Black Arrow Cyber Threat Briefing 05 June 2024

Welcome to this week’s Black Arrow Cyber Threat Briefing – a weekly digest, collated and curated by our cyber experts to provide senior and middle management with an easy to digest round up of the most notable threats, vulnerabilities, and cyber related news from the last week.

Top Cyber Stories of the Last Week

Nearly 10 billion Passwords Leaked in the Largest Compilation of All-time

A recent discovery by Cybernews researchers has revealed the largest password compilation to date, containing 9.9 billion unique plaintext passwords in a file named rockyou2024.txt, posted by forum user ObamaCare. This dataset, sourced from both old and new breaches, poses a significant threat by heightening the risk of credential stuffing attacks. Previous incidents have shown such attacks can severely impact organisations, as seen with recent breaches at Santander and Ticketmaster. To mitigate risks, users should avoid using the same passwords across different sites and services, immediately reset exposed passwords, enable multi-factor authentication, and use password managers to generate and store complex passwords securely.

Half of Employees Fear Punishment for Reporting Security Mistakes

A recent report by ThinkCyber, based on a survey conducted at Infosecurity Europe 2024, reveals that half of employees fear repercussions if they report a security mistake. Only 51% believe that most colleagues are focused on security, with 39% feeling this concern is limited to executives and security teams. Key risky behaviours include clicking on phishing links (53%), sharing corporate data (53%), and sharing credentials (51%). The report highlights the ineffectiveness of current security awareness training, with 42% unable to prove its impact on behaviour.

New RUSI Report Exposes Psychological Toll of Ransomware

A recent report by the UK’s Royal United Services Institute (RUSI) reveals the severe psychological toll that ransomware attacks inflict on victims. The study, titled 'Your Data is Stolen and Encrypted: The Ransomware Victim Experience’, highlights that beyond service disruptions, line managers should be mindful of workloads and the psychological and physical impact of ransomware attacks on the organisation and its staff.

Recommendations include prioritising psychological support in cyber resilience strategies and enhancing public funding for mental health services tailored to ransomware victims. Additionally, the report underscores the need for clearer support roles from UK agencies like the NCSC and ICO, and calls for comprehensive improvements in organisational cyber security practices.

Cyber Extortion Soars: SMBs Hit Four Times Harder

A recent report by Orange Cyberdefense has revealed a 77% year-on-year growth in cyber extortion victims, with 60 distinct ransomware groups responsible for 4,374 attacks from Q1 2023 to Q1 2024. Small and medium-sized businesses were hit 4.2 times more often than larger enterprises. The healthcare sector saw a staggering 160% increase in cyber extortion attacks, placing it among the top three most targeted industries. Additionally, the actual victim numbers are likely 50-60% higher than reported due to unaccounted ransom payments. A new trend of "re-victimisation" was also observed, where organisations faced repeated attacks.

2024 Is Already the Year of the Cyber Attack

A recent wave of cyber breaches has underscored the urgent need for robust cyber security measures, as highlighted by the CDK Global hack that disrupted auto dealership management systems for well over two weeks. Data extortion and ransomware attacks have surged, with high-profile incidents affecting UnitedHealth Group’s Change Healthcare, Dell, Microsoft, and others. Notable breaches included Evolve Bank & Trust, which had a knock on effect on a number of high profile FinTechs, and Neiman Marcus. The UK’s Synnovis attack severely impacted London hospitals, further exemplifying the critical threat. A report by PYMNTS Intelligence found 82% of eCommerce merchants experienced cyber attacks in the past year, with nearly half suffering revenue and customer losses, emphasising the growing cyber security challenge in the digital age.

Survey Reveals Growing Lack of Cyber Security Confidence

A recent survey by Ivanti highlights half of IT and security professionals lacking confidence in preventing a damaging security incident in the next 12 months. Data silos between cyber security and IT teams are a significant barrier, causing slow incident response for 40% of respondents and reduced productivity for 82%. The survey reveals it takes an average of 33.8 hours to restore services after an incident. Despite these challenges, organisations are investing in emerging technologies like identity threat detection (47%) and cyber asset management (46%). However, only 46% have identified vulnerable third-party components in their supply chains.

Cyber Security is Worth the Spend

A recent report highlights that businesses face a constant balancing act between growth and cost, particularly regarding IT and security budgets. Despite significant cyber security investments, few organisations can accurately gauge the return on these expenditures. Companies spend millions annually, with the cyber security market projected to reach $300 billion. Effective cyber security remains critical, with CISOs needing to demonstrate risk management, validate controls, and rationalise spend. As cyber threats grow, organisations must integrate cyber security into overall risk management, ensuring data visibility and compliance to safeguard assets and maintain operational integrity.

Only 13% of Organisations are Cyber Mature

A recent survey by Commvault reveals that 83% of respondents had experienced a material security incident, with over half occurring in the past year. To combat this, five key cyber recovery markers were identified: early warning tools, clean dark sites or secondary system in place, isolated immutable data storage, defined incident response plans, and specific recovery readiness measures. Organisations deploying at least four markers recover 41% faster and report fewer breaches. Only 13% of respondents were categorised as cyber mature, with 54% confident in their recovery ability, highlighting the need for comprehensive resilience strategies.

