News – December 2021


  • Top 10 healthcare breaches in the U.S. exposed data of 19 million

    December 31, 2021

    The healthcare sector has been the target of hundreds of cyberattacks this year. A tally of public data breach reports so far shows that tens of millions of healthcare records have been exposed to unauthorized parties. Most of the largest data breaches result from ransomware attacks and the first ten of them account for more than ...

  • Firmware attack can drop persistent malware in hidden SSD area

    December 30, 2021

    Korean researchers have developed a set of attacks against some solid-state drives (SSDs) that could allow planting malware in a location that’s beyond the reach of the user and security solutions. The attack models are for drives with flex capacity features and target a hidden area on the device called over-provisioning, which is widely used by ...

  • What the Rise in Cyber-Recon Means for Your Security Strategy

    December 30, 2021

    As we move into 2022, bad actors are ramping up their reconnaissance efforts to ensure more successful and more impactful cyberattacks. And that means more zero-day exploits are on the horizon. When seen through an attack chain such as the MITRE ATT&CK framework, campaigns are frequently discussed in terms of left-hand and right-hand phases of threats. ...

  • T-Mobile confirms SIM swapping attacks led to breach

    December 30, 2021

    T-Mobile has confirmed a data breach that was caused in part by SIM swapping attacks, according to a statement from the company. The T-Mo Report, a blog tracking T-Mobile, obtained internal reports showing that some data was leaked from a subset of customers. Some individuals had their customer proprietary network information (CPNI) leaked, which includes information about ...

  • Aquatic Panda Used Log4Shell Exploit Tools During Hands-on Intrusion Attempt – CrowdStrike

    December 29, 2021

    Since the vulnerability was announced, CrowdStrike’s OverWatch threat hunters have been continuously ingesting the latest insights about the Log4j vulnerability as well as publicly disclosed exploit methods to influence their continuous hunting operations. On Dec. 14, 2021, VMware issued guidance around elements of VMware’s Horizon service found to be vulnerable to Log4j exploits. This led ...

  • Fintech firm hit by log4j hack refuses to pay $5 million ransom

    December 29, 2021

    One of the largest Vietnamese crypto trading platforms, ONUS, recently suffered a cyber attack on its payment system running a vulnerable Log4j version. Soon enough, threat actors approached ONUS to extort a $5 million sum and threatened to publish the customer data should ONUS refuse to comply. After the company’s refusal to pay the ransom, threat actors ...

  • New Flagpro malware linked to Chinese state-backed hackers

    December 28, 2021

    BlackTech cyber-espionage APT (advanced persistent threat) group has been spotted targeting Japanese companies using novel malware that researchers call ‘Flagpro’. The threat actor uses Flagpro in the initial stage of an attack for network reconnaissance, to evaluate the target’s environment, and to download second-stage malware and execute it. The infection chain begins with a phishing email crafted ...

  • After NSO Scandal, What’s Next for Israel’s Cyber Industry?

    December 28, 2021

    The year 2021 was not a good one for NSO Group, an Israeli technology firm that became famous, and then notorious, for its Pegasus spyware, capable of remote surveillance of smartphones. Once a promising startup that developed a unique tool to fight against terror and crime, NSO Group is now associated with targeted attacks against journalists ...

  • West Virginia State workers to be paid on time despite ransomware attack

    December 27, 2021

    West Virginia state workers will be paid on schedule this week, despite a ransomware attack that recently crippled a software provider that helps manage time and leave for more than 35,000 state employees. The State Auditor’s Office reassured employees Monday that checks will be deposited on schedule Friday. For additional assurance, officials urged state workers to check ...

  • QNAP NAS devices hit in surge of ech0raix ransomware attacks

    December 27, 2021

    Users of QNAP network-attached storage (NAS) devices are reporting attacks on their systems with the eCh0raix ransomware, also known as QNAPCrypt. The threat actor behind this particular malware intensified their activity about a week before Christmas, taking control of the devices with administrator privileges. Attack count jumps before Christmas BleepingComputer forum users managing QNAP and Synology NAS systems ...

  • Rook ransomware is yet another spawn of the leaked Babuk code

    December 24, 2021

    A new ransomware operation named Rook has appeared recently on the cyber-crime space, declaring a desperate need to make “a lot of money” by breaching corporate networks and encrypting devices. Although the introductory statements on their data leak portal were marginally funny, the first victim announcements on the site have made it clear that Rook is ...

  • Examining Log4j Vulnerabilities in Connected Cars and Charging Stations

    December 23, 2021

    Since its disclosure on Dec. 9, a vast number of articles have been written on the remote code execution (RCE) vulnerability in the library Apache Log4j — a reflection of its impact. The library is used by innumerable programs to easily release log statements without modifying the code. This means that it has an expansive ...

  • Stealthy BLISTER malware slips in unnoticed on Windows systems

    December 23, 2021

    Security researchers have uncovered a malicious campaign that relies on a valid code-signing certificate to disguise malicious code as legitimate executables. One of the payloads that the researchers called Blister, acts as a loader for other malware and appears to be a novel threat that enjoys a low detection rate. The threat actor behind Blister has been ...

  • Microsoft informs customers of ‘NotLegit’ Azure bug

    December 23, 2021

    Microsoft’s Security Response Center has released a blog post explaining its response to the “NotLegit” bug in Azure that was discovered by cloud security company Wiz. Wiz said all PHP, Node, Ruby, and Python applications that were deployed using “Local Git” on a clean default application in Azure App Service since September 2017 are affected. They ...

  • Fulfilling Security Requirements for the Transportation Sector

    December 23, 2021

    Protecting our critical infrastructure against the threat of ransomware remains a top priority for both the private sector and the federal government. In fact, a recent survey from Tripwire found that security professionals in both sectors still identify ransomware as a top security concern. More than half (53%) of respondents in that study said they ...