{"id":9398,"date":"2024-10-14T09:39:28","date_gmt":"2024-10-14T06:39:28","guid":{"rendered":"https:\/\/cyberone.bg\/?p=9398"},"modified":"2024-10-14T09:39:28","modified_gmt":"2024-10-14T06:39:28","slug":"weekly-cybersecurity-report-week-41-2024","status":"publish","type":"post","link":"https:\/\/cyberone.bg\/en\/weekly-cybersecurity-report-week-41-2024","title":{"rendered":"Weekly Cybersecurity Report | Week 41, 2024"},"content":{"rendered":"<p>As your dedicated cybersecurity services provider,<strong>\u00a0<a href=\"https:\/\/cyberone.bg\/\">Cyberone<\/a><\/strong>\u00a0equips you with timely and in-depth information about current cyber attacks. Discover a weekly cybersecurity report of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape.<\/p>\n<h2>Weekly Cybersecurity Report | Week 41, 2024<\/h2>\n<p><b><span data-contrast=\"auto\">Information security updates and events from the past week<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559739&quot;:60}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">1 &#8211; The Lebanese Al-Mayadeen television channel, affiliated with Hezbollah, announces that it is suffering from a <\/span><\/b><b><span data-contrast=\"auto\">cybersecurity<\/span><\/b><b><span data-contrast=\"auto\">-attack because of which various parties took over the accounts on social networks, the Telegram channel and more.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<h3><b><span data-contrast=\"auto\">2 &#8211; The WSJ newspaper reports that Chinese attack groups spent months inside the networks of giant telecommunications companies such as Verizon, AT&amp;T, and Lumen Technologies and were exposed to information that they used for intelligence purposes.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<h3><b><span data-contrast=\"auto\">3 &#8211; The largest water and wastewater company in the USA, American Water, reports to the stock exchange that it was forced to disable part of the computer systems due to a cybersecurity &#8211; attack. The water supply is ongoing.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<h3><b><span data-contrast=\"auto\">4 &#8211; The UMC Health company that provides various health services in Texas reports that it is forced to refer patients to other hospitals due to a ransomware attack.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<h3><b><span data-contrast=\"auto\">5 &#8211; The MoneyGram company continues to update on the attack it is undergoing and claims that the attackers stole sensitive customer information after being on the company&#8217;s network for about a week.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<h3><b><span data-contrast=\"auto\">6 &#8211; The company ADT, which provides various security services, reports an information leak for the second time in two months, after an attacker stole an employee&#8217;s identification data to steal information from the corporate network.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<h3><b><span data-contrast=\"auto\">7 &#8211; Hackers infiltrated the Japan Aerospace Exploration Agency (JAXA) and compromised the accounts of senior officials, including the president of the agency<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">In the attack, the hackers took over about 200 accounts, including five directors on JAXA&#8217;s board of directors.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The targeted accounts belonged to senior officials involved in policy and budget matters, indicating a strategic attempt to access secret negotiations and planning information.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Over 10,000 files are at risk of being leaked, with more than 1,000 files provided by third parties under non-disclosure agreements<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The leaked files included data on international projects, such as NASA&#8217;s Artemis lunar exploration program and Toyota&#8217;s development of a manned lunar rover.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">8 &#8211; The official website of the Lego company was hacked by attackers who used it to promote a new digital currency while impersonating the Lego company. The attack lasted about 85 minutes, and it seems that the attackers managed to get only a few hundred dollars from it<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/legos-website-hacked-to-push-cryptocurrency-scam\/\"><span data-contrast=\"none\">https:\/\/www.bleepingcomputer.com\/news\/security\/legos-website-hacked-to-push-cryptocurrency-scam\/<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">9 &#8211; Ukrainian cybersecurity &#8211; attack on the Russian justice system<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">A Ukrainian attack group managed to gain a foothold in the network of Russia&#8217;s judicial system Pravosudie.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">According to publications, the attack disrupted the work of the courts, email accounts and websites (according to the videos, servers are simply deleted). At the same time, information about users and internal documents of the Pravosudie system were published.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Russian citizens report that it is not possible to file complaints and watch court hearings because the courts&#8217; website is not active.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">10 &#8211; Casio reports disruption of some services following a cybersecurity &#8211; attack. The company claims that on 5.10 it identified an unauthorized party in the company&#8217;s network.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<h3><b><span data-contrast=\"auto\">11 &#8211; American Water shuts down online services due to a cyber attack<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">American Water, the largest publicly traded water and wastewater company in the US, was forced to shut down some of its systems after a cyber attack<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><strong><em>The attacks highlighted in this report aren&#8217;t just incidents, they&#8217;re blueprints of the adversary&#8217;s arsenal. To protect your business you need the right partner. Cyberone is here to help! Check out our <a href=\"https:\/\/cyberone.bg\/en\/services\">services<\/a>.<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As your dedicated cybersecurity services provider,\u00a0Cyberone\u00a0equips you with timely and in-depth information about current cyber attacks. Discover a weekly cybersecurity report of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape. Weekly Cybersecurity Report | Week 41, 2024 Information security updates and events from the past week\u00a0 1 &#8211; The Lebanese Al-Mayadeen television channel, [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":8582,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[],"class_list":["post-9398","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-weekly-cyber-updates"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/9398","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/comments?post=9398"}],"version-history":[{"count":1,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/9398\/revisions"}],"predecessor-version":[{"id":9399,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/9398\/revisions\/9399"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media\/8582"}],"wp:attachment":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media?parent=9398"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/categories?post=9398"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/tags?post=9398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}