Full-Blown Cyber War: a Hollywood Worthy Scenario

A recent analysis highlights the growing threat of cyber warfare, which could destabilise critical infrastructure and disrupt daily life more covertly than other warfare. Experts warn that strategic cyber attacks could target power, water, communications, and banking systems, causing societal chaos. Recent incidents, such as attacks on Microsoft's communication systems and Denmark's power grid, demonstrate the persistent threat. Despite the potential for massive damage, mutually assured destruction in cyber space remains complex due to the diverse actors involved. Effective cyber deterrence and robust defences are essential to mitigate these emerging threats.

Rising Risks Set to Drive Huge Investment in Cyber Security

A recent report by Stocklytics.com predicts that cyber security spending will soar to $272 billion by 2029, reflecting a 50% increase as businesses combat escalating cyber threats. Despite a significant rise in cyber security budgets, cyber attacks remain a major concern, with the annual cost of cyber crime projected to reach $9.2 trillion in 2024 and $13.8 trillion by 2028. Statista's survey indicates cyber security spending has already grown by 60% from 2018 to 2024, with annual spending expected to increase by $17 billion per year. Over the next decade, global spending on cyber solutions and security measures is forecasted to exceed $2.5 trillion.

Authorised Push Payment Fraud Singled Out as Biggest Financial Crime Threat

A recent study by The Payments Association reveals that 65% of payments professionals consider fraud their most pressing financial crime threat, with authorised push payment (APP) scams being the most concerning, as identified by 27% of respondents. APP fraud, where scammers trick victims into transferring money, predominantly stems from online sources (76%) and telecoms (16%). Despite a 12% rise in APP fraud cases in 2023, losses fell by 5% to £460 million. However, new rules will soon hold payment service providers liable for these losses, prompting concerns about the financial impact on smaller fintech firms.

Setting the Tone at the Top to Manage Enterprise Risk

A recent report highlights the critical need for comprehensive risk management in today's business landscape, emphasising that cyber threats are ubiquitous and not just Black Swan events. High-profile cases like Uber, SolarWinds, and Wells Fargo demonstrate the catastrophic impact a single cyber incident can have on an organisation’s reputation, operations, and financial stability. The evolving role of CISOs, who are now facing personal liability for breaches, underscores the importance of strong corporate governance and a clear "tone at the top." Effective cyber security must be prioritised at all levels, with a proactive, enterprise-wide approach to managing operational risk.

Cyber Criminals are Free to Exploit Vulnerabilities Without Fear

A recent report highlights the infuriatingly low enforcement against cyber crime, with only 0.3% of reported incidents resulting in prosecution. This has emboldened cyber criminals, allowing them to exploit vulnerabilities with impunity, often raking in up to $2 million annually. Despite the astronomical financial and human costs, underreporting and outdated legal frameworks contribute to a pitiful conviction rate. The dark web further complicates efforts to catch these criminals, who often operate across borders, exploiting legal loopholes. Urgent reforms in cyber security laws and increased global cooperation are crucial to addressing this rampant issue effectively.

Sources:

https://cybernews.com/security/rockyou2024-largest-password-compilation-leak/

https://www.infosecurity-magazine.com/news/employees-fear-punishment-reporting/

https://www.infosecurity-magazine.com/news/report-exposes-psychological-toll/

https://www.infosecurity-magazine.com/news/cyber-extortion-soars-smb-hit/

https://www.pymnts.com/cybersecurity/2024/2024-is-already-the-year-of-the-cyberattack/

https://securityboulevard.com/2024/07/survey-surfaces-growing-lack-of-cybersecurity-confidence/

https://www.techradar.com/pro/cybersecurity-is-worth-the-spend

https://www.helpnetsecurity.com/2024/07/04/organizations-cyber-recovery-plans/

https://cybernews.com/editorial/cyberwar-hollywood-worthy-scenario/

https://www.emergingrisks.co.uk/rising-risks-set-to-drive-huge-investment-in-cyber-security/

https://www.infosecurity-magazine.com/news/app-fraud-biggest-financial-crime/

https://www.infosecurity-magazine.com/opinions/tone-top-enterprise-risk/

https://hackernoon.com/cyber-scum-are-free-to-exploit-vulnerabilities-without-fear


Governance, Risk and Compliance

Survey Surfaces Growing Lack of Cyber Security Confidence - Security Boulevard

Half of employees afraid to report security errors (betanews.com)

Half of Employees Fear Punishment for Reporting Security Mistakes - Infosecurity Magazine (infosecurity-magazine.com)

Rising risks set to drive huge investment in cyber security (emergingrisks.co.uk)

Cyber security is worth the spend | TechRadar

Only 13% of organisations are cyber mature - Help Net Security

76% of companies enhance cyber defences to secure insurance: Sophos - Reinsurance News

Adapting cyber security strategies to the escalating threat landscape (securitybrief.co.nz)

Cyber Workforce Grows 15% at Large Organisations - Infosecurity Magazine (infosecurity-magazine.com)

Cyber crime rises putting organisations under significant stress, report reveals (holyrood.com)

