Transcript
CISO Series Host (0:00)
From the CISO series, it's Cybersecurity Headlines.
Rich Stroffolino (0:06)
These are the cybersecurity headlines for Wednesday, January 29, 2025. I'm Rich Stofalino. Most ransomware victims shut down operations A new report from the Poneman Institute found that 58% of organizations hit by ransomware last year were forced to shut down operations as part of their recovery process. That's up from 45% of victims in 2021. The report also found organizations seeing significant revenue loss due to attacks, up from 22% to 40% in that same span, while those experiencing brand damage jumped from 21% to 35%. While those metrics are trending in the wrong direction, the report also found that the average time to recover from ransomware decreased 30% to 132 hours, while the average recovery cost fell 13%. 51% of respondents did pay a ransom and for those paying victims, 32% said attackers demanded further payment EU sanctions GRU members for Estonia cyber attacks the European Council announced sanctions against three Russian nationals for involvement in cyberattacks against Estonia in 2020. The three men are linked to Unit 29155, aka Cadet Blizzard of Russia's GRU Intelligence unit. Estonia identified the unit as responsible for the attacks back in September, the first time the country attributed a cyberattack to a state backed actor. Estonia's Foreign Minister Margus Saka said an international Investigation found the 2020 attacks aimed to damage national computer systems, obtain sensitive information and strike a blow against our sense of security. The sanctions will freeze funds, prohibit EU citizens from transferring funds to them and and ban travel in the block. Lynx ransomware runs a tight ship Researchers at Group IB gained access to an affiliate panel for the Lynx ransomware organization, giving details on the level of sophistication used by the group. This panel provides a consumer level UI offering Lynx affiliates, configurable victim profiles, custom ransom or sample generation and data leak scheduling. Add on services to affiliates include a call center for harassing victims and cloud storage services. Lynx also provides a comprehensive archive of binaries across a range of OSes and processor architectures with options for multiple encryption modes so affiliates can balance encryption speed with depth based on their needs. PowerSchool starts notifying victims the education SaaS giant disclosed a cyber attack earlier this month, but only began alerting impacted school districts. Now the company has begun notifying affected individuals in the US And Canada who had personal data stolen, including past and current students, parents and guardians. We know the breach impacted 6,505 school districts, but the exact number of affected individuals and detailed breach report have not been released. PowerSchool did notify Maine's Attorney General's office that 33,488 people were affected in that state. And now a huge thanks to our sponsor for today, Conveyor tired of herding cats to complete customer security questionnaires? Your team probably spends hours daily juggling the back and forth of completing these security requests. That's why Conveyor created Sue, the first AI agent for customer trust. Sue doesn't just handle completing security questionnaires and sending SOC2 to prospects, she manages all the communication and follow up too. You simply get notified when everything's done so you can do a quick review. Stop wrangling cats and see what sue can do for you. @conveyor.com that's C O N V E Y-O-R.com Edge rolls out Scareware protections Ever visit a website that immediately displays a pop up claiming it detected a virus and then offering to download a free antivirus software? Well, then you're familiar with Scareware. The latest preview of Microsoft's Edge browser introduces a new opt in Scareware blocker feature, which uses locally running computer vision to compare sites against known Scareware sites for similarities. If it attacks a malicious site, it automatically exits full screen mode, stops any audio playing from the page, and gives users the options to report the site to Microsoft. Windows already offers some scareware protection with its Defender smartscreen tool, but this is only effective against already flagged sites. Malware writing with Ghost GPT, researchers at Abnormal Security documented a new AI chatbot for cybercriminals called GhostGPT. The chatbot first appeared for sale on a Telegram channel in mid November, offering pricing models that start at $50 a week. Ghost GPT has grown in popularity enough that its operators have shifted from this model to direct private sales. It's marketed as being able to develop exploits, code malware, and write phishing messages. Researchers believe GhostGPT isn't a standalone model, but instead a wrapper on a jailbroken version of ChatGPT or an open source model as opposed to something like wormgpt. The operators also claim not to record user activity or maintain logs for added privacy. Ransomware locked out org for six weeks in an updated filing with the U.S. securities and Exchange Commission, officials with the energy industry contractor N Global Corporation revealed a recent ransomware attack locked them out of financial and operating reporting Systems for approximately six weeks. The attack on the contractor initially began on November 25, 2024, with threat actors accessing systems containing sensitive personal information. Despite being locked out of critical operations systems for over a month, the filing said it did not believe the attack would have a material impact on its financials. The firm with the breach in its side, the multinational engineering firm Smiths Group, disclosed a cybersecurity incident in a filing with the London Stock Exchange. The attack involved unauthorized access, but Smiths did not disclose if any customer or business data was stolen. It's unclear if this resulted in any disruption to operations or, but the company said it isolated impacted systems and is working with experts on recovery efforts. There's no word on any group behind the attacks yet. Remember to register for this week's Super Cyber Friday event hacking the third party risk management process. It's happening this Friday at 1pm Eastern, 10am Pacific and we'll have an hour long discussion with practical tips for reviewing your third party risk. We have a lively chat room that you can join in fun games with prizes and some fantastic expertise on display. Head on over to the events page@cisoseries.com to register and join us. Reporting for the CISO series, I'm Rich Stroffolino reminding you to have a super sparkly day.
