<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Cyber Dispatch]]></title><description><![CDATA[A cybersecurity newsletter, focusing on the latest cyber attacks, updates, and legal advancements in the cybersecurity field. ]]></description><link>https://cyberdispatch.io</link><image><url>https://substackcdn.com/image/fetch/$s_!Aom4!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F586d5a09-c476-447a-9fd5-cb654626e34c_500x500.png</url><title>Cyber Dispatch</title><link>https://cyberdispatch.io</link></image><generator>Substack</generator><lastBuildDate>Thu, 09 Apr 2026 02:23:09 GMT</lastBuildDate><atom:link href="https://cyberdispatch.io/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Mikica Ivošević]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[cyberdispatch@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[cyberdispatch@substack.com]]></itunes:email><itunes:name><![CDATA[Mikica Ivošević]]></itunes:name></itunes:owner><itunes:author><![CDATA[Mikica Ivošević]]></itunes:author><googleplay:owner><![CDATA[cyberdispatch@substack.com]]></googleplay:owner><googleplay:email><![CDATA[cyberdispatch@substack.com]]></googleplay:email><googleplay:author><![CDATA[Mikica Ivošević]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Cyber Dispatch #8: Streamlined Cybersecurity Insights]]></title><description><![CDATA[Weekly overview of most important cybersecurity events of the past week (Friday 2.8.2024 to Thursday 8.8.2024)]]></description><link>https://cyberdispatch.io/p/cyber-dispatch-8-streamlined-cybersecurity-59d</link><guid isPermaLink="false">https://cyberdispatch.io/p/cyber-dispatch-8-streamlined-cybersecurity-59d</guid><dc:creator><![CDATA[Mikica Ivošević]]></dc:creator><pubDate>Thu, 08 Aug 2024 15:04:23 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ACqa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf802eb0-0b62-4832-8b85-30210e4c51f1_1920x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ACqa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf802eb0-0b62-4832-8b85-30210e4c51f1_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ACqa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf802eb0-0b62-4832-8b85-30210e4c51f1_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!ACqa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf802eb0-0b62-4832-8b85-30210e4c51f1_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!ACqa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf802eb0-0b62-4832-8b85-30210e4c51f1_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!ACqa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf802eb0-0b62-4832-8b85-30210e4c51f1_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ACqa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf802eb0-0b62-4832-8b85-30210e4c51f1_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/af802eb0-0b62-4832-8b85-30210e4c51f1_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:535436,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ACqa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf802eb0-0b62-4832-8b85-30210e4c51f1_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!ACqa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf802eb0-0b62-4832-8b85-30210e4c51f1_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!ACqa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf802eb0-0b62-4832-8b85-30210e4c51f1_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!ACqa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf802eb0-0b62-4832-8b85-30210e4c51f1_1920x1080.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In this issue: </p><p><strong>Apache OFBiz ERP </strong>-<strong> </strong>zero-day hits OFBiz Enterprise Resource Planning system;<br><strong>The Grand Palais R&#233;union des mus&#233;es nationaux </strong>-<strong> </strong>a ransomware attack hits Paris amidst the Olympics;<br><strong>McLaren Health Care</strong>, <strong>INC Ransom </strong>-<strong> </strong>ransomware attack on a major healthcare provider; <br><strong>Hunters International </strong>-<strong> </strong>a ransomware group targets IT workers with a new Trojan;<strong>&nbsp;&nbsp;<br>Cryptonator, US DoJ, German law enforcement </strong>-<strong> </strong>Crypto wallet seized by authorities;<strong>&nbsp;<br>Google, Android </strong>-<strong> </strong>zero-day exploited in the wild, update ASAP;<strong>&nbsp;<br>INTERPOL, I-GRIP </strong>- Authorities recover $40+ million from a BEC<br><strong>National Public Data </strong>- 2.9 billion personal records exposed as a result of data scraping;<br><strong>CrowdStrike, Windows </strong>- Crowdstrike discloses the official reason for the update fiasco;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://cyberdispatch.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://cyberdispatch.io/subscribe?"><span>Subscribe now</span></a></p><h1>Vulnerability of the Week - Apache OFBiz ERP 0-day ( CVE-2024-38856)</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!FevM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa292c4b4-a913-45c6-b85f-f5ace363bfb9_900x619.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!FevM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa292c4b4-a913-45c6-b85f-f5ace363bfb9_900x619.png 424w, https://substackcdn.com/image/fetch/$s_!FevM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa292c4b4-a913-45c6-b85f-f5ace363bfb9_900x619.png 848w, https://substackcdn.com/image/fetch/$s_!FevM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa292c4b4-a913-45c6-b85f-f5ace363bfb9_900x619.png 1272w, https://substackcdn.com/image/fetch/$s_!FevM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa292c4b4-a913-45c6-b85f-f5ace363bfb9_900x619.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!FevM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa292c4b4-a913-45c6-b85f-f5ace363bfb9_900x619.png" width="900" height="619" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a292c4b4-a913-45c6-b85f-f5ace363bfb9_900x619.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:619,&quot;width&quot;:900,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!FevM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa292c4b4-a913-45c6-b85f-f5ace363bfb9_900x619.png 424w, https://substackcdn.com/image/fetch/$s_!FevM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa292c4b4-a913-45c6-b85f-f5ace363bfb9_900x619.png 848w, https://substackcdn.com/image/fetch/$s_!FevM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa292c4b4-a913-45c6-b85f-f5ace363bfb9_900x619.png 1272w, https://substackcdn.com/image/fetch/$s_!FevM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa292c4b4-a913-45c6-b85f-f5ace363bfb9_900x619.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A critical zero-day vulnerability, CVE-2024-38856, has been discovered in the <strong>Apache OFBiz ERP</strong> system, allowing pre-authentication remote code execution. With a CVSS score of 9.8, this flaw affects versions prior to 18.12.15. SonicWall reported that the vulnerability stems from a flaw in the authentication mechanism, enabling unauthenticated users to access restricted functionalities. This issue also bypasses the patch for CVE-2024-36104, resolved in version 18.12.14. The flaw resides in the override view functionality, exposing critical endpoints to unauthenticated threat actors through specially crafted requests.</p><p><strong>[Ransomware]<br>The Grand Palais R&#233;union des mus&#233;es nationaux&nbsp;</strong></p><p>The <strong>Grand Palais R&#233;union des mus&#233;es nationaux</strong> in France suffered a ransomware attack on August 3, 2024, causing operational disruptions. The institute is currently hosting the fencing and Taekwondo competitions, as part of the Olympic Games. Systems were shut down to prevent the spread, affecting bookstores and boutiques. The museums under its management continue to operate normally. No group has yet claimed the attack.&nbsp;</p><p><strong>[Ransomware]<br>McLaren Health Care</strong>, <strong>INC Ransom</strong></p><p>On Tuesday (August, 6th), <strong>McLaren Health Care</strong> hospitals' IT and phone systems were disrupted by an <strong>INC Ransom</strong> ransomware attack. The non-profit health system, with $6.5 billion in annual revenue, is investigating the breach and advises patients to bring detailed medical information to appointments due to potential data access issues. <strong>INC Ransom</strong> is a ransomware-as-a-service (RaaS) operation that surfaced in July 2023 and has since targeted organizations in both the public and private sectors.</p><p><strong>[Ransomware]<br>Hunters International ransomware</strong></p><p><strong>The Hunters International</strong> ransomware group targets IT workers with SharpRhino, a new C# remote access trojan. The Trojan malware achieves initial infection, elevates privileges, executes PowerShell commands, and deploys ransomware. Reportedly, it uses typosquatting sites to impersonate legitimate networking tools for initial infection.</p><p><strong>[Cryptocurrencies]<br>Cryptonator, US DoJ, German law enforcement</strong></p><p>U.S. and German authorities seized <strong>Cryptonator</strong>'s domain, used by ransomware gangs and darknet markets, and indicted its operator Roman Boss for money laundering and operating an unlicensed money service. <strong>Cryptonator</strong> lacked anti-money laundering controls, enabling illicit activities.</p><p><strong>[Update]<br>Google, Android</strong></p><p><strong>Google</strong> has patched CVE-2024-36971, a high-severity Linux kernel vulnerability in Android devices. The bug, under limited, targeted exploitation, allows remote code execution. <strong>Google</strong>'s August update also addressed 46 other flaws, with most rated high severity, highlighting the increasing threat of zero-day exploits by both espionage and financially motivated hackers.</p><p><strong>[Legal]<br>INTERPOL, I-GRIP</strong></p><p><strong>INTERPOL</strong>'s stop-payment mechanism, <strong>I-GRIP</strong>, recovered over $40 million stolen in a BEC attack on an unnamed commodity firm based in Singapore. This marks the largest recovery of funds from a BEC scam to date, demonstrating the effectiveness of the <strong>Global Rapid Intervention of Payments</strong> (I-GRIP) system.</p><p><strong>[Legal]<br>National Public Data (Jerico Pictures)</strong></p><p>A class action lawsuit against <strong>National Public Data</strong> (Jerico Pictures) alleges a data breach exposed 2.9 billion personal records on the dark web. The breach involved sensitive data collected through &#8216;scraping&#8217; and has led to accusations of negligence. Plaintiffs seek compensation and improved data protection measures.</p><p><strong>[Legal]<br>CrowdStrike, Windows</strong></p><p><strong>CrowdStrike</strong>'s root cause analysis revealed a content validation issue in the Falcon Sensor update, causing a global <strong>Windows</strong> crash. The problem stemmed from a mismatch in input parameters during the introduction of a new <strong>IPC Template Type</strong>, undetected in testing due to wildcard matching criteria.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cyberdispatch.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Dispatch! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>Resources</h3><ul><li><p><a href="https://thehackernews.com/2024/08/new-zero-day-flaw-in-apache-ofbiz-erp.html">The Hacker News: New Zero-Day Flaw in Apache OFBiz ERP Allows Remote Code Execution</a></p></li></ul><ul><li><p><a href="https://www.bleepingcomputer.com/news/security/frances-grand-palais-discloses-cyberattack-during-olympic-games/">Bleeping Computer: France's Grand Palais discloses cyberattack during Olympic games</a></p></li><li><p><a href="https://www.bleepingcomputer.com/news/security/mclaren-hospitals-disruption-linked-to-inc-ransomware-attack/">Bleeping Computer: McLaren hospitals disruption linked to INC ransomware attack</a></p></li></ul><ul><li><p><a href="https://www.bleepingcomputer.com/news/security/hunters-international-ransomware-gang-targets-it-workers-with-new-sharprhino-malware/">Bleeping Computer: Ransomware gang targets IT workers with new SharpRhino malware</a></p></li></ul><ul><li><p><a href="https://www.bleepingcomputer.com/news/cryptocurrency/cryptonator-seized-for-laundering-ransom-payments-stolen-crypto/">Bleeping Computer: Cryptonator seized for laundering ransom payments, stolen crypto</a></p></li></ul><ul><li><p><a href="https://therecord.media/android-zero-day-google-fix-august-patch">The Record: Google says Android zero-day was exploited in the wild</a></p></li></ul><ul><li><p><a href="https://www.bleepingcomputer.com/news/security/interpol-recovers-over-40-million-stolen-in-a-bec-attack/">Bleeping Computer: INTERPOL recovers over $40 million stolen in a BEC attack</a></p></li></ul><ul><li><p><a href="https://www.techradar.com/pro/3-billion-people-s-personal-data-leaked-to-the-dark-web-including-social-security-numbers">Tech Radar: One of the biggest data breaches ever leaks details on billions of users &#8212; here's what we know so far</a></p></li></ul><ul><li><p><a href="https://thehackernews.com/2024/08/crowdstrike-reveals-root-cause-of.html">The Hacker News: CrowdStrike Reveals Root Cause of Global System Outages</a></p></li></ul>]]></content:encoded></item><item><title><![CDATA[Cyber Dispatch #8: Streamlined Cybersecurity Insights ]]></title><description><![CDATA[Weekly overview of most important cybersecurity events of the past week (Monday 26.7.2024 to Wednesday 2.8.2024)]]></description><link>https://cyberdispatch.io/p/cyber-dispatch-8-streamlined-cybersecurity</link><guid isPermaLink="false">https://cyberdispatch.io/p/cyber-dispatch-8-streamlined-cybersecurity</guid><dc:creator><![CDATA[Mikica Ivošević]]></dc:creator><pubDate>Fri, 02 Aug 2024 09:22:42 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!hQ7O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4de7c8-0058-49ee-b0bc-48ffd091e656_1920x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hQ7O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4de7c8-0058-49ee-b0bc-48ffd091e656_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hQ7O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4de7c8-0058-49ee-b0bc-48ffd091e656_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!hQ7O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4de7c8-0058-49ee-b0bc-48ffd091e656_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!hQ7O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4de7c8-0058-49ee-b0bc-48ffd091e656_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!hQ7O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4de7c8-0058-49ee-b0bc-48ffd091e656_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hQ7O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4de7c8-0058-49ee-b0bc-48ffd091e656_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9a4de7c8-0058-49ee-b0bc-48ffd091e656_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:536003,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hQ7O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4de7c8-0058-49ee-b0bc-48ffd091e656_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!hQ7O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4de7c8-0058-49ee-b0bc-48ffd091e656_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!hQ7O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4de7c8-0058-49ee-b0bc-48ffd091e656_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!hQ7O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9a4de7c8-0058-49ee-b0bc-48ffd091e656_1920x1080.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I<strong>n this issue:</strong></p><p><strong>Acronis </strong>- an RCE vulnerability actively exploited, update now;</p><p><strong>Dark Angels </strong>- biggest ransom ever paid in a ransomware case;</p><p><strong>OneBlood </strong>- ransomware attack on a blood transfusion clinic;</p><p><strong>HealthEquity </strong>- 4.3 million records breached from HealthEquity;&nbsp;</p><p><strong>Google Workspace </strong>- a flaw enabled hackers circumvent email verification;&nbsp;&nbsp;&nbsp;</p><p><strong>ServiceNow</strong> - cloud software breached with the help of two vulnerabilities;&nbsp;</p><p><strong>Delta Air Lines / CrowdStrike </strong>- An airline has launched a lawsuit against Crowdstrike after the recent update fiasco;&nbsp;</p><p><strong>Meta / Texas Attorney General -  </strong>Meta to pay<strong> </strong>$1.4 billion due to privacy violation;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://cyberdispatch.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://cyberdispatch.io/subscribe?"><span>Subscribe now</span></a></p><h1>Vulnerability of the Week - Acronis RCE (CVE-2023-45249)</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!L_xB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf8c6a28-ed41-4368-bd67-f9a353488a6f_1200x675.