{"id":8841,"date":"2024-08-05T09:19:47","date_gmt":"2024-08-05T06:19:47","guid":{"rendered":"https:\/\/cyberone.bg\/?p=8841"},"modified":"2024-08-05T09:19:47","modified_gmt":"2024-08-05T06:19:47","slug":"weekly-cybersecurity-report-week-31-2024","status":"publish","type":"post","link":"https:\/\/cyberone.bg\/en\/weekly-cybersecurity-report-week-31-2024","title":{"rendered":"Weekly Cybersecurity Report | Week 31, 2024"},"content":{"rendered":"<p>As your dedicated cybersecurity services provider,<strong>\u00a0<a href=\"https:\/\/cyberone.bg\/\">Cyberone<\/a><\/strong>\u00a0equips you with timely and in-depth information about current cyber attacks. Discover a weekly cybersecurity report of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape.<\/p>\n<h2>Weekly Cybersecurity Report | Week 31, 2024<\/h2>\n<p><b><span data-contrast=\"auto\">Information security updates and events from the past week<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559739&quot;:60}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">1 &#8211; A ransomware attack on c-edge technologies led to the shutdown of about 300 banks in India.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Following a ransom attack on the company c-edge technologies, which provides banks with various technological systems, about 300 banks in India had to stop their activities.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The National Payments Corporation of India (NPCI) has proactively disconnected all c-edge technologies from the country&#8217;s payment system to prevent the spread of the malware.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">2 &#8211; The OneBlood organization, which collects blood donations and distributes them to hospitals in the US, reports a ransomware attack causing widespread disruptions in the processing of blood donations and publishes an urgent call for donations.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Following the attack on the organization, a shortage of blood units is expected, and the organization urgently calls on donors with blood type O+- to come and donate.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">3 &#8211; Fresnillo PLC, the largest silver mining company in the world and the leader in gold mining, reports that it is suffering from a cyber-attack.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">In a report published by the company, it claims that an unauthorized party managed to access several systems. However, as of now, the attack has no impact on mining activity and is not expected to have a financial impact.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">4 &#8211; Healthcare giant Cencora confirmed this week that personally identifiable information (PII) and protected health information (PHI) were stolen in a February 2024 cyber-attack.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">The incident was identified on February 21 and disclosed a few days later in a regulatory filing, when the company said that personal information had been leaked from its systems.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In a July 31 filing with the Securities and Exchange Commission (SEC), Cencora said that &#8220;additional data, beyond what was initially identified, has been released.&#8221;<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The company has identified and completed its review of most of the data. That review confirmed that the data included personally identifiable information and protected health information about individuals, most of which is maintained by a subsidiary of the company that provides patient support services, Cencora said.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In addition, it stated that the attack did not have a material impact on its activities, and its systems remained fully operational and that no material impact on the financial situation or the result of the activity is expected.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">5 &#8211; The world&#8217;s leading silver producer Fresnillo reveals a cyber attack<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">The world&#8217;s largest silver maker and a leading global producer of gold, copper and zinc, Fresnillo PLC, said attackers gained access to data stored on its systems during a recent cyberattack.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The mining giant revealed on Tuesday that it was &#8220;under a cyber security incident that resulted in unauthorized access to certain IT systems and data.&#8221;<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Upon discovery of the attack, Fresnillo initiated response measures to contain the breach, and its IT experts are investigating and assessing the impact of the incident in coordination with external forensic experts.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">6 &#8211; Microsoft claims the massive Azure outage was caused by a DDoS attack<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Microsoft today confirmed that the nine-hour outage on Tuesday, which brought down and disrupted multiple Microsoft 365 and azure services around the world, was triggered by a distributed denial of service (DDoS) attack.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The outage affected Microsoft Entra, some Microsoft 365 and Microsoft Purview services (including Intune, Power BI and Power Platform), as well as Azure App Services, Application Insights, Azure IoT Central, Azure Log Search Alerts, Azure Policy and Azure Portal.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The company confirmed in a statement released today that the main reason for yesterday&#8217;s outage was a DDoS attack, although it has not yet linked it to a specific threat actor.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">7 &#8211; An online security breach led to the leak of information of 40 million UK voters<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">The Information Commissioner&#8217;s Office said the Electoral Commission had not updated its servers with the latest security updates before the data breach, which occurred in August 2021 but was not detected until October 2022.