{"id":8448,"date":"2023-11-18T11:19:48","date_gmt":"2023-11-18T08:19:48","guid":{"rendered":"https:\/\/cyberone.bg\/?p=8448"},"modified":"2024-02-22T14:54:22","modified_gmt":"2024-02-22T11:54:22","slug":"weekly-cybersecurity-report-week-49","status":"publish","type":"post","link":"https:\/\/cyberone.bg\/en\/weekly-cybersecurity-report-week-49","title":{"rendered":"Weekly Cybersecurity Report | Week 49"},"content":{"rendered":"<p>As your dedicated cybersecurity services provider, Cyberone equips you with timely and in-depth information about current cyber attacks. Discover a comprehensive overview of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape.<\/p>\n<h4><strong>Weekly Cybersecurity Report | Week 49, 2023<\/strong><\/h4>\n<h3><b><span data-contrast=\"auto\">1 &#8211; Iranian attack group which attacks using Wiper-type malware\u00a0<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">The National Cyber Array has identified the activity of an Iranian attack group which attacks using Wiper-type malware, wiping out servers and workstations.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">To identify the attack in your organization and prevent it:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/go.gov.il\/wipers\"><span data-contrast=\"none\">https:\/\/go.gov.il\/wipers<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">2 &#8211; Home Center in an alarming message to customers: &#8220;Under a terrorist cyber attack&#8221;<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Home Center informed its customers: &#8220;Dear customers, unfortunately, the chain&#8217;s website is under a cyber terrorist attack. The branches are open for you, we would be happy for you to come and enjoy various leading products and promotions, thank you for your support and sacrifices.&#8221;<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.ice.co.il\/digital-140\/news\/article\/988628\"><span data-contrast=\"none\">https:\/\/www.ice.co.il\/digital-140\/news\/article\/988628<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">3 &#8211; Denmark experienced the largest cyber attack in its history<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Hackers potentially linked to Russia&#8217;s GRU chief intelligence directorate have carried out a series of highly coordinated cyberattacks targeting Danish critical infrastructure in the country&#8217;s biggest cyber incident.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The SektorCERT, a non-profit cybersecurity center for critical sectors in Denmark, reported that attackers gained access to the systems of 22 companies that monitor various components of the Danish energy infrastructure in May. The report published on Sunday said the hackers exploited zero-day vulnerabilities in Zyxel firewalls, which many Danish critical infrastructure operators use to protect their networks.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The firewall vulnerabilities, first reported in April and tracked as CVE-2023-28771, allow attackers to gain remote access to industrial control systems without authentication. SektorCERT described the cyberattack as &#8220;miraculous&#8221; due to its meticulous planning and coordination and said the threat actors had demonstrated an ability to identify companies with vulnerable devices and simultaneously plan a campaign against the targeted companies.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.bankinfosecurity.com\/denmark-hit-largest-cyberattack-on-record-a-23584\"><span data-contrast=\"none\">https:\/\/www.bankinfosecurity.com\/denmark-hit-largest-cyberattack-on-record-a-23584<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">4 &#8211; Hackers breached Booking.com, one of the world&#8217;s largest online hotel booking sites, by impersonating hotel staff to steal credit card details from travelers making reservations.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Booking.com headquarters in the Netherlands admitted that the damage was happening on a global scale.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">After learning that the stolen card information could have been used to make illegal purchases, the company said, &#8220;it is working to return the money for the affected customers.&#8221;<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><strong>The Booking.com website and app require hotels and travelers to use their IDs and passwords for access.\u00a0<\/strong><\/h3>\n<p><span data-contrast=\"auto\">According to the company, as well as reports from several local hotels, the phishing scam began after someone posing as a traveler sent an email written in English to the hotels.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The email contained a link that, when clicked, caused a virus infection, allowing the hacker to fraudulently obtain hotel IDs and passwords when accessing Booking.com.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The hackers then used these credentials to gain unauthorized access to Booking.com and send messages to travelers posing as hotel employees.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The messages falsely claim that &#8220;prepayment is required,&#8221; and then force travelers to enter their credit card number and other details on a fake Booking.com &#8211; like website to steal the information.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.asahi.com\/sp\/ajw\/articles\/15055042\"><span data-contrast=\"none\">https:\/\/www.asahi.com\/sp\/ajw\/articles\/15055042<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">5 &#8211; Australia locks down ports after &#8220;nationally significant&#8221; cyber attack.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Australia says it is responding to an ongoing cyber attack targeting major ports, prompting operator DP World to limit network access on Saturday temporarily.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The operator closed four ports in Sydney, Melbourne, Brisbane, and Fremantle after detecting a cyber security incident late on Friday night. DP World is responsible for 40% of Australia&#8217;s ocean freight.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/au.news.yahoo.com\/australia-locks-down-ports-nationally-095725266.html\"><span data-contrast=\"none\">https:\/\/au.news.yahoo.com\/australia-locks-down-ports-nationally-095725266.html<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">6 &#8211; The group of Russian hackers Sandworm causes a power outage in Ukraine due to missile strikes<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">The Russian hackers known as Sandworm attacked an electrical substation in Ukraine last year, causing a brief blackout in October 2022.