CyberSecurity news

FlagThis - #cyberattack

Eduard Kovacs@SecurityWeek - 23d
Spanish authorities have arrested a hacker in Alicante for allegedly conducting over 40 cyberattacks targeting critical public and private organizations, including NATO, the US Army, and various Spanish entities such as the Guardia Civil and the Ministry of Defense. The investigation began in early 2024 after a data leak was reported from a Madrid business association, revealing that the hacker was boasting about stolen information on an underground criminal forum, even defacing the victim's website.

The suspect, known online as "Natohub" among other pseudonyms, is accused of illegally accessing computer systems, disclosing secrets, damaging computers, and money laundering. Police seized multiple computers, electronic devices, and over 50 cryptocurrency accounts containing various digital assets. Although the suspect's name hasn't been released by police, local news reports identify him as an 18-year-old man.

Recommended read:
References :
  • BleepingComputer: The Spanish police have arrested a suspected hacker in Alicante for allegedly conducting 40 cyberattacks targeting critical public and private organizations, including the Guardia Civil, the Ministry of Defense, NATO, the US Army, and various universities.
  • securityaffairs.com: Spanish Police arrested an unnamed hacker who allegedly breached tens of government institutions in Spain and the US.
  • BleepingComputer: The Spanish police have arrested a suspected hacker in Alicante for allegedly conducting 40 cyberattacks targeting critical public and private organizations, including the Guardia Civil, the Ministry of Defense, NATO, the US Army, and various universities.
  • Help Net Security: Suspected NATO, UN, US Army hacker arrested in Spain
  • SecurityWeek: Spanish authorities have arrested an individual who allegedly hacked several high-profile organizations, including NATO and the US army.
  • : The Spanish National Police and the Civil Guard announced the arrest (and release) of a hacker responsible for the cyberattacks against various Spanish government organizations, NATO and U.S. Army databases, and other international companies and entities.
  • www.scworld.com: Suspected hacker arrested for attacks on NATO, US Army
  • CyberInsider: Police Arrest Hacker Behind Attacks on U.S. and NATO Systems
  • cyberinsider.com: Police Arrest Hacker Behind Attacks on U.S. and NATO Systems
  • www.bleepingcomputer.com: Spanish National Police : (Spanish language) The Spanish National Police and the Civil Guard announced the arrest (and release) of a hacker responsible for the cyberattacks against various Spanish government organizations, NATO and U.S. Army databases, and other international companies and entities. Police seized multiple computers, electronic devices, and 50 cryptocurrency accounts containing various digital assets. Although no identity was released, linked the victim organizations to high profile attacks by the hacker using the alias "natohub".
  • www.helpnetsecurity.com: Suspected NATO, UN, US Army hacker arrested in Spain
  • www.securityweek.com: SecurityWeek provides details on the hacker's arrest and the organizations targeted.
  • BleepingComputer: The Spanish police have arrested a suspected hacker in Alicante for allegedly conducting 40 cyberattacks targeting critical public and private organizations, including the Guardia Civil, the Ministry of Defense, NATO, the US Army, and various universities.
  • bsky.app: The Spanish police have arrested a suspected hacker in Alicante for allegedly conducting 40 cyberattacks targeting critical public and private organizations, including the Guardia Civil, the Ministry of Defense, NATO, the US Army, and various universities. https://www.bleepingcomputer.com/news/legal/spain-arrests-suspected-hacker-of-us-and-spanish-military-agencies/
  • Cybernews: An undisclosed hacker has been accused of over 40 cyberattacks on strategic organizations, including government, universities, NATO, and the US Army.
  • www.policia.es: Spanish National Police : (Spanish language) The Spanish National Police and the Civil Guard announced the arrest (and release) of a hacker responsible for the cyberattacks against various Spanish government organizations, NATO and U.S. Army databases, and other international companies and entities.
  • Techmeme: Spanish police arrest a hacker for allegedly conducting 40 cyberattacks on critical public and private organizations, seizing 50 crypto accounts, PCs, and more
  • BleepingComputer: The Spanish police have arrested a suspected hacker in Alicante for allegedly conducting 40 cyberattacks targeting critical public and private organizations, including the Guardia Civil, the Ministry of Defense, NATO, the US Army, and various universities.
  • www.techmeme.com: Spanish police arrest a hacker for allegedly conducting 40 cyberattacks on critical public and private organizations, seizing 50 crypto accounts, PCs, and more
  • ciso2ciso.com: Police arrest teenager suspected of hacking NATO and numerous Spanish institutions
  • gbhackers.com: Authorities Arrested Hacker Who Compromised 40+ Organizations
  • www.helpnetsecurity.com: The Spanish National Police has arrested a hacker suspected of having breached national and international agencies (including the United Nation’s International Civil Aviation Organization and NATO), Spanish universities and companies, and released stolen data on the dark web.

