Black Arrow Cyber Threat Briefing 04 October 2024

Welcome to this week’s Black Arrow Cyber Threat Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.

Top Cyber Stories of the Last Week

How Snoozing on Cyber Security Fails Modern Businesses

A recent study has found that many organisations are delaying crucial data security updates, likened to hitting the snooze button on an alarm. This reluctance to modernise security measures leaves businesses vulnerable to evolving threats as technologies like cloud and AI are integrated into operations. The report highlights that clinging to legacy security systems can lead to significant financial and reputational damage. Despite the ever-present threat of cyber attacks, many organisations hesitate to upgrade due to comfort with existing systems and perceived cost implications. The adoption of modern security practices like Zero Trust models and AI-driven tools is essential to mitigate these risks.

Cyber Criminals Capitalise on Poorly Configured Cloud Environments

According to the 2024 Elastic Global Threat Report, cyber criminals are exploiting poorly configured cloud environments and leveraging off-the-shelf offensive security tools, which account for approximately 54% of observed malware alerts, with one tool responsible for over 27% of infections. Misconfigurations are widespread: 47% of Microsoft Azure failures are tied to storage issues, and 30% of AWS failures result from the lack of multi-factor authentication. There has been a 12% increase in brute-force techniques, particularly in Azure environments. While defence technologies are making progress, the report emphasises the need for enterprises to enhance cloud configurations and enforce security measures like multi-factor authentication.

90% of Cyber Security Incidents Could Be Avoided, Survey Reveals

Veeam Software has found that only 43% of EMEA IT decision-makers believe the forthcoming NIS2 directive will significantly enhance EU cyber security. This scepticism persists despite 90% of respondents reporting at least one security incident in the past year that NIS2 could have prevented. While nearly 80% are confident they will eventually comply with NIS2, up to two-thirds expect to miss the October 2024 deadline. The report highlights barriers to compliance, including technical debt (24%), lack of leadership understanding (23%), and insufficient budget (21%). Additionally, 40% have experienced decreased IT budgets since NIS2 was announced, with many organisations ranking it lower in urgency than other business priorities.

The Cyber Industry Needs to Accept It Can't Eliminate Risk

A recent analysis highlights that striving for zero risk in cyber security is unattainable for organisations. The reliance on large technology providers like CrowdStrike exposes systemic risks, where an incident can have widespread impact across dependent businesses. The article emphasises that instead of pursuing perfection, organisations should focus on reducing risks to a manageable level. Transparency with stakeholders about residual risks is crucial to set realistic expectations and maintain trust. It also suggests diversifying technology stacks to avoid overloading risk onto a few providers, and implementing practical security measures that can be consistently followed to manage risks effectively.

Cyber Teams Say They Can’t Keep Up with Attack Volumes

ISACA has found that understaffing and underfunding are major concerns for cyber security professionals in Europe, with 61% reporting understaffed teams and 52% citing underfunding despite predicted spending increases. The report highlighted that 68% feel their work is more stressful now than in 2019 due to a complex threat landscape. Nearly 58% expect to face a cyber attack in the next 12 months, up six percentage points from 2023. Additionally, 52% pointed to a lack of soft skills among cyber pros, especially communication, exacerbating the skills gap in the industry.

C-Level Executives are a Weak Point for Cyber Security

Research indicates that 72% of US senior executives have been targeted by cyber attacks in the past 18 months, highlighting the C-suite as a key security vulnerability. Attacks have grown in frequency and sophistication, with impersonation scams up by 26%, and 27% involving AI-assisted deepfakes. Despite this, many organisations have not prioritised executive security training, though 87% of IT professionals believe senior executives require more training than other staff. As cyber security remains a top concern, companies must enhance security measures to protect their data.

Email Phishing Attacks Surge as Attackers Bypass Security Controls

Egress has reported a 28% rise in email phishing attacks in Q2 2024 compared to Q1, highlighting attackers' effective methods to bypass security controls. These threats intensify as 44% of attacks originated from internally compromised accounts and 8% from supply chain accounts. The report found that 89% of phishing emails involved impersonation, often targeting HR, IT and finance departments. Additionally, commodity attacks have surged, causing a 2700% increase in phishing volumes during such campaigns. Emerging trends also show attackers using multi-channel approaches, leveraging platforms like MS Teams and WhatsApp to exploit vulnerabilities.

Security Threats Are More Pressing Than Ever for Business Leaders, With Cloud Worries Taking Top Spot

PwC has found that cloud-related threats are now the top concern for executives, with 42% ranking them as their primary worry. Despite this focus, 34% admit they are least prepared to address these issues. Hack-and-leak operations and third-party breaches are also significant concerns, cited by 38% and 35% of respondents respectively. Interestingly, Chief Information Security Officers place ransomware among their top three worries, with 42% feeling underprepared to tackle it. The expanding attack surface from increased reliance on cloud, AI, and connected devices underscores the need for an agile, enterprise-wide approach to resilience.

