CyberSecurity updates
2025-01-29 21:29:12 Pacfic

TalkTalk Investigates Alleged Data Grab - 3d

UK telco TalkTalk is investigating a potential data breach, after a threat actor offered the data of millions of its current and former customers on a cybercrime forum. The investigation is in progress, but the claims suggest a potential exfiltration of sensitive user data. This incident highlights the ongoing challenges of safeguarding user data in the telecommunications sector. The claims about data size might be overstated.

The fact that a threat actor is attempting to sell user data on a cybercrime forum is a big risk. The incident highlights the need for telcos to invest more into security practices. It also shows that customers are at risk of their data being exposed via a third party.

US Govt email server cyber risks - 2h

A hastily set up email server by the US Government’s HR department has raised concerns about potential cyber disasters. This highlights the risks of inadequate planning and security measures when deploying new infrastructure. The use of a hastily set up email server could expose sensitive employee data, systems, and other critical US Government infrastructure to various cyber threats, including data breaches and espionage. This incident underscores the importance of robust security protocols and thorough risk assessments for all government IT projects.

OAuth Flaw in Airline Travel Integration - 12h
OAuth Flaw in Airline Travel Integration

A critical OAuth redirect flaw has been identified in an airline travel integration service, potentially exposing millions of users to account hijacking. By exploiting this flaw, attackers can gain unauthorized access to user accounts and perform actions like impersonating victims, modifying bookings, and accessing personal information. The vulnerability highlights the importance of robust OAuth implementation and thorough security testing within travel service platforms. This incident underscores the need for organizations to secure their APIs and ensure adequate security controls against account takeovers.

Fake Malware Builder Backdoors 18000 Users - 2d
Fake Malware Builder Backdoors 18000 Users

A threat actor has successfully targeted low-skilled hackers, often referred to as ‘script kiddies,’ by distributing a fake malware builder. The builder is not what they expected, instead it secretly infects the user’s systems with a backdoor. This sophisticated method allowed the attacker to compromise over 18,000 devices, highlighting a serious issue in the threat landscape. This indicates that even low skilled attackers can be targets and may unknowingly become victims.

EU Sanctions Russian GRU Members Over Estonia Attacks - 1d

The European Union has sanctioned three Russian nationals, identified as Nikolay Alexandrovich Korchagin, Vitaly Shevchenko, and Yuriy Fedorovich Denisov, for their involvement in cyber attacks targeting Estonia’s key ministries in 2020. These individuals are members of the GRU Unit 29155, a Russian military intelligence unit known for its cyber operations. These sanctions highlight the ongoing geopolitical tensions and the attribution of state-sponsored cyber activities. The EU’s action underscores the international effort to hold nation-state actors accountable for their malicious cyber activities, aiming to deter future attacks and ensure the security of digital infrastructure.

Git Credential Exposure Vulnerabilities - 2d
Git Credential Exposure Vulnerabilities

Multiple vulnerabilities in Git’s credential retrieval protocol have been discovered which could allow attackers to access user credentials. These flaws stem from the improper handling of messages within Git’s credential protocol affecting tools like GitHub Desktop, Git Credential Manager, and Git LFS. Successful exploitation of these flaws can lead to credential exposure.

North Korean IT Workers Stealing Source Codes - 9d
North Korean IT Workers Stealing Source Codes

North Korean IT workers, including one who renamed himself ‘Bane’, are accused of engaging in fraudulent schemes. They infiltrated various companies and stole confidential source codes and demanding ransom to prevent release of the stolen data. This highlights a continued trend of North Korea using cyber operations to generate revenue while evading international sanctions. Organizations should be aware of this threat and take necessary precautions.

Subaru Starlink Vulnerability - 3d

Subaru Starlink connected vehicle service had a vulnerability which allowed remote access to the accounts of its customers in the US, Canada, and Japan.