Cyware Weekly Threat Intelligence June 28–July 02, 2021

Weekly Threat Briefing • Jul 2, 2021
This website uses cookies and similar technologies to provide essential functionality and improve your experience. Some features, such as demo scheduling and chat support, require marketing cookies to function. By clicking "Accept All", you consent to all cookies. Alternatively, you can customize your preferences, but note that declining marketing cookies will limit certain website features.
Weekly Threat Briefing • Jul 2, 2021
The Good
Finally, some good news to get you ready for the day! DoubleVPN servers have been confiscated by law enforcement agencies from several countries. Systems attacked by Lorenz ransomware have a piece of good news as researchers developed a decryptor.
The CISA released a new module for its Cyber Security Evaluation Tool (CSET) called Ransomware Readiness Assessment to help an organization gradually improve its cybersecurity posture.
Law enforcement agencies from the U.S., the U.K, Germany, Netherlands, Canada, Switzerland, and other countries obtained personal information, logs, and statistics of all the customers of DoubleVPN and confiscated its servers. The service was leveraged by hackers to evade detection during attacks.
Researchers from cybersecurity firm Tesorion analyzed the recently discovered Lorenz ransomware and developed a decryptor that is to be launched soon.
Google and the Open Source Security Foundation (OSSF) launched the OpenSSF Security Scorecards. This automated tool produces a risk score for open-source programs.
The U.S. Secret Service issued a list of 10 most wanted fugitives in connection with financial cybercrimes. The agency is offering rewards of up to $1 million for information on these cybercriminals.
The Bad
While the SolarWinds attacks witnessed a fallout, another Kremlin-linked hacker group has also upped its malicious activities. Cybersecurity authorities from the U.S. and the U.K issued a joint advisory warning hundreds of organizations about ongoing brute force attacks by the Fancy Bear group. Human errors continue to plague the healthcare sector as UofL Health ended up leaking the PHI of thousands of patients.
A threat actor was found using the leaked Babuk Locker builder tool to target victims across the world. The ransomware demands .006 Bitcoins in ransom from the victims to decrypt their files.
U.K Police warned against a WhatsApp fraud campaign that tricks users into sharing their verification code for the purpose of stealing their accounts.
UofL Health, Kentucky, is notifying more than 40,000 patients about a data breach that affected their PHI. The incident occurred after the healthcare system erroneously sent sensitive data to an email address outside its network.
Russia-linked Nobelium APT group compromised Denmark’s central bank and had access to its network for more than six months. This was an aftermath of the SolarWinds supply chain attack.
An ongoing malware campaign is leveraging famous dating and instant messaging apps to distribute a version of PJobRAT spyware. The campaign is active since January and targeting Indian military personnel.
Data of 700 million LinkedIn users have been leaked on RaidForums dark marketplace. The hacker claims to have posted the records that include full names, gender, email addresses, phone numbers, and industry information.
The U.S. and the U.K warned businesses about a global threat campaign that leverages brute force tactics and hundreds of organizations have already fallen victim to these attacks. The attacks have been attributed to the Russian GRU.
New Threats
Some threat actors strive on expanding their capabilities to wreak havoc on as many as organizations possible. One such threat actor, REvil, came up with a Linux version of its ransomware. The TA543 threat actor also revamped its malware and is using that to target organizations in various industries. The week also witnessed a new ransomware that has been linked to the TrickBot gang and shares quite a few similarities with the Conti ransomware.