Ten Million Brits Hit by Fraud in Just Three Years

A recent study sponsored by Santander UK and conducted by the Social Market Foundation (SMF) revealed that 21% of respondents across 15 European countries experienced fraud between 2021 and 2023, at a direct cost of £168bn. However, the SMF estimated the total cost of such incidents at £420bn; this includes productivity losses from having to spend time reporting and recovering from the fraud incident. In the UK alone, victims lost an average of £907 each, amounting to a total direct cost of around £9bn. The report highlights that while most believe banks should lead in compensating victims, many also see digital platforms and telecom providers as responsible. Both SMF and Santander are calling on the British government to spearhead a global initiative to combat fraud, including international agreements and enhanced law enforcement.

Is the Weakest Link in Cyber Security Becoming Even Weaker?

Human error is the leading cause of cyber security breaches, with Cybint reporting that 95% result from human mistakes. Verizon's 2023 Data Breach Investigations Report highlights that 74% of incidents involve a human element, such as clicking on phishing links. The rise of deepfakes and increased exposure of personal information have intensified these risks, making attacks more sophisticated. Despite awareness training, prominent organisations continue to face breaches. Notably, Gen Z is over three times more likely to fall for online fraud compared to baby boomers. Remote working has further blurred boundaries, increasing vulnerability to cyber attacks.

Cyber Incidents are the Achilles Heel for Major UK CEOs, Report Finds

FGS Global has found that cyber attacks are the top concern for UK businesses, with 36% of senior leaders reporting cyber incidents in the past year. Despite 85% of firms experiencing a crisis, only 36% feel highly prepared to handle ransomware attacks, which over half fear facing. The report highlights a lack of understanding around cyber security and cyber crime, intensified by AI risks.

Sources:

https://votiro.com/blog/how-snoozing-on-cybersecurity-fails-modern-businesses/

https://www.helpnetsecurity.com/2024/10/04/cloud-environments-attack-surface/

https://dcnnmagazine.com/security/90-of-cybersecurity-incidents-could-be-avoided-survey-reveals/

https://www.computerweekly.com/opinion/The-cyber-industry-needs-to-accept-it-cant-eliminate-risk

https://www.computerweekly.com/news/366612212/Cyber-teams-say-they-cant-keep-up-with-attack-volumes

https://www.techradar.com/pro/c-level-executives-are-a-weak-point-for-cybersecurity-research-says

https://www.infosecurity-magazine.com/news/email-phishing-surge-bypass/

https://www.techradar.com/pro/security/security-threats-are-more-pressing-than-ever-for-business-leaders-with-cloud-worries-taking-top-spot

https://www.infosecurity-magazine.com/news/ten-million-brits-hit-fraud-three/

https://hackernoon.com/is-the-weakest-link-in-cybersecurity-becoming-even-weaker

https://www.cityam.com/cyber-incidents-are-the-achilles-heel-for-major-uk-ceos-report-finds/


Governance, Risk and Compliance

CFOs Suit Up for Cyber War as Risk Management Evolves (pymnts.com)

Allies to Leverage During a Cyber Crisis (darkreading.com)

The cyber industry needs to accept it can't eliminate risk | Computer Weekly

PwC Urges Boards to Give CISOs a Seat at the Table - Infosecurity Magazine (infosecurity-magazine.com)

Cyber incidents are the Achilles Heel for major UK CEOs, report finds (cityam.com)

Almost half of professional services firms are not equipped to survive a major cyber security attack | Today's Conveyancer (todaysconveyancer.co.uk)

As CISO roles expand, so should cyber budgets, says NASCIO 2024 cyber security report | StateScoop

Human Capital and Risk Governance: Insider Threats To Cyber Security (forbes.com)

Cyber security teams are understaffed, overworked, and underfunded – and it’s taking a heavy toll on mental health | ITPro

Global cyber threat to double predicts new report (emergingrisks.co.uk)

QBE casts light on what’s ahead in cyber space | Insurance Business America (insurancebusinessmag.com)

Over Half of Cyber Professionals Feel Their Budget is Underfunded - IT Security Guru

C-level executives are a weak point for cyber security | TechRadar

Average North American CISO salary now $565,000 • The Register

BlackBerry report: Cyber threats up 53%, critical sectors hit (securitybrief.co.nz)

Cyber teams say they can’t keep up with attack volumes | Computer Weekly

Watch out, CFOs: cyber crime is booming, says former White House advisor | Fortune

Normalizing Security Culture: Stay Ready (darkreading.com)

Cyber attacks causing reputational damages: CIRA – BNN Bloomberg

Security spending signals major role change for CISOs and their teams | CSO Online

Cyber Security Spending on the Rise, But Security Leaders Still Feel Vulnerable - Infosecurity Magazine (infosecurity-magazine.com)

Strengthening Security Posture Through People-First Engagement (informationsecuritybuzz.com)

Forrester's CISO Budget Planning Guide for 2025: Prioritize API Security - Security Boulevard

Gartner: CISOs should ditch ‘zero tolerance’ prevention (techinformed.com)

How to Enlist the CFO as a Cyber Security Budget Ally | Mimecast


Threats

Ransomware, Extortion and Destructive Attacks

Ransomware attackers hop from on-premises systems to cloud to compromise Microsoft 365 accounts - Help Net Security

Ransomware gangs are using stolen data to threaten CEOs | Fortune

Embargo ransomware escalates attacks to cloud environments (bleepingcomputer.com)

Microsoft: Cloud Environments of US Organisations Targeted in Ransomware Attacks - SecurityWeek

Multinational police effort hits sections of Lockbit ransomware operation | CyberScoop

