Release Date:

Cyber Brief - August 2022

Download

Executive summary

  • We analysed 246 open source reports for this Cyber Security Brief.1

  • Relating to cyber policy and law enforcement, in Europe, France banned a Russian TV broadcasting channel, and Ukraine took down a cybercrime platform. Elsewhere, the US indicted a Russian for spreading disinformation, and offered a bounty for information on Conti associates.

  • On the cyberespionage front, Chinese groups targeted Ukrainian, Russian, Belarusian, and Australian targets with spear-phishing, and Taiwan and the Philippines with supply-chain attacks. Russian groups targeted NATO countries with spear-phishing. Meta (Facebook) removed operations by state-sponsored groups from its social media platforms. A North Korean threat actor targeted several South Korean entities and an Iranian-origin group targeted Israeli organisations.

  • Relating to cybercrime, in Europe reports showed that, besides businesses, ransomware targeted the critical infrastructure sector including energy (at least five cases) and healthcare sectors (at least four cases), as well as public administrations in several countries (at least four cases). Notably, the operations of a Danish retailer were disrupted countrywide. The top three ransomware families in Europe were Lockbit (by far the most infections), AlphV, and LV. On the global level, beside ransomware attacks, the cryptocurrency sector was of particular interest to cybercriminals, as well as to North Korea's Lazarus group which showed consistent activity in the sector.

  • On the hacktivism front, we observed nationalist motivated activity. In Europe, we observed attacks by pro-Russia purported hacktivists against targets in countries opposing Russia's war on Ukraine, while in the rest of the world there were pro-China attacks against Taiwan and a pro-Russia group attacking the US aerospace sector. The targeting focuses on government organisations, especially on those providing services to citizens.

  • Regarding disruptive operations, Google announced that they responded to the highest volume DDoS attack ever. Montenegro faced disruptive attacks affecting government services and critical infrastructure.

  • With relation to data exposure, several big IT platforms and services providers, including Twitter, Cisco, the cloud messaging company Twilio, and the Plex media platform, disclosed data breaches which exposed internal or customer data.

  • We included several significant vulnerabilities and associated advisories, reported in August 2022.

Europe

Cyber policy and law enforcement

France bans an additional Russian TV broadcasting channel
On August 3, the French Audiovisual and Digital Communication Regulatory Authority (Arcom) gave Eutelsat, a French satellite operator, formal notice to cease the European broadcasting of NTV Mir, the international version of the NTV channel. The NTV television group is owned by the Russian gas giant Gazprom. Arcom accuses NTV Mir of remarks inciting hatred or violence. Arcom also sanctions "several serious and baseless allegations, feeding the springs of Russian propaganda" and "disseminated in particular in order to legitimise the war in Ukraine."
Ban,
Foreign media,
Disinformation
Ukraine takes down cybercrime infrastructure hitting crypto fraud victims
The National Police of Ukraine announced that they took down a network of call centres used by a cybercrime group to target victims with cryptocurrency scams under the guise of helping them recover their stolen funds. The cybercriminals behind these illegal call centres were also allegedly involved in scamming citizens of Ukraine and EU countries interested in cryptocurrency, securities, gold, and oil investments.
Take-down,
Cryptocurrency scam

