Cyware Weekly Threat Intelligence - December 18–22

Weekly Threat Briefing • December 22, 2023
Weekly Threat Briefing • December 22, 2023
Law enforcement agencies globally are actively engaged in disrupting cybercriminal infrastructure to safeguard digital ecosystems. In the latest events, the DOJ disrupted the BlackCat ransomware group's server infrastructure and provided a decryption tool to over 500 victims. In another development, nearly 3,500 cybercriminals were arrested, and $300 million in illegal assets from various scams were seized as part of an operation involving agencies from 34 countries.
The US Department of Justice (DOJ) successfully disrupted the infrastructure of the BlackCat ransomware group and offered a decryption tool to more than 500 victims around the world, thus saving more than $68 million in ransom payments. The threat group has targeted over 1,000 computer networks and extorted millions of dollars from victims. With the decryption tool provided by the FBI, businesses and schools were able to reopen, and health care and emergency services were able to come back online. The current status and capacity of AlphV’s operations are unclear.
In a coordinated operation codenamed Operation HAECHI IV, law enforcement agencies from 34 countries arrested nearly 3,500 cybercriminals and seized about $300 million worth of digital assets. The six-month operation targeted seven types of scams, including voice phishing, romance scams, online sextortion, investment fraud, money laundering associated with illegal online gambling, business email compromise fraud, and e-commerce fraud.
The NIST released two draft publications to guide entities aiming to shift their encryption schemes to ones designed to thwart attacks from a potential quantum computer. The documents, named Quantum Readiness: Cryptographic Discovery and Quantum Readiness: Testing Draft Standards for Interoperability and Performance, are open for public comment until Feb. 20, 2024. The first guide outlines a functional test plan for cryptographic tools to identify security configuration issues and offers use case scenarios for successful post-quantum system migrations. The second guide focuses on harmonizing quantum-resilient algorithms with existing network infrastructure and addresses compatibility issues in a controlled, non-production environment.
Database misconfiguration mayhem continues. Blink Mobility and Real Estate Wealth Network left their unprotected databases open to the public, exposing the valuable data of their customers. Database provider MongoDB was also under fire after the data of its customers was stolen.
Database provider MongoDB alerted customers to a data breach in which some customer account metadata and contact information were compromised. The incident was detected on December 13, following which the firm activated its incident response processes to mitigate it. The firm also warned its customers to activate MFA and be wary of phishing attempts that may use stolen data.
Apparel giant VF Corporation reported a cyberattack that forced it to shut down its systems. In the filing, the firm disclosed that the attackers disrupted its business operations, encrypted some IT systems, and stole data, including personal information. Federal law enforcement was notified and is working with cybersecurity experts to investigate the incident.
Bitdefender Labs researchers warned users of ‘get paid scams’ that make false promises of payments for liking videos on YouTube. The scam started with potential victims receiving a message from an unknown number and asking them to like the video or subscribe to a YouTube channel in exchange for money. The scams were primarily designed to target part-time job seekers looking for an opportunity to earn extra cash.
Comcast Cable Communications, doing business as Xfinity, disclosed that attackers who breached one of its Citrix servers in October also gained unauthorized access to and extracted sensitive customer information from its systems. Previously, the firm revealed that the incident affected the data of about 36 million people. However, the latest review reveals that usernames and hashed passwords are also part of the stolen details.
Iran confirmed a nationwide cyberattack that disrupted the operations of 70% of gas stations. An Israel-linked hacking group called Predatroy Sparrow claimed responsibility for the attacks while adding that it breached the central servers of gas stations, gaining access to specific station information, payment system details, and management systems.
HCLTech disclosed the discovery of a ransomware incident within an isolated cloud environment associated with one of its projects. While an investigation is underway to understand the scope of the attack, the company currently has confirmed that the event has not caused a significant impact on the network.
In an update, Austin-based ESO Solution revealed that the information of nearly three million people was affected in the October ransomware attack. The impacted data includes names, dates of birth, injury type, injury date, treatment date, treatment type, and, in some cases, Social Security numbers. The data was stolen from hospitals associated with ESO solution, including Mississippi Baptist Medical Center, Forrest General Hospital, Providence Alaska Medical Center, Manatee Memorial Hospital, and Desert View Hospital.
Los Angeles-based electric car-sharing provider Blink Mobility left a misconfigured MongoDB database open to the public, exposing the personal data of more than 22,000 users. The database contained around 181,000 records that included phone numbers, email addresses, encrypted passwords, and registration dates of customers and administrators.
An unprotected database with a size of 1.16 TB, leaked the real estate records of several people, including major celebrities. The database belonged to Real Estate Wealth Network and contained 1.5 billion records spanning from April 2022 to October 2023. It is unclear how long the database was exposed or who else may have accessed the data but researchers reported that user names, phone numbers, emails, and device information were among the leaked data.
A phishing email pretending to be a copyright infringement complaint was found prompting users to resolve the issue by clicking on an appeal form. This redirected them to a phishing site impersonating Meta’s actual violation portal that asked them to share their username and password. After siphoning these details, the phishing site asks the target if their account is protected by 2FA and, upon confirmation, requests the 8-digit backup code. The ultimate goal of the attack is to steal the backup codes that can be used to hijack Instagram accounts.
Scammers were found abusing a feature in X (formerly known as Twitter) to promote fake giveaway scams and fraudulent Telegram channels to steal cryptocurrency and NFTs from users. As part of it, the scammers took a URL for a tweet and modified the account name, while keeping the status ID unchanged, to trick users into believing that the tweet was from a legitimate organization. Some of the scam accounts were found to be mimicking cryptocurrency firms such as Binance, Ethereum Foundation, zkSync, and Chainlink.
Australia’s largest not-for-profit health and aged care provider, St Vincent’s Health, fell victim to a cyberattack that impacted some of its data. An investigation is underway to understand the nature and scope of the attack. Meanwhile, the healthcare provider has confirmed that the ability to deliver services to patients, residents, and the broader community is not affected.
A passwordless MongoDB database belonging to Goyzer was found leaking details of around 690,000 customers before it was secured. The exposed details included names, email addresses, phone numbers, and scanned copies of receipts, checks, contracts, and IDs. According to security researchers, the specific database was populated with data about customers from Dubai.
New malware families with abilities to target cross-platform software were also observed in the wild. A new information stealer named JaskaGo was found targeting Windows and Apple macOS systems to steal victims’ information. Separately, a data wiper malware was used against Windows and Linux systems, under the pretext of a security update for a zero-day flaw. There’s also a report on the comeback of QakBot trojan.