Russia’s FSB protected Evil Corp gang that carried out NATO cyber-attacks (yahoo.com)

US charges Joker's Stash and Rescator money launderers (bleepingcomputer.com)

More frequent disruption operations needed to dent ransomware gangs, officials say | CyberScoop

Ransomware activity shows no signs of slowing down - Help Net Security

International Counter Ransomware Initiative 2024 Joint Statement | The White House

Ransomware crew infects 100+ orgs monthly with BabyLockerKZ • The Register

Cyber Crime is Still Evil Corp, But Disruptions Are Helping (inforisktoday.com)

As ransomware attacks surge, UK privacy regulator investigating fewer incidents than ever (therecord.media)

Healthcare organisations are having to pay millions to solve ransomware attacks | TechRadar

Here's what to expect from the Counter Ransomware Initiative meeting this week (therecord.media)

JPCERT shares Windows Event Log tips to detect ransomware attacks (bleepingcomputer.com)

Some of the world's biggest countries are teaming up to tackle ransomware scams | TechRadar

Ransomware August 2024 round-up: fools, rules and tools | TechFinitive

Ransomware Victims

Cleaning Up A Cyber Security Mess: Blue Mantis Details The ‘Aftermath’ Of A Ransomware Attack (crn.com)

Patelco Credit Union Data Breach Impacts Over 1 Million People - SecurityWeek

Ransomware forces Texas hospital to turn away ambulances • The Register

Agence France-Presse says cyber attack targeted IT systems (therecord.media)

Dermatology Practice Sued After Ransomware Attack Exposed Data (bloomberglaw.com)

Phishing & Email Based Attacks

UK on high alert over Iranian spear-phishing attacks, says NCSC | Computer Weekly

New report reveals a rise in phishing attacks, as commodity (globenewswire.com)

Email Phishing Attacks Surge as Attackers Bypass Security Controls - Infosecurity Magazine (infosecurity-magazine.com)

Beyond Phishing: AI's New Tricks for Cyber Attacks (govinfosecurity.com)

UK issues alert over threat from cyber attackers working for Iranian state | Evening Standard

iPhone, Android Users Warned After 50,000 Message Email Bomb Attack (forbes.com)

Common Words in Email Scams: Money, Income, Investment, More | Entrepreneur

QR Code phishing is advancing to a new level, so be on your guard | TechRadar

The Hidden Risks of URL Rewriting and the Superior Alternative for Email Security - Security Boulevard

Attackers Targeting Recruiters With More_Eggs Backdoor (darkreading.com)

“Gone Phishing”—Every Cyber Attacker’s Favorite Phrase - Gigaom

IBM X-Force: Hackers Using Phishing, BEC to Steal Cloud Credentials | MSSP Alert

Free Sniper Dz Phishing Tools Fuel 140,000+ Cyber Attacks Targeting User Credentials (thehackernews.com)

INTERPOL Arrests 8 in Major Phishing and Romance Fraud Crackdown in West Africa (thehackernews.com)

Google spooks out users with an erroneous 'You added a new card to your Google Account' email (androidauthority.com)

New Email Scam Includes Pictures of Your House. Don’t Fall For It. | Electronic Frontier Foundation (eff.org)

Ireland is the most phished country in the world, says survey (siliconrepublic.com)

Business Email Compromise (BEC)/Email Account Compromise (EAC)

IBM X-Force: Hackers Using Phishing, BEC to Steal Cloud Credentials | MSSP Alert

Other Social Engineering

QR Code phishing is advancing to a new level, so be on your guard | TechRadar

UK Hacker Charged in $3.75 Million Insider Trading Scheme Using Hacked Executive Emails (thehackernews.com)

Students Add Facial Recognition to Meta Smart Glasses to Identify Strangers in Real-Time - MacRumors

INTERPOL Arrests 8 in Major Phishing and Romance Fraud Crackdown in West Africa (thehackernews.com)

Physical Security Is a Big Part of Staying Digitally Safe: My 5 Top Tips (makeuseof.com)

New Email Scam Includes Pictures of Your House. Don’t Fall For It. | Electronic Frontier Foundation (eff.org)

Meet the people hacker trying to improve cyber security (siliconrepublic.com)

Artificial Intelligence

AI-related cyber crime sparks concern among 65% of global survey participants (techmonitor.ai)

New report reveals a rise in phishing attacks, as commodity (globenewswire.com)

Is the Weakest Link in Cyber Security Becoming Even Weaker? | HackerNoon

Three essential steps for organisations to safeguard against deepfakes | TechRadar

Beyond Phishing: AI's New Tricks for Cyber Attacks (govinfosecurity.com)

Putting an end to the AI cyber responsibility turf wars | CyberScoop

Shadow AI, Data Exposure Plague Workplace Chatbot Use (darkreading.com)

FIN7 Gang Hides Malware in AI “Deepnude” Sites - Infosecurity Magazine (infosecurity-magazine.com)

Ukraine-Russia Cyber Battles Have Real-World Impact (darkreading.com)

Deepfake Ukrainian diplomat targeted US senator on Zoom call (bitdefender.com)

Could APIs be the undoing of AI? - Help Net Security

AI-Powered Rhadamanthys Stealer Targets Crypto Wallets with Image Recognition (thehackernews.com)