Cyberespionage

Chinese actor targeting Ukraine, Russia, and Belarus
On August 8, Kaspersky reported observing a spear-phishing campaign by the Chinese-origin threat actor TA428. The campaign was detected in January 2022 and targeted the military and industry sectors. The threat actors used highly targeted phishing messages that contained attached MS-Word documents to exploit an older vulnerability. The target countries included Afghanistan.
Chinese threat actor,
Spear-phishing
Russian Callisto group attacking NATO countries
Microsoft issued a report on phishing operations of the Callisto group (aka Reuse Team, SEABORGIUM). The group was observed targeting NATO countries, in particular the US and the UK, with occasional targeting of other countries in the Baltics, the Nordics, and Eastern Europe, as well as Ukraine.
Analyst note: We assess that this activity pose a potential threat to EU institutions, bodies and agencies.
Russian threat actor
New post-compromise tool used by APT29
Microsoft security researchers discovered a post-compromise capability dubbed MagicWeb, which is used by a threat actor tracked as Nobelium or APT29 to maintain persistent access to compromised environments. Microsoft reports that the group remains highly active, executing multiple campaigns in parallel targeting government organisations, non-governmental organisations (NGOs) and think tanks across Europe, US and Central Asia.
Analyst note: We assess that this activity pose a potential threat to EU institutions, bodies and agencies.
Russian threat actor,
Persistence

Cybercrime

Ransomware

French hospital suffers ransomware
A French hospital, Centre Hospitalier Sud Francilien (CHSF), suffered a ransomware attack on August 21. The hospital's computer systems were down, the emergency department operated in a downgraded mode, and staff could no longer fill patient admission forms. For more than 24 hours, caregivers were forced to use paper. Threat actors threatened to leak patient data if the ransom was not paid. Patients requiring urgent care were redirected to other hospitals in the region. In addition, some surgeries were postponed.
Ransomware,
Health
French retirement home hit by ransomware
A French retirement home in Beuzeville was the victim of a ransomware attack on August 24. A crisis unit was set up by a nearby hospital. The ransomware used was reportedly Cryptolocker.
Ransomware,
Health
Italian healthcare complex hit by ransomware
A ransomware attack hit ASL Città di Torino, a health complex, in the Turin area. The affected facilities include the San Giovanni Bosco, Maria Vittoria, Martini and Oftalmico hospitals. The management of the health complex issued a press release listing the services that remain active (First Aid, outpatient visits, hospitalisations, hospital visits and surgical interventions) while the collection of radiological reports could only take place at the Radiology Secretariats.
Ransomware,
Health
UK's National Health Service disrupted
On August 5, a ransomware attack on Advanced, a British managed services provider, disrupted the National Health Service's emergency services, resulting in their IT system's complete inoperability.
Ransomware,
Managed services provider,
Health
Data of Italian municipalities exposed after attack
A July attack by the RansomHouse ransomware group on several Italian municipalities in the Valdisieve and Valdarno regions resulted in the exfiltration and later, in August, the public exposure of citizens’ data, after a ransom demand was not met.
Ransomware,
Public administration
Belgian municipality suffers double extortion
The social services of Maldegem, a municipality in Belgium, suffered a ransomware attack whereby the personal data of citizens leaked. The municipality refused to pay the ransom.
Ransomware,
Public administration
Spanish scientific research council hit by ransomware
The Spanish Higher Council for Scientific Research (CSIC), a body dependent on the Ministry of Science and Innovation, confirmed they were targeted by a ransomware attack on July 16 and 17. In a public statement, the Ministry indicated that the cyberattack was similar to that suffered by other research centres such as the Max Planck Institute or the US NASA, and that it "comes from Russia".
Ransomware,
Scientific research
Ransomware hit energy supplier
The AlphV (aka Blackcat) ransomware operation claimed responsibility for a cyberattack against Creos Luxembourg. Creos is a natural gas pipeline and electricity network operator. Creos’ owner, Encevo, operates as an energy supplier in five EU countries.
Ransomware,
Energy
Italian energy company breached
The Italian state-owned energy services company GSE suffered a cyber attack and temporarily blocked its website and access portals for security reasons. The company also stated that its gas purchases were guaranteed.
Analyst note: At time of writing, the nature of the attack (ransomware or other) is not known.
Energy
Clop breaches UK water supplier
On August 15, South Staffordshire PLC, a UK water supplier, revealed that it suffered a cyber attack which resulted in the disruption of its IT systems. In parallel a cybercriminal group claimed responsibility on their data leak site (DLS) and announced that they had supposedly managed to breach the industrial control systems (ICS) of the victim. The attackers also claimed that they had not encrypted compromised systems but instead exfiltrated data. After not receiving the demanded ransom, they started publishing the supposed stolen data on the DLS.
Ransomware,
Critical infrastructure
Greek natural gas system operator attacked
On August 20, DESFA, the Greek national natural gas system operator, announced having suffered a cyber attack on part of its IT infrastructure by cybercriminals who tried to gain illegal access to their data. The company confirmed that some of its systems became unavailable and that there was a potential data leak. The operation of the national gas system was not impacted. According to news reports, data from the DESFA breach leaked on August 19 by the Ragnar Locker ransomware operation, who claimed responsibility for the attack.
Ransomware,
Critical infrastructure
Ransomware forces retailer in Denmark to stop operations
Retail points of 7Eleven in Denmark ceased operations on August 8 due to a ransomware attack.
Ransomware,
Retail
Portugese airline suffers ransomware attack
Portuguese airline TAP was the target of a Ragnar Locker ransomware on August 25, but said that flight safety was not affected. It is unclear whether attackers had access to customer data.
Ransomware
Civil aviation
Telecom firm suffers ransomware
Altice, a telecom company was the victim of a cyber attack by the Hive ransomware group. On its data leak site, the group claims to have carried out an attack on August 9, supposedly allowing it to steal data from the company.
Ransomware,
Telecom
German semiconductor manufacturer breached
Semikron, a German semiconductor manufacturer, disclosed a cyber incident that led to portions of the companyʼs IT systems and files being encrypted. The company says that a “professional hacker group” claims to have obtained data from the companyʼs systems, but the extent of the data leak remains unknown and under investigation.
Ransomware,
Technology

