Multiple code repositories from Nissan North America become public after the company leaves an exposed Git server protected with default access credentials. Lake Regional Healthcare experiences a ransomware attack that disrupted its computer system. Researchers at Morphisec Labs publish details about a malware variant called JSSLoader used by the FIN7 hacking group. Profero, Security Joes, APT28, TG-3390, Emissary Panda, BRONZE UNION, Iron Tiger, LuckyMouseĪ research from Kela reveals finds nearly 1 million compromised accounts pertaining to gaming clients and employees in the dark web, with 50% of them offered for sale. Researchers from Profero and Security Joes reveal the details of a ransomware campaign involving APT28, a Chinese group normally involved in cyber espionage operations. 25.Įxclusive Networks reveals it has been hit by a cyber breach, affecting the cyber security distributor's systems across five countries (UK, US, France, Singapore, and the UAE) with the breach resulting in unauthorized access to data.ĪPT27, AKA TG-3390, Emissary Panda, BRONZE UNION, Iron Tiger, and LuckyMouse.Īt least five companies in the online gambling sector The alleged leaks could be related to Gongan County, Weibo, and QQ.Īurora Cannabis says it experienced a “cybersecurity incident” over the holidays. Researchers from Cyble discover a trove of more than 200 million records of Chinese citizens for sale on the dark web. The same threat actor leaks the data of several Banamex credit cardholdersĪ new SMS text phishing (smishing) campaign pretends to be from PayPal, stating that the victim's account has been permanently limited unless they verify it by clicking on a link. The same threat actor leaks the data of several Santander credit cardholders Mexico-based Santander credit cardholders This week a threat actor leaks the data of 10,000 Mexico-based American Express credit cardholders on a forum. Mexico-based American Express credit cardholders Researchers from ESTsecurity reveal that North Korean hacking group Thallium has targeted users of a private stock investment messenger service. Users of a private stock investment messenger service N Administrative and support service activities Gastroenterology Consultants Ltd, Conti, ransomwareĭassault Falcon Jet discloses a data breach after a Mount Locker ransomware attack, that may have led to the exposure of personal information belonging to current and former employees, as well as their spouses and dependents.ĭassault Falcon Jet, Mount Locker, ransomwareĪmey Plc, the British company providing infrastructure support services reveals to have suffered a ransomware attack since mid-December 2020. Q Human health and social work activities Gastroenterology Consultants Ltd have some data dumped from the Conti ransomware group Security researchers discover using the BSSID (Basic Service Set Identifier) to geo-locate infected hosts. Also, don’t forget to follow on Twitter, or even connect on Linkedin, for the latest updates. Thanks for sharing the timeline and supporting my work in spreading the risk awareness across the community. The Cyber Espionage front is also quite hot, as usual, with multiple operations by well-known threat actors such as APT37 and APT 35: North Korea and Iran are the most active actors. But don’t be too much disenchanted: the new year started exactly how it ended with the ransomware dominating the threat landscape. In this timeline I have collected 83 events, a number clearly lower than the values we have been used to during the past months, so it really looks like the holiday season has also led to a break in the attack rate. Clicking on the icon opens the event’s details. Of course each class has a different icon to quickly visualize the nature of the event. You can pinch and zoom, and also filter events based on the name of the targeted entity and the class (like Cyber Crime, Cyber Espionage, Cyberwarfare and Hacktivism). With the new interactive timeline you can drill down into each event and explore the details. Of course the table format is always available in case you want to search for specific events and export them in XLS format, however it is now possible to browse the single events directly from the timeline in a more interactive manner. The cyber attacks timeline is now interactive. I am happy to start 2021 with a big news, and announce that I have introduced an important change.
0 Comments
Leave a Reply. |