1 in 4 people have experienced identity fraud - and most of them blame AI | ZDNET

Rogue AI: What the Security Community is Missing | Trend Micro (US)

Spotting AI-generated scams: Red flags to watch for - Help Net Security

Large language models hallucinating non-existent developer packages could fuel supply chain attacks | InfoWorld

Cyber security experts praise veto of California's AI safety bill | SC Media (scworld.com)

Nokia's Threat Intelligence Report: Telecom Cyber Attacks Surge with AI & Automation (thefastmode.com)

2FA/MFA

The most common authentication method is also the least secure - Help Net Security

Session Hijacking 2.0 — The Latest Way That Attackers are Bypassing MFA (thehackernews.com)

Malware

Hackers are using a ChromeLoader exploit to set up fake companies and malware-ridden websites | ITPro

FIN7 Gang Hides Malware in AI “Deepnude” Sites - Infosecurity Magazine (infosecurity-magazine.com)

New Fin7 Hacker’s AI Naked Image Generator Serves Up More Than Nudes (forbes.com)

DCRat Malware Spreads via HTML Smuggling | MSSP Alert

Attackers Targeting Recruiters With More_Eggs Backdoor (darkreading.com)

New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking (thehackernews.com)

Thousands of Linux systems infected by stealthy malware since 2021 (arstechnica.com)

Microsoft reveals how Windows 10 and Windows 11 block keyloggers - Neowin

AI-Powered Rhadamanthys Stealer Targets Crypto Wallets with Image Recognition (thehackernews.com)

Here's How Criminals Use CAPTCHAs to Help Spread Malware (makeuseof.com)

North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks (thehackernews.com)

Bots/Botnets

New Cryptojacking Attack Targets Docker API to Create Malicious Swarm Botnet (thehackernews.com)

What bots mean for businesses and consumers - Help Net Security

Mobile

iPhone, Android Users Warned After 50,000 Message Email Bomb Attack (forbes.com)

This nasty Android adware is making phones unusable — how to stay safe | Tom's Guide (tomsguide.com)

Google Adds New Pixel Security Features to Block 2G Exploits and Baseband Attacks (thehackernews.com)

‘Pig butchering’ trading apps found on Google Play, App Store (bleepingcomputer.com)

Verizon outage: iPhones, Android devices stuck in SOS mode (bleepingcomputer.com)

Denial of Service/DoS/DDoS

Record-Breaking DDoS Attack Peaked at 3.8 Tbps, 2.14 Billion Pps - SecurityWeek

DDoS Attacks Skyrocket and Hacktivist Activity Surges Threatening Critical Global Infrastructure According to NETSCOUT’s 1H2024 Threat Intelligence Report | Business Wire

After Code Execution, Researchers Show How CUPS Can Be Abused for DDoS Attacks - SecurityWeek

Hacktivist activity drives a rise in DDoS attacks (betanews.com)

Telcos face increasing frequency and sophistication of DDoS attacks - Nokia (telecoms.com)

Cloudflare mitigated new record-breaking DDoS attack of 3.8 Tbps (securityaffairs.com)

Wave of record-breaking DDoS attacks originating from compromised WiFi routers | Cybernews

Internet of Things – IoT

Trojan cars: Why the US fears Chinese cyber attacks on electric vehicles (france24.com)

Students Add Facial Recognition to Meta Smart Glasses to Identify Strangers in Real-Time - MacRumors

Data Breaches/Leaks

Transport for London (TfL) cyber attack: What you need to know - BBC News

Half of Enterprises Surveyed Have Experienced a Security Breach Due to Unmanaged Non-Human Identities, According to AppViewX Report | Business Wire

43% of data breaches target small businesses in 5 industries | Retail Technology Review

Northern Ireland Police Data Leak Sees Service Fined by ICO - Infosecurity Magazine (infosecurity-magazine.com)

UK data watchdog confirms it's investigating MoneyGram data breach | TechCrunch

Patelco Credit Union Data Breach Impacts Over 1 Million People - SecurityWeek

T-Mobile US agrees to $31.5M settlement after IT breaches • The Register

The sensitive data of Australia's security personnel is at risk of being on-sold to foreign actors - ABC News

Dutch police breached by a state actor (securityaffairs.com)

Louisiana Accounting Firm Breach Impacts More Than 127K Customers | MSSP Alert

Organised Crime & Criminal Actors

UK man allegedly used genealogy sites to hack execs’ email accounts | Fortune

Cyber Crime is Still Evil Corp, But Disruptions Are Helping (inforisktoday.com)

How the FBI and Mandiant caught a 'serial hacker' who tried to fake his own death | TechCrunch

UK reveals father and son at heart of Evil Corp hacking group - BBC News

Cyber Security Losses Surge to $2.1 Billion in 2024: WazirX Seeks Court Protection (financemagnates.com)

Man charged for selling forged license keys for network switches (bleepingcomputer.com)

Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain

Linux malware “perfctl” behind years-long cryptomining campaign (bleepingcomputer.com)

Cyber Security Losses Surge to $2.1 Billion in 2024: WazirX Seeks Court Protection (financemagnates.com)

New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking (thehackernews.com)

Over $750 Million Stolen in Crypto Last Quarter Despite Drop in Hacks: CertiK - Decrypt

