{"id":8556,"date":"2024-01-29T15:40:54","date_gmt":"2024-01-29T12:40:54","guid":{"rendered":"https:\/\/cyberone.bg\/?p=8556"},"modified":"2024-02-22T14:57:04","modified_gmt":"2024-02-22T11:57:04","slug":"weekly-cybersecurity-report-week-5-2024","status":"publish","type":"post","link":"https:\/\/cyberone.bg\/en\/weekly-cybersecurity-report-week-5-2024","title":{"rendered":"Weekly Cybersecurity Report | Week 5, 2024"},"content":{"rendered":"<p>As your dedicated cybersecurity services provider,<strong> <a href=\"https:\/\/cyberone.bg\/\">Cyberone<\/a><\/strong> equips you with timely and in-depth information about current cyber attacks. Discover a comprehensive overview of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape.<\/p>\n<h4><strong>Weekly Cybersecurity Report | Week 5, 2024<\/strong><\/h4>\n<h3><b><span data-contrast=\"auto\">1 &#8211; The Lockbit attack group announces that it hacked the Subway fast food chain<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Subway is an American fast-food chain, with branches all over the world.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">According to the company&#8217;s website, the chain has 36,821 restaurants in 102 countries and as of 2010 it is ranked as the largest fast-food chain in the world.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The Lockbit Group claims to have stolen hundreds of gigabytes of data, which it will sell to competitors if Subway does not meet their demands.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Meanwhile, Subway&#8217;s main website is not available and there is no official comment from the company on the issue.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/cybersecuritynews.com\/lockbit-ransomware-subway\/\"><span data-contrast=\"none\">https:\/\/cybersecuritynews.com\/lockbit-ransomware-subway\/<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">2 &#8211; Microsoft reports that hackers from Russia managed to break into some of the company&#8217;s systems and access the email accounts of senior executives, including those dealing in the cyber field.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Microsoft emphasizes that the attackers were not exposed to the information of the company&#8217;s customers.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Microsoft&#8217;s full report:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/blog\/2024\/01\/microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard\/\"><span data-contrast=\"none\">https:\/\/msrc.microsoft.com\/blog\/2024\/01\/microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard\/<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">3 &#8211; The GitLab company warned against a zero-click vulnerability in its API system.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">The vulnerability, CVE-2023-7028, allows attackers to take over GitLab accounts without having to enter passwords or code.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Almost a week, more than 5,300 servers in the network are exposed to these attacks.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The vulnerability could lead to the theft of sensitive data, such as passwords, API keys, and native code. The attackers can take advantage of the vulnerability to perform a variety of actions, such as: stealing sensitive data, using user accounts for other cyber-attacks or corrupting source code.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The recommendation for GitLab users to immediately update their API systems.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">4 &#8211; Russian hackers hacked HPE security team email accounts<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Hewlett Packard Enterprise (HPE) today disclosed that suspected Russian hackers known as Midnight Blizzard gained access to the company&#8217;s Microsoft Office 365 email environment to steal data from its cybersecurity team and other departments.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The Midnight Blizzard gang, aka Cozy Bear, APT29, is a Russian state-sponsored hacking group believed to be part of the Russian Intelligence Service (SVR). The threat actors have been linked to multiple attacks throughout the year, including the 2020 SolarWinds supply chain attack.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">HPE says it was notified on December 12 that suspected Russian hackers breached its cloud-based email environment in May 2023.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hpe-russian-hackers-breached-its-security-teams-email-accounts\/#google_vignette\"><span data-contrast=\"none\">https:\/\/www.bleepingcomputer.com\/news\/security\/hpe-russian-hackers-breached-its-security-teams-email-accounts\/#google_vignette<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">5 &#8211; Global fintech company EquiLend is down after a recent cyber attack<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">New York-based global financial technology firm EquiLend says its operations have been disrupted after several systems were down in a cyber-attack on Monday.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Following the incident, the technology, data, and analytics company also detected unauthorized access to its network and is now working to restore all affected services.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">&#8220;On January 22, 2024, EquiLend identified a technical issue that disabled portions of our systems,&#8221; an EquiLend spokesperson said today.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/global-fintech-firm-equilend-offline-after-recent-cyberattack\/\"><span data-contrast=\"none\">https:\/\/www.bleepingcomputer.com\/news\/security\/global-fintech-firm-equilend-offline-after-recent-cyberattack\/<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">6 &#8211; Tesla Hacked, and 24 Day Zero Demos at Pwn2Own Automotive 2024<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Security researchers hacked into a Tesla modem and collected $722,500 in bounties on the first day of Pwn2Own Automotive 2024 for three bug crashes and 24 unique zero-day exploits.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Team Synacktiv (@Synacktiv) took home $100,000 after successfully chaining together three zero-day bugs to gain Root privileges on a Tesla modem.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">They also used two unique networks of two bugs to hack an Ubiquiti Connect EV station and a JuiceBox 40 Smart EV charging station, earning an additional $120,000.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/tesla-hacked-24-zero-days-demoed-at-pwn2own-automotive-2024\/\"><span data-contrast=\"none\">https:\/\/www.bleepingcomputer.com\/news\/security\/tesla-hacked-24-zero-days-demoed-at-pwn2own-automotive-2024\/<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">7 &#8211; Major IT shutdown at Europe&#8217;s largest RV club<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">The Caravan and Motorhome Club of Great Britain (CAMC) is battling a suspected cyber-attack with members reporting widespread IT outages over the past five days.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The company, which describes itself as &#8220;Europe&#8217;s largest travel community, helping caravanners, motorcyclists and campers&#8217; access more than 3,000 locations in the UK and Europe&#8221;, has alerted the UK&#8217;s Information Commissioner&#8217;s Office (ICO) to its situation, reporting that it is suffering from a major data security incident.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">UK organizations must notify the ICO within 72 hours if they suffer a breach that could put people&#8217;s rights and freedoms at risk.