Cyware Monthly Threat Intelligence

Monthly Threat Briefing • July 3, 2023
Monthly Threat Briefing • July 3, 2023
Robust risk management practices to protect sensitive data and protect against potential threats are the need of the hour. With the Metior framework, an MIT research group is trying to achieve the same. It aims to assess the efficacy of various cybersecurity obfuscation schemes while laying down promising architecture to safeguard against different cyber threats. In a similar line, FCC Chairwoman Jessica Rosenworcel unveiled the establishment of a new task force last month. This is to fortify the cyber infrastructure of the telecom industry and ensure consumer data safety.
MIT researchers developed the Metior framework that provides a quantitative assessment of cybersecurity obfuscation schemes, helping engineers evaluate the effectiveness of different security approaches. The framework enables users to analyze the impact of various factors, such as victim programs, attacker strategies, and obfuscation scheme configurations, on the leakage of sensitive information. Microprocessor engineers can, hence, use it to determine the most promising architecture during the early stages of chip design.
The FCC announced the launch of its first-ever privacy and data protection task force with an aim to address SIM swapping attacks and thwart threats concerning data privacy. The creation of the task force comes in the wake of the rising number of data protection issues faced by customers of U.S. telecom providers. The task force will coordinate with the FCC to create authentication-related standards for carriers transferring a number to a new device or a new carrier.
The U.S. and Israeli government agencies released a guide for organizations to secure remote access software against malicious attacks. The guide highlights the attractiveness of remote access software to malicious actors, particularly ransomware groups, and offers recommendations to improve security and identify and prevent malicious activity.
Google has introduced a Secure AI Framework (SAIF) to help mitigate the risks of AI systems being misused. SAIF builds on Google's experience developing cybersecurity models and is designed to help protect against theft of AI models, data poisoning, malicious inputs, and extraction of confidential information.
It won’t be wrong to dedicate the month of June to Cl0p victims. The ransomware group exploited a security issue in the MOVEit file transfer tool and compromised at least 158 organizations. In other news, a third-party breach exposed the personal information of numerous pilot applicants for American Airlines and Southwest Airlines. Meanwhile, a car insurance comparison platform and a well-known investment research firm collectively blurted out over 100 GB of data due to misconfigured databases.
National Health Service (NHS), the U.K, suffered a breach impacting the sensitive personal information of about 1.1 million patients, including trauma patients and victims of terrorism. The attack originally targeted the University of Manchester, which led to the NHS leak. The incident also led to the compromise of student and alumni information, which includes personal details, including demographic data. The university's backup servers were accessed by criminals; however, their identity remains unknown at this time.
The Cl0p ransomware group, responsible for numerous breaches due to a bug in the MOVEit file transfer tool, may have impacted at least 158 organizations. The number of individuals impacted by hackers exploiting vulnerabilities in the MOVEit software has surpassed 16 million, and this count is expected to rise further.
The LockBit ransomware group claimed to have hacked into Taiwan Semiconductor Manufacturing Company (TSMC) and demanded $70 million in ransom demand. Meanwhile, TSMC confirmed that one of its IT hardware suppliers was hit by a cyberattack that compromised data related to initial server setup and configuration. The supplier that suffered the actual attack is Kinmax Technology, Taiwan.
Hawai'i Community College observed dealing with a ransomware attack that knocked off its network. The ransomware group named N0_Esc4pe claimed responsibility for the attack and threatened to leak 65 GB of data stolen from the college. Experts said the incident did not impact the other campuses of the University of Hawaii (UH).
Major global airlines American Airlines and Southwest Airlines disclosed data breaches resulting from a hack at a third-party vendor, Pilot Credentials. On April 30, an unauthorized individual reportedly infiltrated Pilot Credentials' systems and illicitly obtained documents containing sensitive information. As a result, personal information belonging to 5,745 pilots from American Airlines and 3,009 pilots from Southwest Airlines has been affected.
A database containing 255,756 records, worth 93.93 GB, was left publicly available. Researchers claimed that the unprotected database belonged to RateForce and contained scans and images of various documents, including vehicle registrations, driver’s licenses, insurance cards, vehicle titles, and state Medicaid health coverage cards.
Hackers breached the computer network at a Scranton, Pennsylvania-based cardiology group and potentially obtained the private data of over 181,000 patients. The exposed information included names, addresses, dates of birth, Social Security numbers, driver’s license numbers, and passport numbers.
A misconfigured database containing the personal information of more than 8.8 million Zacks Investment Research users was dumped on a hacking forum. The compromised information included names, addresses, phone numbers, email addresses, usernames, and passwords stored as unsalted SHA-256 hashes. The oldest entry in the database dated back to May 2020.
A widespread brand impersonation scam campaign was discovered targeting over 100 popular clothing, footwear, and apparel brands. The campaign has been active since 2022 and peaked between November 2022 and February 2023. Scammers have set up more than 3,000 domains impersonating major brands such as Nike, Puma, Clarks, Crocs, Caterpillar, Fila, and Vans. SEO poisoning tactic is used to dupe unsuspecting users.
The government of the Canadian province of Nova Scotia and the University of Rochester, New York, confirmed data theft as a result of the exploitation of a new vulnerability affecting the popular file transfer tool MOVEit Transfer. The payroll provider Zellis was also hit by a cyberattack due to the same vulnerability, compromising the personal data of employees at the BBC, British Airways, Boots, and Aer Lingus, among other companies.
Globalcaja, a major bank in Spain, suffered a ransomware attack by the Play ransomware group. The group claimed to have stolen personal and confidential data and threatened to publish it if the bank did not pay the ransom. While the bank claims that the attack did not affect transactions or accounts of clients, some operations were temporarily limited.
If you ask what’s hot in the cybercrime market, Mystic Stealer will make it to the list. The new info-stealer was found operating with at least 50 C2 servers and targets apps, browsers, crypto browser extensions, and much more. There’s another stealer, dubbed RDStealer, that uses RDP connections to steal sensitive data. The stealer cleverly exploits a remote machine when client drive mapping is enabled. Lastly, PowerStar and PowerDrop have emerged as new threats that you must learn about.