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The findings come from Google&#8217;s Mandiant, which described the hack as a &#8220;multi-event cyberattack&#8221; leveraging a new technique to affect industrial control systems (ICS).<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The actor first used OT-level living-out-of-earth (LotL) techniques to trip the victim&#8217;s circuit breakers, causing an unplanned power outage that coincided with mass missile strikes on critical infrastructure across Ukraine,&#8221; the company said.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">https:\/\/thehackernews.com\/2023\/11\/russian-hackers-sandworm-cause-power.html?m=1<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">7 &#8211; The Industrial and Commercial Bank of China was hit by a ransomware attack<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">The Industrial and Commercial Bank of China (ICBC) is restoring systems and services following a ransomware attack that disrupted the US Treasury market, causing stock clearing problems.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">As first reported in the Financial Times, members of the Securities Industry and Financial Markets Association were notified of the incident on Thursday.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Because of the attack&#8217;s impact on its systems, the Chinese commercial bank could not settle US Treasury transactions for other market participants.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/industrial-and-commercial-bank-of-china-hit-by-ransomware-attack\/\"><span data-contrast=\"none\">https:\/\/www.bleepingcomputer.com\/news\/security\/industrial-and-commercial-bank-of-china-hit-by-ransomware-attack\/<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">8 &#8211; Toyota confirms breach after Medusa ransomware threatens to leak data<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559739&quot;:60}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Toyota Financial Services (TFS) has confirmed that it has detected unauthorized access to some of its systems in Europe and Africa after Medusa ransomware claimed an attack on the company.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Toyota Financial Services, a subsidiary of Toyota Motor Corporation, is a global entity with a presence in 90% of the markets where Toyota sells its cars, providing vehicle financing to its customers.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Earlier today, the Medusa ransomware gang listed TFS as its data leak site on the dark web and demanded a payment of $8,000,000 to delete data allegedly stolen from the Japanese company.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/toyota-confirms-breach-after-medusa-ransomware-threatens-to-leak-data\/#google_vignette\"><span data-contrast=\"none\">https:\/\/www.bleepingcomputer.com\/news\/security\/toyota-confirms-breach-after-medusa-ransomware-threatens-to-leak-data\/#google_vignette<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">9 &#8211; Hackers claim serious data breach at smart Wi-Fi provider Plume<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Smart Wi-Fi service provider Plume has fallen victim to a data breach. The perpetrators, who took responsibility for the incident, published their message in the well-known infringement forums.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This is the same forum where, in the last few days, we watched the data leak of a database of LinkedIn users, which includes 35 million entries and two databases from Chess.com.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Palo Alto, Calif.-based Plume is a SaaS (software-as-a-company) platform that offers users artificial intelligence security, smart Wi-Fi services, and cloud management, and has footprints in more than 45 countries, covering 55 million homes and small businesses. business<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The attackers now claim to have stolen over 20GB of the company&#8217;s Wi-Fi database with over 15 million rows of information. Plume, however, did not confirm the news, stating that it is aware of the attackers&#8217; claims and has launched an investigation to verify these claims.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.hackread.com\/hackers-smart-wi-fi-provider-plume-data-breach\/#google_vignette\"><span data-contrast=\"none\">https:\/\/www.hackread.com\/hackers-smart-wi-fi-provider-plume-data-breach\/#google_vignette<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><em>The attacks highlighted in this report aren&#8217;t just incidents; they&#8217;re blueprints of the adversary&#8217;s arsenal. To protect your business you need the right protection. Cyberone is here to help! Check out our <a href=\"https:\/\/cyberone.bg\/en\/services\">services<\/a>.<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As your dedicated cybersecurity services provider, Cyberone equips you with timely and in-depth information about current cyber attacks. Discover a comprehensive overview of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape. Weekly Cybersecurity Report | Week 49, 2023 1 &#8211; Iranian attack group which attacks using Wiper-type malware\u00a0\u00a0 The National Cyber Array has [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":8576,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[57,56],"class_list":["post-8448","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-weekly-cyber-updates","tag-cybersecurity","tag-weekly-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/8448","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/comments?post=8448"}],"version-history":[{"count":7,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/8448\/revisions"}],"predecessor-version":[{"id":8458,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/8448\/revisions\/8458"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media\/8576"}],"wp:attachment":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media?parent=8448"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/categories?post=8448"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/tags?post=8448"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}