Guru Baran@Cyber Security News - 28d
The New York Blood Center Enterprises (NYBC), a major provider of blood and blood products, has been targeted by a ransomware attack, severely impacting its IT systems. The incident, which was detected on Sunday, January 26th, forced NYBC to take systems offline as a precautionary measure to contain the threat. Cybersecurity experts were immediately engaged and an investigation was launched in conjunction with law enforcement. While the organization is working to restore services, it has noted that operations will be affected and that it is deploying workaround solutions to minimize the disruption. The attack has raised concerns about potential impacts on critical blood donation and distribution services across the region.

NYBC has emphasized that it remains focused on the health of the communities it serves and is taking all possible steps to restore its IT infrastructure. The organization is working with hospital partners to maintain services, while also expressing gratitude for support from the healthcare community during this time. There is currently no indication whether or not sensitive patient or donor data has been compromised, nor has any information on ransom demands been provided. The attack underscores the increasing vulnerability of healthcare entities to cyberattacks and the potential risks associated with these kinds of malicious activities.

Recommended read:
References :
  • Cyber Security News: News about the ransomware attack on the New York Blood Center.
  • gbhackers.com: New York Blood Center Targeted by Ransomware, IT Operations Impacted
  • Security Boulevard: Ransomware Scum — Out For Blood: NYBCe is Latest Victim
  • gbhackers.com: New York Blood Center Targeted by Ransomware, IT Operations Impacted
  • securityboulevard.com: Security Boulevard reports on the NYBC ransomware attack and its impact.
  • gbhackers.com: Tata Technologies, a leading provider of engineering and IT services, has reported a ransomware attack on its IT infrastructure.
  • www.cybersecurity-insiders.com: Tata Technologies, a multinational business that is into the sector of Technology engineering from India has released a press statement that whole of its IT services were suspended as a precautionary measure to mitigate cyber risks associated with the attack.
  • bsky.app: The New York Blood Center (NYBC), one of the world's largest independent blood collection and distribution organizations, says a Sunday ransomware attack forced it to reschedule some appointments.
  • BleepingComputer: The New York Blood Center (NYBC), one of the world's largest independent blood collection and distribution organizations, says a Sunday ransomware attack forced it to reschedule some appointments.
  • securityaffairs.com: Security Affairs article on the ransomware attack against the New York Blood Center.
  • Pyrzout :vm:: Another article covering the NYBC ransomware incident.
  • ciso2ciso.com: A ransomware attack forced New York Blood Center to reschedule appointments – Source: securityaffairs.com
  • www.scworld.com: New York Blood Center Enterprises, one of the leading independent blood centers across the U.S., had its blood drives and donation center activities deferred following a ransomware attack.

Dissent@DataBreaches.Net - 7d
Major Australian IVF provider Genea has confirmed a cybersecurity incident where an unauthorized third party accessed its data. The company detected suspicious activity on its network and promptly shut down some systems and servers to investigate the extent of the breach. Genea is working to determine what specific data was compromised and is taking steps to secure its systems. The incident disrupted patient services, including phone lines, the Genea app, and email communications, causing frustration for patients who rely on the clinic's data processing systems for critical blood test data related to their IVF treatment cycles.

This cyber incident has raised concerns about the security of patient data at healthcare providers. Genea has stated that it is "urgently investigating" the incident and will contact any individuals whose personal data has been compromised. The clinic is also working to restore systems and minimize disruptions to services, assuring patients that their privacy and data security are taken very seriously. Genea has multiple clinics across Australia and is working to ensure minimal disruption to patient services.