Navigating the cyber security tempest in the UK organisations (thehrdirector.com)

Setting the Tone at the Top to Manage Enterprise Risk - Infosecurity Magazine (infosecurity-magazine.com)

The impossibility of “getting ahead” in cyber defence - Help Net Security

Cyber resilience - how to achieve it when most businesses – and CISOs – don’t care (diginomica.com)

Boardroom Blindspot: How New Frameworks for Cyber Metrics are Reshaping Boardroom Conversations - Security Boulevard

Companies spend more on cyber security but struggle to track expenses - Help Net Security

Cyber Crime vs. Cyber Security: Learning the Tactics of Criminals to Protect Your Interests | J.S. Held - JDSupra

Waging war on cyber criminals: should cyber strategies be active or passive? - Verdict

Cyber insurance rates drop as businesses bolster cyber security measures - FStech Financial Sector Technology

Cyber insurance rates fall as businesses improve security, report says By Reuters (investing.com)

Inside the minds of CISOs - Help Net Security

Enterprise hits and misses - cyber security is out; cyber resilience is in. Gen AI is being overestimated, and trust matters in a deep fake world (diginomica.com)


Threats

Ransomware, Extortion and Destructive Attacks

Ransomware Attack Demands Reach a Staggering $5.2m in 2024 - Infosecurity Magazine (infosecurity-magazine.com)

New RUSI Report Exposes Psychological Toll of Ransomware, Urges Action - Infosecurity Magazine (infosecurity-magazine.com)

New ransomware group uses phone calls to pressure victims, researchers say (therecord.media)

Cyber Extortion Soars: SMBs Hit Four Times Harder - Infosecurity Magazine (infosecurity-magazine.com)

2024 Is Already the Year of the Cyber Attack (pymnts.com)

‘I don’t see it happening’: CISA chief dismisses ban on ransomware payments (therecord.media)

Meet Brain Cipher — The new ransomware behind Indonesia's data center attack (bleepingcomputer.com)

Never assume the end of an attack infrastructure | TechRadar

Cyber attacks on healthcare organisations are surging – here's why | ITPro

Home Office was warned about NHS cyber hacks months before Kremlin-backed attack (inews.co.uk)

How MFA Failures are Fueling a 500% Surge in Ransomware Losses (thehackernews.com)

Ransomware payouts hit all-time high, but that’s not the whole story (securityintelligence.com)

This new ransomware group has been calling up victims to pressure them into paying – and it could be their downfall | ITPro

New Ransomware Group Phones Execs to Extort Payment - Infosecurity Magazine (infosecurity-magazine.com)

Businesses bolster defences against evolving ransomware (devx.com)

Ransomware Victims

Cyber attacks on London's hospitals continue to disrupt services - BBC News

Vladimir Putin's latest escalation has hit far too close to home (telegraph.co.uk)

cyber attack: Indonesia data hit by cyber attack not backed up, officials say - The Economic Times (indiatimes.com)

Insurance Software Vendor Notifies 6.1 Million of 2023 Hack (govinfosecurity.com)

Infosys McCamish says LockBit stole data of 6 million people (bleepingcomputer.com)

Hundreds of Thousands Impacted in Children's Hospital Cyber Attack (darkreading.com)

Evolve Bank & Trust Confirms Reports of Cyber Attack and Subsequent Data Breach | Console and Associates, P.C. - JDSupra

Leading claimant firm hit in latest 'targeted cyber campaign' | Law Gazette

Evolve Bank & Trust Faces Wave of Suits Following Cyber Attack (bloomberglaw.com)

Wise confirms impact from Evolve Bank breach | SC Media (scmagazine.com)

Evolve Bank Shares Data Breach Details as Fintech Firms Report Being Hit - Security Week

Croatia’s largest hospital KBC-Zagreb claimed by LockBit | Cybernews

Meet Brain Cipher — The new ransomware behind Indonesia's data center attack (bleepingcomputer.com)

Fintech company Wise says some customers affected by Evolve Bank data breach | TechCrunch

Fintech Frenzy: Affirm & Others Emerge as Victims in Evolve Breach (darkreading.com)

Indonesia struggles to recover after cyber attack hits 282 agencies - Nikkei Asia

NHS data in cyber breach includes names and test details as patients warned recovery ‘will take some time’ – PublicTechnology

Lockbit Ransomware Attack Exposes Affirm Customers' Data (pcmag.com)

Home Office was warned about NHS cyber hacks months before Kremlin-backed attack (inews.co.uk)

Hackers of Indonesian government apologize and give key • The Register

US new-vehicle sales growth slows after CDK cyber attack | Reuters

A cyber attack shutdown the University Hospital Centre Zagreb in Croatia (securityaffairs.com)

Striking NHS doctors to return to support cancer surgery at hospitals hit by cyber attacks (telegraph.co.uk)

Patelco shuts down banking systems following ransomware attack (bleepingcomputer.com)

“Everything’s frozen”: Ransomware locks credit union users out of bank accounts | Ars Technica

Affirm to SEC: Customer info feared stolen in Evolve breach • The Register

Cambridge University Press & Assessment hit by cyber attack (timeshighereducation.com)

