A series of cyberattacks have targeted Israel’s critical infrastructure, including gas stations and credit card systems. The most recent attack on Sunday caused credit card readers across Israeli gas stations and retail outlets to malfunction for an hour, raising concerns about the vulnerability of Israel’s digital payment systems. The attack, suspected to be a DDoS attack, targeted communication services used by many retailers and resulted in disruptions to credit card processing. While the issue was resolved relatively quickly, it highlights the vulnerability of key infrastructure points to cyberattacks, particularly in a region where cyber warfare is increasingly common.
A critical vulnerability in Ivanti’s Cloud Service Appliance (CSA) has been actively exploited by attackers. The flaw, tracked as CVE-2024-8190, allows attackers to gain unauthorized access to sensitive data and execute arbitrary commands on vulnerable systems. The vulnerability exists in the CSA’s authentication mechanism and can be exploited by attackers who can send specially crafted requests to the CSA. This attack vector allows attackers to bypass the CSA’s security measures and gain access to the underlying operating system. The vulnerability has been exploited in the wild by a suspected nation-state adversary. There are strong indications that China is behind the attacks. Organizations using Ivanti CSA should prioritize patching the vulnerability immediately to reduce their risk of being compromised.
South East Technological University (SETU) in Ireland has confirmed a cyberattack affecting its Waterford campus, causing significant disruptions to IT services and academic activities. The university’s IT team and external cybersecurity experts are working to resolve the incident, but the full extent of the impact is still being assessed. The attack highlights the growing vulnerability of educational institutions to cyber threats, especially given their access to large amounts of sensitive data. Although no data breaches have been reported yet, the incident underscores the need for robust security measures to protect critical infrastructure within universities.
Iranian hackers are targeting organizations with a sophisticated multi-factor authentication (MFA) push-bombing attack, aiming to compromise their Microsoft 365, Azure, and Citrix Systems accounts. This attack involves sending a barrage of MFA push notifications to a victim’s device, overwhelming them with authentication requests and potentially tricking them into approving a malicious login.
The attackers exploit the user’s trust in MFA and their desire to quickly clear the notifications. This attack highlights the importance of implementing robust MFA strategies, including the use of advanced MFA solutions and security awareness training for employees. Organizations should also be wary of suspicious activity related to MFA notifications and promptly investigate any unusual behavior.