Cyware Monthly Threat Intelligence
Monthly Threat Briefing • Nov 1, 2023
We use cookies to improve your experience. Do you accept?
Monthly Threat Briefing • Nov 1, 2023
Nations are uniting in the face of growing cybersecurity threats, pooling their resources and expertise to tackle shared challenges. The U.S. and the UAE have inked an agreement to enhance cybersecurity collaboration with information sharing, training, and joint exercises. Meanwhile, Singapore and the U.S. teamed up to counter scams and unsolicited communications through regulatory enforcement and information exchange. On another front, the HHS Office for Civil Rights introduced resources to educate patients about telehealth privacy and security risks, fostering essential cyber hygiene practices.
The U.S. and the UAE signed a memorandum to work closely to improve the security of critical infrastructure in the financial sector. The MoU emphasizes increased information sharing about digital threats, more staff training, and conducting cross-border cybersecurity exercises. This new partnership is part of the U.S. Treasury Department’s continued effort to improve cybersecurity outcomes across the financial service sector.
Singapore's Infocomm Media Development Authority and the U.S. Federal Communications Commission (FCC) signed a memorandum to work together to combat online scams. As part of the effort, the two government agencies will be involved in exchanging information and working with other regulators to deal with scams originating from messages and calls.
The HHS Office of Civil Rights (OCR) unveiled two resource documents to educate patients about the privacy and security risks of their PHIs when using telehealth services. These resources offer tips on basic cybersecurity hygienes such as employing strong and unique passwords, enabling lock screen functions to protect stored health information, activating MFA on accounts, and avoiding public WiFi networks at public charging stations.
The Transportation Security Administration (TSA) announced updates to three security directives regulating passenger and freight railroad carriers in the continued effort to strengthen the industry’s defenses against cyberattacks. The revised directive required owners and operators to submit an annual Cybersecurity Assessment Plan to TSA, test two objectives in their Cybersecurity Incident Response Plan, and provide cybersecurity training to employees.
Last month was marked by a surge in ransomware attacks, creating significant disruptions. The PLAY ransomware group listed over a dozen victims in two weeks, sending threat waves across the world. The education sector continues to be a lucrative target with Stanford University and the University of Michigan disclosing potential cyberattacks affecting confidential records of hundreds of thousands of students. Two major ransomware groups, LockBit and BianLian, also crippled the networks of a pair of organizations in the airline sector.
The LockBit ransomware group added aerospace giant Boeing to its list of victims and claimed to have stolen a significant amount of sensitive data from the company. The group threatens to publish the data unless Boeing contacts it before the specified deadline. LockBit reportedly demanded an $80 million ransom, however, it claimed that the company only offered $1 million.
Stanford University was struck with a ransomware attack claimed by Akira that allegedly exfiltrated 430GB of data. The university stated that, to date, there is no evidence that the breach extended to other parts of the institution or affected emergency police response.
In an update to the August cyberattack, the University of Michigan informed that threat actors stole sensitive personal information belonging to around 230,000 students, applicants, employees, and others. They had access to the university’s systems from August 23–27, even after the campus network was disconnected from the internet.
French professional basketball team LDLC ASVEL confirmed a data breach after the NoEscape ransomware gang claimed to steal 32GB of data from the club. The stolen data included the personal information of players, passports, and ID cards, and many documents related to finance, taxation, and legal matters.
An unsecured 7TB database belonging to Indian diagnostic service provider Redcliffe Labs exposed over 12 million healthcare records. These included medical scans, test results, internal business documents, mobile application details, and patient information.
A threat actor, who goes by the name ‘Sheriff’, claimed to sell 1.2 million Airbnb user records on the dark web. The records included sensitive details such as users’ names, email addresses, countries of residence, and cities. Meanwhile, the firm has not confirmed the claim.
The DNA testing company 23andMe suffered the leak of its customers’ data on popular hacking forums. The database contains 20 million pieces of data, which also includes users’ personal information such as names, addresses, phone numbers, and dates of birth. Two weeks later, a threat actor going by the name ‘Golem’ leaked an additional 4.1 million genetic data profiles on a hacking forum.
The ALPHV ransomware group claimed attacks on QSI Inc., a prominent ITM and ATM solutions provider. It stole 5TB of data, including financial and work-related information, from the firm. Moreover, the attackers listed the names of 10 banks, associated with QSI Inc., which were impacted by the attack. Meanwhile, the firm did not confirm the cyberattack.
CERT-UA revealed that a threat group tracked as UAC-0165 targeted at least 11 telecommunication service providers in Ukraine between May and September. These attacks were launched via exposed RDP or SSH interfaces and used two specialized programs called POEMGATE and POSEIDON to steal credentials and gain remote control of the infected hosts.
Taiwanese manufacturer D-Link confirmed a data breach after a threat actor offered 1.2GB of stolen data for sale on the BreachForums platform. The threat actors allegedly stole three million lines of individual information and the source code for D-Link’s D-View network management software. Other data stolen included information for many Taiwanese government officials, as well as the CEOs and employees of the company.
The PLAY ransomware group added thirteen organizations to its list of victims in the gap of a week. The victims include Roof Management, Security Instrument Corp, Filtration Control Ltd, Cinépolis Cinemas, CHARMANT Group, Stavanger Municipality, Hughes Gill Cochrane Tinetti, Saltire Energy, Centek Industries, NachtExpress Austria, WCM Europe, Starr Finley, and a Missouri-based organization.
A report on the global state of ICS security by BitSight revealed that nearly 100,000 ICSes are exposed on the public internet, allowing attackers to probe them for vulnerabilities and launch attacks against organizations. These exposed systems belong to Fortune 1000 companies located across 96 countries and include sensors, actuators, switches, and building management systems, among others.
Misconfigured databases at B2B CRM provider Really Simply Systems exposed over three million records containing images, invoices, templates, and internal files of the firm. Among other documents, the database contained customers’ names, addresses, and CRM plan details.
The BianLian extortion group claimed responsibility for attacks on Air Canada by sharing screenshots of the stolen data on its leak site. The group added that it stole 210GB of data, which includes details about the company's technical and security challenges, SQL backups, personal information of employees, information of vendors and suppliers, confidential documents, and archives from company databases.
In the new threats category, Microsoft exposed Octo Tempest, a financially oriented threat actor, which utilizes advanced social engineering techniques to target companies using a variety of tools. Meanwhile, a new attack campaign was spotted which leverages fraudulent MSIX Windows app packages for deploying the GHOSTPULSE malware loader on Windows systems, emphasizing the importance of vigilant cybersecurity measures. In addition, Mirai botnet variants—hailBot, kiraiBot, and catDDoS—were observed targeting IoT devices.