Phishing & Email Based Attacks

Escalating global cyber threats require robust layered security measures | TechRadar

Formula 1 governing body discloses data breach after email hacks (bleepingcomputer.com)

Router maker's support portal hacked, replies with MetaMask phishing (bleepingcomputer.com)

Other Social Engineering

Fake SMS – many fall victim to old scam – DW – 06/28/2024

Dozens of Arrests Disrupt €2.5m Vishing Gang - Infosecurity Magazine (infosecurity-magazine.com)

APP Fraud Singled Out as Biggest Financial Crime Threat - Infosecurity Magazine (infosecurity-magazine.com)

Artificial Intelligence

Generative AI is new attack vector endangering enterprises, says CrowdStrike CTO | ZDNET

AI will ‘turbocharge’ cyber crime, auditors warn - CIR Magazine

Getting the balance right between business innovation, security and AI (securitybrief.co.nz)

Deepfakes: Distorted Reality And The Growing Threat (informationsecuritybuzz.com)

The Future Of The Cyber Security Profession With The Rise Of AI (forbes.com)

Rethinking Cyber Security in the Age of AI - Security Boulevard

Friend or Foe? AI's Complicated Role in Cyber Security (darkreading.com)

How the rush to regulate AI could bring new cyber security challenges (betanews.com)

Organisations weigh the risks and rewards of using AI - Help Net Security

Financial services shun AI over job and regulatory fears

California Advances Unique Safety Regulations for AI Companies Despite Tech Firm opposition - Security Week

How Enterprises Can Safely Use Unstructured Data With LLMs (forbes.com)

Photos of Australian children found in AI training dataset, create deepfake risk | Biometric Update

Infostealing malware masquerading as generative AI tools - Help Net Security

Brazil data protection authority bans Meta from training AI models with data originating in the country (securityaffairs.com)

2FA/MFA

How MFA Failures are Fueling a 500% Surge in Ransomware Losses (thehackernews.com)

3 Ways to Chill Attacks on Snowflake (darkreading.com)

Twilio's Authy App Breach Exposes Millions of Phone Numbers (thehackernews.com)

Twilio urges users to update Authy apps after hack (siliconrepublic.com)

2FA hack exposes millions of phone numbers to hackers - Android Authority

Malware

This new threat infects devices with a dozen malware at once | TechRadar

Multi-Malware 'Cluster Bomb' Campaign Drops Widespread Cyber Havoc (darkreading.com)

Kimsuky Using TRANSLATEXT Chrome Extension to Steal Sensitive Data (thehackernews.com)

This Malware Targets Those Looking for Work: Here's How (makeuseof.com)

Unmasking Rafel RAT: Understanding the Threat - Zimperium

CapraRAT Spyware Disguised as Popular Apps Threatens Android Users (thehackernews.com)

How cyber criminals are using free IT tools, YouTube videos to spread malware   - The Hindu

Fake IT support sites push malicious PowerShell scripts as Windows fixes (bleepingcomputer.com)

Chinese Hackers Exploiting Cisco Switches Zero-Day to Deliver Malware (thehackernews.com)

China-linked APT exploited Cisco NX-OS zero-day to deploy custom malware (securityaffairs.com)

Indian Software Firm's Products Hacked to Spread Data-Stealing Malware (thehackernews.com)

FakeBat Loader Malware Spreads Widely Through Drive-by Download Attacks (thehackernews.com)

South Korean ERP Vendor's Server Hacked to Spread Xctdoor Malware (thehackernews.com)

Thousands of child abuse site users potentially exposed by infostealer logs | SC Media (scmagazine.com)

Global Police Operation Shuts Down 600 Cyber Crime Servers Linked to Cobalt Strike (thehackernews.com)

NCA’s Operation Morpheus targets illicit Cobalt Strike use | Computer Weekly

Europol shuts down Cobalt Strike servers used by hackers (stackdiary.com)

Infostealing malware masquerading as generative AI tools - Help Net Security

Infostealer malware logs used to identify child abuse website members (bleepingcomputer.com)

Hackers attack HFS servers to drop malware and Monero miners (bleepingcomputer.com)

Software Productivity Tools Hijacked to Deliver Infostealers (darkreading.com)

Mobile

Security experts issue warning over new spyware variant targeting Android users | ITPro

Google Patches 25 Android Flaws, Including Critical Privilege Escalation Bug - Security Week

Phones are more like PCs than ever — here’s how to protect them from viruses and malware | Tom's Guide (tomsguide.com)

Stop Using Your Face or Thumb to Unlock Your Phone (gizmodo.com)

Denial of Service/DoS/DDOS

Source: Ukrainian cyber attack leaves at least 250,000 consumers without connection in Russian-occupied territories (kyivindependent.com)

HUR’s massive DDoS attack left 250,000 without communication in occupied territories / The New Voice of Ukraine (nv.ua)

Why every company needs a DDoS response plan - Help Net Security

Beware DDoS attacks - the raid which flies under the radar - BusinessCloud

New Golang-Based Zergeca Botnet Capable of Powerful DDoS Attacks (thehackernews.com)

