Rakhi Kundu
Threat Intelligence Cybersecurity News January 02, 2023
Updated: Jan 3
I want to wish everyone a very Happy New Year! However, dark clouds of cyberattacks continue to loom over the cybersecurity landscape. The Bristol Community College was the victim of a ransomware attack that caused significant disruption. In the data breach section, the Indian arm of a Japanese automaker experienced a breach that is being investigated further. New year, new tactics appears to be the ALPHV ransomware group's motto. Continue reading to find out what happened in cyberspace over the weekend.
Top Threat Intelligence Breaches, Malware, and Vulnerabilities Reported in the Last 24hrs
The hack-for-hire group Evilnum was found targeting financial and travel entities in the Middle East and Europe. The campaign is, reportedly, active since 2015.
Telstra, an Australian telecoms provider, inadvertently leaked the names, addresses, and phone numbers of 130,000 customers whose details were supposed to be unlisted.
Several local U.S. governments had their networks targeted with the new Drokbk malware, reportedly used by Iranian threat actor Cobalt Mirage after abusing the Log4j vulnerability.
TrueBot, developed by a Russian-speaking hacker group Silence, has infected 1,500 systems worldwide to deploy the Teleport exfiltration tool, Cl0p ransomware, and other tools - noted researchers.
Around 360,000 Ontarians’ information was potentially compromised in a data breach of the Canadian province’s vaccine management system in 2021, revealed authorities.
The Hive ransomware group claimed responsibility for ongoing disruptions to computer systems at Knox College, Illinois. It claimed to have encrypted critical infrastructure and data.
The Australian Federal Police arrested four alleged members of a financial investment scam group that has pilfered over $100 million from victims across the world.
Amazon is warning customers of a new smishing campaign that is breaking into their online accounts and stealing their personal data.
Researchers developed COVID-bit, a new attack tactic, that leverages electromagnetic waves to transmit data from air-gapped systems isolated from the internet.
Trend Micro researchers spotted a cryptocurrency mining campaign against Linux machines using the open-source Chaos RAT to deploy Monero miner, among other functions.