New Cryptojacking Attack Targets Docker API to Create Malicious Swarm Botnet (thehackernews.com)

AI-Powered Rhadamanthys Stealer Targets Crypto Wallets with Image Recognition (thehackernews.com)

Insider Risk and Insider Threats

Is the Weakest Link in Cyber Security Becoming Even Weaker? | HackerNoon

Insider Threats: Are Disgruntled Employees a Cyber Security Risk? | PLANSPONSOR

Insurance

A Guide to Buying and Maintaining Cyberinsurance | PLANSPONSOR

Beazley forecasts cyber insurance market to grow to $40bn by 2030 - Reinsurance News

Munich Re’s HSB launches comprehensive cyber insurance solution for SMBs - Reinsurance News

Supply Chain and Third Parties

Cyber companies need a best practice approach to major incidents. | Computer Weekly

Digital twins are optimizing supply chains and more. Here's why enterprises should care | ZDNET

Cloud/SaaS

Embargo ransomware escalates attacks to cloud environments (bleepingcomputer.com)

Microsoft Identifies Storm-0501 as Major Threat in Hybrid Cloud Ransomware Attacks (thehackernews.com)

Microsoft: Cloud Environments of US Organisations Targeted in Ransomware Attacks - SecurityWeek

Cloud threats top execs' list of cyber nightmares • The Register

Security threats are more pressing than ever for business leaders, with cloud worries taking top spot | TechRadar

Cyber criminals capitalize on poorly configured cloud environments - Help Net Security

The top enterprise cloud threats of 2024 (betanews.com)

Ransomware attackers hop from on-premises systems to cloud to compromise Microsoft 365 accounts - Help Net Security

Hackers Breach Hybrid Cloud with Stolen Entra ID Credentials (petri.com)

IBM X-Force: Hackers Using Phishing, BEC to Steal Cloud Credentials | MSSP Alert

Hacker made millions from breaking into business Office 365 accounts | TechRadar

Navigating the Security Risks of Multicloud Management (darkreading.com)

Top 6 Cloud Security Threats to Watch Out For - Security Boulevard

The End of The SaaS Era: Rethinking Software’s Role In Business

Outages

Cyber companies need a best practice approach to major incidents. | Computer Weekly

UK Post Office axes MoneyGram services in wake of cyber attack (finextra.com)

Verizon outage: iPhones, Android devices stuck in SOS mode (bleepingcomputer.com)

The Playstation Network is down in a global outage (bleepingcomputer.com)

Identity and Access Management

Five Eyes Agencies Release Guidance on Detecting Active Directory Intrusions - SecurityWeek

Half of Enterprises Surveyed Have Experienced a Security Breach Due to Unmanaged Non-Human Identities, According to AppViewX Report | Business Wire

Active Directory attack guidance issued by Five Eyes | SC Media (scworld.com)

Encryption

The fix for BGP’s weaknesses – RPKI – has issues of its own • The Register

Linux and Open Source

Highly Anticipated Linux Flaw Allows Remote Code Execution, but Less Serious Than Expected - SecurityWeek

Worried about that critical RCE Linux bug? Here's why you can relax | ZDNET

After Code Execution, Researchers Show How CUPS Can Be Abused for DDoS Attacks - SecurityWeek

New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking (thehackernews.com)

Thousands of Linux systems infected by stealthy malware since 2021 (arstechnica.com)

Passwords, Credential Stuffing & Brute Force Attacks

The most common authentication method is also the least secure - Help Net Security

Up to 600 million Facebook and Instagram passwords stored in plain text (9to5mac.com)

Irish Data Protection Commission fines Meta €91 million for passwords stored in plaintext | CyberScoop

IBM X-Force: Hackers Using Phishing, BEC to Steal Cloud Credentials | MSSP Alert

Passkeys and Cyber Security Awareness: A New Era Of Business Security (informationsecuritybuzz.com)

Poor password habits still an issue worldwide (betanews.com)

Complicated Passwords Make You Less Safe, Experts Now Say (forbes.com)

Free Sniper Dz Phishing Tools Fuel 140,000+ Cyber Attacks Targeting User Credentials (thehackernews.com)

Why your password policy should include a custom dictionary (bleepingcomputer.com)

Social Media

Up to 600 million Facebook and Instagram passwords stored in plain text (9to5mac.com)

Irish Data Protection Commission fines Meta €91 million for passwords stored in plaintext | CyberScoop

Students Add Facial Recognition to Meta Smart Glasses to Identify Strangers in Real-Time - MacRumors

UK regulator preparing for ‘strong action’ against tech giants

Are social media influencers equipped to dodge cyber attacks? | Mint (livemint.com)

Brits bemoan personal data practices but do little about it • The Register

Training, Education and Awareness

Is the Weakest Link in Cyber Security Becoming Even Weaker? | HackerNoon

One-Third of UK Teachers Do Not Have Cyber Security Training (techrepublic.com)

Regulations, Fines and Legislation

NIS2 could prevent cyber security incidents but many businesses aren't ready (betanews.com)

90% of cyber security incidents could be avoided, survey reveals - Data Centre & Network News (dcnnmagazine.com)

Majority of Companies will Miss Looming NIS2 Deadline as New European Union Cyber Security Directive Goes into Effect | Business Wire

