Cyware Monthly Threat Intelligence

Monthly Threat Briefing • Apr 4, 2022
This website uses cookies and similar technologies to provide essential functionality and improve your experience. Some features, such as demo scheduling and chat support, require marketing cookies to function. By clicking "Accept All", you consent to all cookies. Alternatively, you can customize your preferences, but note that declining marketing cookies will limit certain website features.
Monthly Threat Briefing • Apr 4, 2022
The significance of the cybersecurity of critical infrastructure entities has come into the limelight as we witness increased nation-state hacking activity. In the light of rising cyber incidents in the U.S, President Joe Biden approved new legislation that requires critical infrastructure organizations to report breaches within 72 hours. MIT researchers found a way to foil memory-timing side-channel attacks. In other news, MITRE published a new framework for cyber defenders, vendors, and decision-makers to discuss and plan adversary engagement activities.
Under the new cyber incident reporting law signed by President Biden, critical infrastructure organizations will be required to report cyber incidents to the DHS within 72 hours of the discovery of the event, and within 24 hours if they make a ransomware payment.
Researchers at the Massachusetts Institute of Technology devised a technique to thwart memory-timing side-channel attacks. They shaped the memory requests by running them via a request shaper. Named DAGuise, the technique utilizes a graph structure to process requests and send them to the memory controller on a fixed schedule.
Microsoft launched an open-source tool—RouterOS Scanner—to secure MicroTik routers and check for IOCs for TrickBot infections. The tool enables users to check the device version and charts it to known vulnerabilities. It also searches for DNS cache poisoning, traffic redirection rules, scheduled tasks, suspicious files, default port changes, non-default users, and firewall rules.
MITRE launched the first official version of Engage, a framework for conducting cyber adversary engagement, deception, and denial activities. This framework will help CISOs, security analysts, and vendors to implement defense strategies by taking cues from adversary behavior observed in the real world.
In the previous month, several cybercriminal groups and scammers attempted to benefit from the ongoing tension between Ukraine and Russia. Meanwhile, a hacker group pulled off one of the biggest crypto heists of all time. It’s not a wrap without mentioning ransomware attacks. Top brands, such as Samsung, Shutterfly, Denso, and Vodafone, lost large troves of confidential data to ransomware groups.
A ransomware attack at Shutterfly affected the personal information of its employees. The attack occurred on December 3, 2021, after which the Conti ransomware group had leaked around 7.05GB of stolen data on its site. Apart from stealing employee data, the gang had also encrypted over 4,000 devices and 120 VMware ESXi servers.
Cyber attackers hacked the Ronin network of Axie Infinity, the blockchain-based game, and stole more than $620 million in cryptocurrency. They used hacked private keys to forge fake withdrawals.
The FBI disclosed that the Ragnar Locker ransomware has targeted at least 52 organizations across 10 critical infrastructure sectors in the U.S. These attacks have been identified since January 2022. The impacted ones include entities in the critical manufacturing, energy, financial services, government, and IT sectors.
Hive ransomware gang claimed to have stolen 850,000 PII records from Partnership HealthPlan of California (PHC) in around 400GB files. Rompetrol, the largest oil refinery in Romania, suffered a major attack by the group.
The Lapsus$ ransomware gang reportedly targeted Samsung, Microsoft, Okta, and Vodafone and stole a huge trove of internal company data from respective firms. Meanwhile, the City of London Police claimed to have arrested seven teenage suspects related to the Lapsus$ gang, two of whom were charged recently.
Pro-Russia Monday Group crippled over 30 WordPress-hosted Ukrainian university websites. Also, a threat actor launched a DDoS attack using DanaBot against the Ukrainian Ministry of Defense’s webmail server. Scammers jumped the bandwagon to weaponize the Russia-Ukraine conflict and target users in well-crafted phishing campaigns, such as fake purchase order, tricking users into downloading offensive—but malware-laced—cyber tools, and impersonating European government personnel. Researchers identified three separate DDoS attacks, involving the new Zhadnost botnet, targeting the Ukrainian government and financial websites.
Automotive giant Denso confirmed a cyberattack by Pandora ransomware. While the incident is under investigation, the attackers revealed that they have stolen 1.4TB of data from the firm. This includes a purchase order, a technical component document, and a sales file.
A cyberattack on South Denver Cardiology Associates (SDCA) had exposed the PHI of almost 300,000 patients. The attack was detected on January 4, and the impacted information included patients’ names, dates of birth, Social Security numbers, drivers’ license numbers, patient account numbers, and health insurance information.
A data breach at a Japan-based beauty product retailer Acro affected the details of more than 100,000 payment cards. The incident occurred as a result of the exploitation of a vulnerability in a third-party payment processing vendor. It affected the Three Cosmetics domain and Amplitude site.
CRM tool Hubspot was hacked, which has led to data breaches at Swan Bitcoin, BlockFi, Circle, and NYDIG. A total of 30 clients have been affected. However, treasuries and operations remain unaffected, stated the companies. The attack was caused by a threat actor gaining access to an employee account and targeting stakeholders in the cryptocurrency sector.
Omega Company—the R&D unit of Russian oil pipeline company Transneft—was hacked by the Anonymous collective. The hacktivists exfiltrated 79GB of emails and published them on the Distributed Denial of Secrets, a non-profit whistleblower leak site. The hackers, in another incident, announced hacking Nestlè and stealing 10 GB of sensitive data, including company emails, passwords, and data related to business customers.
The personal information of roughly 820,000 current and former New York City public school students were affected in a breach that occurred in January after threat actors gained unauthorized access to an online grading system and attendance system.
Researchers warned against active exploitation of the Log4Shell vulnerability, to deliver backdoors and cryptocurrency miners onto vulnerable VMware Horizon servers. The campaign leverages remote monitoring software packages, Atera or Spashtop, and the Sliver backdoor.
Hackers knocked the website of the U.K Ministry of Defense offline. The Army, which was resorted to using paper systems, had declared a cyber emergency and enacted Op Rhodes. The number of affected candidates stood somewhere between 125 and 150, and some recruits’ data was for sale for one BTC on the dark web.
Furthermore, there’s non-stop innovation coming from the adversaries’ side too. A new attack technique unveiled two weeks ago was exploited by a Belarus-linked APT. Malware threats spiked with the introduction of new macOS malware, ??a new variant of PlugX, and a crypto-mining malware. Ransomware strains such as Suncrypt and Hive were updated to cause greater damage.