Recommended read:
References :
  • Carly Page: Australian IVF giant Genea has disclosed a cybersecurity incident that disrupted patient services and led to the access of potentially sensitive information
  • ciso2ciso.com: Australian IVF Clinic Suffers Data Breach Following Cyber Incident – Source: www.infosecurity-magazine.com
  • www.cybersecurity-insiders.com: Genea Australia data breach and Black Basta Ransomware gang data leak Genea IVF Australia, a leading fertility service provider and one of the three largest in the country, has confirmed that it has fallen victim to a significant cyberattack, resulting in a data breach.
  • DataBreaches.Net: Major Australian IVF provider Genea suffers ‘cyber incident’
  • techcrunch.com: Australian IVF giant Genea has disclosed a cybersecurity incident that disrupted patient services and led to the access of potentially sensitive information
  • kirbyidau.com: Incident: Australian IVF provider Genea in cyber incident | iTnews
  • www.scworld.com: Cyberattack compromises leading Australian IVF provider's data
  • kirbyidau.com: Kirbyidau - Australian IVF provider Genea in cyber incident | iTnews
  • Carly Page: Australian IVF provider Genea confirms hackers have leaked sensitive patient data after Termite listed the firm on its dark web site. A court order prohibiting publication of the stolen data reveals that hackers breached Genea's network on January 31 to steal more than 900GB of information
  • The420.in: Termite Ransomware Gang Breaches Australian IVF Giant Genea
  • bsky.app: The Termite ransomware gang has claimed responsibility for breaching and stealing sensitive healthcare data belonging to Genea patients, one of Australia's largest fertility services providers.
  • thecyberexpress.com: Cyberattack on Australia’s Genea: Stolen Patient Data Hits the Dark Web

@www.csoonline.com - 11d
Ransomware gangs are accelerating their operations, significantly reducing the time between initial system compromise and encryption deployment. Recent cybersecurity analyses reveal the average time-to-ransom (TTR) now stands at a mere 17 hours. This marks a dramatic shift from previous tactics where attackers would remain hidden within networks for extended periods to maximize reconnaissance and control. Some groups, like Akira, Play, and Dharma/Crysis, have even achieved TTRs as low as 4-6 hours, demonstrating remarkable efficiency and adaptability.

This rapid pace presents considerable challenges for organizations attempting to defend against these attacks. The shrinking window for detection and response necessitates proactive threat detection and rapid incident response capabilities. The trend also highlights the increasing sophistication of ransomware groups, which are employing advanced tools and techniques to quickly achieve their objectives, often exploiting vulnerabilities in remote monitoring and management tools or using initial access brokers to infiltrate networks, escalate privileges, and deploy ransomware payloads.

Recommended read:
References :
  • ciso2ciso.com: Source: www.csoonline.com – Author: News 17 Feb 20255 mins Incident ResponseRansomware The window for intrusion detection keeps getting shorter as ransomware group’s time-to-ransom (TTR) accelerates.
  • gbhackers.com: Ransomware Gangs Encrypt Systems 17 Hours After Initial Infection
  • www.csoonline.com: Ransomware gangs extort victims 17 hours after intrusion on average
  • ciso2ciso.com: Ransomware gangs extort victims 17 hours after intrusion on average
  • gbhackers.com: Ransomware Gangs Encrypt Systems 17 Hours After Initial Infection
  • Blog RSS Feed: Ransomware has become more than a threat—it's a calculated assault on industries, wielding AI-driven precision to bypass traditional defenses.

@www.helpnetsecurity.com - 29d
Zyxel CPE devices are under active attack due to a critical, unpatched zero-day vulnerability identified as CVE-2024-40891. This command injection flaw allows unauthenticated attackers to execute arbitrary commands via the telnet protocol, potentially leading to complete system compromise, data exfiltration, and network infiltration. The vulnerability, first acknowledged by VulnCheck in July 2024, is similar to another HTTP-based flaw, CVE-2024-40890, but uses telnet, and continues to be exploited because of the lack of a patch from Zyxel. Cyber security researchers have observed active exploitation attempts originating from numerous IP addresses, particularly in Taiwan, impacting over 1,500 devices globally, according to Censys.

The active exploitation of CVE-2024-40891 has prompted security researchers to issue warnings and provide guidance to affected users. GreyNoise, in collaboration with VulnCheck, has been monitoring the attacks and observed a significant overlap between IPs exploiting this vulnerability and those associated with the Mirai botnet. The lack of an official fix means that users are urged to take immediate steps such as filtering traffic for unusual telnet requests, restricting administrative interface access to trusted IPs, and monitoring Zyxel's official communication channels for patch announcements. These actions are crucial to mitigate the risk of exploitation until Zyxel releases an official patch.