Up to 600 million Facebook and Instagram passwords stored in plain text (9to5mac.com)

SolarWinds CISO: World's Cyber Regulations Still 'In Flux' (pymnts.com)

Irish Data Protection Commission fines Meta €91 million for passwords stored in plaintext | CyberScoop

Northern Ireland Police Data Leak Sees Service Fined by ICO - Infosecurity Magazine (infosecurity-magazine.com)

Sellafield nuclear site in Cumbria fined for IT security breaches - BBC News

As ransomware attacks surge, UK privacy regulator investigating fewer incidents than ever (therecord.media)

Government outlines plan for Cyber Security and Resilience Bill | UKAuthority

The UK Cybersecurity and Resilience Bill – A Different Approach to NIS2 or a British Sister Act? | DLA Piper - JDSupra

Ireland has been slow to incorporate new EU cyber security law, and may now miss deadline | Irish Independent

How Should CISOs Navigate the SEC Cyber Security Rules? (darkreading.com)

Ireland to grant National Cyber Security Centre emergency powers (finextra.com)

Opinion: How to design a US data privacy law | Ars Technica

UK data watchdog confirms it's investigating MoneyGram data breach | TechCrunch

T-Mobile US agrees to $31.5M settlement after IT breaches • The Register

Opinion | Artificial Intelligence Requires Specific Safety Rules - The New York Times (nytimes.com)

Minimum Healthcare Cyber Standards Called by New Legislation | MSSP Alert

UK regulator preparing for ‘strong action’ against tech giants

Cyber Security in the European Union | Cooley LLP - JDSupra

Financial regulatory agencies are sunsetting a tool to assess cyber risks | FedScoop

Cyber security experts praise veto of California's AI safety bill | SC Media (scworld.com)

Models, Frameworks and Standards

NIS2 could prevent cyber security incidents but many businesses aren't ready (betanews.com)

90% of cyber security incidents could be avoided, survey reveals - Data Centre & Network News (dcnnmagazine.com)

Majority of Companies will Miss Looming NIS2 Deadline as New European Union Cyber Security Directive Goes into Effect | Business Wire

Could Security Misconfigurations Top OWASP List? (darkreading.com)

Government outlines plan for Cyber Security and Resilience Bill | UKAuthority

The UK Cybersecurity and Resilience Bill – A Different Approach to NIS2 or a British Sister Act? | DLA Piper - JDSupra

Ireland has been slow to incorporate new EU cyber security law, and may now miss deadline | Irish Independent

Data Protection

Opinion: How to design a US data privacy law | Ars Technica

Brits bemoan personal data practices but do little about it • The Register

Careers, Working in Cyber and Information Security

Cyber security teams are understaffed, overworked, and underfunded – and it’s taking a heavy toll on mental health | ITPro

ISACA: European Security Teams Are Understaffed and Underfunded - Infosecurity Magazine (infosecurity-magazine.com)

Average North American CISO salary now $565,000 • The Register

Cyber UK's quickest growing tech field, but skills gap remains | Computer Weekly

Cyber security Professionals Operate Under Increased Stress Levels - Security Boulevard

How Are We Going to Fill 4.8 Million Cyber Security Jobs? (inforisktoday.com)

Cyber security hiring slows, pros' stress levels rise - Help Net Security

Share of Women in UK Cyber Roles Now Just 17% - Infosecurity Magazine (infosecurity-magazine.com)

In-house skills and co-management, what is the balance to optimize security skills needed for cyber resilience | ITPro

Law Enforcement Action and Take Downs

Russia exploited Evil Corp relationship for NATO attacks • The Register

Unmasked: The Evil Corp cyber gangster who worked for LockBit | Computer Weekly

UK unmasks LockBit ransomware affiliate as high-ranking hacker in Russia state-backed cyber crime gang | TechCrunch

More LockBit Hackers Arrested, Unmasked as Law Enforcement Seizes Servers - SecurityWeek

Iranian hackers charged over Trump campaign disruption | TechRadar

U.S. charges Joker's Stash and Rescator money launderers (bleepingcomputer.com)

U.K. Hacker Charged in $3.75 Million Insider Trading Scheme Using Hacked Executive Emails (thehackernews.com)

Law enforcement arrests vacationing LockBit developer in ongoing operation | TechSpot

Cyber Crime is Still Evil Corp, But Disruptions Are Helping (inforisktoday.com)

How the FBI and Mandiant caught a 'serial hacker' who tried to fake his own death | TechCrunch

UK reveals father and son at heart of Evil Corp hacking group - BBC News

INTERPOL Arrests 8 in Major Phishing and Romance Fraud Crackdown in West Africa (thehackernews.com)

Iranian hackers charged for ‘hack-and-leak’ plot to influence election (bleepingcomputer.com)

More frequent disruption operations needed to dent ransomware gangs, officials say | CyberScoop

Telegram revealed it shared U.S. user data with law enforcement (securityaffairs.com)

Man charged for selling forged license keys for network switches (bleepingcomputer.com)

Misinformation, Disinformation and Propaganda

Intel agencies warn of Iran's ongoing phishy behavior • The Register

Iranian hackers charged over Trump campaign disruption | TechRadar

Microsoft cracks down further on Russian hackers looking to disrupt elections | TechRadar