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!L_xB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf8c6a28-ed41-4368-bd67-f9a353488a6f_1200x675.png 424w, https://substackcdn.com/image/fetch/$s_!L_xB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf8c6a28-ed41-4368-bd67-f9a353488a6f_1200x675.png 848w, https://substackcdn.com/image/fetch/$s_!L_xB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf8c6a28-ed41-4368-bd67-f9a353488a6f_1200x675.png 1272w, https://substackcdn.com/image/fetch/$s_!L_xB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf8c6a28-ed41-4368-bd67-f9a353488a6f_1200x675.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!L_xB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf8c6a28-ed41-4368-bd67-f9a353488a6f_1200x675.png" width="1200" height="675" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bf8c6a28-ed41-4368-bd67-f9a353488a6f_1200x675.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:675,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!L_xB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf8c6a28-ed41-4368-bd67-f9a353488a6f_1200x675.png 424w, https://substackcdn.com/image/fetch/$s_!L_xB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf8c6a28-ed41-4368-bd67-f9a353488a6f_1200x675.png 848w, https://substackcdn.com/image/fetch/$s_!L_xB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf8c6a28-ed41-4368-bd67-f9a353488a6f_1200x675.png 1272w, https://substackcdn.com/image/fetch/$s_!L_xB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbf8c6a28-ed41-4368-bd67-f9a353488a6f_1200x675.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Cybersecurity company <strong>Acronis</strong> has issued a warning about a critical security flaw in its Cyber Infrastructure (ACI) product that has been exploited in the wild. The vulnerability, tracked as CVE-2023-45249 (CVSS score: 9.8), allows remote code execution due to the use of default passwords.&nbsp;</p><p>It impacts ACI builds:</p><ul><li><p>5.0.1-61</p></li><li><p>5.1.1-71</p></li><li><p>5.2.1-69</p></li><li><p>5.3.1-53</p></li><li><p>5.4.4-132&nbsp;</p></li></ul><p>The flaw has been patched in versions:&nbsp;</p><ul><li><p>5.4 update 4.2</p></li><li><p>5.2 update 1.3</p></li><li><p>5.3 update 1.3</p></li><li><p>5.0 update 1.4</p></li><li><p>5.1 update 1.2&nbsp;</p></li></ul><p>Acronis discovered the issue when investigating a customer's report of performance degradation, finding crypto-mining software installed.</p><p><strong>[Ransomware]</strong></p><p><strong>Dark Angels</strong></p><p>An undisclosed Fortune 50 company paid a record-breaking $75 million ransom to the D<strong>ark Angels</strong> ransomware gang, as reported by Zscaler ThreatLabz and confirmed by Chainalysis. The largest known ransom payment was previously $40 million, paid by CNA after an Evil Corp ransomware attack.</p><p><strong>[Ransomware]</strong></p><p><strong>OneBlood</strong></p><p>A ransomware attack has severely impacted <strong>OneBlood</strong>, a major U.S. blood donation center. Operating at reduced capacity, <strong>OneBlood</strong> has implemented manual processes and asked over 250 hospitals to activate critical blood shortage protocols. They are collaborating with cybersecurity experts and officials to resolve the crisis.</p><p><strong>[Data Breach]</strong></p><p><strong>HealthEquity</strong></p><p><strong>HealthEquity</strong> reported a data breach affecting 4.3 million people. A compromised vendor&#8217;s user accounts allowed unauthorized access to a data repository, exposing names, contact information, Social Security numbers, health plan details, diagnoses, prescription information, and payment card details (excluding card numbers).</p><p><strong>[Data Breach]</strong></p><p><strong>Google Workspace</strong></p><p>A <strong>Google Workspace</strong> authentication flaw allowed hackers to bypass email verification, impersonate companies, and access third-party services using "Sign in with Google." The vulnerability, discovered by KrebsOnSecurity, was exploited in the wild and affected thousands of accounts before Google fixed it.</p><p><strong>[DDoS]</strong></p><p><strong>Microsoft</strong></p><p><strong>Microsoft</strong> confirmed a nine-hour outage on Tuesday was caused by a DDoS attack. The outage disrupted Microsoft 365, Azure services, and other applications. An error in DDoS defense implementation worsened the impact. A preliminary post-incident review will be released within 72 hours.</p><p><strong>[Vulnerability]</strong></p><p><strong>ServiceNow</strong></p><p>Hackers are exploiting two vulnerabilities in <strong>ServiceNow&#8217;s</strong> cloud software to steal sensitive data. Despite patches released in May and June, public disclosure led to increased attacks. The Cybersecurity and Infrastructure Security Agency warns federal agencies to patch the bugs by August 19 due to their critical severity.</p><p><strong>[Legal]</strong></p><p><strong>Delta Air Lines / CrowdStrike</strong></p><p><strong>Delta Air Lines</strong> hired attorney David Boies to seek damages from <strong>CrowdStrike </strong>and <strong>Microsoft</strong> after a July 19 software update caused an outage, leading to widespread flight cancellations. The incident cost Delta $350-$500 million and caused CrowdStrike's shares to drop 5%.&nbsp;</p><p><strong>[Legal]</strong></p><p><strong>Meta / Texas Attorney General</strong></p><p><strong>Meta</strong> has agreed to a $1.4 billion settlement with Texas over unauthorized use of biometric data. Texas Attorney General Ken Paxton noted this is the largest state-secured settlement. Previously, Meta settled for $650 million in Illinois. <strong>Meta</strong> aims to invest further in Texas despite the settlement.&nbsp;</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cyberdispatch.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Dispatch! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>Resources</h3><ul><li><p><a href="https://thehackernews.com/2024/07/critical-flaw-in-acronis-cyber.html">The Hacker News Critical Flaw in Acronis Cyber Infrastructure Exploited in the Wild</a></p></li></ul><ul><li><p><a href="https://www.bleepingcomputer.com/news/security/dark-angels-ransomware-receives-record-breaking-75-million-ransom/">Bleeping Computer: Dark Angels ransomware receives record-breaking $75 million ransom</a></p></li></ul><ul><li><p><a href="https://therecord.media/ransomware-attack-blood-center-shortage-protocols-hospitals">The Record: Ransomware attack on major US blood center prompts hundreds of hospitals to implement shortage protocols</a></p></li></ul><ul><li><p><a href="https://www.healthcaredive.com/news/healthequity-data-breach-4-3-million-affected/722792/">HealthCare Dive: HealthEquity data breach could affect 4.3M</a></p></li></ul><ul><li><p><a href="https://www.techradar.com/pro/security/hackers-bypass-google-workspace-authentication-to-expose-thousands-of-accounts">Tech Radar: Hackers bypass Google Workspace authentication to expose thousands of accounts</a></p></li></ul><ul><li><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-says-massive-azure-outage-was-caused-by-ddos-attack/">Bleeping Computer: Microsoft says massive Azure outage was caused by DDoS attack</a>&nbsp;&nbsp;</p></li></ul><ul><li><p><a href="https://therecord.media/critical-servicenow-vulnerabilities-hackers-cisa">The Record: Critical ServiceNow vulnerabilities being targeted by hackers, cyber agency warns</a></p></li></ul><ul><li><p><a href="https://www.cnbc.com/2024/07/29/delta-hires-david-boies-to-seek-damages-from-crowdstrike-microsoft-.html?ref=news.risky.biz">NBC: Delta hires David Boies to seek damages from CrowdStrike, Microsoft after outage</a></p></li></ul><ul><li><p><a href="https://apnews.com/article/texas-attorney-general-meta-settlement-3ed4d9c3c3abc4494a3731eac8643e4e#:~:text=AUSTIN%2C%20Texas%20(AP)%20%E2%80%94,secured%20by%20a%20single%20state.">AP: Meta agrees to $1.4B settlement with Texas in privacy lawsuit over facial recognition</a></p></li></ul>]]></content:encoded></item><item><title><![CDATA[Cyber Dispatch #7: Streamlined Cybersecurity Insights]]></title><description><![CDATA[Weekly overview of most important cybersecurity events of the past week (Monday, 18.7.2024 to Friday, 26.7.2024)]]></description><link>https://cyberdispatch.io/p/cyber-dispatch-7-streamlined-cybersecurity</link><guid isPermaLink="false">https://cyberdispatch.io/p/cyber-dispatch-7-streamlined-cybersecurity</guid><dc:creator><![CDATA[Mikica Ivošević]]></dc:creator><pubDate>Sat, 27 Jul 2024 09:30:04 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!5EAW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c9bb5f-4d64-4c19-b8c9-29ae218c745f_1920x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5EAW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c9bb5f-4d64-4c19-b8c9-29ae218c745f_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5EAW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c9bb5f-4d64-4c19-b8c9-29ae218c745f_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!5EAW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c9bb5f-4d64-4c19-b8c9-29ae218c745f_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!5EAW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c9bb5f-4d64-4c19-b8c9-29ae218c745f_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!5EAW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c9bb5f-4d64-4c19-b8c9-29ae218c745f_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5EAW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c9bb5f-4d64-4c19-b8c9-29ae218c745f_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c2c9bb5f-4d64-4c19-b8c9-29ae218c745f_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:533569,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5EAW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c9bb5f-4d64-4c19-b8c9-29ae218c745f_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!5EAW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c9bb5f-4d64-4c19-b8c9-29ae218c745f_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!5EAW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c9bb5f-4d64-4c19-b8c9-29ae218c745f_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!5EAW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2c9bb5f-4d64-4c19-b8c9-29ae218c745f_1920x1080.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In this issue: </p><p>Crowdstrike - a failed update crashes Windows, invites hackers;&nbsp;<br>Play / VMware ESXi - ESXi vulnerability exploited by a vicious ransomware;<br>Telegram / Android - a raging malware campaign endangers Telegram users;&nbsp;<br>Land Registry of Greece - hackers 400 cyberattacks and exfiltrate 1.2 GB of data;&nbsp;<br>KnowBe4, North Korea - security company accidentally hires a N. Korean spy; Hamster Kombat - popular play-to-earn game targeted by a spyware campaign; <br>Verizon / TracFone Wireless - $16m settlement over three data breaches; <br>Lockbit - two Russian nationals plead guilty for taking part in Lockbit operations;&nbsp;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://cyberdispatch.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://cyberdispatch.io/subscribe?"><span>Subscribe now</span></a></p><h1>Vulnerability of the Week - Crowdstrike failed update</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!A3BV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76e533e2-120f-4abf-97be-7e8ee4b6e18c_1024x576.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!A3BV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76e533e2-120f-4abf-97be-7e8ee4b6e18c_1024x576.png 424w, https://substackcdn.com/image/fetch/$s_!A3BV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76e533e2-120f-4abf-97be-7e8ee4b6e18c_1024x576.png 848w, https://substackcdn.com/image/fetch/$s_!A3BV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76e533e2-120f-4abf-97be-7e8ee4b6e18c_1024x576.png 1272w, https://substackcdn.com/image/fetch/$s_!A3BV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76e533e2-120f-4abf-97be-7e8ee4b6e18c_1024x576.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!A3BV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76e533e2-120f-4abf-97be-7e8ee4b6e18c_1024x576.png" width="1024" height="576" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/76e533e2-120f-4abf-97be-7e8ee4b6e18c_1024x576.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:576,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!A3BV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76e533e2-120f-4abf-97be-7e8ee4b6e18c_1024x576.png 424w, https://substackcdn.com/image/fetch/$s_!A3BV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76e533e2-120f-4abf-97be-7e8ee4b6e18c_1024x576.png 848w, https://substackcdn.com/image/fetch/$s_!A3BV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76e533e2-120f-4abf-97be-7e8ee4b6e18c_1024x576.png 1272w, https://substackcdn.com/image/fetch/$s_!A3BV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76e533e2-120f-4abf-97be-7e8ee4b6e18c_1024x576.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Although not a vulnerability in the classical sense, the <strong>CrowdStrike</strong> incident on July 19, 2024, caused major disruptions due to a faulty update affecting Windows workstations. Cybercriminals exploited the chaos, distributing Remcos RAT via a fake "crowdstrike-hotfix.zip" file targeting Latin American users.&nbsp;</p><p>As for the initial incident, <strong>CrowdStrike</strong> has deployed a fix for its Falcon Sensor product. Impacted users should delete the file "C-00000291*.sys" from the <strong>CrowdStrike</strong> directory in Safe Mode and restart. The outage also impacted Google Cloud Compute Engine, crashing Windows VMs using csagent.sys. Airlines, banks, retail chains, hospitals, and telecom firms were affected, leading to a 15% drop in <strong>CrowdStrike</strong> shares in U.S. premarket trading.</p><p><strong>[Ransomware]<br>Play / VMware ESXi</strong></p><p><strong>Play</strong> ransomware now targets <strong>VMware ESXi</strong> virtual machines with a new Linux locker. Trend Micro reports this variant checks for <strong>ESXi</strong> environments before executing and evades detection on Linux systems. This move indicates a broader attack strategy, exploiting the shift of enterprises to <strong>ESXi</strong> for critical data storage and hosting.</p><p><strong>[Vulnerability]<br>Telegram</strong></p><p>A <strong>Telegram</strong> for Android zero-day vulnerability dubbed 'EvilVideo' allowed attackers to send malicious APKs disguised as video files. Discovered by ESET researchers and disclosed in June 2024, it was patched in version 10.14.5 on July 11, 2024. Threat actors exploited the flaw for at least five weeks</p><p><strong>[Data Breach]<br>Land Registry of Greece</strong></p><p>Greece's <strong>Land Registry </strong>experienced a limited data breach following 400 cyberattacks over a week. Hackers stole 1.2 GB of non-sensitive administrative data but failed to access or exfiltrate key databases. Emergency measures include password resets and mandatory two-factor authentication. Operations remain unaffected and ongoing attacks are unknown.</p><p><strong>[Malware]<br>KnowBe4, North Korea</strong></p><p><strong>KnowBe4</strong> accidentally hired a North Korean threat actor as a software engineer. Despite thorough pre-hiring checks, the individual used a stolen identity and AI-enhanced photo. Upon receiving his workstation, he attempted to load malware. The company detected and contained the threat without any data breach or loss</p><p><strong>[Cryptocurrency]<br>Hamster Kombat</strong></p><p>Cybercriminals are exploiting the popularity of the <strong>Hamster Kombat</strong> game, which has over 250 million players, by distributing fake Android and Windows apps that install spyware and information-stealing malware. Launched in March 2024, the game involves earning fictional currency and has significant growth due to a new crypto token.&nbsp;</p><p><strong>[Legal]<br>Verizon TracFone Wireless</strong></p><p><strong>Verizon Communications</strong> will pay $16 million to settle FCC charges over three data breaches at its subsidiary, <strong>TracFone Wireless</strong>. The breaches, from 2021 to 2023, involved unauthorized access to customer data due to security vulnerabilities. The settlement mandates improved data security measures by TracFone.</p><p><strong>[Legal]<br>Lockbit</strong></p><p>Two Russian nationals, Ruslan Magomedovich Astamirov and Mikhail Vasiliev, have pleaded guilty in the U.S. for their roles in the <strong>LockBit</strong> ransomware scheme. Astamirov, arrested in May 2023, and Vasiliev, extradited from Canada, face significant prison sentences. <strong>LockBit</strong> has attacked over 2,500 entities globally, demanding substantial ransoms.