Cyware Weekly Threat Intelligence - May 16–20

Weekly Threat Briefing • May 20, 2022
This website uses cookies and similar technologies to provide essential functionality and improve your experience. Some features, such as demo scheduling and chat support, require marketing cookies to function. By clicking "Accept All", you consent to all cookies. Alternatively, you can customize your preferences, but note that declining marketing cookies will limit certain website features.
Weekly Threat Briefing • May 20, 2022
The threat landscape for the e-commerce sector is evolving rapidly. In order to ensure user safety, the Singapore government has introduced a safety rating scheme for e-commerce sites. It has also established a joint center as a one-stop facility for cybersecurity evaluation and certification, the first of its kind in South-East Asia. Meanwhile, the U.K government laid out a cybersecurity strategy to protect the civil nuclear sector under its reign.
Singapore launched E-commerce Marketplace Transaction Safety Ratings, a scheme that assesses online marketplaces based on the type of anti-scam measures they take. The e-commerce platforms would also be accessed for the use of secure payment tools as well as the availability of dispute reporting and resolution mechanisms.
The UK government published 2022 Civil Nuclear Cyber Security Strategy for the country’s civil nuclear sector that focuses on more testing, design-based security, enhanced resilience, and improved collaboration. The nuclear industry aims to achieve enhanced resilience by preparing better for and responding to incidents faster.
The U.S. government and the EU have joined hands to take new initiatives to strengthen supply chain security, address disinformation and sanction evasions, and develop trustworthy AI and privacy-enhancing technologies. Both the parties will also exchange information on critical tech exports, with an initial focus on Russia and other sanctions-evading countries.
Singapore set up the National Integrated Center for Evaluation (NICE) to evaluate and certify systems for cybersecurity strength. The $13.99 million facility will enhance software and hardware vulnerability assessment, physical hardware attacks, and security posture.
Did Conti pay the price of attempting a major cyberattack operation against the Costa Rican government? The group’s infrastructure is now offline. However, the number of ransomware incidents reported per week is still scary. Nikkei Inc., Parker Hannifin, and Bank of Zambia are among the latest victims.
A server at Nikkei Group Asia, an overseas subsidiary of Nikkei Inc. based in Singapore, was compromised in a ransomware attack. Unauthorized access to the server was first detected and reported on May 13. The server supposedly stored some customer data, however, the exact impact of the attack is yet to be determined.
The new Costa Rican president announced that the country was at war with the Conti cybercriminal group. Officials had reportedly denied paying the $20 million ransom to the group. Meanwhile, Conti threatened to topple the government with cyberattacks and also claimed that it has the support of insiders from the government.
An alleged data leak exposed the information of 22.5 million Malaysians born between 1940 and 2004. The database—160GB in size—was seemingly stolen from the National Registration Department (NRD) and is for sale on the dark web for $10,000. However, Malaysia's Home Minister claimed that NRD isn’t related to the alleged data breach.
Pennsylvania-based Mercyhurst University was reportedly breached by the LockBit 2.0 gang. The threat actor claimed to have stolen data worth 300GB and the deadline for ransom payment is May 22. The attack affects both students and employees.
Parker Hannifin leaked the personal data and PHI of employees and their dependents to an unauthorized third party in an alleged ransomware attack by Conti. The leaked information included records for the current and former employees enrolled in Parker's Group Health Plans. Hacker gained access to Parker Hannifin’s IT systems between March 11 and March 14.
A cyberattack on Washington Local Schools affected the district’s internet, phone, WiFi networks, Google Classroom, and email addresses. The school district had announced to share an emergency phone number for each school as currently, teachers don’t have access to any calls or emails.
An investigation by PRODAFT into Wizard Spider revealed that the threat actor has hundreds of millions of dollars in assets and is hiring cold callers to scare its victims into paying the ransom. The allegedly Russia-based group contains a complex set of sub-teams and groups as part of its infrastructure.
Christus Health was targeted by the AvosLocker ransomware. Meanwhile, RefuahHealth and xNuLife Med also revealed falling victim to different cyberattack incidents, exposing personal data and sensitive healthcare data.
Trend Micro researchers observed more than 200 apps on the Google Play Store that were found delivering the Facestealer spyware. The spyware aims to steal users’ passwords while being disguised in the form of apps related to fitness, photo editing, and other categories.
The Bank of Zambia experienced a ransomware attack by the HIVE group that disrupted some of its operations. Officials have urged businesses in the financial sector to stay alert as the incident might impact them. Also, the bank has reportedly refused to pay the ransom.
Researchers have exposed two new vulnerabilities in VMware products, for which CISA has also issued an emergency warning. In a separate threat, UpdateAgent has returned to claim a fresh set of victims with its new macOS malware dropper. Researchers also reported Sysrv botnet that abuses flaws in web frameworks and WordPress to inject cryptominers.