Transcript
Steve Prentice (0:00)
From the CISO series it's Cybersecurity Headlines these are the cybersecurity headlines for Wednesday, November 13, 2024. I'm Steve Prentice. Dutch cybersecurity incident affects Giant Food and Hanaford A cybersecurity incident hit the Dutch food company Achold Dulluis on Friday, forcing the company to take some of its operations offline. This has subsequently impacted a number of e commerce and supermarket sites around the world, including Food Lion, Giant Food, Hannaford, Stop and Shop and the Giant Company. The head office in Holland has not yet offered further details as of this recording, but its actions are suggestive of a ransomware attack Indictment against Snowflake Breach suspects is released following up on coverage we delivered last week regarding Snowflake. This indictment was filed in the U.S. district Court of Western Washing and identifies Conor Mooka, who is a Canadian citizen, and John Binns as accused of executing an international hacking and extortion scheme targeting more than 10 organizations, including AT&T, with demands for ransom following the theft of sensitive data. They reportedly extorted digital currency as a ransom valued at approximately $2.5 million. The indictment itself does not specify the victim's companies, but it does align with previous reports linking the breaches to prominent firms that were customers of the daily data storage firm Snowflake, such as Ticketmaster and Santander. Surge in zero day vulnerability exploits is the new normal, says Five Eyes. This warning comes from the Five Eyes Intelligence alliance, which is the us, the uk, Australia, Canada and New Zealand, and states that contrary to previous years in which malicious cyber attacks were exploiting older software vulnerabilities, the tide has turned with the networking product netscalers from Citrix being the most widely used. Their report also mentions a critical vulnerability affecting Cisco routers and another in FortinetVPN equipment and one affecting the Move it file transfer tool that was of course exploited by the Klopp ransomware gang. A link to the report published by CISA is available in the show. Notes to this episode Iranian Dream Job campaign delivers malware to aerospace industry this campaign, attributed to the Iranian linked threat actor TA455, uses a spear phishing email containing fake job offers and supported by a convincing LinkedIn presence to get victims to download a zip file titled signedconnection zip, which has been flagged as malicious by five antivirus engines, according to a report from Clear Sky Cybersecurity. The download instructions provide a detailed PDF guide to instruct the victim on how to safely download and open the zip file, warning against actions that might prevent the attack from succeeding thanks to Today's episode's sponsor, ThreatLocker. Do zero day exploits and supply chain attacks keep you up at night? Well, worry no more. You can harden your security with Threat Locker. Threat Locker helps you take a proactive default deny approach to cybersecurity and provides a full audit of every action allowed or blocked for risk management and compliance. Onboarding and operation are fully supported by their US based support team. To learn more about how ThreatLocker can help keep your organization running efficiently and protected from ransomware, visit threatlocker.com that is T H R E A T L O c k e r.com TSA proposes new rules for cyber incident reporting at pipelines and railroads as reported in the Record, the rule would formalize several security directives issued by TSA since the ransomware attack on colonial pipeline in 2021. They would require cyber risk management plans overseen by the TSA and would need to include annual cybersecurity evaluations assessment plans to identify unaddressed vulnerabilities and to be run by officials who do not have a personal financial interest in the results of the assessment. This also requires a Cybersecurity Operational Implementation Plan. The TSA estimates that this proposed rule would impact about 300 surface transportation owners and operators, including 73 of the approximately 620 freight railroads currently operating in the U.S. north Korean hackers create flutter apps to bypass macOS security North Korean threat actors are now targeting Apple macOS systems using trojanized notepad apps and Minesweeper games created with Flutter, which are signed and notarized by a legitimate Apple developer id. According to Bleeping Computer, this means that the malicious apps, even if temporarily, passed Apple's security checks, so macOS systems treat them as verified and allow them to execute without restrictions. According to JAMF Threat Labs, that is jamf the lab that discovered the activity. The campaign appears more like an experiment on how to bypass macOS security rather than a fully fledged and highly targeted operation. End Quote GitLocker's Go issue tool focuses on GitHub developers and supply chains. A threat actor going by the name of Cyberluffy and claiming to be a member of the Gitlocker hacking group, and that is spelled G I T L is now offering a new GitHub publishing tool for sale or rent named GoIssue. It makes it possible to extract email addresses from GitHub repositories, which next describes as a gateway to source code theft, supply chain attacks and corporate network breaches through compromised developer credentials. Slash Next describes it as the sale or the rental of the tool that Gitlocker first developed for itself for email harvesting in early 2024. New ransomware Wimir delivered after a Rusty Stealer breach Researchers at Kaspersky have identified a new ransomware family called Wimir, which attackers use after breaching systems through PowerShell commands. It includes detection, evasion features and is launched after a target system has been accessed remotely and after the installation of tools like Process hacker and advanced IP scanner and rusty stealer. The ransomware uses the StreamCypher ChaCha20 algorithm to encrypt the files. No group has yet been associated with this product. Are you subscribed to the ciso series on YouTube? If not, you're missing out on a lot of great content. We host our Week in Review livestreams there, as well as posting original content, interviews, demos and podcast snippets. If that sounds like what you want to be watching, search for ciso series on YouTube and subscribe. I'm Steve Prentice reporting for the CISO series. Cybersecurity headlines are available every weekday. Head to csoseries.com for the full stories behind the headlines.
