{"id":9770,"date":"2025-04-21T16:05:13","date_gmt":"2025-04-21T13:05:13","guid":{"rendered":"https:\/\/cyberone.bg\/?p=9770"},"modified":"2025-04-21T16:05:13","modified_gmt":"2025-04-21T13:05:13","slug":"weekly-cybersecurity-report-week-16-2025","status":"publish","type":"post","link":"https:\/\/cyberone.bg\/en\/weekly-cybersecurity-report-week-16-2025","title":{"rendered":"Weekly Cybersecurity Report | Week 16, 2025"},"content":{"rendered":"<p>As your dedicated cybersecurity services provider,<strong>\u00a0<a href=\"https:\/\/cyberone.bg\/\">Cyberone<\/a><\/strong>\u00a0equips you with timely and in-depth information about current cyber attacks. Discover a weekly cybersecurity report of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape.<\/p>\n<h2>Weekly Cybersecurity Report | Week 16, 2025<\/h2>\n<p>\u00a0<\/p>\n<p><strong><u>Information security updates and events from the past we<\/u><\/strong><strong><u>ek<\/u><\/strong><\/p>\n<h3><strong>1 \u2013 DaVita, a dialysis service provider across the US, reports a ransomware attack that began two days ago.<\/strong><\/h3>\n<p>The attack encrypted parts of the company\u2019s computer systems and caused operational disruptions. The company reports that it has isolated the affected systems and is using external cyber experts to investigate the incident.<\/p>\n<p>The attack caused various disruptions, but medical treatments continue.<\/p>\n<p>No ransomware group has claimed responsibility for the attack at this stage.<\/p>\n<h3><strong>2 \u2013 South African telecommunications company Cell C confirms that it has fallen victim to a ransomware attack carried out by the RansomHouse group.<\/strong><\/h3>\n<p>The group claims to have stolen 2 terabytes of data including names, ID numbers, bank details, passports, driver\u2019s licenses, medical details and contact information of the company\u2019s customers.<\/p>\n<p>Cell C said it is working with cyber experts and law enforcement authorities to address the incident.<\/p>\n<h3><strong>3 \u2013 Morocco is investigating A cyberattack on the National Insurance Institute (CNSS), in which more than 54,000 files containing personal information of almost two million citizens were leaked.<\/strong><\/h3>\n<p>The leaked information includes names, ID numbers, bank details, email addresses and telephone numbers. The files were published on Telegram and uploaded to various forums for download.<\/p>\n<p>The hacker group JabaROOT claimed responsibility for the attack and claimed that it was a response to Moroccan cyber operations against institutions in Algeria.<\/p>\n<h3><strong>4 \u2013 Sensata Technologies, which manufactures and markets various sensors and technological products, reports that it is suffering from a ransomware attack.<\/strong><\/h3>\n<p>In a report published by the company on the stock exchange, it states that an initial investigation indicates that information was stolen from the organizational network but that there is no impact on business activity.<\/p>\n<p>No ransomware group has claimed responsibility for the attack so far.<\/p>\n<h3><strong>5 \u2013 Germany accuses Russia of cyberattack on its research institute<\/strong><\/h3>\n<p>The German government accuses the Russian attack group APT28 (linked to the GRU, military intelligence) of a cyberattack on the GIGA research institute in Hamburg.<\/p>\n<p>The hack involved the use of an old vulnerability in Outlook (CVE-2023-23397), which allowed the attackers to access internal systems.<\/p>\n<p>The goal was not just technical espionage, but an attempt to access materials related to German foreign policy and analysis of sanctions on Russia.<\/p>\n<p>In other words \u2013 targeted academic espionage in wartime.<\/p>\n<p>Germany summoned the Russian ambassador and warned that there would be a diplomatic response.<\/p>\n<p>According to the German Foreign Ministry \u2013 this is a serious violation of sovereignty, and the attack was aimed at research institutions of a scientific nature<\/p>\n<p>\u00a0<\/p>\n<p><strong><em>The cybersecurity attacks highlighted in this report aren\u2019t just incidents, they\u2019re blueprints of the adversary\u2019s arsenal. To protect your business you need the right partner. Cyberone is here to help! Check out our <a href=\"https:\/\/cyberone.bg\/en\/services\">services<\/a>.<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As your dedicated cybersecurity services provider,\u00a0Cyberone\u00a0equips you with timely and in-depth information about current cyber attacks. Discover a weekly cybersecurity report of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape. Weekly Cybersecurity Report | Week 16, 2025 \u00a0 Information security updates and events from the past week 1 \u2013 DaVita, a dialysis service [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":8618,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[],"class_list":["post-9770","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-weekly-cyber-updates"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/9770","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/comments?post=9770"}],"version-history":[{"count":1,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/9770\/revisions"}],"predecessor-version":[{"id":9771,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/9770\/revisions\/9771"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media\/8618"}],"wp:attachment":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media?parent=9770"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/categories?post=9770"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/tags?post=9770"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}