Deepfake Ukrainian diplomat targeted US senator on Zoom call (bitdefender.com)

Iranian hackers charged for ‘hack-and-leak’ plot to influence election (bleepingcomputer.com)


Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity

CFOs Suit Up for Cyber War as Risk Management Evolves (pymnts.com)

Protecting Democratic Institutions from Cyber Threats - Microsoft On the Issues

Israel army hacked the communication network of the Beirut Airport control tower (securityaffairs.com)

Cyber Warfare Industry Research Report 2024-2034: Collaborations Between Governments and Private Sectors Unlocks Opportunities - ResearchAndMarkets.com | Business Wire

Cyber Warfare and Cyber Espionage

Nation State Actors

China

Trojan cars: Why the US fears Chinese cyber attacks on electric vehicles (france24.com)

China-Linked CeranaKeeper Targeting Southeast Asia with Data Exfiltration (thehackernews.com)

The sensitive data of Australia's security personnel is at risk of being on-sold to foreign actors - ABC News

Russia

Russia exploited Evil Corp relationship for NATO attacks • The Register

Multinational police effort hits sections of Lockbit ransomware operation | CyberScoop

UK unmasks LockBit ransomware affiliate as high-ranking hacker in Russia state-backed cyber crime gang | TechCrunch

Police arrest four suspects linked to LockBit ransomware gang (bleepingcomputer.com)

Evil Corp's LockBit Ties Exposed in Latest Phase of Operation Cronos - Infosecurity Magazine (infosecurity-magazine.com)

More LockBit Hackers Arrested, Unmasked as Law Enforcement Seizes Servers - SecurityWeek

Russia’s FSB protected Evil Corp gang that carried out Nato cyber-attacks (yahoo.com)

Trojan cars: Why the US fears Chinese cyber attacks on electric vehicles (france24.com)

Ukraine-Russia Cyber Battles Have Real-World Impact (darkreading.com)

Microsoft and DOJ disrupt Russian FSB hackers' attack infrastructure (bleepingcomputer.com)

Microsoft cracks down further on Russian hackers looking to disrupt elections | TechRadar

Russian Hackers Target Ukrainian Servicemen via Messaging Apps - Infosecurity Magazine (infosecurity-magazine.com)

Deepfake Ukrainian diplomat targeted US senator on Zoom call (bitdefender.com)

bne IntelliNews - Russian tech startups, cyber security firms flourish amid sanctions

Russian authorities arrest nearly 100 in raids tied to cyber criminal money laundering | CyberScoop

Dutch police breached by a state actor (securityaffairs.com)

Law enforcement arrests vacationing LockBit developer in ongoing operation | TechSpot

Iran

UK on high alert over Iranian spear-phishing attacks, says NCSC | Computer Weekly

Intel agencies warn of Iran's ongoing phishy behaviour • The Register

Iranian hackers charged over Trump campaign disruption | TechRadar

Iranian hackers charged for ‘hack-and-leak’ plot to influence election (bleepingcomputer.com)

North Korea

North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks (thehackernews.com)

North Korea Profits as 'Stonefly' APT Swarms US Co's. (darkreading.com)

North Korean hackers attack Diehl Defence company - Militarnyi

Other Nation State Actors, Hacktivism, Extremism, Terrorism and Other Geopolitical Threat Intelligence

Israel army hacked the communication network of the Beirut Airport control tower (securityaffairs.com)

DDoS Attacks Skyrocket and Hacktivist Activity Surges Threatening Critical Global Infrastructure According to NETSCOUT’s 1H2024 Threat Intelligence Report | Business Wire

Hacktivist activity drives a rise in DDoS attacks (betanews.com)

ICE Signs $2 Million Contract With Spyware Maker Paragon Solutions | WIRED


Tools and Controls

Is the Weakest Link in Cyber Security Becoming Even Weaker? | HackerNoon

CFOs Suit Up for Cyber War as Risk Management Evolves (pymnts.com)

Cyber companies need a best practice approach to major incidents. | Computer Weekly

Allies to Leverage During a Cyber Crisis (darkreading.com)

The cyber industry needs to accept it can't eliminate risk | Computer Weekly

As CISO roles expand, so should cyber budgets, says NASCIO 2024 cyber security report | StateScoop

Over Half of Cyber Professionals Feel Their Budget is Underfunded - IT Security Guru

Five Eyes Agencies Release Guidance on Detecting Active Directory Intrusions - SecurityWeek

How to Plan and Prepare for Penetration Testing (thehackernews.com)

Half of Enterprises Surveyed Have Experienced a Security Breach Due to Unmanaged Non-Human Identities, According to AppViewX Report | Business Wire

Session Hijacking 2.0 — The Latest Way That Attackers are Bypassing MFA (thehackernews.com)

Moving DevOps Security Out of 'the Stone Age' (darkreading.com)

Security spending signals major role change for CISOs and their teams | CSO Online

Three hard truths hindering cloud-native detection and response - Help Net Security

Forrester's CISO Budget Planning Guide for 2025: Prioritize API Security - Security Boulevard

Gartner: CISOs should ditch ‘zero tolerance’ prevention (techinformed.com)

API security maturity model to assess API security posture | TechTarget

Large language models hallucinating non-existent developer packages could fuel supply chain attacks | InfoWorld

