Ransomware Attack Takes 18 Romanian Hospitals Offline
A ransomware attack encrypted the database of the Hipocrate Information System, a medical services management platform used by 18 hospitals in Romania, taking the hospitals offline. The Ministry of Health provided a list of affected facilities including regional centers and cancer treatment centers. Cybersecurity experts are investigating but no group has claimed responsibility or if patient data was exposed. The software provider has not commented. Read more
CISA Confirms New Fortinet RCE Bug Being Actively Exploited
CISA confirms exploitation of an RCE vulnerability (CVE-2022-48618) in Fortinet’s FortiOS. The bug allows remote execution via HTTP requests. CISA directed government agencies to secure devices within 7 days through a binding order by February 16th. Timely patches are needed as Fortinet RCE vulnerabilities are commonly leveraged in cyber attacks against networks. Read more
Raspberry Robin Malware Uses One-Day Exploits to Target Windows
Raspberry Robin malware utilized one-day Windows exploits (CVE-2023-36802, CVE-2023-29360) likely from dark web sources or an external developer, to bypass security tools and escalate privileges. It disguises C2s using Tor, downloads payloads via Discord instead of PsExec, terminates processes, and detects API hooks to evade analysis. Operators actively pursue zero-days and connect to an exploit developer but do not self-develop. Read more
Black Basta Ransomware Attack Hits Hyundai Motor Europe
Hyundai Motor Europe experienced a Black Basta ransomware attack in January 2024. Attackers claimed to steal 3TB of data from Windows domains including legal, sales, HR and IT. Hyundai initially referred to IT issues but later confirmed the cyberattack. Hyundai had a previous data breach affecting customers in Europe. The nature of stolen data from this incident remains unclear. Read more
New Fortinet RCE flaw in SSL VPN Exploited in the Wild
Fortinet warned of an RCE flaw (CVE-2024-21762) in FortiOS SSL VPN, rated 9.6 severity. It is an out-of-bounds write vulnerability allowing unauthorized remote code execution via crafted requests. Fortinet recommends upgrading devices to latest versions to patch. Disabling SSL VPN can also mitigate risk. No details on exploitation provided. Prompt updates are strongly recommended due to risk of exploitation. Read more
Free Rhysida Ransomware Decryptor Released for Windows
South Korean researchers analyzed the Rhysida ransomware encryptor and discovered a flaw in its random number generator that derives a 32-bit seed value predictably from system time. This allows guessing the seed and regeneration of encryption keys. They created an automated decryptor tool for Windows exploiting its intermittent encryption pattern. The decryptor precisely recreates keys to decrypt files without the attacker’s private key. Read more
Bank of America Data Breached: Customers Warned After Vendor Hacked
Bank of America notified customers of a data breach after a security incident at one of its service providers, Infosys McCamish Systems (IMS). Personal information of 57,028 customers was compromised, including names, addresses, SSNs, DOBs and financial account details. IMS systems were hacked in November 2023 by the LockBit ransomware gang, which claimed to have encrypted over 2,000 systems. The breach exposed data for Bank of America’s deferred compensation plans handled by IMS. Read more
Roundcube Email Server Bug Actively Exploited in Attacks: CISA Issues Advisory
CISA issued an advisory warning of active exploitation of CVE-2023-43770, a persistent XSS bug in Roundcube email servers before versions 1.4.14, 1.5.x-1.5.4 and 1.6.x-1.6.3. CISA added it to the Known Exploited Vulnerabilities Catalog, requiring federal agencies to patch within 3 weeks. Another Roundcube bug, CVE-2023-5631, was exploited by Russian APT Winter Vivern group in October to steal emails from European government servers via malicious SVG files. Read more
What is the SLAM Method? Identify Phishing Emails with SLAM Method
The SLAM method is a 4-step framework (Stop, Look, Ask, Manage) for identifying phishing emails. It involves double checking the Sender address, Links, Attachments and Message details. STOP means pause before taking actions in emails. LOOK means closely examine sender address for spoofing and inspect email body for suspicious requests. ASK means get a second opinion from IT if unsure. MANAGE means properly handle identified phishing emails according to policies and report to IT. Following this systematic process makes it harder for phishing schemes to succeed when used consistently across an organization, along with technical controls and user training. Read more
Hackers Mint $290 Million PLA Tokens from PlayDapp Gaming Platform
Hackers allegedly stole a private key to generate 200M PLA tokens from the PlayDapp gaming platform worth $36.5M. PlayDapp notified users and froze assets. They offered a $1M bounty if hackers returned stolen items by a date, but hackers instead created 1.59B more tokens worth $253.9M. PlayDapp took measures like suspending trading and withdrawals. The attack style resembles previous hacks by the North Korean Lazarus Group. Read more
Prudential Financial Breached in a Cyberattack, Hackers Stole Sensitive Data
Financial giant Prudential notified of a breach affecting systems on Feb 4-5. They promptly secured compromised systems within a day and informed authorities. An investigation is underway on extent of unauthorized access. No customer data appears compromised so far. Prudential reports no material impact from this incident on their operations or finances currently. Read more
Bumblebee Malware Attacks Re-Emerge After a 4 Month Pause, Target US Organizations
Proofpoint revealed that the Bumblebee malware had resurfaced in a new campaign after a 4 month absence, aligning with the return of other threats post-winter. The February 2024 campaign used VBA macros in phishing emails sent to US organizations pretending to be a voicemail. Opening the attached files launched a PowerShell command pulling the next stage from a remote server which downloaded and executed the Bumblebee DLL. While attribution is uncertain, techniques aligned with past TA579 group activities. Read more
LockBit Ransomware Claims Cyberattack on Fulton County, Georgia
The LockBit ransomware group claimed responsibility for a cyberattack on Fulton County, Georgia that caused IT outages. Fulton County, with over 1 million people including Atlanta, still has phone, court, and tax disruptions 3 weeks later. LockBit published evidence of accessing systems and sensitive citizen data, threatening a leak by February 16th unless paid. While authorities haven’t confirmed LockBit, the claims prompted a statement that a ransomware attack occurred but no specifics on the actor were provided. Fulton County is exploring insurance to recover compromised systems. Read more
Trans-Northern Pipelines Hit by ALPHV Ransomware Attack
Trans-Northern Pipelines (TNPI), which transports fuel through pipelines in Ontario-Quebec and Alberta, confirmed experiencing a November 2023 cyber attack impacting internal systems. The ALPHV/BlackCat ransomware group claims stealing 183GB of TNPI documents and publishing employee contact data. TNPI is investigating these claims while safely operating pipelines.