Cyware Monthly Threat Intelligence

Monthly Threat Briefing • December 4, 2023
Monthly Threat Briefing • December 4, 2023
Crafting robust cyber policies is pivotal against evolving threats. Over 18 countries, including the U.S. and the U.K, introduced a non-binding agreement outlining general guidelines for secure AI design and deployment. The U.S. Navy also unveiled its comprehensive cyber strategy, emphasizing seven key areas focusing on strengthening cyber posture, defending critical infrastructure, and collaborating with allies. Along similar lines, the Shields Ready campaign has been introduced by federal agencies. It aims to proactively build resilience and prepare for potential disruption of critical infrastructure entities.
Once again, the actions of cybercriminals unfolded in a realm devoid of ethical boundaries. Paying ransom didn’t turn out a great step for an American on-demand moving and furniture delivery service as adversaries still leaked the stolen data. The PLAY ransomware group extended its list of victims by adding 17 new organizations, with 14 located in the U.S. Separately, around two dozen energy firms in Denmark suffered a breach owing to zero-day vulnerabilities in Zyxel firewalls.
Cybersecurity experts took the wraps off of several new threats over the last month. They reported SugarGh0st, possibly a variant of Gh0st RAT, targeting users in Uzbekistan and South Korea. Furthermore, a highly advanced phishing campaign was spotted that reminisced of Qakbot tactics. Experts suggested that threat actors may have moved on to DarkGate and Pikabot malware, posing a similar level of risk to enterprises. Speaking of rebranding, Royal ransomware now identifies itself as BlackSuit, asserted the FBI. The newer version boasts strategic modifications.