacks was launched on May 11 and the second wave on May 22. The flaw in question was CVE-2023-28771 and affected Zyxel ZyWALL/USG series firmware versions 4.60 through 4.73.
Over 20GB of data stolen from Plume, a smart Wi-Fi service provider, was dumped by a threat actor on the BreachForums marketplace. The stolen database contains over 15 million lines of information, including email addresses, full names, and device details of users. A majority of the leaked email addresses were associated with the @plume.com and @plumewifi.com domains.
Dolly[.]com, an on-demand moving and delivery service provider, had its stolen data leaked despite making a partial ransom payment. The attackers posted the details on a Russian-language forum and included high-level account login details, credit card information, full names, email addresses, and home addresses of customers. Besides these, 95 AWS S3 bucket names belonging to the company, including backups, were attached to the post.
A Monero Project maintainer revealed that one of its wallets was hacked on September 01 to drain around $437,000 in Monero cryptocurrency. The funds were drained in nine separate transactions that took place in a couple of minutes. While the team is trying to determine the initial access vector of the attack, it claims that none of the project’s other wallets were affected.
A threat actor named USDoD leaked a scraped LinkedIn database, holding the personal information of over 35 million users. The data was dumped on the BreachForums cybercrime marketplace. The leaked data primarily includes full names, email addresses, and profile bios of users, with some screenshots showing that many of these email addresses belong to various government agencies worldwide.
Cook County Health, a healthcare provider in Chicago, notified that the personal information of around 1.2 million patients was compromised following an attack at its third-party vendor, Perry Johnson & Associates. The data includes names, birthdates, addresses, medical information, and dates and times of service of patients.
Auto parts giant AutoZone disclosed that the data of around 184,995 people was affected in the Cl0p MOVEit file transfer attacks that occurred earlier this year. It took the company three more months to determine what data the intruders had stolen from its systems. Furthermore, the listing on the Office of the Maine Attorney mentioned full names and Social Security numbers were among the breached data.
The LockBit ransomware group claimed responsibility for the attack on two Canadian government contractors, Brookfield Global Relocation Services (BGRS) and SIRVA Worldwide Relocation & Moving Services. The incident allegedly exposed 1.5TB of sensitive information of an undisclosed number of government employees. Data of current and former Government of Canada employees, Canadian Armed Forces members, and Royal Canadian Mounted Police personnel was compromised in the breach.
Cybersecurity experts took the wraps off of several new threats over the last month. They reported SugarGh0st, possibly a variant of Gh0st RAT, targeting users in Uzbekistan and South Korea. Furthermore, a highly advanced phishing campaign was spotted that reminisced of Qakbot tactics. Experts suggested that threat actors may have moved on to DarkGate and Pikabot malware, posing a similar level of risk to enterprises. Speaking of rebranding, Royal ransomware now identifies itself as BlackSuit, asserted the FBI. The newer version boasts strategic modifications.