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cyberdispatch.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Dispatch! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>Resources</h3><ul><li><p><a href="https://thehackernews.com/2024/07/faulty-crowdstrike-update-crashes.html">The Hacker News: Faulty CrowdStrike Update Crashes Windows Systems, Impacting Businesses Worldwide</a></p></li></ul><ul><li><p><a href="https://www.bleepingcomputer.com/news/security/telegram-zero-day-allowed-sending-malicious-android-apks-as-videos/">Bleeping Computer: Telegram zero-day allowed sending malicious Android APKs as videos</a></p></li></ul><ul><li><p><a href="https://www.bleepingcomputer.com/news/security/greeces-land-registry-agency-breached-in-wave-of-400-cyberattacks/">Bleeping Computer: Greece&#8217;s Land Registry agency breached in wave of 400 cyberattacks</a></p></li></ul><ul><li><p><a href="https://www.bleepingcomputer.com/news/security/new-play-ransomware-linux-version-targets-vmware-esxi-vms/">Bleeping Computer: New Play ransomware Linux version targets VMware ESXi VMs</a></p></li></ul><ul><li><p><a href="https://www.darkreading.com/vulnerabilities-threats/security-firm-hires-north-korean-hacker-knowbe4">Dark Readings: Security Firm Accidentally Hires North Korean Hacker, Did Not KnowBe4</a></p></li></ul><ul><li><p><a href="https://thehackernews.com/2024/07/cybercriminals-exploit-crowdstrike.html">The Hacker News: Cybercriminals Exploit CrowdStrike Update Mishap to Distribute Remcos RAT Malware</a></p></li></ul><ul><li><p><a href="https://www.bleepingcomputer.com/news/security/hamster-kombats-250-million-players-targeted-in-malware-attacks/">Bleeping Computer: Hamster Kombat&#8217;s 250 million players targeted in malware attacks</a></p></li></ul><ul><li><p><a href="https://www.bleepingcomputer.com/news/security/verizon-to-pay-16-million-in-tracfone-data-breach-settlement/">Bleeping Computer: Verizon to pay $16 million in TracFone data breach settlement</a></p></li></ul><ul><li><p><a href="https://thehackernews.com/2024/07/two-russian-nationals-plead-guilty-in.html">The Hacker News: Two Russian Nationals Plead Guilty in LockBit Ransomware Attacks</a></p></li></ul>]]></content:encoded></item><item><title><![CDATA[Cyber Dispatch #6: Streamlined Cybersecurity Insights]]></title><description><![CDATA[Weekly overview of most important cybersecurity events of the past week (Monday 11.7.2024 to Wednesday 17.7.2024)]]></description><link>https://cyberdispatch.io/p/cyber-dispatch-6-streamlined-cybersecurity</link><guid isPermaLink="false">https://cyberdispatch.io/p/cyber-dispatch-6-streamlined-cybersecurity</guid><dc:creator><![CDATA[Mikica Ivošević]]></dc:creator><pubDate>Thu, 18 Jul 2024 11:32:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!meMB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1286595b-93e4-43d7-a4d9-6ecf9e92d722_1920x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!meMB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1286595b-93e4-43d7-a4d9-6ecf9e92d722_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!meMB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1286595b-93e4-43d7-a4d9-6ecf9e92d722_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!meMB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1286595b-93e4-43d7-a4d9-6ecf9e92d722_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!meMB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1286595b-93e4-43d7-a4d9-6ecf9e92d722_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!meMB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1286595b-93e4-43d7-a4d9-6ecf9e92d722_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!meMB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1286595b-93e4-43d7-a4d9-6ecf9e92d722_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1286595b-93e4-43d7-a4d9-6ecf9e92d722_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:513802,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!meMB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1286595b-93e4-43d7-a4d9-6ecf9e92d722_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!meMB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1286595b-93e4-43d7-a4d9-6ecf9e92d722_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!meMB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1286595b-93e4-43d7-a4d9-6ecf9e92d722_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!meMB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1286595b-93e4-43d7-a4d9-6ecf9e92d722_1920x1080.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>In this issue:</strong></p><p><strong>Exim - </strong>1,567,109 servers exposed to a critical flaw;<strong><br>AT&amp;T - </strong>109 million accounts breached in Snowflake April attack;<strong><br>Ticket Heist </strong>- fake Paris 2024 Olympics tickets flood the market; <strong><br>Kaspersky </strong>- cybersecurity giant shuts down operations in US; <strong><br>Tether </strong>- stablecoin freezes $29m in Cambodia due to scams; <strong><br>PHP </strong>-<strong> </strong>new critical RCE flaw discovered, update now; <strong><br>regreSSHio</strong>n - new flaw discovered related to the dreaded SSH bug;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://cyberdispatch.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://cyberdispatch.io/subscribe?"><span>Subscribe now</span></a></p><h1>Vulnerability of the Week - Exim bug (CVE-2024-39929)</h1><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mXqa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40f7703f-95e9-4fd3-9216-7123bd573222_1280x460.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mXqa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40f7703f-95e9-4fd3-9216-7123bd573222_1280x460.png 424w, https://substackcdn.com/image/fetch/$s_!mXqa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40f7703f-95e9-4fd3-9216-7123bd573222_1280x460.png 848w, https://substackcdn.com/image/fetch/$s_!mXqa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40f7703f-95e9-4fd3-9216-7123bd573222_1280x460.png 1272w, https://substackcdn.com/image/fetch/$s_!mXqa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40f7703f-95e9-4fd3-9216-7123bd573222_1280x460.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mXqa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40f7703f-95e9-4fd3-9216-7123bd573222_1280x460.png" width="1280" height="460" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/40f7703f-95e9-4fd3-9216-7123bd573222_1280x460.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:460,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mXqa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40f7703f-95e9-4fd3-9216-7123bd573222_1280x460.png 424w, https://substackcdn.com/image/fetch/$s_!mXqa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40f7703f-95e9-4fd3-9216-7123bd573222_1280x460.png 848w, https://substackcdn.com/image/fetch/$s_!mXqa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40f7703f-95e9-4fd3-9216-7123bd573222_1280x460.png 1272w, https://substackcdn.com/image/fetch/$s_!mXqa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F40f7703f-95e9-4fd3-9216-7123bd573222_1280x460.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Censys reports that over 1.5 million <strong>Exim</strong> mail servers are vulnerable to CVE-2024-39929, a flaw allowing bypass of security filters by incorrectly parsing multiline RFC2231 header filenames. This could let attackers deliver malicious executables. As of July 10, 2024, 1,567,109 exposed <strong>Exim</strong> servers remain unpatched, mostly in the U.S., Russia, and Canada. The NSA revealed in May 2020 that Russian hackers Sandworm exploited the <strong>Exim</strong> CVE-2019-10149 flaw since August 2019. In October, Exim developers patched three zero-days, including CVE-2023-42115, exposing millions of servers to pre-auth RCE attacks.</p><p><strong>[Data Breach]</strong></p><p><strong>AT&amp;T</strong></p><p>Metadata from nearly all call logs and texts made by <strong>AT&amp;T</strong> customers over six months in 2022 was stolen in April via a breach of the Snowflake platform. The breach affected about 109 million accounts and involved hackers accessing and exfiltrating files containing aggregated metadata.</p><p><strong>[Fraud]<br>Ticket Heist</strong></p><p>A large-scale fraud campaign, dubbed <strong>"Ticket Heist"</strong>, targets Russian-speaking users with over 700 domains selling fake tickets for the Paris 2024 Olympics. The operation exploits major sports and music events, registering about 20 new domains monthly since 2022.</p><p><strong>[Legal]</strong></p><p><strong>Kaspersky</strong></p><p><strong>Kaspersky Lab</strong> will shut down its U.S. operations on July 20, affecting fewer than 50 employees. This follows U.S. sanctions against <strong>Kaspersky</strong> executives and its inclusion on the Entity List due to national security risks, making their operations non-viable.</p><p><strong>[Cryptocurrency]<br>Tether</strong></p><p><strong>Tether stablecoin</strong> froze over 29 million USDT linked to a Cambodian online marketplace used for &#8220;pig butchering scams&#8221;, a type of cryptocurrency pyramid scheme. Researchers from Elliptic revealed Huione Guarantee's role in Southeast Asian cybercrime, with $11 billion in transactions over three years, primarily in USDT. </p><p><strong>[Update]<br>PHP</strong></p><p>Threat actors are exploiting the <strong>PHP</strong> flaw CVE-2024-4577 (CVSS score: 9.8) to deploy remote access trojans, cryptocurrency miners, and DDoS botnets. The vulnerability, publicly disclosed in June 2024, allows remote command execution on Windows systems using Chinese and Japanese locales by misinterpreting Unicode to ASCII conversions. Update <strong>PHP</strong> to the latest patched versions to mitigate the risk of exploitation.</p><p><strong>[Update]<br>Linux - regreSSHion</strong></p><p>The <strong>regreSSHion</strong> bug, discovered by Qualys, potentially impacts millions of OpenSSH servers. However, a new flaw related to <strong>regreSSHion</strong>, CVE-2024-6409, found by an independent researcher, Alexander Peslyak, also allows remote code execution but has a lower immediate impact. <strong>Linux</strong> distributions are releasing patches, while Windows and macOS are likely unaffected.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cyberdispatch.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Dispatch! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>Resources</h3><ul><li><p><a href="https://www.bleepingcomputer.com/news/security/critical-exim-bug-bypasses-security-filters-on-15-million-mail-servers/">Bleeping Computer: Critical Exim bug bypasses security filters on 1.5 million mail servers</a></p></li></ul><ul><li><p><a href="https://therecord.media/hackers-stole-call-logs-att-months">The Record: Hackers stole &#8216;nearly all&#8217; call logs over six months from AT&amp;T</a></p></li></ul><ul><li><p><a href="https://www.bleepingcomputer.com/news/security/kaspersky-is-shutting-down-its-business-in-the-united-states/">Bleeping Computer: Kaspersky is shutting down its business in the United States</a></p></li></ul><ul><li><p><a href="https://www.bleepingcomputer.com/news/security/ticket-heist-fraud-gang-uses-700-domains-to-sell-fake-olympics-tickets/">Bleeping Computer: Ticket Heist fraud gang uses 700 domains to sell fake Olympics tickets</a></p></li></ul><ul><li><p><a href="https://therecord.media/hackers-stole-call-logs-att-months">The Record: Tether freezes $29 million of cryptocurrency connected to Cambodian marketplace accused of fueling scams</a></p></li></ul><ul><li><p><a href="https://thehackernews.com/2024/07/php-vulnerability-exploited-to-spread.html">The Hacker News: PHP Vulnerability Exploited to Spread Malware and Launch DDoS Attacks</a></p></li></ul><ul><li><p><a href="https://www.securityweek.com/microsoft-says-windows-not-impacted-by-regresshion-as-second-openssh-bug-is-found/#:~:text=Microsoft%20confirmed%20last%20week%20that,Microsoft%20explained%20in%20its%20advisory.">Security Week: Microsoft Says Windows Not Impacted by regreSSHion as Second OpenSSH Bug Is Found</a></p></li></ul>]]></content:encoded></item><item><title><![CDATA[Cyber Dispatch #5: Streamlined Cybersecurity Insights ]]></title><description><![CDATA[Weekly overview of most important cybersecurity events of the past week (Monday 1.7.2024 to Wednesday 10.7.2024)]]></description><link>https://cyberdispatch.io/p/cyber-dispatch-5-streamlined-cybersecurity</link><guid isPermaLink="false">https://cyberdispatch.io/p/cyber-dispatch-5-streamlined-cybersecurity</guid><dc:creator><![CDATA[Mikica Ivošević]]></dc:creator><pubDate>Wed, 10 Jul 2024 10:28:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!QRgq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32868b44-0d52-419b-9f80-b1fc9852216a_1920x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QRgq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32868b44-0d52-419b-9f80-b1fc9852216a_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QRgq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32868b44-0d52-419b-9f80-b1fc9852216a_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!QRgq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32868b44-0d52-419b-9f80-b1fc9852216a_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!QRgq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32868b44-0d52-419b-9f80-b1fc9852216a_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!QRgq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32868b44-0d52-419b-9f80-b1fc9852216a_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QRgq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32868b44-0d52-419b-9f80-b1fc9852216a_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/32868b44-0d52-419b-9f80-b1fc9852216a_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:528774,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QRgq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32868b44-0d52-419b-9f80-b1fc9852216a_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!QRgq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32868b44-0d52-419b-9f80-b1fc9852216a_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!QRgq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32868b44-0d52-419b-9f80-b1fc9852216a_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!QRgq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32868b44-0d52-419b-9f80-b1fc9852216a_1920x1080.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>In this issue:</strong> </p><p><strong>Ghostscript</strong> - RCE affecting Ghostscript document conversion toolkit;<br><strong>Eldorado RaaS</strong> - new player on the ransomware scene targets 16 victims worldwide;<br><strong>Ticketmaster</strong>/<strong>Sp1derHunters - </strong>hacker group prints out additional 39k tickets; <br><strong>Neiman Marcus - </strong>31m customers affected, and not 64k as first reported;  <strong><br>PhilHealth/Medusa Ransomware - </strong>42m leaked sets of data: lawmakers demand immediate explanation; <strong><br>Polyfill.io/Hertzer CSP - </strong>a supply chain attack via cloud affects Mercedes, Warner Bros, Hulu&#8230;<strong><br>Operation MORPHEUS - </strong>a crackdown on servers using Cobalt Strike for malicious purposes; </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://cyberdispatch.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://cyberdispatch.io/subscribe?"><span>Subscribe now</span></a></p><h3>Vulnerability of the Week - Ghostscript RCE (CVE-2024-29510) - Update Now</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VJxQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62408414-1d90-448d-b098-c309aa695b51_1200x675.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VJxQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62408414-1d90-448d-b098-c309aa695b51_1200x675.png 424w, https://substackcdn.com/image/fetch/$s_!VJxQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62408414-1d90-448d-b098-c309aa695b51_1200x675.png 848w, https://substackcdn.com/image/fetch/$s_!VJxQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62408414-1d90-448d-b098-c309aa695b51_1200x675.png 1272w, https://substackcdn.com/image/fetch/$s_!VJxQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62408414-1d90-448d-b098-c309aa695b51_1200x675.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VJxQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62408414-1d90-448d-b098-c309aa695b51_1200x675.png" width="1200" height="675" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/62408414-1d90-448d-b098-c309aa695b51_1200x675.