Recommended read:
References :
  • The Hacker News: Zyxel CPE Devices Face Active Exploitation Due to Unpatched CVE-2024-40891 Vulnerability
  • Help Net Security: Zyxel CPE devices under attack via critical vulnerability without a patch (CVE-2024-40891)
  • gbhackers.com: Zyxel CPE Zero-Day (CVE-2024-40891) Exploited in the Wild
  • thedefendopsdiaries.com: Exploiting the Unpatched: A Deep Dive into Zyxel CPE Vulnerability
  • ciso2ciso.com: Unpatched Zyxel CPE Zero-Day Pummeled by Cyberattackers
  • securityonline.info: Zero-Day Alert: Mirai Botnet Exploiting Unpatched Zyxel CPE Vulnerability (CVE-2024-40891)
  • www.bleepingcomputer.com: Hackers are exploiting a critical command injection vulnerability in Zyxel CPE Series devices that is currently tracked as CVE-2024-40891 and remains unpatched since last July.

MSSP Alert Staff@MSSP feed for Latest - 15d
The Sarcoma ransomware group has claimed responsibility for a cyberattack against Unimicron, a major Taiwanese printed circuit board (PCB) manufacturer. The attackers are threatening to release 377 GB of allegedly stolen data, including SQL files and documents, if the company refuses to pay a ransom. Sarcoma listed Unimicron on its leak site, publishing samples of the exfiltrated files.

Despite confirming that its China-based subsidiary, Unimicron Technology (Shenzhen) Corp., experienced a ransomware intrusion, Unimicron has not yet confirmed the data breach. The company noted that it is currently conducting an ongoing investigation into the incident that disrupted operations on January 30th. Sarcoma has emerged as a leading threat, having claimed attacks against dozens of organizations since October.

Recommended read:
References :
  • cyberinsider.com: Taiwanese PCB Giant Unimicron Breached by Sarcoma Ransomware
  • securityaffairs.com: Sarcoma ransomware gang claims the theft of sensitive data from PCB maker Unimicron
  • www.bleepingcomputer.com: Sarcoma ransomware claims breach at giant PCB maker Unimicron
  • MSSP feed for Latest: Unimicron Purportedly Subjected to Sarcoma Ransomware Attack
  • BleepingComputer: A relatively new ransomware operation named 'Sarcoma' has claimed responsibility for an attack against the Unimicron printed circuit boards (PCB) maker in Taiwan.
  • CyberInsider: CyberInsider reports the Taiwanese PCB giant Unimicron was breached by Sarcoma ransomware.
  • www.scworld.com: Unimicron purportedly subjected to Sarcoma ransomware attack

Veronika Telychko@SOC Prime Blog - 2d
Criminal group UAC-0173 is actively targeting Ukrainian notaries in a series of cyberattacks. These attacks, which have been ongoing since mid-January 2025, involve the use of DARKCRYSTALRAT malware. The cybercriminals are exploiting RDP tools to breach Ukraine's notarial offices, aiming to manipulate state registers. CERT-UA has issued an alert, CERT-UA#13738, regarding these activities.

SOC Prime has released Sigma rules to detect UAC-0173 attacks leveraging DARKCRYSTALRAT malware, providing cybersecurity professionals with tools to identify and mitigate these threats. These attacks by UAC-0173 highlight the ongoing cyber warfare impacting critical infrastructure and organizations within Ukraine.

CERT-UA reports Hackers Exploit RDP Tools to Breach Ukraine’s Notarial Offices.

Recommended read:
References :
  • SOC Prime Blog: UAC-0173 Activity Detection: Hackers Launch Phishing Attacks Against Ukrainian Notaries Using the DARKCRYSTALRAT Malware
  • thecyberexpress.com: Hackers Exploit RDP Tools to Breach Ukraine’s Notarial Offices, CERT-UA Reports
  • securityaffairs.com: Criminal group UAC-0173 targets the Notary Office of Ukraine
  • The Hacker News: CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries
  • Talkback Resources: Cyble article describing CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries

@techcrunch.com - 19d
Lee Enterprises, a major media group and one of the largest newspaper publishers in the U.S., has confirmed it experienced a cyberattack that disrupted its systems. The attack, which began on February 3, 2025, caused a technology outage impacting various business applications and resulting in operational disruptions across numerous news outlets. CEO Kevin Mowbray stated the company is working to fully restore its systems, while a spokesperson confirmed they are determining what information, if any, may have been affected by the situation.

The cyberattack impacted Lee Enterprises' publishing technology and website services, affecting 72 publications, including the St. Louis Post-Dispatch and the Casper Star-Tribune. While the Post-Dispatch managed to avoid missing any publication days, it reported that most of its newspaper editions were affected, with some being smaller than usual. The Star-Tribune noted that the cyberattack initially prevented many of Lee's newspapers from building pages and publishing. The company's focus is now on determining if any data was stolen and restoring full operational capabilities.