Internet of Things – IoT

Are smart home security systems more of a security risk than a benefit? | TechRadar

99% of IoT exploitation attempts rely on previously known CVEs - Help Net Security

Any IoT Device Can Be Hacked, Even Grills (darkreading.com)

Data Breaches/Leaks

The biggest data breaches in 2024: 1B stolen records and rising | TechCrunch

Russia's Midnight Blizzard stole email of more Microsoft customers (securityaffairs.com)

TeamViewer links corporate cyber attack to Russian state hackers (bleepingcomputer.com)

Ticketmaster Confirms User Email Addresses, Phone Numbers Stolen in Hack (pcmag.com)

Insurance Software Vendor Notifies 6.1 Million of 2023 Hack (govinfosecurity.com)

Infosys McCamish says LockBit stole data of 6 million people (bleepingcomputer.com)

Hundreds of Thousands Impacted in Children's Hospital Cyber Attack (darkreading.com)

Network Segmentation Saved TeamViewer From APT29 Attack (darkreading.com)

Panama Papers: Court acquits all 28 charged with money laundering - BBC News

Landmark Admin Discloses Data Breach Impacting Personal, Medical Information - Security Week

‘Russia’ Breaches TeamViewer — ‘No Evidence’ Billions of Devices at Risk - Security Boulevard

NHS data in cyber breach includes names and test details as patients warned recovery ‘will take some time’ – PublicTechnology

Prudential said 36,000 people were affected in a February data breach – it just revised that number to 2.5 million | ITPro

3 Ways to Chill Attacks on Snowflake (darkreading.com)

Formula 1 governing body discloses data breach after email hacks (bleepingcomputer.com)

Twilio's Authy App Breach Exposes Millions of Phone Numbers (thehackernews.com)

Ethereum mailing list breach exposes 35,000 to crypto draining attack (bleepingcomputer.com)

2FA hack exposes millions of phone numbers to hackers - Android Authority

Dairy giant Agropur says data breach exposed customer info (bleepingcomputer.com)

300k Affected by Year-Old Data Breach at Florida Community Health Centers - Security Week

Healthcare fintech firm HealthEquity disclosed a data breach (securityaffairs.com)

Offshore vessel firm fined $18k after health and financial info of seamen affected in data breach | The Straits Times

Cambridge University Press & Assessment hit by cyber attack (timeshighereducation.com)

Gamers’ Data Exposed in RPG Platform Roll20 Breach - Infosecurity Magazine (infosecurity-magazine.com)

Organised Crime & Criminal Actors

Cyber criminals Are Free To Exploit Vulnerabilities Without Fear | HackerNoon

Cyber crime rises putting organisations under significant stress, report reveals (holyrood.com)

Cyber Crime vs. Cyber Security: Learning the Tactics of Criminals to Protect Your Interests | J.S. Held - JDSupra

Waging war on cyber criminals: should cyber strategies be active or passive? - Verdict

Cryptocurrency/Cryptomining/Cryptojacking/NFTs/Blockchain

8220 Gang Exploits Oracle WebLogic Server Flaws for Cryptocurrency Mining (thehackernews.com)

Ethereum mailing list breach exposes 35,000 to crypto draining attack (bleepingcomputer.com)

Insider Risk and Insider Threats

Half of Employees Fear Punishment for Reporting Security Mistakes - Infosecurity Magazine (infosecurity-magazine.com)

A fifth of office workers have access to data from a previous employer - Business Plus

Insurance

Cyber insurance Premiums are Going Down: Here’s Why and What to Expect - Security Week

76% of companies enhance cyber defences to secure insurance: Sophos - Reinsurance News

Insurers told they need to get active in cyber risk response (emergingrisks.co.uk)

Cyber insurance Bedevils Law Firms - Above the Law

Cyber insurance rates drop as businesses bolster cyber security measures - FStech Financial Sector Technology

Cyber insurance rates fall as businesses improve security, report says By Reuters (investing.com)

Supply Chain and Third Parties

Cyber attacks on London's hospitals continue to disrupt services - BBC News

Ticketmaster Confirms User Email Addresses, Phone Numbers Stolen in Hack (pcmag.com)

Evolve Bank & Trust Faces Wave of Suits Following Cyber Attack (bloomberglaw.com)

Wise confirms impact from Evolve Bank breach | SC Media (scmagazine.com)

Evolve Bank Shares Data Breach Details as Fintech Firms Report Being Hit - Security Week

Fintech company Wise says some customers affected by Evolve Bank data breach | TechCrunch

Fintech Frenzy: Affirm & Others Emerge as Victims in Evolve Breach (darkreading.com)

Cloud/SaaS

Ticketmaster sends notifications about recent massive data breach (bleepingcomputer.com)

Security in the public cloud explained: A guide for IT and security admins | Computer Weekly

Man-In-The-Middle Attacks are Still a Serious Security Threat - Security Boulevard

Ensuring data security in an uncertain world | TechRadar

47% of corporate data stored in the cloud is sensitive - Help Net Security

Bare metal can come back, says Gartner, citing VMware prices • The Register

Identity and Access Management

Man-In-The-Middle Attacks are Still a Serious Security Threat - Security Boulevard