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:675,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VJxQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62408414-1d90-448d-b098-c309aa695b51_1200x675.png 424w, https://substackcdn.com/image/fetch/$s_!VJxQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62408414-1d90-448d-b098-c309aa695b51_1200x675.png 848w, https://substackcdn.com/image/fetch/$s_!VJxQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62408414-1d90-448d-b098-c309aa695b51_1200x675.png 1272w, https://substackcdn.com/image/fetch/$s_!VJxQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62408414-1d90-448d-b098-c309aa695b51_1200x675.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A remote code execution vulnerability in the Ghostscript document conversion toolkit (CVE-2024-29510) is being actively exploited. This flaw affects Ghostscript 10.03.0 and earlier, allowing attackers to bypass the -dSAFER sandbox and perform high-risk operations like command execution and file I/O. Ghostscript is widely used in Linux systems and various document conversion software. Security researchers recommend updating to the latest version to mitigate the risk. Attackers are already exploiting this vulnerability by using EPS files disguised as JPGs to gain shell access to vulnerable systems.</p><p>For more update information go <a href="https://www.ghostscript.com/releases/index.html">here</a>.</p><h3>In other news</h3><p><strong>[Ransomware]<br>Eldorado RaaS</strong></p><p>Eldorado is an emerging ransomware-as-a-service (RaaS) operation targeting Windows and Linux systems with variants for different platforms. It uses Golang, Chacha20 for file encryption, and RSA-OAEP for key encryption. Its data leak site lists 16 victims as of June 2024, including companies in the U.S., Italy, and Croatia.</p><p><strong>[Data Breach]<br>Ticketmaster - Sp1derHunters</strong></p><p>In an extortion campaign against Ticketmaster, hackers leaked 39,000 print-at-home tickets for 150 events, including Pearl Jam and Foo Fighters. The group 'Sp1derHunters' sells data stolen from Snowflake accounts. Initially, the hackers demanded $500,000, later raising it to $2 million after leaking 166,000 Taylor Swift ticket barcodes. Ticketmaster claims the data is useless due to their SafeTix technology, which refreshes barcodes frequently.</p><p><strong>[Data Breach]<br>Neiman Marcus&nbsp;</strong></p><p>A May 2024 data breach at Neiman Marcus exposed over 31 million customer email addresses, despite the company reporting only 64,472 affected people. The breach included names, contact information, birth dates, gift card info, transaction data, partial credit card numbers, Social Security numbers, and employee IDs.</p><p><strong>[Data Breach]<br>PhilHealth - Medusa Ransomware</strong></p><p>PhilHealth is under scrutiny for not informing over 42 million individuals of a data breach from a ransomware attack last fall. Lawmakers demand a status report and notification plan be issued this week. The Medusa ransomware attack in September 2023 compromised data, affecting the health information of millions.</p><p><strong>[Supply Chain Attack]<br>Polyfill.io - Hertzer CSP</strong></p><p>&#8203;&#8203;The Polyfill.io supply chain attack is more extensive than initially believed, impacting over 380,000 hosts, with around 237,700 located in Hetzner&#8217;s cloud network. Prominent companies like WarnerBros, Hulu, Mercedes-Benz, and Pearson have been affected, embedding malicious scripts in their HTTP responses as of July 2, 2024.</p><p><strong>[Legal]<br>Operation MORPHEUS</strong></p><p>Operation MORPHEUS, a coordinated law enforcement effort, dismantled nearly 600 servers linked to cybercriminals using Cobalt Strike. The crackdown targeted unlicensed versions of this pen-testing tool from June 24-28, 2024. The operation involved global authorities and was led by the UK NCA, rendering 590 of 690 flagged IP addresses inaccessible.</p><h3>Resources</h3><ul><li><p><a href="https://www.bleepingcomputer.com/news/security/rce-bug-in-widely-used-ghostscript-library-now-exploited-in-attacks/">Bleeping Computer: RCE bug in widely used Ghostscript library now exploited in attacks</a></p></li><li><p><a href="https://thehackernews.com/2024/07/new-ransomware-as-service-eldorado.html">The Hacker News: New Ransomware-as-a-Service 'Eldorado' Targets Windows and Linux Systems</a></p></li><li><p><a href="https://www.bleepingcomputer.com/news/security/hackers-leak-39-000-print-at-home-ticketmaster-tickets-for-154-events/">Bleeping Computer: Hackers leak 39,000 print-at-home Ticketmaster tickets for 154 events</a></p></li><li><p><a href="https://www.bleepingcomputer.com/news/security/neiman-marcus-data-breach-31-million-email-addresses-found-exposed/">Bleeping Computer: Neiman Marcus data breach: 31 million email addresses found exposed</a></p></li><li><p><a href="https://therecord.media/philippine-lawmakers-want-answers-data-breach">The Record: Philippine lawmakers grill health agency executive over breach affecting 42 million people</a></p></li><li><p><a href="https://thehackernews.com/2024/07/polyfillio-attack-impacts-over-380000.html">The Hacker News: &#8203;&#8203;Polyfill[.]io Attack Impacts Over 380,000 Hosts, Including Major Companies</a></p></li><li><p><a href="https://thehackernews.com/2024/07/global-police-operation-shuts-down-600.html">The Hacker News: Global Police Operation Shuts Down 600 Cybercrime Servers Linked to Cobalt Strike</a></p></li></ul><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://cyberdispatch.io/p/cyber-dispatch-5-streamlined-cybersecurity?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thank you for reading Cyber Dispatch. This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://cyberdispatch.io/p/cyber-dispatch-5-streamlined-cybersecurity?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://cyberdispatch.io/p/cyber-dispatch-5-streamlined-cybersecurity?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Cyber Dispatch #4: Streamlined Cybersecurity Insights]]></title><description><![CDATA[Weekly overview of most important cybersecurity events of the past week (Monday 24.6. to Monday 1.7.2024.)]]></description><link>https://cyberdispatch.io/p/cyber-dispatch-4-streamlined-cybersecurity</link><guid isPermaLink="false">https://cyberdispatch.io/p/cyber-dispatch-4-streamlined-cybersecurity</guid><dc:creator><![CDATA[Nikola Budanovic]]></dc:creator><pubDate>Wed, 03 Jul 2024 09:26:52 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!jWSE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd73b1916-bae6-4599-a28c-b9855345d0f8_1920x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jWSE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd73b1916-bae6-4599-a28c-b9855345d0f8_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jWSE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd73b1916-bae6-4599-a28c-b9855345d0f8_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!jWSE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd73b1916-bae6-4599-a28c-b9855345d0f8_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!jWSE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd73b1916-bae6-4599-a28c-b9855345d0f8_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!jWSE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd73b1916-bae6-4599-a28c-b9855345d0f8_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jWSE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd73b1916-bae6-4599-a28c-b9855345d0f8_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d73b1916-bae6-4599-a28c-b9855345d0f8_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:532409,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!jWSE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd73b1916-bae6-4599-a28c-b9855345d0f8_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!jWSE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd73b1916-bae6-4599-a28c-b9855345d0f8_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!jWSE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd73b1916-bae6-4599-a28c-b9855345d0f8_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!jWSE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd73b1916-bae6-4599-a28c-b9855345d0f8_1920x1080.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>In this issue:</strong> <br><br><strong>RegreSSHion</strong> - new OpenSSH RCE vulnerability threatening hundreds of thousands of servers.<br><strong>Prudential / ALPHV - </strong>Financial confirms more 2.5 M records leaked.<br><strong>TeamViewer / Cozy Bear</strong> - Russian APT29 hacks the major software company.<br><strong>Indonesian National Data Center </strong>/ <strong>Brain Cipher - </strong>new Lockbit 3.0-based ransomware wreaks havoc in Indonesia. <br><strong>Cisco / Velvet Ant - </strong>a 0-day vulnerability, discovered and patched by Cisco, exploited by a Chinese hacking group. <br><strong>Ollama</strong> - the AI platform discovered and patched a critical vulnerability.<br><strong>Operation First Light - </strong>international law enforcement arrests nearly 4,000 people accused of various accounts of cybercrime. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://cyberdispatch.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://cyberdispatch.io/subscribe?"><span>Subscribe now</span></a></p><h3>Vulnerability of the Week&nbsp;- CVE-2024-6387 (RegreSSHion)</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fdnm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889180dc-128f-4219-a2be-958b641358aa_650x364.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fdnm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889180dc-128f-4219-a2be-958b641358aa_650x364.png 424w, https://substackcdn.com/image/fetch/$s_!fdnm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889180dc-128f-4219-a2be-958b641358aa_650x364.png 848w, https://substackcdn.com/image/fetch/$s_!fdnm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889180dc-128f-4219-a2be-958b641358aa_650x364.png 1272w, https://substackcdn.com/image/fetch/$s_!fdnm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889180dc-128f-4219-a2be-958b641358aa_650x364.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fdnm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889180dc-128f-4219-a2be-958b641358aa_650x364.png" width="650" height="364" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/889180dc-128f-4219-a2be-958b641358aa_650x364.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:650,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fdnm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889180dc-128f-4219-a2be-958b641358aa_650x364.png 424w, https://substackcdn.com/image/fetch/$s_!fdnm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889180dc-128f-4219-a2be-958b641358aa_650x364.png 848w, https://substackcdn.com/image/fetch/$s_!fdnm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889180dc-128f-4219-a2be-958b641358aa_650x364.png 1272w, https://substackcdn.com/image/fetch/$s_!fdnm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F889180dc-128f-4219-a2be-958b641358aa_650x364.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A new <strong>OpenSSH</strong> <strong>unauthenticated remote code execution (RCE) vulnerability</strong>, "<strong>regreSSHion</strong>," grants root privileges on glibc-based Linux systems. Discovered by Qualys in May 2024, CVE-2024-6387 is due to a signal handler race condition in sshd, allowing unauthenticated remote attackers to execute arbitrary code as root. If a client does not authenticate within LoginGraceTime, sshd's SIGALRM handler is called and executes non-async-signal-safe functions. Around 7.3 million SSH servers are exposed to the threat. </p><p>Exploiting this flaw could lead to full system takeover, malware installation, and data manipulation. Despite its severity, <strong>regreSSHion</strong> is hard to exploit and requires multiple attempts.</p><p><strong>Check if you&#8217;re vulnerable to RegreSSHion on my website https://regresshion.sh/.</strong> </p><h3>In other news</h3><p><strong>[Data Breach]<br>Prudential - ALPHV</strong></p><p><strong>Prudential Financial</strong> disclosed that over 2.5 million individuals were affected by a February data breach, up from an initial estimate of 36,000. The <strong>ALPHV/Blackcat</strong> ransomware gang claimed responsibility for the attack, which compromised sensitive personal information.</p><p><strong>[Data Breach]<br>TeamViewer - Cozy Bear</strong></p><p><strong>TeamViewer</strong> confirmed a breach by Russian hacking group <strong>APT29 (Cozy Bear)</strong> in its corporate IT environment. The incident, traced to compromised employee credentials, exposed employee directory data and encrypted passwords, but did not compromise customer data or the product environment, which are segregated.</p><p><strong>[Ransomware]<br>Indonesian National Data Center </strong>- <strong>Brain Cipher</strong></p><p><strong>Brain Cipher</strong>, a new ransomware operation, has targeted organizations globally, notably attacking Indonesia's temporary <strong>National Data Center</strong> on June 20th. This attack encrypted government servers and disrupted critical services. <strong>Brain Cipher</strong>, created partly from the leaked LockBit 3.0 builder, demanded $8 million in Monero cryptocurrency for decryption and data non-disclosure.</p><p><strong>[Update]<br>Cisco - Velvet Ant</strong></p><p><strong>Cisco</strong> patched an NX-OS zero-day (CVE-2024-20399) exploited in April by the Chinese state-sponsored group <strong>Velvet Ant</strong>. The flaw allowed local attackers with admin privileges to execute root commands on switches. <strong>Cisco</strong> advises regular credential changes for network-admin and vdc-admin users.</p><p><strong>[Update]<br>Ollama</strong></p><p>Cybersecurity researchers have detailed a critical RCE vulnerability (CVE-2024-37032) in the <strong>Ollama</strong> AI platform, codenamed Probllama. The flaw, due to insufficient input validation, allows remote code execution via path traversal. Patched in version 0.1.34, the issue was disclosed on May 5, 2024.</p><p><strong>[Legal]<br>Operation First Light</strong></p><p>International law enforcement dismantled online scam networks in 61 countries, arresting over 3,900 suspects and seizing $257 million. <strong>Operation First Light</strong> targeted phishing, investment fraud, fake online shopping sites, romance scams, and impersonation scams, identifying 14,600 additional suspects and freezing 6,745 bank accounts.</p><h3>Resources</h3><ul><li><p><a href="https://www.bleepingcomputer.com/news/security/new-regresshion-openssh-rce-bug-gives-root-on-linux-servers/">Bleeping Computer: New regreSSHion OpenSSH RCE bug gives root on Linux servers</a></p></li><li><p><a href="https://therecord.media/teamviewer-cozy-bear-hack-confirmed">The Record: TeamViewer says Russia&#8217;s &#8216;Cozy Bear&#8217; hackers attacked corporate IT system</a></p></li><li><p><a href="https://www.bleepingcomputer.com/news/security/meet-brain-cipher-the-new-ransomware-behind-indonesia-data-center-attack/">Bleeping Computer: Meet Brain Cipher &#8212; The new ransomware behind Indonesia's data center attack</a></p></li><li><p><a href="https://www.bleepingcomputer.com/news/security/prudential-financial-now-says-25-million-impacted-by-data-breach/">Bleeping Computer: Prudential Financial now says 2.5 million impacted by data breach</a></p></li><li><p><a href="https://www.bleepingcomputer.com/news/security/cisco-warns-of-nx-os-zero-day-exploited-to-deploy-custom-malware/">Bleeping Computer: Cisco warns of NX-OS zero-day exploited to deploy custom malware</a></p></li><li><p><a href="https://thehackernews.com/2024/06/critical-rce-vulnerability-discovered.html">The Hacker News: Critical RCE Vulnerability Discovered in Ollama AI Infrastructure Tool</a></p></li><li><p><a href="https://therecord.media/4000-arrested-in-global-cybercrime-scam-crackdown-interpol">The Record: Nearly 4,000 arrested in global police crackdown on online scam networks</a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cyberdispatch.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Dispatch! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p></li></ul>]]></content:encoded></item><item><title><![CDATA[Cyber Dispatch #3: Streamlined Cybersecurity Insights, May 2024 ]]></title><description><![CDATA[News from May 1st to May 28th, 2024.]]