Recommended read:
References :
  • cyberinsider.com: CyberInsider covers the cyberattack at Lee Enterprises disrupting operations nationwide.
  • techcrunch.com: TechCrunch reports on the cyberattack hitting Lee Enterprises, causing disruption across news outlets.
  • www.bleepingcomputer.com: Cyberattack disrupts Lee newspapers operations across the US
  • Anonymous ???????? :af:: Social Media post about cyberattack on Lee Enterprises
  • CyberInsider: Cyberattack at Lee Enterprises disrupting operations nationwide.
  • The Register - Security: US newspaper publisher Lee Enterprises is one week into tackling a nondescript "cybersecurity event", saying the related investigation may take "weeks or longer" to complete.
  • Anonymous ???????? :af:: Cyberattack on Lee Enterprises, one of the largest newspaper groups in the U.S., causing a widespread outage impacting operations.

@cyberinsider.com - 10d
Lee Enterprises, a major newspaper publisher with 77 newspapers and 350 weekly publications, has confirmed that a recent system outage was caused by a ransomware attack. The cyberattack disrupted newspaper operations starting in early February. The attackers are suspected of using double-extortion tactics, encrypting critical applications and exfiltrating files.

Cybercriminals launched a large-scale campaign, dubbed StaryDobry, which distributed the XMRig cryptominer through trojanized game installers. The attackers targeted users worldwide, including in Russia, Brazil, Germany, Belarus, and Kazakhstan. Cracked versions of popular games like BeamNG.drive, Garry's Mod, Dyson Sphere Program, Universe Sandbox, and Plutocracy were used to deliver the malware. Once downloaded, the installer extracts and executes a malicious payload, injecting the cryptominer into the victim's system.

Recommended read:
References :
  • cyberinsider.com: Lee Enterprises has officially confirmed that the cyberattack disrupting its newspaper operations since early February was a ransomware incident.
  • www.bleepingcomputer.com: Newspaper publishing giant Lee Enterprises has confirmed that a ransomware attack is behind ongoing disruptions impacting the group's operations for over two weeks.
  • BleepingComputer: Newspaper publishing giant Lee Enterprises has confirmed that a ransomware attack is behind ongoing disruptions impacting the group's operations for over two weeks.
  • The Register - Security: US newspaper publisher uses linguistic gymnastics to avoid saying its outage was due to ransomware
  • Cybernews: Lee Enterprises expects that a recent cyberattack will most likely have a material impact on its operations.
  • CyberInsider: Lee Enterprises has officially confirmed that the cyberattack disrupting its newspaper operations since early February was a ransomware incident.
  • DataBreaches.Net: Newspaper publishing giant Lee Enterprises said an ongoing cyberattack is causing disruptions across its business, and is now in its third week of outages.
  • Talkback Resources: Lee Enterprises Newspaper Disruptions Caused by Ransomware [for] [mal]
  • securityonline.info: Cracked Games, Cryptojacked PCs: The StaryDobry Campaign
  • Talkback Resources: Lee Enterprises Newspaper Disruptions Caused by Ransomware [for] [mal]
  • Talkback Resources: Lee Enterprises Newspaper Disruptions Caused by Ransomware

@techcrunch.com - 8d
UK healthcare giant HCRG Care Group, previously known as Virgin Care, is currently investigating an IT security incident after the Medusa ransomware gang claimed responsibility for breaching the company's systems. The attackers allege to have stolen troves of sensitive data, totaling 2.275 TB, and are demanding $2 million (£1.6 million) in ransom. HCRG, which runs child and family health and social services across the UK for the NHS and local authorities, is working with external forensic specialists to investigate the incident.

HCRG has stated that its services are continuing to operate safely, and patients should keep their scheduled appointments. The Medusa crew is threatening to leak the stolen information online if the ransom isn't paid by February 27th. Samples of the allegedly stolen data, which include employees’ personal information, sensitive medical records, financial records, and government identification documents, have been shared by Medusa. HCRG has notified the U.K.’s Information Commissioner’s Office and other relevant regulators about the breach.