3 Ways to Chill Attacks on Snowflake (darkreading.com)

Compliance, Security and the Role of Identity - Security Boulevard

Encryption

Modern Cryptographic Attacks: A Guide for the Perplexed - Check Point Research

Linux and Open Source

New OpenSSH Vulnerability Could Lead to RCE as Root on Linux Systems (thehackernews.com)

PoC Exploit Published for Linux Kernel Privilege Escalation Flaw (cybersecuritynews.com)

Passwords, Credential Stuffing & Brute Force Attacks

Police allege ‘evil twin’ in-flight Wi-Fi used to steal info • The Register

RockYou2024: 10 billion passwords leaked in the largest compilation of all time | Cybernews

Nearly 10 billion passwords stolen by hackers — how to protect yourself | Tom's Guide (tomsguide.com)

Hackers exploit critical D-Link DIR-859 router flaw to steal passwords (bleepingcomputer.com)

Social Media

Meta’s ‘Pay or Consent’ Data Model Breaches EU Law - Infosecurity Magazine (infosecurity-magazine.com)

Cyber security researchers uncover disproportionate rise in investment scams on social media – Firstpost

Brazil data protection authority bans Meta from training AI models with data originating in the country (securityaffairs.com)

Training, Education and Awareness

Cyber security training needs a human touch (betanews.com)

Fortinet annual skills gap report - more security training needed - Verdict

Want to scale cyber defenders? Focus on AI-enabled security and organisation-wide training | CyberScoop

Regulations, Fines and Legislation

Newly Proposed Rule Expanding Cyber Incident Reporting to Affect Financial Services Companies | ArentFox Schiff - JDSupra

Banking groups balk at proposed cyber incident reporting rule | American Banker

Meta’s ‘Pay or Consent’ Data Model Breaches EU Law - Infosecurity Magazine (infosecurity-magazine.com)

European Commission consults on draft Implementing Regulation on requirements for cyber security risk management measures and significant incidents under NIS 2 Directive | Practical Law (thomsonreuters.com)

Ensuring data security in an uncertain world | TechRadar

The Critical Role of Governments in EU Cyber Resilience - IDC Europe Blog (blog-idceurope.com)

California Advances Unique Safety Regulations for AI Companies Despite Tech Firm opposition - Security Week

How the rush to regulate AI could bring new cyber security challenges (betanews.com)

Financial services shun AI over job and regulatory fears

Models, Frameworks and Standards

Cyber Essentials at 10: Success or failure? | Computer Weekly

Boardroom Blindspot: How New Frameworks for Cyber Metrics are Reshaping Boardroom Conversations - Security Boulevard

Backup and Recovery

Cyber attack: Indonesia data hit by cyber attack not backed up, officials say - The Economic Times (indiatimes.com)

Data Protection

47% of corporate data stored in the cloud is sensitive - Help Net Security

Brazil data protection authority bans Meta from training AI models with data originating in the country (securityaffairs.com)

Careers, Working in Cyber and Information Security

Fortinet annual skills gap report - more security training needed - Verdict

Finance sector facing multiple skills shortages amid wider disruption - Business Plus

The Future Of The Cyber Security Profession With The Rise Of AI (forbes.com)

Cyber Workforce Grows 15% at Large Organisations - Infosecurity Magazine (infosecurity-magazine.com)

Cyber Workforce Numbers Rise for Larger Organisations (darkreading.com)

Here are 5 of the highest-paying cyber security jobs | Fortune Education

Law Enforcement Action and Take Downs

Global Police Operation Shuts Down 600 Cyber Crime Servers Linked to Cobalt Strike (thehackernews.com)

NCA’s Operation Morpheus targets illicit Cobalt Strike use | Computer Weekly

Europol shuts down Cobalt Strike servers used by hackers (stackdiary.com)

Dozens of Arrests Disrupt €2.5m Vishing Gang - Infosecurity Magazine (infosecurity-magazine.com)

Indonesia detains 103 foreigners in a raid in Bali involving suspected cyber crime - ABC News (go.com)

Misinformation, Disinformation and Propaganda

Google Thwarts Over 10,000 Attempts by Chinese Influence Operator - Infosecurity Magazine (infosecurity-magazine.com)

Cyber hacktivists issue “call to arms” to target elections in Europe, UK (verdict.co.uk)


Nation State Actors, Advanced Persistent Threats (APTs), Cyber Warfare, Cyber Espionage and Geopolitical Threats/Activity

Cyber Warfare and Cyber Espionage

Full-blown cyberwar: a Hollywood worthy scenario | Cybernews

The US Wants to Integrate the Commercial Space Industry With Its Military to Prevent Cyber Attacks | WIRED

Major bank raises alarm bell on cyber 'warfare': Claims 'entire community is at risk' - ABC News

Nation State Actors

China

Google Thwarts Over 10,000 Attempts by Chinese Influence Operator - Infosecurity Magazine (infosecurity-magazine.com)

China is turning to private firms for offensive cyber operations - Defense One

Chinese Hackers Exploiting Cisco Switches Zero-Day to Deliver Malware (thehackernews.com)