Other cybercrime

German organisation hit by cyber attack
The Association of German Chambers of Industry and Commerce (DIHK) was targeted by a cyber attack. The organisation decided to shut down all of its IT systems and switch off digital services, telephones, and email servers, as a precaution and a way to give IT teams time to develop a solution and build up defence. DIHK is a coalition of 79 chambers representing companies within the German state, with over three million members comprising businesses ranging from small shops to large enterprises in the country.
Breach,
Commerce coalition
Data theft extortion targeting MBDA
A group calling itself Andrastea claimed to have stolen 60 GB of data from MBDA, a France-based company, through a vulnerability in their network infrastructure. According to Adrastea, the stolen data includes information associated with employees working on military projects, commercial activities, correspondence with other firms, and contract agreements. The group also says it wants to sell the data and discuss the price in chat. MBDA confirmed they are the subject of a blackmail attempt and that the hackers started disseminated the information after the company refused to pay the requested ransom. MDBA claimed that the stolen data were acquired from an external hard drive and that there has been no compromise of corporate networks.
Extortion,
Defence contractor
Moldova government servers breached
The Moldovan government announced that the email servers of the country's President had been breached on August 10. it is unclear how long the email servers remained compromised and if any data leaked.
Breach,
Government
Polish remote water meter reading company breached
Isra Polska, a company that manages remote water meter reading suffered a breach on August 11. According to the company's statement, its IT systems were shutdown but no additional information became known.
Critical infrastructure
Dutch municipalities attacked
Five municipalities in the Netherlands suffered a cyber attack which resulted in IT disruptions. According to the municipalities, no data was stolen.
Public administration
Banking trojan targeting Spain
On August 18, security researchers reported observing banking trojan Grandoreiro targeting employees of a chemical manufacturer in Spain as well as the automotive sector in Mexico. The attacks started with phishing emails impersonating, in the case of Spain, the Spanish Public Ministry.
Banking trojan
Czech crypto company suffers theft
General Bytes, A Czech Republic-based company, revealed that its Crypto Application server suffered a cyber attack resulting in the theft of digital currency. The threat actors exploited a zero-day vulnerability. The crypto firm adds that two-way ATMs started to forward coins to the attacker's wallet when customers sent coins to the ATM.
Cryptocurrency
German light bulb manufacturer suffers cyberattack
German light bulb manufacturer Vosla GmbH was reportedly hit by a cyberattack. It is likely that these attacks were initiated by phishing emails.
Malware