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.theregister.com\/2024\/01\/24\/major_it_outage_at_caravan\/\"><span data-contrast=\"none\">https:\/\/www.theregister.com\/2024\/01\/24\/major_it_outage_at_caravan\/<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">8 &#8211; Water services giant Veolia North America was hit by a ransomware attack<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Veolia North America, a subsidiary of the multinational conglomerate Veolia, disclosed a ransomware attack that affected the systems of part of its municipal water division and disrupted its bill payment systems.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">After identifying the attack, Veolia implemented protective measures, temporarily disabling some systems to contain the breach.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The company is currently working with law enforcement and third-party forensic experts to assess the extent of the attack&#8217;s impact on its operations and systems.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/water-services-giant-veolia-north-america-hit-by-ransomware-attack\/\"><span data-contrast=\"none\">https:\/\/www.bleepingcomputer.com\/news\/security\/water-services-giant-veolia-north-america-hit-by-ransomware-attack\/<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">9 &#8211; Massive cyber-attack targeting a Ukrainian bank<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Hackers attacked Monobank, Ukraine&#8217;s largest mobile-only bank, with waves of denial-of-service (DDoS) attacks on January 21, company founder and CEO Ole Horchovsky reported.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">According to Horchovsky, Monobank was targeted with 580 million service requests in one attack.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">&#8220;I think today Monobank is one of the most attacked IT targets in the country,&#8221; he said and reported a DDoS attack of 50 million service requests the previous day, January 20.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">While Horchowski said the situation was under control, he said another wave of attacks had begun as he was writing his message.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Horchovsky did not say who he believed was behind the attacks, although previous threats have been linked to Russian hackers.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/news.yahoo.com\/massive-cyberattack-targets-ukrainian-online-010639938.html\"><span data-contrast=\"none\">https:\/\/news.yahoo.com\/massive-cyberattack-targets-ukrainian-online-010639938.html<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">10 &#8211; Hackers steal $7.5 million from the US Department of Health through an email cyber attack<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">In a recent cybersecurity incident, hackers were able to steal millions of dollars from the US Department of Health and Human Services through a sophisticated spoofing attack.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The cybercriminals assumed the identities of legitimate fund recipients, skillfully communicating with Ministry of Health staff via e-mail to fraudulently obtain funds.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The cyberattack resulted in the unauthorized withdrawal of about $7.5 million of the agency&#8217;s funds, posing a significant challenge for security experts trying to recover the stolen assets.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.cybersecurity-insiders.com\/hackers-steal-7-5-million-funds-from-us-health-department-via-email-spoofing-cyber-attack\/\"><span data-contrast=\"none\">https:\/\/www.cybersecurity-insiders.com\/hackers-steal-7-5-million-funds-from-us-health-department-via-email-spoofing-cyber-attack\/<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">11 &#8211; Jira platform down: The cyber-attack on Atlassian affects several cloud services, several Atlassian Jira products are experiencing a continuous outage since this morning.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Users of Jira Work Management, Jira Software, Jira Service Management, and Jira Product Discovery are experiencing connection issues.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">As of an update in the last few hours, Atlassian implemented fixes that should resolve the issue and continues to monitor the incident.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/technology\/jira-down-atlassian-outage-affecting-multiple-cloud-services\/#google_vignette\"><span data-contrast=\"none\">https:\/\/www.bleepingcomputer.com\/news\/technology\/jira-down-atlassian-outage-affecting-multiple-cloud-services\/#google_vignette<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">12 &#8211; Guardio Labs discloses a critical vulnerability in the Opera browser<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Guardio Labs, known for its browser security tools boasting over a million users, recently disclosed a critical zero-day vulnerability in the Opera family of browsers.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The company launched a report detailing these vulnerabilities called MyFlawCross Platform 0-Day RCE Vulnerability discovered in Opera browsers. The Opera family of browsers, notably the fourth most widely used browser in the world, has over 350 million active users.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The vulnerability originates from Opera&#8217;s &#8220;My-Flow&#8221; feature. This tool allows users to synchronize messages and files between using the mobile app and using a desktop browser.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/securitybrief.in\/story\/guardio-labs-exposes-critical-vulnerability-in-opera-browser\"><span data-contrast=\"none\">https:\/\/securitybrief.in\/story\/guardio-labs-exposes-critical-vulnerability-in-opera-browser<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><em>The attacks highlighted in this report aren&#8217;t just incidents; they&#8217;re blueprints of the adversary&#8217;s arsenal. To protect your business you need the right protection. Cyberone is here to help! Check out our <a href=\"https:\/\/cyberone.bg\/en\/services\">services<\/a>.<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As your dedicated cybersecurity services provider, Cyberone equips you with timely and in-depth information about current cyber attacks. Discover a comprehensive overview of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape. Weekly Cybersecurity Report | Week 5, 2024 1 &#8211; The Lockbit attack group announces that it hacked the Subway fast food chain\u00a0 [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":8606,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[57,56],"class_list":["post-8556","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-weekly-cyber-updates","tag-cybersecurity","tag-weekly-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/8556","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/comments?post=8556"}],"version-history":[{"count":2,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/8556\/revisions"}],"predecessor-version":[{"id":8558,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/8556\/revisions\/8558"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media\/8606"}],"wp:attachment":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media?parent=8556"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/categories?post=8556"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/tags?post=8556"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}