"Pro-Iranian Hacktivists Set Sights on Israeli Industrial Control Systems"

"Pro-Iranian Hacktivists Set Sights on Israeli Industrial Control Systems"

The hacktivist group SiegedSec has claimed to be behind a series of attacks against Israeli infrastructure and Industrial Control Systems (ICS). SecurityScorecard's Threat Research, Intelligence, Knowledge, and Engagement (STRIKE) Team discovered a list of what the hacking group claims to be its Israeli ICS targets, which the group compiled. An image of the list found by analyzing various dark web groups reveals a series of IP addresses, with the claim of having launched attacks against Israeli infrastructure.

Submitted by Gregory Rigby on

"State Actors Targeting WinRAR Flaw in Multiple Campaigns"

"State Actors Targeting WinRAR Flaw in Multiple Campaigns"

Several Advanced Persistent Threat (APT) groups, including two Russian groups, are conducting campaigns to exploit a known vulnerability in the popular WinRAR archive utility and deliver malware. The attackers are exploiting a vulnerability, tracked as CVE-2023-38831, in multiple versions of WinRAR that can result in arbitrary code execution. The WinRAR team released a patch for the vulnerability in August, but threat actors had been exploiting it since at least April, when researchers were unaware of it.

Submitted by Gregory Rigby on

"CISA Updates Toolkit to Promote Public Safety Communications and Cyber Resiliency"

"CISA Updates Toolkit to Promote Public Safety Communications and Cyber Resiliency"

The Cybersecurity and Infrastructure Security Agency (CISA) works with public safety, national security, and emergency preparedness communities to improve seamless and secure communications in order to maintain the safety, security, and resiliency of the US. Any disruption to communications can have a domino effect on a public safety agency's ability to provide critical lifesaving services.

Submitted by Gregory Rigby on

"D-Link Says Hacker Exaggerated Data Breach Claims"

"D-Link Says Hacker Exaggerated Data Breach Claims"

D-Link has recently launched an investigation after a hacker offered to sell information allegedly stolen from one of its networks and has determined that the claims are exaggerated.  On October 1, a user of the new BreachForums cybercrime website claimed they had breached the internal network of D-Link in Taiwan, which gave them access to a database storing the information of 3 million customers, as well as source code for the D-View network monitoring product.

Submitted by Adam Ekwall on

"Lloyd's of London Finds Hypothetical Cyberattack Could Cost World Economy $3.5 Trillion"

"Lloyd's of London Finds Hypothetical Cyberattack Could Cost World Economy $3.5 Trillion"

The insurance giant Lloyd's of London has warned that a major cyberattack against payment systems could cost the global economy $3.5 trillion. Modeled by the insurance marketplace and the Cambridge Centre for Risk Studies, the hypothetical scenario is deemed unlikely. Researchers estimated a 3.3 percent chance of happening. In addition, the British government has researched the probability of a cyberattack on the financial system and determined that a catastrophic incident is unlikely.

Submitted by Gregory Rigby on

"FBI Warns of Extortion Groups Targeting Plastic Surgery Offices"

"FBI Warns of Extortion Groups Targeting Plastic Surgery Offices"

According to the FBI, cybercriminals are using spoofed emails and phone numbers to target plastic surgery offices across the US. After gaining access to their networks, the attackers steal data from compromised systems to extort surgeons and patients. Stolen documents may contain highly sensitive information, such as medical records and, in some instances, photos taken for medical purposes. The cybercriminals supplement the stolen data with open-source information, such as social media details, to strengthen their extortion attempts.

Submitted by Gregory Rigby on

"Jupyter Notebooks Targeted by Cryptojackers"

"Jupyter Notebooks Targeted by Cryptojackers"

Researchers have discovered that cryptojackers are targeting exposed Jupyter Notebooks to install cryptocurrency miners and steal credential files for popular cloud services. Jupyter is a service that enables users to host individual code snippets and lets others execute this code in an isolated environment. According to Matt Muir, Threat Research Lead at Cado Security, a Jupyter Notebook refers to an instance of the Jupyter web application where a user would define the code to be run and how it is presented.

Submitted by Gregory Rigby on

"Former Navy IT Manager Sentenced to Prison for Hacking, Selling PII"

"Former Navy IT Manager Sentenced to Prison for Hacking, Selling PII"

A former US Navy IT manager was recently sentenced to five years and five months in prison for hacking into a database, stealing personally identifiable information (PII), and selling it on the dark web.  The man, Marquis Hooper, 32, of Selma, California, who was a chief petty officer, opened under false pretenses an account at a private company operating a database containing the PII of millions of individuals.

Submitted by Adam Ekwall on

"Cybercriminals Register .AI Domains of Trusted Brands for Malicious Activity"

"Cybercriminals Register .AI Domains of Trusted Brands for Malicious Activity"

According to CSC's 2023 Domain Security Report, nearly half of Forbes Global 2000 companies do not have control over their branded Artificial Intelligence (.AI) domain names, which third parties register. Cybercriminals are exploiting the popularity of AI by registering the domains of trusted brands for malicious activity. There has been a 350 percent increase in domain dispute cases involving .AI extensions in 2023 from companies who discovered that third parties were misappropriating .AI domains using their brands.

Submitted by Gregory Rigby on

"Russia's Sandworm Hacking Unit Targets Ukrainian Telecom Providers"

"Russia's Sandworm Hacking Unit Targets Ukrainian Telecom Providers"

According to a recent report from Ukrainian cybersecurity authorities, the Russian state hacking group Sandworm has targeted at least 11 Ukrainian Internet and telecommunication providers since May. Ukraine's Computer Emergency Response Team (CERT-UA) said the attacks resulted in service interruptions and potential data breaches. During the ongoing war, hackers target telecommunication providers in Russia and Ukraine to disrupt communications and Internet access.

Submitted by Gregory Rigby on
Subscribe to