></description><link>https://cyberdispatch.io/p/cyber-dispatch-3-streamlined-cybersecurity</link><guid isPermaLink="false">https://cyberdispatch.io/p/cyber-dispatch-3-streamlined-cybersecurity</guid><dc:creator><![CDATA[Nikola Budanovic]]></dc:creator><pubDate>Wed, 05 Jun 2024 09:06:08 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!UWZn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2def169f-03a0-4643-9878-4de093dccd60_1920x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UWZn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2def169f-03a0-4643-9878-4de093dccd60_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UWZn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2def169f-03a0-4643-9878-4de093dccd60_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!UWZn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2def169f-03a0-4643-9878-4de093dccd60_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!UWZn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2def169f-03a0-4643-9878-4de093dccd60_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!UWZn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2def169f-03a0-4643-9878-4de093dccd60_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UWZn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2def169f-03a0-4643-9878-4de093dccd60_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2def169f-03a0-4643-9878-4de093dccd60_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:543718,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!UWZn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2def169f-03a0-4643-9878-4de093dccd60_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!UWZn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2def169f-03a0-4643-9878-4de093dccd60_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!UWZn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2def169f-03a0-4643-9878-4de093dccd60_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!UWZn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2def169f-03a0-4643-9878-4de093dccd60_1920x1080.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>The month of May is behind us, and many exciting cybersecurity news are worth mentioning. If you missed them, check out the latest monthly edition of Cyber Dispatch. Highlights definitely include IntelBroker&#8217;s stunt of breaking into Europol, the subsequent revenge act of FBI shutting down BreachForums. In other news, Windows has launched an AI feature that triggers some dubious privacy concerns&#8230;</strong></p><p><strong>The rundown: <br><br>VMware ESXi </strong>- Vulnerabilities actively exploited by ransomware groups;<br><strong>IntelBroker/Europol</strong> - Allegedly leaked sensitive data from the European law enforcement agency;<br><strong>BreachForums/FBI</strong> - FBI swiftly took control of a notorious dark web forum;<br><strong>Dell</strong> - Data of 49 million customers leaked;<br><strong>Lockbit</strong> - Website back online, now in police hands, leader's identity revealed;<br><strong>UK Ministry of Defence</strong> - 270,000 sensitive data leaked from UK Ministry of Defence;<br><strong>Tinyproxy</strong> - Critical vulnerability endangering tens of thousands of devices;<br><strong>REvil</strong> - One of the leaders of the group responsible for the Kaseya attack 2021 convicted;<br><strong>Incognito Market</strong> - Founder of one of the largest dark web drug markets arrested;<br><strong>Apache Flink</strong> - Three-year-old vulnerability patched due to increased exploitation;<br><strong>Google Chrome</strong> - Third 0day in seven days, totaling four patched 0day vulnerabilities in May;</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cyberdispatch.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Dispatch! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Welcome to the third monthly overview of cybersecurity events that shaped the month of May, 2024. </p><p><br><strong>[Ransomware]</strong> <br><strong>VMWare ESXi</strong> vulnerabilities actively exploited in ransomware campaigns</p><p>Cybersecurity company Sygnia conducted an investigation and identified the modus operandi of a series of ransomware attacks exploiting vulnerabilities in <strong>VMware ESXi</strong> virtual machine solutions. The vulnerabilities stem from inherent configuration flaws and other weaknesses in <strong>VMware ESXi</strong> software, and some of the groups exploiting these vulnerabilities include LockBit, HelloKitty, BlackMatter, Akira, BlackCat, among others. Users are advised to enhance monitoring, implement adequate event logging, and regularly update backups. </p><p><strong>[Ransomware]<br>Lockbit</strong> site back online, now in police hands</p><p>The previously shut down<strong> Lockbit </strong>forum, used for communicating ransomware group operations, has been restored to function, albeit in a completely different role. The police seized the site in February and have now released it along with data obtained during the investigation. The identity of the group's alleged leader, Russian national Dmitry Horoshev, has been disclosed. The dark website was previously thoroughly infiltrated by the British cyber crime department.</p><p><strong>[Data Breach]<br>IntelBroker </strong>disclosed sensitive Europol data</p><p><strong>IntelBroker</strong>, a hacker who recently claimed access to Zscaler systems and sold them on the dark web, made headlines again, this time for allegedly stealing data from Europol. <strong>IntelBroker </strong>claims to have "hacked" into Europol's systems and accessed highly confidential information classified as "For Official Use Only." However, Europol denies the leakage of sensitive data, asserting that the hacker accessed the Europol Platform for Experts (EPE), which, despite its name, does not contain information crucial or jeopardizing their police operations.</p><p><strong>[Legal]<br></strong>In response to the data breach, the<strong> FBI</strong> seized <strong>BreachForums</strong></p><p>If the beginning of the week was marked by the theft of Europol's data, then the swift action of the <strong>FBI</strong> and the US Department of Justice marked its end. As stated, the <strong>FBI</strong> managed to take control of <strong>BreachForums</strong>, one of the most popular platforms for distributing and reselling leaked and stolen data. This information was posted on the <strong>BreachForums</strong> website and Telegram channel.</p><p><strong>[Data Breach]<br>Dell</strong> - 49 million data leaked in the latest cyber attack</p><p>The American computer and computer equipment manufacturing and sales company, <strong>Dell</strong>, has issued a statement that 49 million of their users' data have leaked online. Compromised data includes warranty details, customer names, computer serial numbers, locations, and other order-related information. The hacker(s) behind this attack informed <strong>Dell</strong> about their feat, but only after putting the data up for sale. Despite this, <strong>Dell</strong> has not yet addressed the vulnerability that led to the leak, citing that they "do not negotiate with criminals."</p><p><strong>[Data Breach]</strong><br><strong>WebTPA</strong> data breach impacts over 2.4 million individuals</p><p><strong>WebTPA</strong>, an American company specializing in health plan administration, reported a data breach affecting nearly 2.5 million individuals. <strong>WebTPA</strong>'s clients include some of the largest American insurance companies, and the current data compromise has affected companies such as Hartford, Transamerica, and Gerber Life Insurance.</p><p><strong>[Data Breach]</strong> <br><strong>Cencora</strong> discloses data breach affecting 11 major pharmaceutical companies worldwide</p><p><strong>Cencora</strong>, a platform for pharmaceutical logistics and distribution, revealed information about a cyberattack that occurred in February, resulting in a data breach affecting 11 of the world's largest pharmaceutical companies. Among the first three affected partner companies are corporations like Novartis and Bayer. Although the stolen data has not yet been published on the internet, <strong>Cencora</strong> determined through its investigation that it includes personal data, medical diagnoses, treatment histories, and prescriptions of an unspecified number of users of these 11 pharmaceutical companies. </p><p><strong>[Data Breach]<br></strong>Over 270,000 sensitive data leaked from the <strong>UK Ministry of Defence</strong></p><p>The <strong>British Ministry of Defence</strong> has confirmed a cyber attack resulting in the leakage of sensitive data of active duty personnel, reservists, and retirees. The leak was limited to an external system managed by a partner firm handling employee payroll. Although the central <strong>MoD</strong> system was not compromised, the leak affected up to 270,000 details, including payment, names, surnames, and banking information. It is believed that hackers associated with Chinese intelligence services are behind the attack.</p><p><strong>[Privacy]</strong> <br><strong>Microsoft Recall</strong> feature records complete computer history, including screen screenshots</p><p><strong>Microsoft</strong> has introduced a new AI feature called <strong>Recall</strong>, which will be integrated into the new Windows 11 operating system. <strong>Recall</strong>'s role is to record all computer activities, processes, operations, as well as random screen screenshots, enabling users to deeply record the complete history of the operating system. <strong>Recall</strong> is designed to work locally, encrypt data, and operate in conjunction with the MS Copilot system. However, such a feature also implies potential abuses and privacy violations by operating system distributors. </p><p><strong>[Legal]<br></strong>One of the leaders of the <strong>REvil </strong>ransomware group convicted</p><p>Ukrainian citizen <strong>Jaroslav Vasinski</strong>, known as <strong>Rabotnik</strong>, has been sentenced to 13 years in prison and fined $16 million for conducting over 2,500 ransomware attacks. <strong>Vasinski</strong> was a key member of the <strong>REvil group</strong>, which extorted over $700 million in cryptocurrencies through ransomware attacks. Additionally, <strong>REvil</strong> is responsible for the 2021 Kaseya supply chain attack. <strong>Vasinski</strong> was apprehended in Poland and extradited to the US, where he will serve his sentence.</p><p><strong>[Legal]<br></strong>Founder of <strong>Incognito Market</strong> arrested in the US</p><p>Twenty-three-year-old Taiwanese citizen <strong>Rui-Shiang Lin</strong> has been arrested in the US on charges of running <strong>Incognito Market</strong>, a dark web e-commerce platform specializing in drug trafficking. <strong>Incognito Market</strong> generated over $100 million in profits from drug trading and ceased operations in March of this year when <strong>Lin</strong> launched a campaign to extort money from all dealers on the platform, threatening to report them to the police.</p><p><strong>[Update]<br></strong>Dozens of thousands of <strong>Tinyproxy</strong> servers exposed to critical vulnerability</p><p>Over 50% of the 90,310 <strong>Tinyproxy</strong> server hosts are exposed to a critical vulnerability rated at 9.8 on the CVSS scale. Cisco Talos was the first to alert about this flaw, but <strong>Tinyproxy</strong> claims that the company poorly communicated its discovery, and the security update is still in progress. It concerns a memory corruption bug that subsequently enables remote code execution for attackers. Users are advised to remove their <strong>Tinyproxy </strong>servers from the public internet and await a patch.</p><p><strong>[Update]<br>Apache Flink </strong>addresses a high-risk security vulnerability</p><p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has identified active exploitation of a vulnerability in <strong>Apache Flink</strong>, documented under CVE-2020-17519 dating back to 2020. This vulnerability allows attackers to read local files via the JobManager REST interface. The exploit can be remotely exploited and affects Apache Flink versions from 1.11.0 to 1.11.2. If you are using <strong>Apache Flink</strong>, update to versions 1.11.3 and 1.12.0.</p><p><strong>[Update]<br>Google</strong> discovered and fixed four 0day vulnerabilities in May</p><p><strong>Google</strong> addressed four <strong>Chrome</strong> zero-days in May 2024. A total of 8 zero-day vulnerabilities were detected by Google since the beginning of the year. Experts warn of various exploitations by attackers, emphasizing the need for prompt updates and continuous user education on cybersecurity. <strong>Google</strong>'s open-source nature adds complexity to vulnerability management.</p><h3>Resources</h3><ul><li><p><a href="https://thehackernews.com/2024/05/ransomware-attacks-exploit-vmware-esxi.html">The Hacker News: Ransomware Attacks Exploit VMware ESXi Vulnerabilities in Alarming Pattern</a></p></li><li><p><a href="https://www.csoonline.com/article/2104251/intelbroker-steals-classified-data-from-the-europol-website.html">CSO Online: IntelBroker steals classified data from the Europol website</a></p></li></ul><ul><li><p><a href="https://www.bleepingcomputer.com/news/security/fbi-seize-breachforums-hacking-forum-used-to-leak-stolen-data/">Bleeping Computer: FBI seize BreachForums hacking forum used to leak stolen data</a></p></li><li><p><a href="https://www.malwarebytes.com/blog/news/2024/05/dell-notifies-customers-about-data-breach">Malwarebytes: Dell notifies customers about data breach</a></p></li><li><p><a href="https://therecord.media/lockbit-ransomware-gang-seized-site-reappears-teasing-new-information">The Record: LockBit's seized darknet site resurrected by police, teasing new revelations</a></p></li><li><p><a href="https://news.cloudsek.com/2024/05/uk-ministry-of-defence-confirms-cyber-attack-270000-personnel-records-exposed/">CloudSEKNews: UK Ministry of Defence Confirms Cyber Attack, 270,000 Personnel Records Exposed</a></p></li><li><p><a href="https://thehackernews.com/2024/05/critical-tinyproxy-flaw-opens-over.html">The Hacker News: Critical Tinyproxy Flaw Opens Over 50,000 Hosts to Remote Code Execution</a></p></li><li><p><a href="https://thehackernews.com/2024/05/ukrainian-revil-hacker-sentenced-to-13.html">The Hacker News: Ukrainian REvil Hacker Sentenced to 13 Years and Ordered to Pay $16 Million</a></p></li><li><p><a href="https://therecord.media/incognito-market-leader-arrested-drugs">The Record: Dark web narcotics market&#8217;s alleged leader arrested and charged in New York</a></p></li><li><p><a href="https://thehackernews.com/2024/05/cisa-warns-of-actively-exploited-apache.html">The Hacker News: CISA Warns of Actively Exploited Apache Flink Security Vulnerability</a></p></li><li><p><a href="https://www.bleepingcomputer.com/news/google/google-fixes-CVE-2024-4947-third-actively-exploited-chrome-zero-day-in-a-week/">Bleeping Computer: Google fixes third actively exploited Chrome zero-day in a week</a></p></li></ul><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cyberdispatch.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Dispatch! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Cyber Dispatch #2: Events That Marked April 2024]]></title><description><![CDATA[Streamlined cybersecurity insight with news from April 1st to April 24th, 2024.]]></description><link>https://cyberdispatch.io/p/cyber-dispatch-2-events-that-marked</link><guid isPermaLink="false">https://cyberdispatch.io/p/cyber-dispatch-2-events-that-marked</guid><dc:creator><![CDATA[Nikola Budanovic]]></dc:creator><pubDate>Wed, 24 Apr 2024 14:50:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!bl5v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bdfa983-6c79-4960-97cd-5c4c20f686f5_1920x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bl5v!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bdfa983-6c79-4960-97cd-5c4c20f686f5_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bl5v!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bdfa983-6c79-4960-97cd-5c4c20f686f5_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!bl5v!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bdfa983-6c79-4960-97cd-5c4c20f686f5_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!bl5v!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bdfa983-6c79-4960-97cd-5c4c20f686f5_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!bl5v!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bdfa983-6c79-4960-97cd-5c4c20f686f5_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bl5v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bdfa983-6c79-4960-97cd-5c4c20f686f5_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1bdfa983-6c79-4960-97cd-5c4c20f686f5_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:552260,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bl5v!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bdfa983-6c79-4960-97cd-5c4c20f686f5_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!bl5v!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bdfa983-6c79-4960-97cd-5c4c20f686f5_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!bl5v!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bdfa983-6c79-4960-97cd-5c4c20f686f5_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!bl5v!