Rakhi Kundu
Threat Intelligence Cybersecurity News December 12, 2022
Remember Evilnum? It’s back in the news. Its latest campaign has been active for seven years now, which is targeting entities across a couple of industries. In another vein, an Australian telecommunications provider leaked the data for hundreds of thousands of customers and apologized. On the ransomware front, Hive claimed yet another victim in the education sector. Read along for the top 10 cybersecurity news from the past 24 hours.
Top Breaches, Malware, and Vulnerabilities Reported in the Last 24hrs
The hack-for-hire group Evilnum was found targeting financial and travel entities in the Middle East and Europe. The campaign is, reportedly, active since 2015.
Telstra, an Australian telecoms provider, inadvertently leaked the names, addresses, and phone numbers of 130,000 customers whose details were supposed to be unlisted.
Several local U.S. governments had their networks targeted with the new Drokbk malware, reportedly used by Iranian threat actor Cobalt Mirage after abusing the Log4j vulnerability.
TrueBot, developed by a Russian-speaking hacker group Silence, has infected 1,500 systems worldwide to deploy the Teleport exfiltration tool, Cl0p ransomware, and other tools - noted researchers.
Around 360,000 Ontarians’ information was potentially compromised in a data breach of the Canadian province’s vaccine management system in 2021, revealed authorities.
The Hive ransomware group claimed responsibility for ongoing disruptions to computer systems at Knox College, Illinois. It claimed to have encrypted critical infrastructure and data.
The Australian Federal Police arrested four alleged members of a financial investment scam group that has pilfered over $100 million from victims across the world.
Amazon is warning customers of a new smishing campaign that is breaking into their online accounts and stealing their personal data.
Researchers developed COVID-bit, a new attack tactic, that leverages electromagnetic waves to transmit data from air-gapped systems isolated from the internet.
Trend Micro researchers spotted a cryptocurrency mining campaign against Linux machines using the open-source Chaos RAT to deploy Monero miner, among other functions.