
Loading summary
David Spark
From the CISO series, it's Cybersecurity Headlines.
Steve Prentice
These are the cybersecurity headlines for Monday, December 16, 2024. I'm Steve Prentice UnitedHealth's AI driven insurance claims Chatbot Left exposed to the Internet, the healthcare giant Optum has now restricted access to an internal AI chatbot that had been used by employees to encour inquire about how to handle patient health insurance claims and disputes according to standard operating procedures. This is after Mosab Hossain, Chief Security Officer and co founder of cybersecurity firm SpiderSilk, saw that its IP address was accessible online for anyone with a web browser. No password was required. The chatbot quote did not appear to contain or produce sensitive personal or protected health information. A spokesperson for Optum, whose parent company is UnitedHealth Group, told TechCrunch in a statement that Optum's SOP chatbot was a demo tool developed as a potential proof of concept, but was never put into production and the site is no longer accessible. South Carolina Credit union suffers a cyberattack SRP Federal Credit Union, one of the largest credit unions in South Carolina, filed breach notification documents with regulators in Maine and Texas on Friday following suspicious activity detected on its network. Initial investigations show that threat actors accessed the network at times between September 5th and November 4th of this year and potentially acquired certain files during that time. The Texas filing stated that the stolen data included names, Social Security numbers, driver's license numbers, dates of birth and financial information like account numbers, as well as credit or debit card numbers. The Nitrogen ransomware gang has claimed responsibility for this attack and for the theft of 650 gigabytes of customer data. The credit union company has not yet confirmed that it was a ransomware attack. IO Control cyberweapon targets infrastructure in the US and Israel, according to specialist security group Clarity. That is Claroty. Their Team 82 has obtained a sample of a custom built IoT OT MalW called IO Control which is being used by an Iran linked threat actor group called Cyberavengers with the number three as the first letter E in Avengers. All of this to target devices in infrastructure located in Israel and the US Specifically Fuel Management Systems. IO Control is a custom built modular malware that can run on a variety of platforms from different vendors and has been already used against device families including IP cameras, routers, programmable logic controllers, human machine interfaces, firewalls and more. Thanks to today's episode's sponsor ThreatLocker Do Zero Day Exploits and supply chain attacks keep you up at night. Well, worry no more. You can harden your security with Threat Locker. Threat Locker helps you take a proactive default deny approach to cybersecurity and provides a full audit of every action allowed or blocked for risk management and compliance. Onboarding and operation are fully supported by their US support team. To learn more about how ThreatLocker can help keep your organization running efficiently and protected from ransomware, visit threatlocker.com that is T H R E A T L O c k e r.com Auto parts giant LKQ suffers cyber attack on Canadian business unit LKQ is a publicly held US Based company that specializes in automotive replacement parts along with providing vehicle repair and maintenance services. Its brands include Keystone, TriStar and ADL. Representatives of the company filed a Form 8K on Friday stating that one of its business units in Canada was breached on November 13th disrupting business operations. The representatives do not believe the incident will have any material impact on its financials or operations for the remainder of the fiscal year, and they add they will seek reimbursement for costs and expenses stemming from the cyberattack from their cyber insurance company. No group has yet claimed responsibility for this attack. WordPress credentials stolen via malicious GitHub repository According to Datadog Security Labs, a GitHub repository which has since been removed and which advertised a WordPress tool to published posts is estimated to have enabled the exfiltration of over 390,000 credentials. This appears to be part of a broader attack campaign undertaken by a threat actor named by Datadog security labs as MUT 1244, where MUT refers to mysterious unattributed threat. The attack involves phishing and several Trojanized GitHub repositories hosting proof of concept code for exploiting known security flaws. Victims of the exfiltration are believed to be offensive actors such as pen testers and security researchers, as well as malicious threat actors, all of whom had sensitive data such as SSH private keys and AWS access keys. Exfiltrated Germany disrupts Bad box malware on 30,000 devices Germany's Federal Office of Information Security has disrupted a malware operation called Bad Box that came pre loaded on at least 30,000 Internet connected devices sold across the country. In a statement published earlier this week, authorities said they severed the connections between the devices and their command and control servers by sinkholing the domains in question. Impacted devices include digital picture frames, media players and streamers, and also some phones and tablets. Recorded Future Highlights the business impact of data breaches Recorded Futures Insect Group has identified a 76% increase in publicly reported data breaches from 2022 to 2023. And even though there are two more weeks remaining in this year, recorded Futures Data project a further 5% increase in 2024 compared to 2023. The group points out, quote, the costliest impacts of data breaches in the last several years have been operational dis, legal risks and declining sales due to churn and loss of customer trust. They add the real risk lies in companies falling behind in their security strategy and failing to adopt a new way of thinking. End quote. If you've ever wanted to meet up with some like minded CISO Series fans, well, you're in luck. We're hosting a CISO Series meetup in San Diego, California on December 18th. That's Wednesday. It's at the Novo Brazil Brewing, Mission Valley at 6pm Pacific Time. So come on down, meet the big boss, David Spark. Play some games and network with your fellow fans. We've got more details over at the events page@cisoseries.com and of course we hope to see you there. I'm Steve Prentice reporting for the CISO Series.