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1bdfa983-6c79-4960-97cd-5c4c20f686f5_1920x1080.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Welcome to the April edition of the Cyber Dispatch newsletter on information security! April witnessed a significant discovery: a nearly catastrophic campaign aimed at infecting the xz compression/decompression tool for Linux operating systems with malware. This open-source program, utilized by millions worldwide, narrowly escaped compromise. Uncovered by a Microsoft security researcher, the campaign spanned two years and relied on social engineering tactics. If the plan went through, however, it would allow attackers to develop sophisticated malicious software, granting backdoor access to all Linux systems utilizing xz. </p><p>Despite this alarming revelation, April had more in store for the cybersecurity community, underscoring the ongoing challenges and threats faced in safeguarding digital environments.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cyberdispatch.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Dispatch! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>The Rundown of April cybersecurity events</h2><p><strong>Translated parts:</strong></p><p><strong>1. Linux - </strong>XZ Utils backdoor discovered</p><p><strong>2. Frontier - </strong>US telco hit by a data breach</p><p><strong>3. Hospital Simone Veil - </strong>French hospital under ransomware siege</p><p><strong>4. Akira - </strong>ransomware group amassed $42 million since last year</p><p><strong>5. LockBit - </strong>ransomware group hits the D.C. Department of Insurance, Securities and Banking</p><p><strong>6. MITRE - </strong>warnings about Ivanti VPN 0-day vulnerabilities exploited</p><p><strong>7. CrushFTP - </strong>announced a 0-day, update available</p><p><strong>8. Palo Alto - </strong>22,500 firewall devices exposed to a critical vulnerability</p><p><strong>9. Hoya Corporation - </strong>Healthcare company hit by ransomware</p><p><strong>10. French municipalities - </strong>five French municipalities under ransomware attack</p><p><strong>11. Roku - </strong>over 500,000 user accounts compromised</p><p><strong>12. IxMetro Powerhost / VMware ESXi - </strong>new type of ransomware attack</p><p><strong>13. City of Hope - </strong>compromised data of cancer patients</p><p><strong>14. SurveyLama -</strong> 4.4 million users compromised</p><p><strong>15. D-Link NAS - </strong>92,000 outdated devices vulnerable to critical flaw</p><p><strong>16. PandaBuy -</strong> leaked data of 1.3 million users</p><p><strong>17. Palo Alto Network - </strong>exploited critical 0-day vulnerability</p><p><strong>18. Crema/Nirvana Finance -</strong> software engineer convicted of cryptocurrency theft</p><p><strong>19. Google / EU - </strong>Google agrees to delete incognito logs</p><h2>The Newsletter</h2><p><strong>[Ransomware]</strong></p><p>One of key medical facilities in France, <strong>Hospital Simone Veil </strong>hit by bad actors</p><p>The <strong>Hospital Simone Veil</strong> in Cannes faced a cyberattack, disrupting its operations and reverting to manual processes. As a crucial medical institution in France, it serves thousands annually but hasn't disclosed ransom demands from attackers.&nbsp;</p><p>Read more: <a href="https://www.bleepingcomputer.com/news/security/chc-sv-hospital-in-france-postpones-procedures-after-cyberattack/">Bleeping Computer: 840-bed hospital in France postpones procedures after cyberattack</a></p><p><strong>[Ransomware]</strong><br><strong>Akira ransomware group</strong> amassed $42 million since last year</p><p>The FBI and European law enforcement agencies issued a warning about the <strong>Akira</strong> ransomware gang, which has targeted 250+ organizations globally, affecting businesses and critical infrastructure. Collaborating agencies published an advisory on Thursday, revealing the group's earnings of $42 million since March 2023.</p><p>Read more: <a href="https://therecord.media/akira-ransomware-attacked-hundreds-millions">The Record: Akira ransomware gang made $42 million from 250 attacks since March 2023: FBI</a></p><p><strong>[Ransomware]</strong><br><strong>LockBit </strong>hits a US government institution</p><p><strong>LockBit</strong> ransomware gang stole data from a third-party provider linked to a Washington, D.C., government agency. On April 13, they claimed to have breached the D.C. Department of Insurance, Securities and Banking, aiming to pressure for ransom payment by leaking 1GB of data.</p><p>Read more: <a href="https://therecord.media/dc-city-agency-ransomware-attack-lockbit">The Record: DC city agency says LockBit claims tied to third-party attack</a></p><p><strong>[Ransomware]</strong></p><p><strong>Hoya Corporation</strong> halts operations due to ransomware attack</p><p>Japanese giant in ophthalmic equipment manufacturing, <strong>Hoya</strong>, reported a ransomware attack that halted operations at 160 of their branches worldwide. The responsibility was claimed by the Hunters International group, demanding a $10 million ransom in cryptocurrencies. The attack crippled production, orders, and IT operations.</p><p>Read more: <a href="https://therecord.media/hoya-japan-cyberattack-affects-production">The Record: Japanese optics company Hoya says cyber incident affected production</a></p><p><strong>[Ransomware]</strong></p><p>New ransomware targets <strong>VMware ESXi</strong> servers</p><p>Chilean hosting provider IxMetro Powerhost reported a ransomware attack by the unknown SEXi group, encrypting <strong>VMware ESXi</strong> servers and their backups. The company, operating across North and South America, faces a ransom demand of $140 million in cryptocurrency equivalents.</p><p>Read more: <a href="https://www.bleepingcomputer.com/news/security/hosting-firms-vmware-esxi-servers-hit-by-new-sexi-ransomware/">Bleeping Computer: Hosting firm's VMware ESXi servers hit by new SEXi ransomware</a></p><p><strong>[Ransomware]</strong></p><p>Five municipalities in <strong>France</strong> hit by ransomware attacks</p><p>Described by French media as a "large-scale cyber attack," resembling a ransomware attack, it struck five municipalities in the Loire Valley. It's yet unknown if citizen data was compromised. The attackers remain unidentified, with only telephone lines and email servers affected. A similar attack occurred in Brittany in January, but any connection between the two incidents is undisclosed.</p><p>Read more: <a href="https://www.theregister.com/2024/04/12/french_municipalities_cyberattack/">The Register: French issue alerte rouge after local governments knocked offline by cyber attack</a></p><p><strong>[Data Breach]</strong></p><p><strong>Frontier </strong>hit by a cyberattack, potentialy millions of customers affected</p><p>American telecom <strong>Frontier Communications</strong> is recovering from a cyberattack where a cybercrime group breached IT systems, accessing unspecified personally identifiable information (PII). After discovering the incident, the company was forced to partially shut down some systems to prevent the threat actors from laterally moving through the network, which also led to some operational disruptions.</p><p>Read more: <a href="https://www.bleepingcomputer.com/news/security/frontier-communications-shuts-down-systems-after-cyberattack/">Bleeping Computer: Frontier Communications shuts down systems after cyberattack</a></p><p><strong>[Data Breach]</strong></p><p><strong>Roku </strong>reports hundreds of thousands of compromised user accounts in latest breach</p><p>Streaming platform Roku disclosed a data leak affecting 576,000 user accounts. Initially reported in March with 15,000 affected accounts, the scope expanded after investigation. Attackers utilized data from various platforms to compromise valid <strong>Roku</strong> accounts through password reset mechanisms and two-factor authentication.</p><p>Read more: <a href="https://www.bleepingcomputer.com/news/security/roku-warns-576-000-accounts-hacked-in-new-credential-stuffing-attacks/">Bleeping Computer: Roku warns 576,000 accounts hacked in new credential stuffing attacks</a></p><p><strong>[Data Breach]</strong></p><p><strong>City of Hope</strong> cancer clinic experiences massive data breach</p><p>A cyber attack on <strong>City of Hope </strong>cancer clinic compromised data of 827,000 patients. Initial investigation results suggest data theft between September and October of the previous year. Stolen data includes personal patient information and medical records.</p><p>Read more: <a href="https://www.bleepingcomputer.com/news/security/us-cancer-center-data-breach-exposes-info-of-827-000-patients/">Bleeping Computer: US cancer center data breach exposes info of 827,000 patients</a></p><p><strong>[Data Breach]</strong></p><p>Data of 4.4 million <strong>SurveyLama</strong> users compromised</p><p><strong>Survey Lama</strong>, a survey conducting platform, suffered a data breach compromising 4.4 million users. Have I Been Pwned service recorded the incident, noting it involved primarily personal information, including email addresses and passwords.</p><p>Read more: <a href="https://www.bleepingcomputer.com/news/security/surveylama-data-breach-exposes-info-of-44-million-users/">Bleeping Computer: SurveyLama data breach exposes info of 4.4 million users</a></p><p><strong>[Data Breach]</strong></p><p><strong>PandaBuy </strong>user data leaked</p><p>Data of over 1.3 million users of the Chinese shopping platform leaked due to critical vulnerabilities in the <strong>Panda Buy</strong> API. Sangierro and IntelBoker claimed responsibility and released user data, including names, contacts, and other information.</p><p>Read more: <a href="https://www.bleepingcomputer.com/news/security/shopping-platform-pandabuy-data-leak-impacts-13-million-users/">Bleeping Computer: Shopping platform PandaBuy data leak impacts 1.3 million users</a></p><p><strong>[Update]</strong></p><p>New 0-day vulnerability exploited in <strong>Palo Alto</strong> firewall solution</p><p>Cybersecurity researchers detected exploitation of a 0-day vulnerability in <strong>Palo Alto Network </strong>firewall solutions, designated CVE-2024-3400. The vulnerability creates a backdoor access, enabling remote code execution. Palo Alto released a patch; for more information, visit Palo Alto's website. Suspected attackers have ties to certain state entities, possibly members of an unnamed security service.</p><p>Read more: <a href="https://www.bleepingcomputer.com/news/security/22-500-palo-alto-firewalls-possibly-vulnerable-to-ongoing-attacks/">Bleeping Computer: 22,500 Palo Alto firewalls "possibly vulnerable" to ongoing attacks</a></p><p><strong>[Update]</strong></p><p>Critical <strong>Linux</strong> backdoor vulnerability discovered</p><p>The Linux user community uncovered a malicious package in the latest version of the open-source compression tool, xz, making it vulnerable to a backdoor attack. Designated CVE-2024-3094, it affects versions from 5.6.0 to 5.6.1. Before the security patch release, it carried a risk score of 10 on the CVSS scale. The patch is available for Kali Linux and Debian.</p><p>Read more: <a href="https://www.kali.org/blog/about-the-xz-backdoor/">Kali[.]org: All about the xz-utils backdoor</a></p><p><strong>[Update]</strong></p><p>Obsolete <strong>D-Link NAS</strong> devices vulnerable to critical flaw</p><p>The discovered flaw, classified as CVE-2024-3273, affects <strong>Network-Attached Storage (NAS)</strong> devices deemed obsolete but still in use. Over 92,000 such devices are vulnerable, and <strong>D-Link </strong>recommends replacing them to avoid exploitation. At risk are models DNS-320L, DNS-325, DNS-327L, and DNS-340L.</p><p>Read more: <a href="https://www.bleepingcomputer.com/news/security/over-92-000-exposed-d-link-nas-devices-have-a-backdoor-account/">Bleeping Computer: Over 92,000 exposed D-Link NAS devices have a backdoor account</a></p><p><strong>[Update]</strong></p><p><strong>XZ Utils </strong>strikes again, this time in Rust</p><p>Test files containing the <strong>XZ Utils </strong>backdoor were discovered in the Rust crate liblzma-sys. The affected version, 0.3.2, distributed on Crates.io, contained these files. Following disclosure, version 0.3.3 removed the files, with the previous version withdrawn.&nbsp;</p><p>Read more: <a href="https://thehackernews.com/2024/04/popular-rust-crate-liblzma-sys.html">The Hacker News: Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files</a></p><p><strong>[Update]<br>CrushFTP </strong>announces a 0-day, update now</p><p><strong>CrushFTP</strong> issued a private memo today alerting customers to an actively exploited zero-day vulnerability, advising immediate patching. The flaw allows attackers to escape the virtual file system, accessing system files. Using a DMZ can mitigate risks. Upgrading to version 11 is urged for v9 users.&nbsp;</p><p>Read more: <a href="https://www.bleepingcomputer.com/news/security/crushftp-warns-users-to-patch-exploited-zero-day-immediately/">Bleeping Computer: CrushFTP warns users to patch exploited zero-day &#8220;immediately&#8221;</a></p><p><strong>[Update]</strong></p><p><strong>Palo Alto </strong>warns of 22,500 firewal devices exposed to a critical vulnerability</p><p>Approximately 22,500 <strong>Palo Alto GlobalProtect</strong> firewall devices are exposed to CVE-2024-3400, a critical command injection flaw exploited since March 26, 2024. <strong>Palo Alto Networks</strong> disclosed the flaw on April 12, urging immediate mitigations until patches were released between April 14 and 18. Threat actors, including state-backed group 'UTA0218,' exploited the vulnerability to deploy a custom backdoor named 'Upstyle.'&nbsp;</p><p>Read more: <a href="https://www.bleepingcomputer.com/news/security/22-500-palo-alto-firewalls-possibly-vulnerable-to-ongoing-attacks/">Bleeping Computer: 22,500 Palo Alto firewalls "possibly vulnerable" to ongoing attacks</a></p><p><strong>[Update]</strong></p><p><strong>MITRE </strong>breached via exploit of Ivanti VPN 0-day vulnerabilities</p><p>State-backed hackers exploited two zero-day vulnerabilities in Ivanti VPN to breach MITRE Corporation's systems in January 2024. Detected on the NERVE network, MITRE notified affected parties, engaged authorities, and is restoring operations. Fortunately, the breach did not impact core enterprise or partner systems.</p><p>Read more: &#8203;&#8203;<a href="https://www.bleepingcomputer.com/news/security/mitre-says-state-hackers-breached-its-network-via-ivanti-zero-days/">Bleeping Computer: MITRE says state hackers breached its network via Ivanti zero-days</a></p><p><strong>[Legal]</strong></p><p>Former <strong>Amazon</strong> employee sentenced to three years in prison</p><p>Software engineer, Shakib Ahmed, received a three-year prison sentence for abusing and manipulating "smart contracts," resulting in the theft of $12 million in cryptocurrencies via <strong>Crema Finance</strong> and <strong>Nirvana Finance</strong> platforms. Ahmed admitted guilt in late 2023, leading to the three-year prison sentence, becoming the first person convicted for a cyber attack on "smart contracts."</p><p>Read more: <a href="https://cybersecuritynews.com/ex-amazon-manager-sentenced/">Cybersecurity News: Ex-Amazon Manager Whole Stole $10 Million Sentenced to 16 Years</a></p><p><strong>[Legal]</strong></p><p><strong>Google</strong> agrees to delete billions of "incognito" logs under threat of lawsuits</p><p>While Apple and Meta are still under scrutiny for compliance with the new European Digital Markets Act, Google decided to align with new legal regulations in the European Union. To avoid privacy violations, they agreed to delete billions of recorded searches in the "incognito" mode, as well as block third-party cookies for five years</p><p>Read more: <a href="https://www.theguardian.com/technology/2024/apr/01/google-destroying-browsing-data-privacy-lawsuit">The Guardian: Google to destroy billions of private browsing records to settle lawsuit</a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cyberdispatch.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Dispatch! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[February: Cyber Attacks in Southeast Europe ]]></title><description><![CDATA[Hospitals, Power Plants, and Government Institutions in Crosshairs of Various Bad Actors]]></description><link>https://cyberdispatch.io/p/february-cyber-attacks-in-southeast</link><guid isPermaLink="false">https://cyberdispatch.io/p/february-cyber-attacks-in-southeast</guid><dc:creator><![CDATA[Mikica Ivošević]]></dc:creator><pubDate>Mon, 26 Feb 2024 10:54:30 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!uhKR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff302d4bc-2a23-4da7-8812-02728c5958a4_850x491.