Recommended read:
References :
  • DataBreaches.Net: HCRG Care Group, a private health and social services provider, has seemingly fallen victim to the Medusa ransomware gang, which is threatening to leak what’s claimed to be stolen internal records unless a substantial ransom is paid.
  • The Register: Medusa ransomware gang demands $2M from UK private health services provider 2.3 TB held to ransom as biz formerly known as Virgin Care tells us it's probing IT 'security incident' Exclusive  HCRG Care Group, a private health and social services provider, has seemingly fallen victim to the Medusa ransomware gang, which is threatening to leak what's claimed to be stolen internal records unless…
  • The Register - Security: HCRG Care Group, a private health and social services provider, has seemingly fallen victim to the Medusa ransomware gang, which is threatening to leak what's claimed to be stolen internal records unless a substantial ransom is paid.
  • Carly Page: UK healthcare giant HCRG Care Group has confirmed it’s investigating an IT security incident after the Medusa ransomware gang claimed to have breached the company's systems to steal troves of sensitive data
  • techcrunch.com: HCRG Care Group, a private health and social services provider, has seemingly fallen victim to the Medusa ransomware gang, which is threatening to leak what’s claimed to be stolen internal records unless a substantial ransom is paid.
  • go.theregister.com: 2.3 TB held to ransom as biz formerly known as Virgin Care tells us it's probing IT 'security incident' Exclusive   HCRG Care Group, a private health and social services provider, has seemingly fallen victim to the Medusa ransomware gang, which is threatening to leak what's claimed to be stolen internal records unless a substantial ransom is paid.…
  • Legit Security Blog: Medusa ransomware gang demands $2M from UK private health services provider

Pierluigi Paganini@Security Affairs - 25d
A web skimming campaign has targeted multiple websites, including Casio UK, in a sophisticated double-entry attack. Security firm Jscrambler discovered that at least 17 websites were compromised, with the attack on Casio UK lasting from January 14th to January 24th. The threat actor installed a web skimmer on all pages except the checkout page. This skimmer altered the usual payment flow, manipulating the user into entering sensitive information such as name, address, email, phone number, and credit card details into a fake payment form.

The double-entry technique involved an unobfuscated loader that fetched a second-stage skimmer from an attacker-controlled server. This skimmer encrypted and exfiltrated sensitive customer information, including contact information, credit card details, and billing addresses, concealing malicious activity through XOR-based string masking and custom encoding. After completing the fake form, victims were redirected to the legitimate checkout page, where they were asked to fill out the same details again. Jscrambler noted that Casio UK's website had a content security policy set to report-only, which logged events but failed to prevent the attack.

Recommended read:
References :
  • securityaffairs.com: Web Skimmer found on at least 17 websites, including Casio UK
  • www.scworld.com: Web skimming campaign hits several websites
  • ciso2ciso.com: Casio Website Infected With Skimmer  – Source: www.securityweek.com
  • ciso2ciso.com: CISO to CISO reports on the web skimming attack against Casio and 16 other websites.
  • Pyrzout :vm:: Casio and 16 Other Websites Hit by Double-Entry Web Skimming Attack – Source:hackread.com
  • ciso2ciso.com: The attackers' goal was to harvest and exfiltrate visitor information.
  • Secure Bulletin: On February 3, 2025, the Casio UK online store fell victim to a significant cyberattack, leading to the unauthorized access and theft of customer credit card information.
  • BleepingComputer: Casio UK's e-shop at casio.co.uk was hacked to include malicious scripts that stole credit card and customer information between January 14 and 24, 2025.
  • www.bleepingcomputer.com: Bleeping Computer article on the Casio UK online store being hacked to steal customer credit cards.
  • securebulletin.com: Malicious scripts on the CASIO e-shop stole credit card and personal customer details

@www.the420.in - 3d
A large-scale malware campaign has compromised over 35,000 websites by injecting malicious JavaScript. The injected scripts redirect users to Chinese-language gambling platforms, specifically under the "Kaiyun" brand. This attack utilizes obfuscated JavaScript payloads to hijack user browsers, replacing legitimate website content with full-page redirects.

This malicious campaign operates by embedding a one-line `` tag into the source code of affected websites. These scripts then reference domains like zuizhongjs[.]com and other similar URLs. Once loaded, these scripts dynamically inject further payloads, manipulating browser behavior and creating a full-screen overlay that redirects users to unlicensed gambling platforms in Mandarin, targeting users in regions where Mandarin is predominantly spoken. The attackers employ techniques such as string concatenation and Unicode escapes to conceal their activities and evade detection by automated security systems.

Recommended read:
References :
  • Cyber Security News: cyberpress.org on 35,000 Websites Compromised with Malicious Scripts Redirecting Users to Chinese Websites
  • gbhackers.com: Over 35,000 Websites Hacked to Inject Malicious Scripts Redirecting Users to Chinese Websites
  • Talkback Resources: talkback.sh on Over 35,000 Websites Targeted in Full-Page Hijack Linking to a Chinese-Language Gambling Scam
  • gbhackers.com: WordPress Admins Warned of Fake Plugins Injecting Malicious Links into Websites

@www.bleepingcomputer.com - 20d
Hospital Sisters Health System (HSHS) has notified over 882,000 patients about a significant data breach stemming from a cyberattack in August 2023. The breach exposed the personal and health information of these individuals, raising concerns about data security within the healthcare sector. HSHS, established in 1875, operates a network of 15 local hospitals across Illinois and Wisconsin and works with over 2,200 physicians.

