Cyware Monthly Threat Intelligence

Monthly Threat Briefing • July 1, 2022
Monthly Threat Briefing • July 1, 2022
In light of the growing occurrence of cyber incidents, 37 organizations across eight countries have formed a coalition to work on cyber resilience and combat cyber threats globally. To counter the data privacy issues around IoT devices, a research group has proposed a framework based on the principle of data minimization. In another story, the CISA announced the release of CMMC 2.0, a compliance program for businesses interested in working with the U.S. Department of Defense.
The Coalition to Reduce Cyber Risk (CR2) along with 37 tech leaders from across eight countries have signed a pledge to improve cybersecurity standards and incorporate them into policies and controls. The adoption of these standards among companies and government agencies is expected to mitigate cyber risks and facilitate economic growth.
The U.S. President signed two bipartisan bills—Federal Rotational Cyber Workforce Program Act and State and Local Government Cybersecurity Act—to strengthen the government’s cybersecurity posture across the local, state, and federal levels.
Researchers have designed a new privacy framework, dubbed Peekaboo, that can help address the data sharing concerns across IoT devices. The framework operates on the principle of data minimization, which refers to the practice of limiting the collection of data on a need basis.
The House appropriations subcommittee approved a budget of $2.9 billion for CISA in Homeland Security FY2023 Budget Print. The fund will be used to support the agency’s security, infrastructure security, emergency communications, integrated operations, and risk management.
The Cybersecurity Maturity Model Certification (CMMC) 2.0 is in the rule-making process and will be launched in 2023, revealed CISA officials. The model aims to bring a unified security standard among contractors linked to the U.S. Department of Defense (DoD). An official said that third-party assessment organizations will perform the assessments as an ongoing process rather than a point-in-time complaint.
Ransomware actors going bonkers! 50 victim organizations in a couple of months. The menace and mystery of Black Basta is beyond comprehension for many. Meanwhile, another ransomware group has been zeroing in on targets in Europe with a focus on state entities and educational institutes. Meanwhile, several large organizations, including AMD, OpenSea, and the Bank of the West, suffered leaks in the past month.
OpenSea confirmed experiencing a breach, owing to a security incident at its email delivery vendor, Customer[.]io. An employee downloaded email addresses belonging to OpenSea users and newsletter subscribers and shared them with an unauthorized third-party. Users have been warned against phishing attacks that may stem in the wake of the leak.
As per its own claims, extortion group RansomHouse penetrated the systems of processor manufacturer AMD to steal about 450GB of data. The group, however, said it did not breach the networks themselves but rather acted as a negotiator on behalf of its partner who allegedly attacked the firm. The stolen data trove may include research and financial information from the firm.
Sharp Boys hacker group made a claim about obtaining personal and credit card data from at least five tourism-related sites in Israel. Hackers allegedly accessed the backend interface of the targeted sites. As proof of the leak, they also released a spreadsheet containing the personal information of 120,000 people.
A Mexico-based production plant belonging to Foxconn fell victim to a ransomware attack. The LockBit gang claimed responsibility for the attack. Foxconn assured that the impact on its overall operations is minimal, and the recovery will unfold according to a pre-determined plan.
MyEasyDocs, an India-based online document verification platform, exposed 30GB of data owing to a misconfigured Azure server. This included both personal and financial information of over 50,000 students from India and Israel.
BlackCat ransomware group claimed its attack against Regina Public Schools in the Canadian province of Saskatchewan. The threat actors, reportedly, stole 500GB of files containing tax reports, health information, passports, and Social Security numbers.
Several customers of California-headquartered Bank of the West apparently lost their debit card numbers and PINs to skimmers installed at the bank's ATMs. Cybercriminals can use this stolen data to generate fake cards and attempt cash withdrawals. Experts have been able to identify all the affected accounts.
The FBI warned the public again about the fraudulent schemes seeking donations or other financial assistance related to the crisis in Ukraine. Criminal actors are taking advantage of the ongoing crisis by posing as Ukrainian entities needing humanitarian aid or developing fundraising efforts.
Black Basta, a RaaS syndicate, crippled as many as 50 victims in the U.S., Canada, the U.K, New Zealand, and Australia, within two months of launching. Researchers have warned of the threat it poses to various industries, such as manufacturing, transportation, cosmetics, telcos, pharmaceuticals, plumbing and heating, automobile dealers, and retail.
The Vice Society ransomware group targeted European organizations lately. The group claimed responsibility for the cyberattack against the Medical University of Innsbruck and the city of Palermo in Italy, which triggered a massive service outage.
Malicious hackers again managed to steal 32 NFTs (worth more than $250,000) from Bored Ape Yacht Club (BAYC) by compromising the Discord account of one of its community managers. The threat actors used this compromised account to send a phishing link, which was later used to gain access to BAYC owners’ cryptocurrency wallets. Among the NFTs compromised in the hack were 1 Bored Ape, 2 Mutant Apes, 5 Otherdeeds, and 1 Bored Kennel.
Ukraine CERT warned that the Russian hacking group Sandworm is exploiting the Follina vulnerability in a new campaign to target various media organizations in Ukraine. The campaign is carried out via phishing email and targeted more than 500 recipients.
An unprotected Elasticsearch database had exposed 5GB of personal data belonging to over 30,000 students. The unprotected database apparently belongs to account holders of Transact Campus, which works with higher education institutions in the U.S.
Around 32GB of sensitive data stored in an unsecured database of the Uganda Securities Exchange (USE) was left exposed on the internet. The leaked data included the full name, address, date of birth, phone number, email address, and bank details of customers from across the globe.
A phishing email campaign spoofed MetaMask cryptocurrency wallet provider in an attempt to steal recovery phrases from Microsoft 365 users. The recovery phrases could later enable attackers to steal NFTs and cryptocurrency from compromised wallets. The phishing email used a Know Your Customer (KYC) verification request to lure recipients into sharing sensitive data.
Ukrainian organizations were subjected to new hacking attempts tailored to drop CredoMap malware and malicious Cobalt Strike beacons onto their networks. It is suspected to be the work of Fancy Bear and UAC-0098. The CredoMap malware is capable of stealing account credentials and cookies stored in Firefox, Edge, and Chrome web browsers.
Crypto threats are reaching new heights. A recent report found a rather contagious cryptominer that harvested millions in cryptocurrency since the beginning of the year. Furthermore, two ransomware strains have released their news versions in an attempt to up their game. One of them has also promised huge payouts for identifying bugs in their program.