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><p>Southeast Europe is known for many things, but until a few years ago, cybercrime was still not one of them. In this blog, I will examine monthly activities of international cybercrime activity that affect the region, and try to create a chronicle of increasing attacks that bear the mark of renowned malicious actors.&nbsp;</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cyberdispatch.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Dispatch! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>This article specifically explores the cybersecurity incidents that occurred in February in Albania and Romania. Additionally, it offers a glance into a ransomware attack on Slovenia's critical infrastructure which occurred in late 2023.&nbsp;</p><p>As we navigate the aftermath of these events, the aim is to illuminate the context surrounding mounting incidents in the region, which often remain obscured in the fog of sporadic news coverage.&nbsp;</p><p>Without further ado, I bring you three separate cybersecurity news stories in the region that caught my attention in the past month.&nbsp;</p><h2>Over 100 Hospitals in Romania Knocked Out by Ransomware</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uhKR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff302d4bc-2a23-4da7-8812-02728c5958a4_850x491.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uhKR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff302d4bc-2a23-4da7-8812-02728c5958a4_850x491.png 424w, https://substackcdn.com/image/fetch/$s_!uhKR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff302d4bc-2a23-4da7-8812-02728c5958a4_850x491.png 848w, https://substackcdn.com/image/fetch/$s_!uhKR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff302d4bc-2a23-4da7-8812-02728c5958a4_850x491.png 1272w, https://substackcdn.com/image/fetch/$s_!uhKR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff302d4bc-2a23-4da7-8812-02728c5958a4_850x491.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uhKR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff302d4bc-2a23-4da7-8812-02728c5958a4_850x491.png" width="850" height="491" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f302d4bc-2a23-4da7-8812-02728c5958a4_850x491.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:491,&quot;width&quot;:850,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!uhKR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff302d4bc-2a23-4da7-8812-02728c5958a4_850x491.png 424w, https://substackcdn.com/image/fetch/$s_!uhKR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff302d4bc-2a23-4da7-8812-02728c5958a4_850x491.png 848w, https://substackcdn.com/image/fetch/$s_!uhKR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff302d4bc-2a23-4da7-8812-02728c5958a4_850x491.png 1272w, https://substackcdn.com/image/fetch/$s_!uhKR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff302d4bc-2a23-4da7-8812-02728c5958a4_850x491.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In a distressing turn of events, more than 100 Romanian hospitals find themselves ensnared in the clutches of a ransomware threat, with Phobos group claiming the attack &#8212; a Russian-speaking entity renowned for exploiting vulnerabilities in the Remote Desktop Protocol for unauthorized access.</p><p>The bull's eye of the attack was the Hypocrite Information System, an integral IT management solution utilized by various healthcare institutions for managing patient data and other critical services. In response to the attack, medical personnel across the nation have resorted to the age-old practice of pen-and-paper, striving to maintain essential hospital functions.</p><p>The Romanian National Cyber Security Directorate (DNSC), in collaboration with cybersecurity experts from third-party entities, is actively engaged in investigating and containing the ongoing assault. However, as this battle unfolds, Romanian patients find themselves caught in the crossfire, their well-being hanging in the balance.</p><p>The cybercriminals behind this assault have set a hefty ransom of 3.5 Bitcoin, equivalent to over $164,500, in exchange for decrypting the vital files they've maliciously locked away.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZTRC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd6f4b4d-e270-4565-9a30-8bbb5b651ddc_790x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZTRC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd6f4b4d-e270-4565-9a30-8bbb5b651ddc_790x600.png 424w, https://substackcdn.com/image/fetch/$s_!ZTRC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd6f4b4d-e270-4565-9a30-8bbb5b651ddc_790x600.png 848w, https://substackcdn.com/image/fetch/$s_!ZTRC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd6f4b4d-e270-4565-9a30-8bbb5b651ddc_790x600.png 1272w, https://substackcdn.com/image/fetch/$s_!ZTRC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd6f4b4d-e270-4565-9a30-8bbb5b651ddc_790x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZTRC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd6f4b4d-e270-4565-9a30-8bbb5b651ddc_790x600.png" width="790" height="600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bd6f4b4d-e270-4565-9a30-8bbb5b651ddc_790x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:790,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZTRC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd6f4b4d-e270-4565-9a30-8bbb5b651ddc_790x600.png 424w, https://substackcdn.com/image/fetch/$s_!ZTRC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd6f4b4d-e270-4565-9a30-8bbb5b651ddc_790x600.png 848w, https://substackcdn.com/image/fetch/$s_!ZTRC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd6f4b4d-e270-4565-9a30-8bbb5b651ddc_790x600.png 1272w, https://substackcdn.com/image/fetch/$s_!ZTRC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbd6f4b4d-e270-4565-9a30-8bbb5b651ddc_790x600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>An example of a Phobos ransomware note</em></figcaption></figure></div><p>While ransomware incidents targeting the healthcare sector are unfortunately not novel, it appears that the FBI's December 2023 crackdown on the ALPHV/BlackCat Dark Web infrastructure acted as a catalyst.&nbsp;</p><p>The aftermath has seen a surge in hospital-targeted attacks, not only in the US and Germany but now reaching Romania. The resilience of local authorities in handling such a crisis is yet to be fully gauged as the country experiences the full scope of a ransomware offensive.&nbsp;</p><h2>Albanian Cybersecurity Under Siege: Iran-Backed Group Strikes Institutions</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!t9HU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F041cb666-fdb8-498b-a01f-c6a7847f1766_640x360.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!t9HU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F041cb666-fdb8-498b-a01f-c6a7847f1766_640x360.png 424w, https://substackcdn.com/image/fetch/$s_!t9HU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F041cb666-fdb8-498b-a01f-c6a7847f1766_640x360.png 848w, https://substackcdn.com/image/fetch/$s_!t9HU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F041cb666-fdb8-498b-a01f-c6a7847f1766_640x360.png 1272w, https://substackcdn.com/image/fetch/$s_!t9HU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F041cb666-fdb8-498b-a01f-c6a7847f1766_640x360.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!t9HU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F041cb666-fdb8-498b-a01f-c6a7847f1766_640x360.png" width="640" height="360" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/041cb666-fdb8-498b-a01f-c6a7847f1766_640x360.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:360,&quot;width&quot;:640,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!t9HU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F041cb666-fdb8-498b-a01f-c6a7847f1766_640x360.png 424w, https://substackcdn.com/image/fetch/$s_!t9HU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F041cb666-fdb8-498b-a01f-c6a7847f1766_640x360.png 848w, https://substackcdn.com/image/fetch/$s_!t9HU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F041cb666-fdb8-498b-a01f-c6a7847f1766_640x360.png 1272w, https://substackcdn.com/image/fetch/$s_!t9HU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F041cb666-fdb8-498b-a01f-c6a7847f1766_640x360.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In the enduring shadow of Iran's geopolitical maneuvers, Albanian institutions face the looming and persistent threat of the country&#8217;s cyber warfare capacities. Air traffic control systems, Telco operators and government institutions have all fallen victim to the Teheran-backed Homeland Justice group in the past two years.&nbsp;&nbsp;</p><p>Most recently, on February 1, Homeland Justice executed a Wiper cyberattack on INSTAT, deleting crucial national data. The INSTAT cyber attack aimed to erase data and compromised as many as 40 computers, raising concerns about the integrity of sensitive information. A similar attack targeted the Albanian parliament at the end of 2023, though the official statement claimed there was no permanent data loss.&nbsp;</p><p>Homeland Justice&#8217;s motivation comes from Albania sheltering a shadowy Iranian opposition group, called the Mujahedeen-e-Khalq (MEK) and its 3,000 members. The MEK has been in Albania since 2013 and is a thorn in the side of official Teheran, which has turned to cyber pressure in hopes of arranging extradition of the group.&nbsp;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!m4zT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F458589cf-e687-4f3d-b77c-a5362027baab_900x763.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!m4zT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F458589cf-e687-4f3d-b77c-a5362027baab_900x763.png 424w, https://substackcdn.com/image/fetch/$s_!m4zT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F458589cf-e687-4f3d-b77c-a5362027baab_900x763.png 848w, https://substackcdn.com/image/fetch/$s_!m4zT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F458589cf-e687-4f3d-b77c-a5362027baab_900x763.png 1272w, https://substackcdn.com/image/fetch/$s_!m4zT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F458589cf-e687-4f3d-b77c-a5362027baab_900x763.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!m4zT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F458589cf-e687-4f3d-b77c-a5362027baab_900x763.png" width="900" height="763" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/458589cf-e687-4f3d-b77c-a5362027baab_900x763.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:763,&quot;width&quot;:900,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!m4zT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F458589cf-e687-4f3d-b77c-a5362027baab_900x763.png 424w, https://substackcdn.com/image/fetch/$s_!m4zT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F458589cf-e687-4f3d-b77c-a5362027baab_900x763.png 848w, https://substackcdn.com/image/fetch/$s_!m4zT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F458589cf-e687-4f3d-b77c-a5362027baab_900x763.png 1272w, https://substackcdn.com/image/fetch/$s_!m4zT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F458589cf-e687-4f3d-b77c-a5362027baab_900x763.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>An example of a Homeland Justice message from their official Telegram channel</em></figcaption></figure></div><p>The group itself is reportedly unpopular in Albania &#8211; even more so &#8211; after the recent string of attacks. Yet Albanians are bound by the 2013 agreement brokered by the USA, which stipulates that MEK can remain in the country, under the condition of refraining from political activities and abiding by the nation's laws.</p><p>Stuck in limbo, the country braces itself, as Homeland Justice announces new attacks are inbound via its Telegram channel.&nbsp;&nbsp;</p><h2>Rhysida Ransomware, Used in the Slovenian Power Plants Attack, Gets Decrypted: Is it a Little Too Late?&nbsp;</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Lfcm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dc852e6-58c1-411f-92e0-59999df29649_860x520.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Lfcm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dc852e6-58c1-411f-92e0-59999df29649_860x520.png 424w, https://substackcdn.com/image/fetch/$s_!Lfcm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dc852e6-58c1-411f-92e0-59999df29649_860x520.png 848w, https://substackcdn.com/image/fetch/$s_!Lfcm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dc852e6-58c1-411f-92e0-59999df29649_860x520.png 1272w, https://substackcdn.com/image/fetch/$s_!Lfcm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dc852e6-58c1-411f-92e0-59999df29649_860x520.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Lfcm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dc852e6-58c1-411f-92e0-59999df29649_860x520.png" width="860" height="520" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7dc852e6-58c1-411f-92e0-59999df29649_860x520.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:520,&quot;width&quot;:860,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Lfcm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dc852e6-58c1-411f-92e0-59999df29649_860x520.png 424w, https://substackcdn.com/image/fetch/$s_!Lfcm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dc852e6-58c1-411f-92e0-59999df29649_860x520.png 848w, https://substackcdn.com/image/fetch/$s_!Lfcm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dc852e6-58c1-411f-92e0-59999df29649_860x520.png 1272w, https://substackcdn.com/image/fetch/$s_!Lfcm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7dc852e6-58c1-411f-92e0-59999df29649_860x520.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In November 2023, the notorious Rhysida ransomware targeted Slovenia's electrical infrastructure, specifically at the key holding company responsible for 60% of the nation's power production. Despite the potential for catastrophic consequences, the attack did not directly impact power production, although it did leave a lingering shadow that extended into 2024.</p><p>The aftermath raises questions about HSE Holding, the Slovenian power plant company, and how it dealt with the ransomware attack. Whether they paid the ransom, independently restored their data, or are still awaiting the recovery of parts of their infrastructure remains unclear.</p><p>If the last option is the case, and they are still affected, then a recent breakthrough might just be an answer to all their prayers.&nbsp;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!moF-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2853d19-a96d-4398-b649-40df16980fc3_750x714.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!moF-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2853d19-a96d-4398-b649-40df16980fc3_750x714.png 424w, https://substackcdn.com/image/fetch/$s_!moF-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2853d19-a96d-4398-b649-40df16980fc3_750x714.png 848w, https://substackcdn.com/image/fetch/$s_!moF-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2853d19-a96d-4398-b649-40df16980fc3_750x714.png 1272w, https://substackcdn.com/image/fetch/$s_!moF-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2853d19-a96d-4398-b649-40df16980fc3_750x714.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!moF-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2853d19-a96d-4398-b649-40df16980fc3_750x714.png" width="750" height="714" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d2853d19-a96d-4398-b649-40df16980fc3_750x714.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:714,&quot;width&quot;:750,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!moF-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2853d19-a96d-4398-b649-40df16980fc3_750x714.png 424w, https://substackcdn.com/image/fetch/$s_!moF-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2853d19-a96d-4398-b649-40df16980fc3_750x714.png 848w, https://substackcdn.com/image/fetch/$s_!moF-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2853d19-a96d-4398-b649-40df16980fc3_750x714.png 1272w, https://substackcdn.com/image/fetch/$s_!moF-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2853d19-a96d-4398-b649-40df16980fc3_750x714.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>HSE Holding received this ransom letter from Rhysida</em></figcaption></figure></div><p>Cybersecurity experts from Kookmin University and the Korea Internet &amp; Security Agency (KISA) successfully cracked Rhysida's complex code. Exploiting an "implementation vulnerability" within the ransomware, they have provided a strong foothold against this digital threat in the form of free-to-use decryption software.