The health system discovered the security breach on August 27, 2023, after detecting unauthorized access to its network. Following the discovery, HSHS initiated an investigation to assess the scope and impact of the incident. The notification sent to patients confirmed that the cyberattack led to the compromise of their personal data, emphasizing the importance of vigilance regarding potential misuse of the exposed information.

Recommended read:
References :
  • BleepingComputer: Hospital Sisters Health System notified over 882,000 patients that an August 2023 cyberattack led to a data breach that exposed their personal and health information.
  • securityaffairs.com: The cyberattack on Hospital Sisters Health System in 2023 compromised the personal information of 883,000 individuals.
  • www.bleepingcomputer.com: US health system notifies 882,000 patients of August 2023 breach
  • BleepingComputer: Hospital Sisters Health System notified over 882,000 patients that an August 2023 cyberattack led to a data breach that exposed their personal and health information.
  • Anonymous ???????? :af:: Hospital Sisters Health System notified over 882,000 patients that an August 2023 cyberattack led to a data breach that exposed their personal and health information.
  • BleepingComputer: Hospital Sisters Health System notified over 882,000 patients that an August 2023 cyberattack led to a data breach.

Swagta Nath@The420.in - 2h
References: The420.in , gbhackers.com ,
EncryptHub, also known as LARVA-208, is a sophisticated cyber threat actor conducting widespread spear-phishing and social engineering campaigns. Since June 2024, the group has successfully infiltrated at least 618 organizations globally. EncryptHub employs SMS phishing (smishing) and voice phishing (vishing) to distribute infostealers and ransomware, targeting corporate networks worldwide. Cybersecurity firms Catalyst and Prodaft report the group impersonates IT personnel to trick employees into revealing VPN credentials or installing remote monitoring software, bypassing multi-factor authentication and redirecting victims to legitimate login pages.

EncryptHub registers domain names mimicking popular VPN services to enhance phishing campaign credibility. Once inside, custom PowerShell scripts install information-stealing malware to extract sensitive data, including credentials and system information. The final stage involves deploying ransomware payloads like Locker.ps1 to encrypt files and demand cryptocurrency payments. The group has also been linked to other ransomware strains such as RansomHub and BlackSuit, causing widespread operational disruptions.

Recommended read:
References :
  • The420.in: A sophisticated cyber threat actor known as EncryptHub (Larva-208) has been conducting widespread spear-phishing and social engineering campaigns to infiltrate corporate networks worldwide.
  • gbhackers.com: A newly identified cybercriminal group, LARVA-208, also known as EncryptHub, has successfully infiltrated 618 organizations globally since June 2024, leveraging advanced social engineering techniques to steal credentials and deploy ransomware.
  • Talkback Resources: A threat actor named LARVA-208, also known as EncryptHub, has been conducting targeted spear-phishing attacks using sophisticated social engineering techniques to deploy ransomware and steal credentials from corporate networks, compromising over 600 organizations since June 2024.

BushidoToken (noreply@blogger.com)@blog.bushidotoken.net - 22h
BlackBasta ransomware group's attack on Ascension Health, one of the largest healthcare providers in the US, has been brought to light by leaked chat logs. The incident, which occurred in May 2024, significantly disrupted services and involved the exfiltration of 1.4TB of data and encryption of over 12,000 servers. The BlackBasta gang gained initial access months prior to deploying the ransomware, starting around November 2023, using phishing and password guessing techniques to compromise 14 email addresses of Ascension Health employees.

These leaked chat logs provide researchers a unique opportunity to understand the inner workings of the Russia-based cybercrime enterprise. The BlackBasta gang, consisting of former Conti ransomware members, exhibits similar operational structures. Veriti Research analyzed the leaked communications, revealing that BlackBasta exploited vulnerabilities in VMware ESXi, Microsoft Exchange, Citrix VPNs, and Fortinet firewalls, and Active Directory. The gang also uses cloud services for malware hosting and adjusts tactics to evade detection, while expressing frustration when EDRs, firewalls, and IP reputation monitoring disrupt their operations.

