{"id":8685,"date":"2024-03-18T12:56:28","date_gmt":"2024-03-18T09:56:28","guid":{"rendered":"https:\/\/cyberone.bg\/?p=8685"},"modified":"2024-03-18T12:56:28","modified_gmt":"2024-03-18T09:56:28","slug":"weekly-cybersecurity-report-week-12-2024","status":"publish","type":"post","link":"https:\/\/cyberone.bg\/en\/weekly-cybersecurity-report-week-12-2024","title":{"rendered":"Weekly Cybersecurity Report | Week 12, 2024"},"content":{"rendered":"<p>As your dedicated cybersecurity services provider,<strong> <a href=\"https:\/\/cyberone.bg\/\">Cyberone<\/a><\/strong> equips you with timely and in-depth information about current cyber attacks. Discover a weekly cybersecurity report of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape.<\/p>\n<h2><strong>Weekly Cybersecurity Report | Week 12, 2024<\/strong><\/h2>\n<h3><b><span data-contrast=\"auto\">Information security updates and events from the past week<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559739&quot;:60}\">\u00a0<\/span><\/h3>\n<p>&nbsp;<\/p>\n<h3><b><span data-contrast=\"auto\">1 &#8211; Microsoft reports &#8211; the Russian Midnight Blizzard group managed to break into our corporate network, access source code and internal systems.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Microsoft&#8217;s update follows the report published in January according to which hackers from Russia gained access to the email accounts of company executives.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Microsoft is now reporting that through those email accounts the attackers obtained identification details, through which they later connected to the company&#8217;s internal systems and were exposed to sensitive information.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-says-russian-hackers-breached-its-systems-accessed-source-code\/\"><span data-contrast=\"none\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/stanford-data-of-27-000-people-stolen-in-september-ransomware-attack\/\">Learn more:<\/a> https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-says-russian-hackers-breached-its-systems-accessed-source-code\/<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">2 &#8211; Several government offices in France suffer from a significant DDos attack.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">In a statement issued by the Prime Minister&#8217;s Office in France, it was stated that the attack damaged the availability of some services, but there is no fear of data theft.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The Anonymous Sudan group is the one responsible for the attack while announcing that it has continuously attacked about 17k IP addresses and 300 domains.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">3 &#8211; The US Cyber and Infrastructure Protection Agency (CISA) reports that attackers were able to exploit a weakness in Ivanti&#8217;s product, break into the agency&#8217;s network and access two internal systems.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">CISA reports that as soon as it was detected, they disabled the systems immediately.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The source with details reports that the attackers were able to access the Infrastructure Protection (IP) Gateway system and the Chemical Security Assessment Tool (CSAT) system.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Both systems contain sensitive security information.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">CISA refused to confirm the above details.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">4 &#8211; Roku canceled unauthorized subscribers and refunded 15 thousand hacked accounts<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">The company canceled unauthorized subscribers after discovering &#8220;suspicious activity&#8221;.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The streaming TV giant with revenues of $3.4 billion a year, announced that from the end of December to the end of February, hackers managed to break into 15K accounts and sold them for $50 per account.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">&#8220;After gaining access, they changed Roku login information for accounts and, in a limited number of cases, attempted to purchase streaming subscriptions,&#8221; the company said.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">&#8220;However, accessing the accounts did not provide the attackers with access to social security numbers, full payment account numbers, dates of birth or similar sensitive personal information.&#8221;<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Roku&#8217;s security team forced password resets and investigated account activity to determine if the hackers made unauthorized charges, any unauthorized charges were reversed, and users were refunded.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Because password reuse is so common, hackers have little trouble breaking into accounts on a variety of platforms.<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">5 &#8211; Researchers hacked Google A.I and made $50,000<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">At Google&#8217;s LLM bugSWAT event in Las Vegas, researchers uncovered and reported bugs in the company&#8217;s Bard AI (formerly known as Gemini) and were awarded $50,000.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The security flaws the researchers found allowed DoS attacks, extraction of user data and access to uploaded images belonging to a specific user.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/cybersecuritynews.com\/researchers-hacked-google\/\"><span data-contrast=\"none\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/stanford-data-of-27-000-people-stolen-in-september-ransomware-attack\/\">Learn more:<\/a> https:\/\/cybersecuritynews.com\/researchers-hacked-google\/<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">6 &#8211; The ransomware attack on Xplain exposed 65,000 files containing data relevant to the Swiss federal government.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">The May 23 ransomware attack on Xplain affected tens of thousands of federal government files, Switzerland&#8217;s National Cyber Security Center (NCSC) said.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/securityaffairs.com\/160174\/data-breach\/xplain-data-breach-report.html\"><span data-contrast=\"none\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/stanford-data-of-27-000-people-stolen-in-september-ransomware-attack\/\">Learn more:<\/a> https:\/\/securityaffairs.com\/160174\/data-breach\/xplain-data-breach-report.html<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">7 &#8211; Canada&#8217;s anti-money laundering agency shut down after cyber attack<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">The Financial Transactions and Reporting Analysis Center of Canada (FINTRAC) has announced that a &#8220;cyber incident&#8221; has forced it to shut down its corporate systems as a precaution.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">FINTRAC is a government agency in Canada that acts as the country&#8217;s financial intelligence unit. It deals with money laundering investigations, monitors millions of suspicious transactions every year and discloses thousands of revelations about the flow of illegal funds to the police.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The agency issued a brief press statement on its website saying there was no access to the center&#8217;s classified intelligence or systems.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/canadas-anti-money-laundering-agency-offline-after-cyberattack\/\"><span data-contrast=\"none\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/stanford-data-of-27-000-people-stolen-in-september-ransomware-attack\/\">Learn more:<\/a> https:\/\/www.bleepingcomputer.com\/news\/security\/canadas-anti-money-laundering-agency-offline-after-cyberattack\/<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">8 &#8211; Stanford: 27,000 people&#8217;s data was stolen in a ransomware attack in September<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Stanford University says the personal information of 27,000 people was stolen in a ransomware attack that affected the Department of Public Safety (SUDPS) network.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The university discovered the attack on September 27 and revealed a month later that it was investigating a cyber security incident affecting SUDPS systems.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In an update issued Monday, Stanford said the attackers did not gain access to other systems outside of the Department of Public Safety&#8217;s network.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/stanford-data-of-27-000-people-stolen-in-september-ransomware-attack\/\"><span data-contrast=\"none\">Learn more: https:\/\/www.bleepingcomputer.com\/news\/security\/stanford-data-of-27-000-people-stolen-in-september-ransomware-attack\/<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><em>The attacks highlighted in this report aren&#8217;t just incidents; they&#8217;re blueprints of the adversary&#8217;s arsenal. To protect your business you need the right protection. Cyberone is here to help! Check out our <a href=\"https:\/\/cyberone.bg\/en\/services\">services<\/a>.<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As your dedicated cybersecurity services provider, Cyberone equips you with timely and in-depth information about current cyber attacks. Discover a weekly cybersecurity report of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape. Weekly Cybersecurity Report | Week 12, 2024 Information security updates and events from the past week\u00a0 &nbsp; 1 &#8211; Microsoft reports [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":8600,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[57,65,56],"class_list":["post-8685","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-weekly-cyber-updates","tag-cybersecurity","tag-weekly-cybersecurity-report","tag-weekly-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/8685","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/comments?post=8685"}],"version-history":[{"count":1,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/8685\/revisions"}],"predecessor-version":[{"id":8686,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/8685\/revisions\/8686"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media\/8600"}],"wp:attachment":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media?parent=8685"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/categories?post=8685"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/tags?post=8685"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}