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Earlier this year, the Conservative government blamed the data breach on Chinese hackers and summoned Beijing&#8217;s ambassador to the UK to explain his country&#8217;s actions.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The US also blamed Chinese hackers targeting US businesses, officials, journalists and politicians, as the US and UK announced joint sanctions. New Zealand has also raised concerns with China about its involvement in a planned attack on the country&#8217;s parliament in 2021.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">A breach in the UK allegedly resulted in Beijing&#8217;s access to the personal details of around 40 million voters held by the Election Commission.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">8 &#8211; A cyber gang leaks documents stolen from the Pentagon&#8217;s IT provider<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Hackers have published internal documents stolen from one of America&#8217;s largest IT service providers, whose clients include various US government agencies, including the Department of Defense.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Bloomberg reports that the leaked data, which belonged to Virginia-based Leidos Holdings, was captured by hackers during a previously reported 2022 breach of software company Diligent.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">According to reports, the cybercriminal gang that leaked the data is the Russian-linked Trigona ransomware group, whose past victims have included Mexican telecom company Claro.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.computing.co.uk\/news\/4339649\/pentagon-contractor-leidos-hit-breach\"><span data-contrast=\"none\">https:\/\/www.computing.co.uk\/news\/4339649\/pentagon-contractor-leidos-hit-breach<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">9 &#8211; The French government is investigating a recent malware attack that affected 3,000 machines<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">The attack, part of a wider botnet operation affecting millions around the world, has raised serious concerns about cyber security as France prepares to host the upcoming Olympic Games.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The investigation began following a report by Sekoia, a cyber security company, that detected PlugX malware in many systems.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The Remote Access Trojan (RAT) allows attackers to execute arbitrary commands and steal data from infected machines.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">According to the Tribunal De Paris Justice report, the malware was mainly distributed via infected USB drives.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Sekoia&#8217;s analysts were able to locate and take over the command and control (C2) server that engineered the botnet.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This server was responsible for issuing commands to the infected machines, numbering millions around the world.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In France alone, 3,000 machines were affected, receiving instructions from the C2 server and almost 100,000 more victims every day.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">10 &#8211; Ukraine&#8217;s cyber operation disabled the ATM services of major Russian banks<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Ukraine launched a massive cyber-attack against ATMs of Russian banks, the cyber operation began on July 23.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">A Ukrainian intelligence source told the Kyiv Post that the attack is described as &#8220;gaining momentum&#8221;. The hacking campaign is part of the ongoing cyber operation within the wider conflict between Russia and Ukraine. The list of hacked Russian banks includes Dom.RF, VTB Bank, Alfa-Bank, Sberbank, Raiffeisen Bank, RSHB Bank, Rosbank, Gazprombank, Tinkoff Bank and iBank.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Many banks customers&#8217; debit and credit cards were immediately blocked when they tried to use ATMs. The attack included freezing bank payment systems and mobile apps, causing outages in personal offices and preventing payments for public transportation.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><strong><em>The attacks highlighted in this report aren&#8217;t just incidents, they&#8217;re blueprints of the adversary&#8217;s arsenal. To protect your business you need the right protection. Cyberone is here to help! Check out our <a href=\"https:\/\/cyberone.bg\/en\/services\">services<\/a>.<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As your dedicated cybersecurity services provider,\u00a0Cyberone\u00a0equips you with timely and in-depth information about current cyber attacks. Discover a weekly cybersecurity report of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape. Weekly Cybersecurity Report | Week 31, 2024 Information security updates and events from the past week\u00a0 1 &#8211; A ransomware attack on c-edge [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":8603,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[],"class_list":["post-8841","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-weekly-cyber-updates"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/8841","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/comments?post=8841"}],"version-history":[{"count":1,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/8841\/revisions"}],"predecessor-version":[{"id":8842,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/8841\/revisions\/8842"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media\/8603"}],"wp:attachment":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media?parent=8841"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/categories?post=8841"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/tags?post=8841"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}