Recommended read:
References :
  • blog.bushidotoken.net: BlackBasta Leaks: Lessons from the Ascension Health attack
  • thecyberexpress.com: Black Basta Chat Logs Reveal Ransomware Group’s TTPs, IoCs
  • VERITI: Inside the Minds of Cybercriminals: A Deep Dive into Black Basta’s Leaked Chats
  • aboutdfir.com: Report on the attack on Ascension Health and the alleged involvement of Black Basta.
  • ASEC: Description of the ransomware attack, its impact, and the potential ramifications for healthcare organizations.

@techcrunch.com - 10d
New York-based venture capital and private equity firm Insight Partners has disclosed a security breach of its systems. The firm, which manages over $90 billion in regulatory assets and has invested in over 800 software and technology startups globally over the past 30 years, revealed that the incident occurred in January. The breach involved unauthorized access to its information systems following what they are calling "a sophisticated social engineering attack."

Insight Partners confirmed that the attack took place on January 16, 2025. The company has taken steps to address the situation, notifying law enforcement in relevant jurisdictions and engaging third-party cybersecurity experts to investigate the full scope and impact of the breach. The investigation is ongoing to determine the extent of data exposure and to implement measures to prevent future incidents.

Recommended read:
References :
  • cyberinsider.com: Insight Partners Investigates Data Breach Following Cyberattack
  • BleepingComputer: New York-based venture capital firm Insight Partners has disclosed that its systems were breached
  • techcrunch.com: VC giant Insight Partners confirms a January cyberattack
  • CyberInsider: Insight Partners Investigates Data Breach Following Cyberattack
  • securityaffairs.com: Venture capital firm Insight Partners discloses security breach
  • www.bleepingcomputer.com: Insight Partners hit by cyberattack
  • Carly Page: US-based VC giant Insight Partners has confirmed that hackers breached its systems in January.
  • aboutdfir.com: Insight Partners confirms cyberattack in January 2025, with unauthorized access to information systems.

Dissent@DataBreaches.Net - 2d
Australian fertility provider Genea has confirmed a significant cyberattack resulting in the potential compromise of sensitive patient data. The Termite ransomware group has claimed responsibility, alleging to have stolen approximately 700GB of confidential information after breaching Genea's systems. This data is said to include medical records, personal identifiers, and insurance details, affecting one of Australia's largest IVF providers.

Genea has acknowledged the unauthorized access and the subsequent leak of patient data on the dark web after Termite listed the firm on its site. In response, a court order was obtained to prevent further dissemination of the stolen information. The attack reportedly occurred on January 31, with the cybercriminals claiming to have exfiltrated over 900GB of data.

Recommended read:
References :
  • Carly Page: Australian IVF provider Genea confirms hackers have leaked sensitive patient data after Termite listed the firm on its dark web site.
  • thecyberexpress.com: Termite ransomware group has allegedly leaked sensitive patient data following the Genea cyberattack, targeting one of Australia’s leading fertility providers.
  • The420.in: The Termite ransomware gang has taken responsibility for breaching Genea, one of Australia’s largest fertility service providers, and stealing sensitive patient data.

@ciso2ciso.com - 29d
SquareX has revealed a new attack method called "Browser Syncjacking" which exploits browser synchronization features to give attackers full control over a user's browser and device. This technique uses malicious browser extensions to hijack a user's browser by silently adding a profile managed by the attacker, essentially granting them complete access and control of the system. The attack starts when a user installs a seemingly innocuous extension, which could be disguised as an AI tool or even a popular extension already with millions of users.

The malicious extension then automatically authenticates the victim into a Chrome profile controlled by the attacker's Google Workspace. This method does not require any additional permissions from the user above read/write capabilities that most browser extensions already request. Experts from SquareX demonstrated how this enables attackers to escalate privileges and conduct a total browser and device takeover with minimal user interaction. This discovery suggests that any browser extension could be a potential attack vector as these extensions are not put through additional security scrutiny.

Recommended read:
References :
  • ciso2ciso.com: SquareX Discloses “Browser Syncjackingâ€� , a New Attack Technique that Provides Full Browser and Device Control, Putting Millions at Risk – Source:hackread.com
  • Pyrzout :vm:: SquareX Discloses “Browser Syncjackingâ€� , a New Attack Technique that Provides Full Browser and Device Control, Putting Millions at Risk – Source:hackread.com
  • hackread.com: SquareX Unveils "Browser Syncjacking" Attack Granting Full Browser and Device Control
  • ciso2ciso.com: News alert: SquareX discloses ‘Browser Syncjacking’ – a new attack to hijack browser – Source: www.lastwatchdog.com