,

This Week in Cybersecurity: Feb 12th – Feb 16th, Ransomware Attack Takes 18 Romanian Hospitals Offline

This Week in Cybersecurity: Feb 12th - Feb 16th, Ransomware Attack Takes 18 Romanian Hospitals Offline
Table of Contents
    Add a header to begin generating the table of contents

    Ransomware Attack Takes 18 Romanian Hospitals Offline

    A ransomware attack encrypted the database of the Hipocrate Information System, a medical services management platform used by 18 hospitals in Romania, taking the hospitals offline. The Ministry of Health provided a list of affected facilities including regional centers and cancer treatment centers. Cybersecurity experts are investigating but no group has claimed responsibility or if patient data was exposed. The software provider has not commented. Read more

    CISA Confirms New Fortinet RCE Bug Being Actively Exploited

    CISA confirms exploitation of an RCE vulnerability (CVE-2022-48618) in Fortinet’s FortiOS. The bug allows remote execution via HTTP requests. CISA directed government agencies to secure devices within 7 days through a binding order by February 16th. Timely patches are needed as Fortinet RCE vulnerabilities are commonly leveraged in cyber attacks against networks. Read more

    Raspberry Robin Malware Uses One-Day Exploits to Target Windows

    Raspberry Robin malware utilized one-day Windows exploits (CVE-2023-36802, CVE-2023-29360) likely from dark web sources or an external developer, to bypass security tools and escalate privileges. It disguises C2s using Tor, downloads payloads via Discord instead of PsExec, terminates processes, and detects API hooks to evade analysis. Operators actively pursue zero-days and connect to an exploit developer but do not self-develop. Read more

    Black Basta Ransomware Attack Hits Hyundai Motor Europe

    Hyundai Motor Europe experienced a Black Basta ransomware attack in January 2024. Attackers claimed to steal 3TB of data from Windows domains including legal, sales, HR and IT. Hyundai initially referred to IT issues but later confirmed the cyberattack. Hyundai had a previous data breach affecting customers in Europe. The nature of stolen data from this incident remains unclear. Read more

    New Fortinet RCE flaw in SSL VPN Exploited in the Wild

    Fortinet warned of an RCE flaw (CVE-2024-21762) in FortiOS SSL VPN, rated 9.6 severity. It is an out-of-bounds write vulnerability allowing unauthorized remote code execution via crafted requests. Fortinet recommends upgrading devices to latest versions to patch. Disabling SSL VPN can also mitigate risk. No details on exploitation provided. Prompt updates are strongly recommended due to risk of exploitation. Read more

    Free Rhysida Ransomware Decryptor Released for Windows

    South Korean researchers analyzed the Rhysida ransomware encryptor and discovered a flaw in its random number generator that derives a 32-bit seed value predictably from system time. This allows guessing the seed and regeneration of encryption keys. They created an automated decryptor tool for Windows exploiting its intermittent encryption pattern. The decryptor precisely recreates keys to decrypt files without the attacker’s private key. Read more

    Bank of America Data Breached: Customers Warned After Vendor Hacked

    Bank of America notified customers of a data breach after a security incident at one of its service providers, Infosys McCamish Systems (IMS). Personal information of 57,028 customers was compromised, including names, addresses, SSNs, DOBs and financial account details. IMS systems were hacked in November 2023 by the LockBit ransomware gang, which claimed to have encrypted over 2,000 systems. The breach exposed data for Bank of America’s deferred compensation plans handled by IMS. Read more

    Roundcube Email Server Bug Actively Exploited in Attacks: CISA Issues Advisory

    CISA issued an advisory warning of active exploitation of CVE-2023-43770, a persistent XSS bug in Roundcube email servers before versions 1.4.14, 1.5.x-1.5.4 and 1.6.x-1.6.3. CISA added it to the Known Exploited Vulnerabilities Catalog, requiring federal agencies to patch within 3 weeks. Another Roundcube bug, CVE-2023-5631, was exploited by Russian APT Winter Vivern group in October to steal emails from European government servers via malicious SVG files. Read more

    What is the SLAM Method? Identify Phishing Emails with SLAM Method

    The SLAM method is a 4-step framework (Stop, Look, Ask, Manage) for identifying phishing emails. It involves double checking the Sender address, Links, Attachments and Message details. STOP means pause before taking actions in emails. LOOK means closely examine sender address for spoofing and inspect email body for suspicious requests. ASK means get a second opinion from IT if unsure. MANAGE means properly handle identified phishing emails according to policies and report to IT. Following this systematic process makes it harder for phishing schemes to succeed when used consistently across an organization, along with technical controls and user training. Read more

    Hackers Mint $290 Million PLA Tokens from PlayDapp Gaming Platform

    Hackers allegedly stole a private key to generate 200M PLA tokens from the PlayDapp gaming platform worth $36.5M. PlayDapp notified users and froze assets. They offered a $1M bounty if hackers returned stolen items by a date, but hackers instead created 1.59B more tokens worth $253.9M. PlayDapp took measures like suspending trading and withdrawals. The attack style resembles previous hacks by the North Korean Lazarus Group. Read more

    Prudential Financial Breached in a Cyberattack, Hackers Stole Sensitive Data

    Financial giant Prudential notified of a breach affecting systems on Feb 4-5. They promptly secured compromised systems within a day and informed authorities. An investigation is underway on extent of unauthorized access. No customer data appears compromised so far. Prudential reports no material impact from this incident on their operations or finances currently. Read more

    Bumblebee Malware Attacks Re-Emerge After a 4 Month Pause, Target US Organizations

    Proofpoint revealed that the Bumblebee malware had resurfaced in a new campaign after a 4 month absence, aligning with the return of other threats post-winter. The February 2024 campaign used VBA macros in phishing emails sent to US organizations pretending to be a voicemail. Opening the attached files launched a PowerShell command pulling the next stage from a remote server which downloaded and executed the Bumblebee DLL. While attribution is uncertain, techniques aligned with past TA579 group activities. Read more

    LockBit Ransomware Claims Cyberattack on Fulton County, Georgia

    The LockBit ransomware group claimed responsibility for a cyberattack on Fulton County, Georgia that caused IT outages. Fulton County, with over 1 million people including Atlanta, still has phone, court, and tax disruptions 3 weeks later. LockBit published evidence of accessing systems and sensitive citizen data, threatening a leak by February 16th unless paid. While authorities haven’t confirmed LockBit, the claims prompted a statement that a ransomware attack occurred but no specifics on the actor were provided. Fulton County is exploring insurance to recover compromised systems. Read more

    Trans-Northern Pipelines Hit by ALPHV Ransomware Attack

    Trans-Northern Pipelines (TNPI), which transports fuel through pipelines in Ontario-Quebec and Alberta, confirmed experiencing a November 2023 cyber attack impacting internal systems. The ALPHV/BlackCat ransomware group claims stealing 183GB of TNPI documents and publishing employee contact data. TNPI is investigating these claims while safely operating pipelines.

    Trending

    Daily Briefing Newsletter

    Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

    Related Posts