Taiwan reports over 100 cyber security incidents in May | Taiwan News | Jun. 29, 2024 14:22

Russia

Russia's Midnight Blizzard stole email of more Microsoft customers (securityaffairs.com)

Ukraine war briefing: US charges Russian with conspiring to destroy Kyiv computer systems | Ukraine | The Guardian

Russian hackers behind NHS attack are part of Kremlin-protected cyber army (inews.co.uk)

Microsoft reveals even more emails to customers were accessed by Russia-based hackers - Neowin

Vladimir Putin's latest escalation has hit far too close to home (telegraph.co.uk)

US charges Russian civilian for allegedly helping GRU spies target Ukrainian government systems with data-destroying malware | TechCrunch

Network Segmentation Saved TeamViewer From APT29 Attack (darkreading.com)

TeamViewer attributes security incident to Russian APT group Midnight Blizzard | SC Media (scmagazine.com)

Major bank raises alarm bell on cyber 'warfare': Claims 'entire community is at risk' - ABC News

Home Office was warned about NHS cyber hacks months before Kremlin-backed attack (inews.co.uk)

‘Russia’ Breaches TeamViewer — ‘No Evidence’ Billions of Devices at Risk - Security Boulevard

Poland to probe Russia-linked cyber attack on state news agency (therecord.media)

US Announces $10 Mln Bounty for Russian Hacker Behind 2022 Hack Targeting Ukraine (kyivpost.com)

Source: Ukrainian cyber attack leaves at least 250,000 consumers without connection in Russian-occupied territories (kyivindependent.com)

HUR’s massive DDoS attack left 250,000 without communication in occupied territories / The New Voice of Ukraine (nv.ua)

Alert: French Diplomats Targeted By Russian Cyber Attacks - Security Boulevard

North Korea

Kimsuky Using TRANSLATEXT Chrome Extension to Steal Sensitive Data (thehackernews.com)

Major bank raises alarm bell on cyber 'warfare': Claims 'entire community is at risk' - ABC News

Other Nation State Actors, Hacktivism, Extremism, Terrorism and Other Geopolitical Threat Intelligence

Cyber hacktivists issue “call to arms” to target elections in Europe, UK (verdict.co.uk)


Tools and Controls

Cyber security training needs a human touch (betanews.com)

Rising risks set to drive huge investment in cyber security (emergingrisks.co.uk)

Cyber security is worth the spend | TechRadar

Network Segmentation Saved TeamViewer From APT29 Attack (darkreading.com)

Half of IT pros think there are devices on their network they don't know about (betanews.com)

Fortinet annual skills gap report - more security training needed - Verdict

A fifth of office workers have access to data from a previous employer - Business Plus

Escalating global cyber threats require robust layered security measures | TechRadar

Fake IT support sites push malicious PowerShell scripts as Windows fixes (bleepingcomputer.com)

Reduce security risk with 3 edge-securing steps | CSO Online

76% of companies enhance cyber defences to secure insurance: Sophos - Reinsurance News

The Future Of The Cyber Security Profession With The Rise Of AI (forbes.com)

Adapting cyber security strategies to the escalating threat landscape (securitybrief.co.nz)

Navigating the cyber security tempest in the UK organisations (thehrdirector.com)

Insurers told they need to get active in cyber risk response (emergingrisks.co.uk)

Cyber insurance Bedevils Law Firms - Above the Law

Setting the Tone at the Top to Manage Enterprise Risk - Infosecurity Magazine (infosecurity-magazine.com)

How MFA Failures are Fueling a 500% Surge in Ransomware Losses (thehackernews.com)

Boardroom Blindspot: How New Frameworks for Cyber Metrics are Reshaping Boardroom Conversations - Security Boulevard

Companies spend more on cyber security but struggle to track expenses - Help Net Security

Stress-Testing Security Assumptions in a World of New & Novel Risks (darkreading.com)

Organisations use outdated approaches to secure APIs - Help Net Security

Kaspersky software ban: CISOs must move quickly, experts say | CSO Online

Rethinking Cyber Security in the Age of AI - Security Boulevard

Friend or Foe? AI's Complicated Role in Cyber Security (darkreading.com)

Blurred lines: Securing the physical and digital sides of business - IT Security Guru

Understanding collective defence as a route to better cyber security | TechRadar

Waging war on cyber criminals: should cyber strategies be active or passive? - Verdict

Staying Ahead of Adversarial AI with Incident Response Automation - Security Boulevard

Embracing Automation: The Key to Proactive Security  | MSSP Alert

SIEM-Apocalypse: Protecting Your Security Team in a Time of Turmoil | MSSP Alert

Want to scale cyber defenders? Focus on AI-enabled security and organisation-wide training | CyberScoop

US folk still buying in 3rd-party antivirus, more so the old • The Register

Four Reasons Why You Should Evaluate Your Cyber Security System (forbes.com)

Cyber insurance rates fall as businesses improve security, report says By Reuters (investing.com)

Compliance, Security and the Role of Identity - Security Boulevard

Why AI is essential to securing software and data supply chains (betanews.com)

