{"id":8635,"date":"2024-02-26T10:49:40","date_gmt":"2024-02-26T07:49:40","guid":{"rendered":"https:\/\/cyberone.bg\/?p=8635"},"modified":"2024-02-26T10:49:40","modified_gmt":"2024-02-26T07:49:40","slug":"weekly-cybersecurity-report-week-9-2024","status":"publish","type":"post","link":"https:\/\/cyberone.bg\/en\/weekly-cybersecurity-report-week-9-2024","title":{"rendered":"Weekly Cybersecurity Report | Week 9, 2024"},"content":{"rendered":"<p>As your dedicated cybersecurity services provider,<strong> <a href=\"https:\/\/cyberone.bg\/\">Cyberone<\/a><\/strong> equips you with timely and in-depth information about current cyber attacks. Discover a weekly cybersecurity report of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape.<\/p>\n<h2><strong>Weekly Cybersecurity Report | Week 9, 2024<\/strong><\/h2>\n<h3><b><span data-contrast=\"auto\">1 &#8211; A cyber-attack on the company Change Healthcare causes extensive disruptions in various pharmacies and medical institutions throughout the USA.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Change Healthcare is a major provider of systems that connect medical institutions, patients, insurance companies, the Ministry of Health and more, the company has access to medical information of about a third of US citizens and processes billions of medical transactions per year.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Following the cyber-attack experienced by the company, it had to disable a large part of the computer systems as well as systems that serve the company&#8217;s customers.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">As a result of the shutdown, pharmacies report being unable to approve prescriptions with insurance companies, lack of access to patient records, and more.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">2 &#8211; The BMW company reports: sensitive information of the company was leaked due to a faulty configuration of a cloud server.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">An AVTM researcher from SocRadar identified the exposed server as containing sensitive information such as private keys for cloud services, identification data for production environments, and more.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The researcher reported to BMW about the server, and they rushed to turn the server from public to private, however, according to the researcher, BMW did not change all the keys and passwords that were exposed for an unknown amount of time.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">3 &#8211; Hackers from Russia broke into several news sites in Ukraine and published fake articles about the defeat of Ukrainian forces in the battles between the parties.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Some of the websites that were attacked operate automatic systems for distributing articles on social networks so that the fake articles were even published under the official accounts on Twitter, etc.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Among the websites affected &#8211; Pravda and Liga.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">4 &#8211; Washington County, Pennsylvania reports: We paid hackers from Russia $350,000 in ransom after they disabled all computer systems in the county.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">The attorney for the district explained that the attack was detected on 19.1.24 and a few days later, on 25.1, the district received an alert from the US Cyber and Infrastructure Protection Agency to disconnect all servers from the Internet.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">On 5.2.24 the response team hired by the district confirmed that the attackers managed to steal a lot of information, including sensitive information and on 6.2.24 a vote was held in the district in which it was decided to pay the ransom.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">To make the payment, the district hired the services of a crypto company from Chicago, and they transferred $346,687 to the attackers (and took a commission of $19,313).<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">5 &#8211; Cyber-attack on ETISALAT by LockBit Ransomware<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Emirates Telecommunications Group PJSC in the United Arab Emirates is facing a ransomware attack attributed to the notorious LockBit ransomware faction.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The ransom gang took responsibility for the cyber-attack on ETISALAT, which successfully breached the company&#8217;s systems. They are now demanding $100,000 for the return of the stolen data and set a deadline of April 17.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/thecyberexpress.com\/cyberattack-on-etisalat-lockbit-demands-ransom\/amp\/\"><span data-contrast=\"none\">Learn more: https:\/\/thecyberexpress.com\/cyberattack-on-etisalat-lockbit-demands-ransom\/amp\/<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">6 &#8211; American cyber-attack against an Iranian spy ship, which passed information to the Houthis<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">The NBC network reported yesterday (Thursday) that the US carried out a cyber-attack against an Iranian military ship. According to three American officials, the cyber-attack was about a week ago, while the ship was collecting information on cargo ships in the Red Sea and the Gulf of Aden.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The purpose of the cyber-attack was to inhibit the spy ship&#8217;s ability to share information with the Houthi rebels from Yemen &#8211; who during the war in Gaza attack commercial ships in the Red Sea<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">According to the American officials who spoke to NBC, Iran is using the spy ship to provide the Houthis with information that will make their attacks more effective. One of the sources said that the ship&#8217;s name is MV Behshad<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">7 &#8211; The LockBit ransomware was shut down by the global police operation<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Law enforcement agencies from 11 countries have disrupted the notorious LockBit ransomware in a joint operation known as &#8216;Operation Cronos&#8217;.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">According to a banner displayed on the LockBit data leak site, the site is now under the control of the UK&#8217;s National Enforcement Agency.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">&#8220;The site is now under the control of law enforcement. This site is now under the control of the UK&#8217;s National Crime Agency, working closely with the FBI and the international law enforcement task force, Operation Cronos,&#8221; the banner read.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/lockbit-ransomware-disrupte\"><span data-contrast=\"none\">Learn more: https:\/\/www.bleepingcomputer.com\/news\/security\/lockbit-ransomware-disrupte<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">8 &#8211; Russian hackers hit mail servers in Europe for political and military intelligence<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">A Russian-linked actor, TAG-70, accessed mail servers in Ukraine, Georgia, and Poland to gather intelligence on political and military activities in Europe, particularly related to Ukraine&#8217;s war efforts.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.hackread.com\/russian-hackers-mail-servers-europe-intel\/#google_vignetted-by-global-police-operation\/\"><span data-contrast=\"none\">Learn more: https:\/\/www.hackread.com\/russian-hackers-mail-servers-europe-intel\/#google_vignetted-by-global-police-operation\/<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><em>The attacks highlighted in this report aren&#8217;t just incidents; they&#8217;re blueprints of the adversary&#8217;s arsenal. To protect your business you need the right protection. Cyberone is here to help! Check out our <a href=\"https:\/\/cyberone.bg\/en\/services\">services<\/a>.<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As your dedicated cybersecurity services provider, Cyberone equips you with timely and in-depth information about current cyber attacks. Discover a weekly cybersecurity report of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape. Weekly Cybersecurity Report | Week 9, 2024 1 &#8211; A cyber-attack on the company Change Healthcare causes extensive disruptions in various [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":8618,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[57,65,56],"class_list":["post-8635","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-weekly-cyber-updates","tag-cybersecurity","tag-weekly-cybersecurity-report","tag-weekly-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/8635","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/comments?post=8635"}],"version-history":[{"count":2,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/8635\/revisions"}],"predecessor-version":[{"id":8637,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/8635\/revisions\/8637"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media\/8618"}],"wp:attachment":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media?parent=8635"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/categories?post=8635"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/tags?post=8635"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}