Top 6 Cloud Security Threats to Watch Out For - Security Boulevard

JPCERT shares Windows Event Log tips to detect ransomware attacks (bleepingcomputer.com)

The Silent Epidemic: Uncovering the Dangers of Alert Fatigue and How to Overcome It (cybereason.com)

Top 5 Myths of AI & Cyber Security (darkreading.com)

How organisations can derive value from security investments and enable business growth | ITPro

How to balance your understanding of threats and how you respond to them | ITPro

Does your security strategy show continuous improvement? | ITPro

The convergence of network and security – how it helps achieve business outcomes | ITPro



Other News

The cyber industry needs to accept it can't eliminate risk | Computer Weekly

Cyber incidents are the Achilles Heel for major UK CEOs, report finds (cityam.com)

Global cyber threat to double predicts new report (emergingrisks.co.uk)

Cyber teams say they can’t keep up with attack volumes | Computer Weekly

How Snoozing on Cyber Security Fails Modern Businesses - Security Boulevard

Governments Urge Improved Security and Resilience for Undersea Cables - Infosecurity Magazine (infosecurity-magazine.com)

UK man allegedly used genealogy sites to hack execs’ email accounts | Fortune

Cyber-Attacks Hit Over a Third of English Schools - Infosecurity Magazine (infosecurity-magazine.com)

UK Post Office axes MoneyGram services in wake of cyber attack (finextra.com)

Feds say Microsoft security ‘requires an overhaul’ — but will it listen? – Computerworld

Global cyber attacks will more than double this year to 211, says QBE - Reinsurance News

Critical Infrastructure: The latest target for cyber criminals? | TechRadar

When Innovation Outpaces Financial Services Cyber Security - Security Boulevard

CISA Urges Action As Attackers Exploit Critical Systems Using Basic Tactics (informationsecuritybuzz.com)

Securing Space in the Age of Advanced Cyber Threats (eetimes.eu)

Schools reminded to maintain cyber hygiene by Ofqual | Education Business (educationbusinessuk.net)

America's policy in cyber space is about persistence, not deterrence (cyberscoop.com)

One-Third of UK Teachers Do Not Have Cyber Security Training (techrepublic.com)

Global Cyber Security Agencies Release OT Security Guidelines (inforisktoday.com)


Vulnerability Management

Could Security Misconfigurations Top OWASP List? (darkreading.com)

What are zero-day vulnerabilities? | TechRadar

NVD still backlogged with 17K+ unprocessed bugs • The Register

Systems used by courts and governments across the US riddled with vulnerabilities | Ars Technica

Vulnerabilities

Highly Anticipated Linux Flaw Allows Remote Code Execution, but Less Serious Than Expected - SecurityWeek

Thousands of Adobe Commerce e-stores hacked by exploiting CosmicSting bug (securityaffairs.com)

Worried about that critical RCE Linux bug? Here's why you can relax | ZDNET

Ivanti Endpoint Manager Flaw Actively Targeted, CISA Warns Agencies to Patch (thehackernews.com)

Progress Software Releases Patches for 6 Flaws in WhatsUp Gold – Patch Now (thehackernews.com)

New Chrome Security Warning For 3 Billion Windows, Mac, Linux, Android Users (forbes.com)

Rackspace systems hit by zero-day exploit of third-party app • The Register

Organisations Warned of Exploited SAP, Gpac and D-Link Vulnerabilities - SecurityWeek

Zimbra RCE Vuln Under Attack Needs Immediate Patching (darkreading.com)

700K+ DrayTek routers are sitting ducks on the internet • The Register

Critical flaw in NVIDIA Container Toolkit allows full host takeover (bleepingcomputer.com)

Microsoft fixes Windows KB5043145 reboot loops, USB and Bluetooth issues (bleepingcomputer.com)

VLC Player Vulnerability Let Attackers Execute Malicious Code (cybersecuritynews.com)

Arc browser adds security bulletins and bug bounties - The Verge

The fix for BGP’s weaknesses – RPKI – has issues of its own • The Register


Sector Specific

Industry specific threat intelligence reports are available.

Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.

·         Automotive

·         Construction

·         Critical National Infrastructure (CNI)

·         Defence & Space

·         Education & Academia

·         Energy & Utilities

·         Estate Agencies

·         Financial Services

·         FinTech

·         Food & Agriculture

·         Gaming & Gambling

·         Government & Public Sector (including Law Enforcement)

·         Health/Medical/Pharma

·         Hotels & Hospitality

·         Insurance

·         Legal

·         Manufacturing

·         Maritime & Shipping

·         Oil, Gas & Mining

·         OT, ICS, IIoT, SCADA & Cyber-Physical Systems

·         Retail & eCommerce

·         Small and Medium Sized Businesses (SMBs)

·         Startups

·         Telecoms

·         Third Sector & Charities

·         Transport & Aviation

·         Web3


Contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.

Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.

You can also follow us on Facebook, Twitter and LinkedIn.

Links to articles are for interest and awareness and linking to or reposting external content does not endorse any service or product, likewise we are not responsible for the security of external links.

Previous
Previous

Black Arrow Cyber Advisory 09 October 2024 – Microsoft and Adobe Security Updates 

Next
Next

Black Arrow Cyber Threat Briefing 27 September 2024