4 key steps to building an incident response plan - Help Net Security


Reports Published in the Last Week

2024 Cyber Threat Report | Huntress


Other News

Cyber Criminals Are Free To Exploit Vulnerabilities Without Fear | HackerNoon

Google is cracking down on internet security in this big way | Digital Trends

Water supplies remain ‘too weak’ when it comes to cyber security - Digital Journal

Man-In-The-Middle Attacks are Still a Serious Security Threat - Security Boulevard

Hackers Are Hiding in Plain Sight: Insights from Our 2024 Cyber Threat Report | Huntress

Blurred lines: Securing the physical and digital sides of business - IT Security Guru

Understanding collective defence as a route to better cyber security | TechRadar

Over 380k Hosts Still Referencing Malicious Polyfill Domain: Censys - Security Week

Polyfill[.]io Attack Impacts Over 380,000 Hosts, Including Major Companies (thehackernews.com)

Cyber attack handling ‘staggeringly incompetent’ | Guernsey Press

Paris Olympics 2024: The rising threat of cyber attacks (yahoo.com)

States of Guernsey hit by attempted cyber attack on emails - BBC News

Food Security: Mitigating the Dangers of Digital Poison | AFCEA International

CISA director: US 'not afraid' to probe holes in Big Tech • The Register

Stress-Testing Security Assumptions in a World of New & Novel Risks (darkreading.com)

Kaspersky software ban: CISOs must move quickly, experts say | CSO Online

Space: The Final Frontier for Cyber Attacks (informationweek.com)

IT Security Responsibilities for Online Start-Ups - IT Security Guru

To guard against cyber attacks in space, researchers ask ‘what if?’ (theconversation.com)

Protecting our data in a world of rising cyber attacks - IT Security Guru

States hit back at deputies’ IT security criticism | Bailiwick Express

OPINION: Why cyber security urgently needs updating in transportation | Traffic Technology Today


Vulnerability Management

Stress-Testing Security Assumptions in a World of New & Novel Risks (darkreading.com)

Embracing the Absurd: Finding Freedom in Cyber Security  - Security Boulevard

The Great Overcomplication | AFCEA International

99% of IoT exploitation attempts rely on previously known CVEs - Help Net Security

Smashing Silos With a Vulnerability Operations Center (VOC) - Security Boulevard

Vulnerabilities

First OpenSSH vulnerability in nearly two decades leaves over 14 million servers potentially at risk | ITPro

Over 14M servers may be vulnerable to OpenSSH's regreSSHion RCE flaw. Here's what you need to do | ZDNET

PoC Exploit Published for Linux Kernel Privilege Escalation Flaw (cybersecuritynews.com)

3 million iOS and macOS apps were exposed to potent supply-chain attacks | Ars Technica

'Almost every Apple device' vulnerable to CocoaPods • The Register

8220 Gang Exploits Oracle WebLogic Server Flaws for Cryptocurrency Mining (thehackernews.com)

Critical GitLab Bug Threatens Software Development Pipelines (darkreading.com)

Juniper releases out-of-cycle fix for max severity auth bypass flaw (bleepingcomputer.com)

This Windows 11 bug may break Windows Security (xda-developers.com)

Splunk Patches High-Severity Vulnerabilities in Enterprise Product - Security Week

New Intel CPU Vulnerability 'Indirector' Exposes Sensitive Data (thehackernews.com)

Google Patches 25 Android Flaws, Including Critical Privilege Escalation Bug - Security Week

Gogs vulnerabilities may put your source code at risk | SC Media (scmagazine.com)

Hackers exploit critical D-Link DIR-859 router flaw to steal passwords (bleepingcomputer.com)


Sector Specific

Industry specific threat intelligence reports are available.

Contact us to receive tailored reports specific to the industry/sector and geographies you operate in.

·         Automotive

·         Construction

·         Critical National Infrastructure (CNI)

·         Defence & Space

·         Education & Academia

·         Energy & Utilities

·         Estate Agencies

·         Financial Services

·         FinTech

·         Food & Agriculture

·         Gaming & Gambling

·         Government & Public Sector (including Law Enforcement)

·         Health/Medical/Pharma

·         Hotels & Hospitality

·         Insurance

·         Legal

·         Manufacturing

·         Maritime

·         Oil, Gas & Mining

·         OT, ICS, IIoT, SCADA & Cyber-Physical Systems

·         Retail & eCommerce

·         Small and Medium Sized Businesses (SMBs)

·         Startups

·         Telecoms

·         Third Sector & Charities

·         Transport & Aviation

·         Web3


As usual, contact us to help assess where your risks lie and to ensure you are doing all you can do to keep you and your business secure.

Look out for our ‘Cyber Tip Tuesday’ video blog and on our YouTube channel.

You can also follow us on Facebook, Twitter and LinkedIn.

Links to articles are for interest and awareness and linking to or reposting external content does not endorse any service or product, likewise we are not responsible for the security of external links.

Previous
Previous

Black Arrow Cyber Advisory 10 July 2024 – Microsoft Patch Tuesday, Adobe and Citrix Updates

Next
Next

Black Arrow Cyber Advisory 02 July 2024 – Critical Vulnerabilities identified in OpenSSH, Juniper, and Apple App Development Supply Chain