{"id":9646,"date":"2025-02-24T13:10:05","date_gmt":"2025-02-24T10:10:05","guid":{"rendered":"https:\/\/cyberone.bg\/?p=9646"},"modified":"2025-02-24T13:10:05","modified_gmt":"2025-02-24T10:10:05","slug":"weekly-cybersecurity-report-week-8-2025","status":"publish","type":"post","link":"https:\/\/cyberone.bg\/en\/weekly-cybersecurity-report-week-8-2025","title":{"rendered":"Weekly Cybersecurity Report | Week 8, 2025"},"content":{"rendered":"<p>As your dedicated cybersecurity services provider,<strong>\u00a0<a href=\"https:\/\/cyberone.bg\/\">Cyberone<\/a><\/strong>\u00a0equips you with timely and in-depth information about current cyber attacks. Discover a weekly cybersecurity report of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape.<\/p>\n<h2>Weekly Cybersecurity Report | Week 8, 2025<\/h2>\n<h3><strong>1 \u2013 Textile and apparel company Raymond Limited has confirmed that it has been the victim of a cyberattack that affected some of its information systems.<\/strong><\/h3>\n<p>The Indian company, a leader in its field, announced that it has isolated the affected systems to prevent the attack from spreading.<\/p>\n<p><a href=\"https:\/\/m.economictimes.com\/tech\/technology\/raymond-reports-cyber-security-incident-affecting-some-of-its-it-assets\/articleshow\/118382291.cms\">https:\/\/m.economictimes.com\/tech\/technology\/raymond-reports-cyber-security-incident-affecting-some-of-its-it-assets\/articleshow\/118382291.cms<\/a><\/p>\n<h3><strong>2 \u2013 The Medusa ransomware group has attacked HCRG Care Group, a healthcare and social care provider employing 5,000 people in the UK.<\/strong><\/h3>\n<p>The attackers claim to have stolen 2.3 terabytes of sensitive data and will leak it if a ransom is not paid by February 27.<\/p>\n<h3><strong>3 \u2013 Genea, an Australian fertility services giant with 22 clinics across the country, has announced a massive cyberattack on its systems. The company, one of three companies that control 80% of the Australian fertility market, confirmed that unidentified attackers had gained access to its sensitive information systems.<\/strong><\/h3>\n<p>Immediate consequences:<\/p>\n<p>\u2013 Collapse of the telephone system of all clinics<\/p>\n<p>\u2013 Disabling of the MyGenea application for patients<\/p>\n<p>\u2013 Danger of leaking medical and personal information of patients<\/p>\n<p>\u2013 Possible disruptions in the schedule of fertility treatments<\/p>\n<h3><strong>4 \u2013 Financial technology company Finastra, which provides services to 8,100 financial institutions in 130 countries, has begun notifying its customers of a data leak that occurred at the end of October 2024.<\/strong><\/h3>\n<p>Finastra suffered a previous ransomware attack in March 2020<\/p>\n<p>The company serves 45 of the world\u2019s 50 largest banks<\/p>\n<p>The full scope of the leak has not yet been revealed<\/p>\n<h3><strong>5 \u2013 The Japanese government has approved dramatic legislation that gives it extensive powers to deal with cyber threats, to catch up with the US and deal with increasing Chinese cyber-attacks.<\/strong><\/h3>\n<p>Main points of the legislation:<\/p>\n<p>\u2013 Establishment of a National Cyber \u200b\u200bCouncil and a Committee Intelligence<\/p>\n<p>\u2013 Mandatory reporting of cyber incidents by critical infrastructure providers<\/p>\n<p>\u2013 New powers for the military to protect military systems<\/p>\n<p>\u2013 Appointment of cyber damage prevention officers with immediate action powers<\/p>\n<h3><strong>6 \u2013 Ghost ransomware group hacks organizations in 70 countries<\/strong><\/h3>\n<p>As part of the #Stopransomware project, the Cybersecurity and Infrastructure Security Agency (CISA) and the FBI report that the Ghost ransomware group has hacked organizations in a variety of sectors in more than 70 countries, including critical infrastructure.<\/p>\n<p>The group exploits vulnerabilities in outdated software and systems exposed to the Internet.<\/p>\n<p>The group frequently changes its executable files, encrypted file extensions, and the content of its ransom demands, making it difficult to identify. Other names associated with the group include Cring, Crypt3r, and Phantom.<\/p>\n<h3><strong>7 \u2013 NioCorp Developments reports cyberattack that led to fraud, because of which payments of $ 500,000 were transferred to the attackers, instead of to the suppliers<\/strong><\/h3>\n<p>According to the report, on February 14, 2025, NioCorp Developments Ltd detected unauthorized access to the company\u2019s systems, including to some email accounts.<\/p>\n<p>The attack led to payments that were supposed to be transferred to a supplier\u2019s bank account being transferred to the attacker\u2019s bank account (approximately $ 500,000).<\/p>\n<p>The company reported the incident to federal authorities to try to recover the funds.<\/p>\n<h3><strong>8 \u2013 Ransomware attack on Mackay Memorial Hospital in Taipei disables over 500 computers.<\/strong><\/h3>\n<p>Since last Sunday, Mackay Hospital in Taipei has been dealing with a ransomware attack that encrypted patient files and disabled over 500 computers in the outpatient and emergency departments. The attackers have even threatened another attack which will arrive on Tuesday at 5 p.m. if the ransom is not paid.<\/p>\n<p>Taiwan\u2019s Ministry of Health and Welfare is working with cyber experts to address the incident. No ransomware group has claimed responsibility for the attack currently.<\/p>\n<h3><strong>9 \u2013 Cyberattack on Virginia Attorney General\u2019s Office knocks out computer systems.<\/strong><\/h3>\n<p>The Virginia Attorney General\u2019s Office reported that it was dealing with a cyberattack this week that resulted in the shutdown of a large portion of its computer systems.<\/p>\n<p>An internal email from the deputy attorney general said that the affected systems include Outlook, Teams, VPN access and internet connectivity through the office network.<\/p>\n<p>Virginia Police have launched an investigation.<\/p>\n<p>\u00a0<\/p>\n<p><strong><em>The cybersecurity attacks highlighted in this report aren\u2019t just incidents, they\u2019re blueprints of the adversary\u2019s arsenal. To protect your business you need the right partner. Cyberone is here to help! Check out our <a href=\"https:\/\/cyberone.bg\/en\/services\">services<\/a>.<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As your dedicated cybersecurity services provider,\u00a0Cyberone\u00a0equips you with timely and in-depth information about current cyber attacks. Discover a weekly cybersecurity report of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape. Weekly Cybersecurity Report | Week 8, 2025 1 \u2013 Textile and apparel company Raymond Limited has confirmed that it has been the victim [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":8621,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[],"class_list":["post-9646","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-weekly-cyber-updates"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/9646","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/comments?post=9646"}],"version-history":[{"count":1,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/9646\/revisions"}],"predecessor-version":[{"id":9647,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/9646\/revisions\/9647"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media\/8621"}],"wp:attachment":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media?parent=9646"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/categories?post=9646"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/tags?post=9646"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}