David Spark
Cybersecurity headlines are available every weekday. Head to cisoseries.com for the full stories behind the headlines.
Cyber Security Headlines – CISO Series Podcast Summary
Episode Released: December 16, 2024
Host: CISO Series
The latest episode of Cyber Security Headlines by CISO Series, hosted by Steve Prentice, delves into a series of significant cybersecurity incidents affecting various industries worldwide. This comprehensive summary captures the key points, discussions, insights, and conclusions from the episode, enriched with notable quotes and structured into clear sections for easy navigation.
Timestamp: [00:07]
In a concerning development, Optum, a subsidiary of UnitedHealth Group, inadvertently exposed its internal AI-driven insurance claims chatbot to the public internet. This chatbot was initially designed to assist employees in managing patient health insurance claims and disputes in line with standard operating procedures (SOPs).
Key Points:
Implications: While the exposed chatbot did not compromise sensitive data, this incident underscores the importance of rigorous access controls and regular security audits for internal tools, especially those leveraging AI technologies.
Timestamp: [00:45]
SRP Federal Credit Union, one of South Carolina's largest financial institutions, recently suffered a significant cyberattack that has raised alarms across the financial sector.
Key Points:
Quote: Steve Prentice noted, "The Nitrogen ransomware gang has claimed responsibility for this attack and for the theft of 650 gigabytes of customer data." ([00:45])
Implications: This breach highlights the persistent threats faced by financial institutions and the need for robust cybersecurity measures to protect sensitive customer information from sophisticated ransomware groups.
Timestamp: [02:15]
A sophisticated cyberweapon named IO Control has been identified by Clarity, a specialist security group, targeting critical infrastructure in the United States and Israel.
Key Points:
Quote: "IO Control is a custom built modular malware that can run on a variety of platforms from different vendors," explained Steve Prentice. ([02:15])
Implications: The deployment of IO Control signifies a growing trend of nation-state actors developing tailored cyberweapons to disrupt critical infrastructure, necessitating enhanced defensive strategies and international cooperation to mitigate such threats.
Timestamp: [03:50]
LKQ Corporation, a leading auto parts supplier based in the United States, has reported a cyberattack on its Canadian business division.
Key Points:
Implications: This incident underscores the vulnerability of multinational corporations to cyber threats and the importance of having comprehensive cyber insurance and incident response plans in place.
Timestamp: [04:30]
A security breach involving WordPress credentials has been uncovered by Datadog Security Labs, highlighting the risks associated with malicious code repositories.
Key Points:
Quote: Steve Prentice reported, "Victims of the exfiltration are believed to be offensive actors such as pen testers and security researchers, as well as malicious threat actors, all of whom had sensitive data such as SSH private keys and AWS access keys." ([04:30])
Implications: This incident reveals the dual threats hackers face, where both defenders and attackers can fall victim to credential theft, emphasizing the need for vigilant security practices even within trusted platforms like GitHub.
Timestamp: [05:20]
Germany's Federal Office of Information Security has successfully dismantled a malware operation known as Bad Box, which had infiltrated at least 30,000 internet-connected devices across the country.
Key Points:
Implications: The eradication of Bad Box demonstrates the effectiveness of coordinated government efforts in neutralizing large-scale malware threats, highlighting the importance of national cybersecurity infrastructure.
Timestamp: [06:10]
In recent research, Recorded Future has shed light on the escalating business consequences associated with data breaches.
Key Points:
Quote: "The costliest impacts of data breaches in the last several years have been operational disruptions, legal risks, and declining sales due to churn and loss of customer trust. The real risk lies in companies falling behind in their security strategy and failing to adopt a new way of thinking." – Recorded Future ([06:10])
Implications: The findings highlight the urgent need for businesses to prioritize advanced cybersecurity measures and proactive strategies to mitigate the extensive repercussions of data breaches.
Timestamp: [07:00]
In addition to the cybersecurity news, CISO Series is hosting an in-person meetup for fans and cybersecurity professionals.
Details:
Call to Action: Steve Prentice invites listeners to join the event, stating, "Come on down, meet the big boss, David Spark. Play some games and network with your fellow fans."
Implications: Events like these foster community building and provide valuable networking opportunities for professionals in the cybersecurity field.
Conclusion
The December 16, 2024 episode of Cyber Security Headlines by CISO Series presents a compelling overview of recent cybersecurity incidents impacting various sectors, from healthcare and finance to infrastructure and technology. The discussions underscore the evolving nature of cyber threats and the critical need for organizations to enhance their security postures proactively. With insights into both the incidents and their broader implications, listeners gain a nuanced understanding of the current cybersecurity landscape.
For those interested in exploring these stories in greater detail, additional information is available on cisoseries.com.
This summary was prepared to provide an in-depth overview of the episode for those who have not had the chance to listen. For the complete narratives and expert analyses, tuning into the original podcast is recommended.