&nbsp;</p><p>Whether or not this will be the silver bullet for Rhysida remains to be seen, as the group faces possibilities of mutation and resurgence or integration into emerging cartels like Lockbit and ALPHV/BlackCat.</p><h2>Why is Southeast Europe Becoming a Hotbed of Cybercriminal Activity?&nbsp;</h2><p>While the process of digitalization in the region has seen great growth, cybersecurity lags as a marginal effort in the overall digital culture. In short, progress occurs only after a cyber attack already happened.&nbsp;</p><p>Yet, relying solely on this reactive approach falls short of achieving robust security for organizations. Legal frameworks, both nationally and internationally, along with collaborative efforts, are still in their infancy. In turn, this offers additional maneuvering space for attackers.</p><p>Simultaneously, geopolitical motivations cast a shadow over the Balkans, enticing nation-state hackers to breach the digital defenses of vulnerable institutions for political pressure as seen between Iran and Albania. </p><p>In essence, the region is poised to remain a breeding ground for high-profile cybercrime attacks unless comprehensive strategies and substantial investments fortify the cybersecurity landscape. Achieving this feat will undoubtedly encounter numerous setbacks and will demand years of concerted effort, but it is what needs to be done if the region plans to counter the surging cyber risk demonstrated in the attacks listed above.&nbsp;</p><p><em><strong>Did you like this article? Subscribe to Cyber Dispatch and follow me for more insights on the exciting cyber landscape of Southeast Europe.&nbsp;</strong></em></p><p></p><h3>Resources</h3><ul><li><p><a href="https://albanianpost.com/en/homeland-justice-is-it-a-whole-network-of-iranian-hackers-with-real-threats-to-the-government-the-cyber-security-giant-mandiant-explains-it-to-albanian-post/">Albanian Post: &#8216;Homeland Justice&#8217;, is it a whole network of Iranian hackers with real threats to the Government?</a></p></li></ul><ul><li><p><a href="https://www.aa.com.tr/en/europe/albania-blames-iranian-backed-group-for-cyberattack-on-its-statistical-institute/3137301#">Anadolu Agency: Albania blames Iranian-backed group for cyberattack on its statistical institute</a></p></li></ul><ul><li><p><a href="https://apnews.com/article/albania-mek-iranian-opposition-police-raid-851dcb5fc32cd6bc60206e342eea7b16">Associated Press: Police raid Iranian opposition camp in Albania, seize computers</a></p></li></ul><ul><li><p><a href="https://www.theregister.com/2024/02/13/rhysida_ransomware_decrypted/">The Register: Korean eggheads crack Rhysida ransomware and release free decryptor tool</a></p></li></ul><ul><li><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/slovenia-power-provider-hse-suffers-ransomware-attack">Dark Readings: Slovenian Electrical Utility HSE Suffers Ransomware Attack</a></p><p></p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cyberdispatch.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Dispatch! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Cyber Dispatch #1: Streamlined Cybersecurity Insights ]]></title><description><![CDATA[These are the events that shaped the cybersecurity frontline in the days leading up to 2024, as well as the first days of the new year. (29.12.2023 &#8211; 4.1.2024)]]></description><link>https://cyberdispatch.io/p/cyber-dispatch-1-streamlined-cybersecurity</link><guid isPermaLink="false">https://cyberdispatch.io/p/cyber-dispatch-1-streamlined-cybersecurity</guid><dc:creator><![CDATA[Mikica Ivošević]]></dc:creator><pubDate>Wed, 31 Jan 2024 10:17:01 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/6af2b3dc-5b79-4798-8c7f-cadfd10cee87_990x622.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>[Ransomware]</strong></p><p>Tigo, Black Hunt</p><p>On January 4, <strong>Tigo</strong>, <strong>Paraguay's</strong> leading mobile phone company that serves half of the country&#8217;s 6.7 million people, suffered a security incident impacting infrastructure and specific services for corporate customers. The country&#8217;s military attributed the attack to the Black Hunt ransomware group, claiming that it impacted more than 300 companies downstream. <strong>Tigo </strong>tried to downplay the effect of the attack initially, but is now collaborating with affected organizations and assures that internet, phone, and wallet services beyond the corporate segment remain unaffected.&nbsp;</p><p><strong>[Ransomware]</strong></p><p>Bosch, Nozomi</p><p>Researchers at <strong>Nozomi Networks</strong> identified vulnerabilities in <strong>Bosch</strong>'s pneumatic torque wrench, commonly used in automotive production lines. The flaws, not yet exploited, pose ransomware risks. Threat actors could compromise tightening programs, affecting torque levels, operational performance, and safety measures making ransomware attacks very likely, as they can potentially cause severe production stoppages and financial losses. <strong>Bosch</strong> acknowledged the issues, stating a patch will be released by the end of the month.&nbsp;</p><p><strong>[Ransomware]</strong></p><p>Katholische Hospitalvereinigung Ostwestfalen (KHO), Lockbit</p><p>Although in the unofficial cybercriminals' code of conduct, hospitals are considered off-limits, associates of the <strong>Lockbit</strong> ransomware group have decided to break that rule. Three hospitals under the management of <strong>Katholische Hospitalvereinigung Ostwestfalen </strong>(<strong>KHO</strong>) in Germany have suffered a ransomware attack from the <strong>Lockbit</strong> group. The attack caused technical difficulties, leading to the suspension of the intensive care units' operations. The management ensures that patients' lives are not endangered.</p><p><strong>[Ransomware]</strong></p><p>Capital Health, Lockbit</p><p><strong>Capital Health</strong>, a prominent healthcare organization managing numerous clinics in the U.S., recently revealed a cybersecurity crisis at the end of November 2023. While not officially confirmed by <strong>Capital Health</strong>, the <strong>Lockbit</strong> group claimed responsibility, stating they had stolen over 10 million files. However, they chose not to encrypt the hospital network to avoid endangering patient lives. This statement reflects the growing threat of ransomware attacks on healthcare institutions, particularly jeopardizing high-risk patients.</p><p><strong>[Data Breach]</strong></p><p>Court Services Victoria (CSV), Qilin</p><p><strong>The Australian state of Victoria's court </strong>has fallen victim to a ransomware attack by the <strong>Qilin</strong> group, leading to the leakage of sensitive recordings of court hearings. The attack was discovered on December 21, 2023, and the incident allowed hackers to disrupt operations and gain access to the audio-visual archive containing sensitive hearing recordings. The mentioned recordings contain public and confidential information, so depending on the case, they may expose sensitive information regarding court cases. However, the announced court proceedings will not be postponed.</p><p><strong>[Data Breach]</strong></p><p>HealthEC</p><p><strong>HealthEC</strong>, a company providing IT services to numerous clinics in the United States, has announced a data breach affecting approximately 4.5 million individuals. The incident is dated back to July of last year, and the leaked sensitive information includes names, addresses, dates of birth, social security numbers, taxpayer identification numbers, medical data, health insurance information, as well as billing and claims information. The perpetrator of the attack has not yet been identified.</p><p><strong>[Crypto]</strong></p><p>Orbit Chain&nbsp;</p><p>On New Year's Eve, the <strong>Orbit Chain</strong> blockchain and DApps management platform fell victim to a cyberattack, resulting in a direct loss of $86 million in various cryptocurrencies. The attackers remain unknown, but the sophistication suggests an involvement of <strong>North Korean hackers</strong> specialized in large-scale cryptocurrency theft. <strong>Orbit Chain</strong> has cautioned users about fake profiles on the X social network promising refunds and advised them to await further official statements.</p><p><strong>[Crypto]<br></strong>SEC</p><p><strong>The Securities and Exchange Commission's (SEC)</strong> Twitter account was compromised, with a fraudulent tweet falsely claiming approval for Bitcoin exchange-traded funds. The <strong>SEC</strong> confirmed the breach after the misleading tweet was posted last week, marking another high-profile account takeover on the social media platform, along with Mandiant earlier this month.&nbsp;</p><p><strong>[Infrastructure]</strong></p><p>Sandworm, Kyivstar</p><p>Russian hackers, known as the <strong>Sandworm</strong> group, conducted a cyber attack on <strong>Kyivstar</strong>, Ukraine's largest telecom service provider, in December. The attack temporarily caused an internet outage for over 25 million users and wiped the data from 10,000 computers and thousands of servers on Kyivstar's network. Sandworm, closely linked to Russian military intelligence units, gained global recognition in 2015 when they caused a power outage in Ukraine.</p><p><strong>[Update]</strong></p><p>Apache OFBiz</p><p>Experts from <strong>Shadowserver</strong> have detected attempts to exploit a critical 0-day vulnerability in the <strong>Apache OFBiz open-source Enterprise Resource Planning</strong> (ERP) system, which is also the foundation for Atlassian Jira. The identified vulnerability can be exploited to bypass authentication and achieve server-side request forgery (SSRF), allowing attackers access to sensitive information and arbitrary code execution (ACE). The vulnerability affects <strong>Apache OFBiz</strong> versions 18.12.11 and earlier. If you are using any vulnerable versions, update to the latest version.</p><p><strong>[Update]</strong></p><p>Apache RocketMQ</p><p>Experts warn of a rising number of potential attackers exploiting vulnerabilities discovered in <strong>Apache RocketMQ</strong> last year, even after the company released a security patch that proved only partially effective. In a specific context, the flaw could lead to remote code execution (RCE) and affect NameServer, Broker, and Controller services. Updating NameServer to version 5.1.2/4.9.7 or newer is recommended to avoid attacks.</p><p><strong>[Update]</strong></p><p>Ivanti Endpoint Protection Manager (EPM)</p><p><strong>Ivanti</strong>, a cybersecurity solutions company, alerts about a newly discovered critical flaw in its endpoint protection software (<strong>Endpoint Protection Manager</strong>). The flaw allows SQL injection, allowing potential attackers to execute arbitrary queries without authentication and gain control over devices with the EPM agent. Urgent updating or implementing other risk reduction measures outlined on the Ivanti website is advised.</p><p><strong>[0-Day Vulnerability]</strong></p><p>Ivant VPN&nbsp;</p><p>Chinese nation-state actors are actively exploiting two critical zero-day vulnerabilities in <strong>Ivanti VPN</strong> services, allowing unauthenticated remote code execution. Discovered by Volexity in December, the vulnerabilities (CVE-2023-46805 and CVE-2024-21887) were chained together for complete system compromise, enabling attackers to run RCE, steal configuration data, modify files, and conduct reverse tunneling from the I<strong>vanti Connect Secure VPN</strong> appliance. Ivanti announced an upcoming patch in the following days.</p><p><strong>[Legal]</strong></p><p>23andMe</p><p>The popular ancestry discovery app <strong>23andMe</strong> experienced a cyber attack in November of last year, compromising the data of 6.9 million users. Recently, due to a collective lawsuit against the company, the case has reappeared in the media. However, leveraging the lack of clear guidelines in the <strong>California Privacy Rights Act</strong>, <strong>23andMe</strong> denies responsibility for data protection, shifting blame to users who did not regularly change passwords and follow security recommendations on the website. The case is another indicator of the underdeveloped framework for user data protection globally.</p><p><strong>[Legal]</strong></p><p>DoJ, xDedic Marketplace</p><p>The U.S. Department of Justice has indicted 19 individuals worldwide concerning the now-defunct <strong>xDedic Marketplace</strong>, a Dark Web site for selling stolen data. Three defendants received 6.5 years in prison, eight received sentences ranging from one to five years, and one individual received five years of probation. <strong>xDedic</strong>, until its shutdown in January 2019, facilitated cybercriminals in trading stolen access credentials and personal information, affecting over 700,000 hacked computers worldwide, with estimated damages exceeding $68 million.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cyberdispatch.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Dispatch! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Resources:&nbsp;</h2><ul><li><p><a href="https://therecord.media/paraguay-military-warns-of-ransomware">The Recorded Future: Paraguay military warns of &#8216;significant impact&#8217; of ransomware after attack on internet provider</a></p></li></ul><ul><li><p><a href="https://therecord.media/bosch-rexroth-pneumatic-wrenches-vulnerabilities-disclosed">The Recorded Future: Vulnerabilities found in high-power Bosch wrenches popular with carmakers</a></p></li></ul><ul><li><p><a href="https://blog.knowbe4.com/ransomware-disrupts-multiple-german-hospitals?utm_content=277318403&amp;utm_medium=social&amp;utm_source=linkedin&amp;hss_channel=lcp-2225282">KnowBe4: Lockbit 3.0 Ransomware Disrupts Emergency Care at Multiple German Hospitals</a></p></li></ul><ul><li><p><a href="https://thecyberexpress.com/cyberattack-on-capital-health/">The Cyber Express: Capital Health Hit by Cyberattack: Traces of LockBit Foul Play Emerge</a></p></li></ul><ul><li><p><a href="https://www.bleepingcomputer.com/news/security/victoria-court-recordings-exposed-in-reported-ransomware-attack/">Bleeping Computer: Victoria court recordings exposed in reported ransomware attack</a></p></li></ul><ul><li><p><a href="https://www.securityweek.com/4-5-million-individuals-affected-by-data-breach-at-healthec/#:~:text=Health%20technology%20company%20HealthEC%20has,healthcare%20organizations%20improve%20patient%20outcomes.">Security Week: 4.5 Million Individuals Affected by Data Breach at HealthEC</a></p></li></ul><ul><li><p><a href="https://www.bleepingcomputer.com/news/security/orbit-chain-loses-86-million-in-the-last-fintech-hack-of-2023/">Bleeping Computer: Orbit Chain loses $86 million in the last fintech hack of 2023</a></p></li><li><p><a href="https://therecord.media/sec-x-account-compromised-bitcoin">Recorded Future: SEC's X account compromised, used to spread false bitcoin announcement</a></p></li></ul><ul><li><p><a href="https://www.bleepingcomputer.com/news/security/russian-hackers-wiped-thousands-of-systems-in-kyivstar-attack/">Bleeping Computer: Russian hackers wiped thousands of systems in KyivStar attack</a></p></li></ul><ul><li><p><a href="https://www.securityweek.com/critical-apache-ofbiz-vulnerability-in-attacker-crosshairs/">Security Week: Critical Apache OFBiz Vulnerability in Attacker Crosshairs</a></p></li></ul><ul><li><p><a href="https://www.bleepingcomputer.com/news/security/hackers-target-apache-rocketmq-servers-vulnerable-to-rce-attacks/">Bleeping Computer: Hackers target Apache RocketMQ servers vulnerable to RCE attacks</a></p></li></ul><ul><li><p><a href="https://arstechnica.com/security/2024/01/ivanti-warns-of-critical-vulnerability-in-its-popular-line-of-endpoint-protection-software/">Ars Technica: Ivanti warns of critical vulnerability in its popular line of endpoint protection software</a></p></li><li><p><a href="https://www.csoonline.com/article/1290205/chinese-hackers-exploit-ivanti-vpn-zero-days-for-rce-attacks.html#:~:text=Two%20critically%20severe%20zero%2Dday,execution%2C%20according%20to%20Volexity%20research.">CSO Online: Chinese hackers exploit Ivanti VPN zero days for RCE attacks</a></p></li></ul><ul><li><p><a href="https://arstechnica.com/tech-policy/2024/01/23andme-shamelessly-blaming-users-for-data-breach-lawyer-says/">Ars Technica: 23andMe told victims of data breach that suing is futile, letter shows</a></p></li></ul><ul><li><p><a href="https://thehackernews.com/2024/01/doj-charges-19-worldwide-in-68-million.html">Hacker News: DoJ Charges 19 Worldwide in $68 Million xDedic Dark Web Marketplace Fraud</a></p></li></ul><h2></h2><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://cyberdispatch.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Cyber Dispatch! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>