{"id":8859,"date":"2024-08-26T10:34:49","date_gmt":"2024-08-26T07:34:49","guid":{"rendered":"https:\/\/cyberone.bg\/?p=8859"},"modified":"2024-08-26T10:34:49","modified_gmt":"2024-08-26T07:34:49","slug":"weekly-cybersecurity-report-week-34-2024","status":"publish","type":"post","link":"https:\/\/cyberone.bg\/en\/weekly-cybersecurity-report-week-34-2024","title":{"rendered":"Weekly Cybersecurity Report | Week 34, 2024"},"content":{"rendered":"<p>As your dedicated cybersecurity services provider,<strong>\u00a0<a href=\"https:\/\/cyberone.bg\/\">Cyberone<\/a><\/strong>\u00a0equips you with timely and in-depth information about current cyber attacks. Discover a weekly cybersecurity report of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape.<\/p>\n<h2>Weekly Cybersecurity Report | Week 34, 2024<\/h2>\n<p><b><span data-contrast=\"auto\">Information security updates and events from the past week<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559739&quot;:60}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Trump&#8217;s election headquarters claims: Iranian hackers managed to break into the email accounts of senior officials at the headquarters and stole documents in order to interfere in the US elections.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">The Politico website was the first to report the incident after an anonymous source started sending them the documents he stole.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Crypto company Unicoin reports that an attacker managed to gain access to the company&#8217;s Google G-Suite management interface, changed passwords for all employees and locked them all out of accounts.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">In a report published by the company to the stock exchange, it states that the attack lasted four days during which the attacker had full control over the accounts.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">It is not yet clear what the attacker stole and what information was exposed, but at this stage there is no evidence that he stole digital coins from the company&#8217;s crypto wallets.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">The company Microchip Technology, which specializes in the production of semiconductors and supplies chips to the American defense industry, suffered a major cyber-attack a few days ago<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">The attack significantly disrupted the company&#8217;s activities, especially in some of its factories, and affected its ability to fulfill orders.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The company detected suspicious activity on its IT systems on August 17, and by August 19 it had confirmed that several servers and business processes were affected by the attack.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In response to this breach, the company isolated the affected systems and shut down some of them as a precaution. The company also brought in external cyber security experts to assist in the investigation and return of operations to normal.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">So far, the company has not determined whether this incident has a significant financial impact, but estimates indicate that it is a ransomware attack.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">No attack group has yet claimed responsibility for the attack, but the group is apparently waiting for progress in negotiations before going public<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Another threat to US national security now by TP-Link routers<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Members of the US Congress have asked the Commerce Department to investigate the cybersecurity risks posed by Chinese technology company TP-Link&#8217;s Wi-Fi routers.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">They asked to investigate the security risks of this company by the end of August and, if necessary, to apply restrictions on TP-Link products in America<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Ransom attack on the city of Flint in the United States<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">The phones and computers of employees in the city of Flint, Michigan, which has a population of about 80,000, were disrupted by a ransomware attack that began on Wednesday.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">A timetable has not yet been set for restoring the systems, and the city can only accept cash or check payments for water, sewer and tax bills, as the online and credit card systems are down<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Taiwan University under unique DLL Backdoor attack<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">A never-before-seen &#8220;backdoor&#8221; known as Msupedge is targeting victims in Taiwan using a unique communication technique.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">After researchers captured the malware deployed in an attack on a university in Taiwan, they determined that it was communicating with its command and control (C2) server using DNS traffic\u2014a well-known, but rare, technique.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Toyota confirmed that its network was breached after a threat actor leaked a 240GB archive of data stolen from the company&#8217;s systems<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">&#8220;We are aware of the situation.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The issue is limited in scope and is not a multi-system issue,&#8221; Toyota said when asked to verify the threat actor&#8217;s claims.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The company added that it is &#8220;dealing with those affected and will provide assistance if necessary&#8221;, but has not yet provided information on when it discovered the breach, how the attacker gained access and how many people the data was exposed to in the incident.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/toyota-confirms-breach-after-stolen-data-leaks-on-hacking-forum\/\"><span data-contrast=\"none\">https:\/\/www.bleepingcomputer.com\/news\/security\/toyota-confirms-breach-after-stolen-data-leaks-on-hacking-forum\/<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">100,000 affected by Jewish Home Lifecare data breach<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">New York-based nonprofit health care organization Jewish Home Lifecare revealed that a data breach disclosed earlier this year affects more than 100,000 people.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Jewish Home Lifecare, now called &#8220;The New Jewish Home&#8221; and specializing in providing healthcare services to the elderly, informed customers in February that it had discovered unusual activity on its network on January 7.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The hackers may have gained access to information related to patients and other members of the community, including their name, address, date of birth, social security number, financial account details, payment card details, passport number and registration and medical treatment details.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><strong><em>The attacks highlighted in this report aren&#8217;t just incidents, they&#8217;re blueprints of the adversary&#8217;s arsenal. To protect your business you need the right partner. Cyberone is here to help! Check out our <a href=\"https:\/\/cyberone.bg\/en\/services\">services<\/a>.<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As your dedicated cybersecurity services provider,\u00a0Cyberone\u00a0equips you with timely and in-depth information about current cyber attacks. Discover a weekly cybersecurity report of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape. Weekly Cybersecurity Report | Week 34, 2024 Information security updates and events from the past week\u00a0 Trump&#8217;s election headquarters claims: Iranian hackers managed [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":8612,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[],"class_list":["post-8859","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-weekly-cyber-updates"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/8859","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/comments?post=8859"}],"version-history":[{"count":1,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/8859\/revisions"}],"predecessor-version":[{"id":8860,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/8859\/revisions\/8860"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media\/8612"}],"wp:attachment":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media?parent=8859"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/categories?post=8859"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/tags?post=8859"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}