Cyware Monthly Threat Intelligence

Monthly Threat Briefing • March 2, 2023
Monthly Threat Briefing • March 2, 2023
Counterterrorism and confronting new challenges in cyberspace is the only way forward. In the wake of the newest offensive cyber operations and national security threats against the U.S. and its allies, the DoJ has introduced the Disruptive Technology Strike Force. With increasing attempts to compromise IoT devices, NIST has picked Ascon as the new cryptography standard for small IoT devices. Get ready to witness post-quantum cryptography guidance in the first, much anticipated National Cybersecurity Strategy from the White House Office of the National Cyber Director.
The DoJ launched a new Disruptive Technology Strike Force to address several national security threats. The force will consist of top experts and will use intelligence and data analytics to tackle nation-state-sponsored cyberattacks, supply chain attacks, and abuse of sensitive data. The force is also assigned with the job of providing early warnings of threats to critical assets.
Singapore and the European Union (EU) signed a partnership agreement to drive collaboration across multiple digital platforms. These include digital payments, trusted data flows, 5G, artificial intelligence (AI), and digital identities. The agreement also mentions improving and maintaining cybersecurity standards across these platforms.
The NIST selected the Ascon algorithm developed at Graz University as a cryptography standard for lightweight IoT protection. The algorithm has been selected from 57 proposals submitted in 2019. The agency will publish the full standard later this year, which applies to miniature technologies, such as medical implants or keyless car openers.
The White House Office of the National Cyber Director confirmed it will include guidance on post-quantum cryptography in the upcoming National Cybersecurity Strategy to fortify digital networks. This will enable the government and private industries to better safeguard sensitive information, such as medical and personal data, against cyberattacks in the coming years.
With organizations striving to detect, track, and take down phishing and malware attack attempts, the DDoS landscape also continues to evolve. Last month, security analysts took the wraps off of a DDoSaaS activity dubbed Passion, which may have an inimitable connection with Russian hacking groups. Meanwhile, Vice Society, which also happens to have a Russian connection, claimed two victims in the education sector in the U.S. and the U.K. Besides, there were several data breach incidents this month.
Web hosting giant GoDaddy disclosed that it was a victim of a multi-year security breach that started in May 2020. The same attackers stole the source code for Managed WordPress (MWP) in November 2021 and, later in December 2022, infected the cPanel hosting server with malware.
Lehigh Valley Health Network revealed that it suffered an attack by the BlackCat ransomware group. The unauthorized activity was detected on February 6 and involved a computer system used for patient images for radiation oncology treatment. The investigation to understand the full scope of the attack is underway.
A new DDoS-as-a-Service (DDoSaaS) platform named Passion was seen being used in attacks targeting medical institutions in the U.S. and Europe. Although its origins are unknown, the operation has distinctive ties with Russian hacking groups, such as Killnet, Mirai, Venom, and Anonymous Russia.
The Vice Society ransomware group claimed to have stolen sensitive data from the Guildford County School, the gang posted several files containing sensitive information belonging to teachers and students. U.S-based Mount Saint Mary College also disclosed a ransomware attack incident that it suffered from the same group.
A novel phishing attack, dubbed Screentime, was observed deploying a first-stage malware payload that infected over 1,000 organizations in the U.S. and Germany. The campaign was first observed in October 2022 and has been attributed to a new threat actor TA866. The malware used in the campaign were WasabiSeed, Screenshotter, AHK Bot, and Rhadamanthys Stealer.
The Tallahassee Memorial HealthCare (TMH) hospital was forced to cancel all non-emergency surgeries and other medical procedures following a security incident that crippled its computer systems. The incident is believed to be yet another ransomware attack on the U.S. healthcare providers.
Berkeley County Schools, West Virginia, was forced to temporarily cancel its daily classes and activities following a cyberattack. Law enforcement agencies were notified about the attack and the institution worked constantly to restore the affected IT systems, internet, and phone services.
Unknown hackers stole internal data from the gaming giant Activision and published them on dark web forums. According to the firm, the hackers stole information, such as full names, email addresses, phone numbers, salaries, work addresses, and home addresses of employees.
Indigo Books & Music, the largest bookstore chain in Canada, was hit by a ransomware attack that forced the chain to shut down its website. The incident compromised the current and former employees' data, including their credit card numbers.
A hacking crew called SiegedSec targeted Atlassian by gaining access to a third-party contractor’s systems and stole the personal data of more than 13,000 employees, along with floor plans for two of Atlassian’s offices. The exposed data included names, email addresses, work departments, and other information of employees.
Cutout, a popular AI image editing tool, suffered a data breach that exposed user images, usernames, and email addresses. An unsecured Elasticsearch database belonging to the tool included 9GB of user data with 22 million log entries. It also had information on the number of user credits, a virtual in-game currency, and links to Amazon S3 buckets.
German airport websites were hit by DDoS attacks once again. The alleged attack took place a day after an IT failure that caused cancellations and delays for thousands of passengers traveling via the country’s flag carrier Lufthansa. The investigations are underway.
Given all the hype around ChatGPT, cybercriminals are not far from exploiting it for disruptive attacks. A case in point is cybercriminals abusing the platform through fake Windows desktop clients and bogus payment portals. Additionally, three ransomware groups, namely ESXiArgs, Royal Ransomware, and BlackBasta, were found crippling ESXi servers. Moving on, we have two BEC scammer groups baiting users in at least 13 languages, such as Norwegian, Polish, Portuguese, and Spanish.