Hacktivism

Killnet targets Italian institutions
On July 30, Italian law enforcement announced that pro-Russia purported hacktivists targeted the websites of various Italian institutions and ministries. Killnet claimed responsibility for the attacks. Among the 50 institutions affected are Italy's Supreme Judicial Council, its customs agency and its ministries of foreign affairs, education and cultural heritage.The Italian embassy in London said on Twitter that the websites of the foreign ministry and all the country's embassies had been affected and were not operational at the moment.
Analyst note: We cannot confirm the accuracy of these claims.
Russian threat actor,
DDoS
Killnet attacks the Latvian parliament with DDoS
On August 11, the Russian-origin hacktivist group Killnet launched a DDoS attack against the Latvian parliament after the vote on a resolution that Russia is a statesponsor of terrorism and attacks civilians in Ukraine. The web services of the parliament became inaccessible that day.
Russian threat actor,
DDoS
Hackvists target Republic of North Macedonia
Hacktivist claimed responsibility for breaching the Republic of North Macedoniaʼs Ministry of Education and Science website.
Breach

Disruption and hijacking

Hacking concerns delayed balloting for new UK Prime Minister
The UK's Conservative Party delayed selection for the next prime minister over concerns that hackers may alter online ballots after Britain's National Cyber Security Center (NCSC) warned that the system was vnerable to abuse. In response to the concerns, the Conservative Party overhauled online voting, which may result in delays as voters will not receive ballots until August 11.
Political party
Montenegro state institutions and critical infrastructure attacked
Government officials in Montenegro declared on August 29 that there were several attacks on the country's critical infrastructure. The attacks were coordinated and manage to cause disruption to services to citizens.
Critical infrastructure,
Government

Data exposure and leaks

Exposed server at cards operator leaks data
According to a report on Twitter, on August 8, an EU-based virtual cards operator had an exposed server, which resulted in the leak of more than 67 million records from countries that included France, Germany, Italy, and Spain, in the period 2014-2022.
Exposure,
Data leak,
Financial services
Autodoc suffered data leak
A German auto parts store, Autodoc, located in Finland, suffered a data breach, according to a statement sent to its customers. Attackers managed to break into the company's internal communication tool and used it to steal customers' personal data. The attack was quickly stopped, but the company says that data was still stolen. Customers' names, home addresses, phone numbers and email addresses were affected.
Data leak
UK government lawyers leak officials’ data
In a data leak incident, revealed on August 24, UK government lawyers, handling reimbursement claims, published the names of several civil servants. The UK government's legal department has launched an investigation.
Data leak,
Government

World

Cyber policy and law enforcement

US indicts Russian for spreading disinformation
A federal grand jury in the US has indicted Russian national Aleksandr Viktorovich Ionov. The individual was charged with spreading disinformation designed to further Russia's political ambitions and to disrupt US elections.
Indictment
US introduces law on federal data centre cybersecurity
The US Senate has introduced the Federal Data Center Enhancement Act. The law tasks the Office of Management and Budget with establishing baseline security and resiliency standards for federal data centres.
Legislation
US offers 10 million US dollars for information on Conti associates
US authorities announced that they are willing to pay 10 million US dollars for information on five members of the Conti ransomware operation. News reports clarify that such monetary rewards are offered for information related to threat actors affecting the national security of the United States.
Bounty

Cyberespionage

Woody RAT used against Russian entities
A newly discovered remote access trojan (RAT) dubbed Woody has been used to target Russian entities by using Office documents leveraging the Follina vulnerability. The threat actor targeted a Russian aerospace and defence entity.
Aerospace,
Defence
APT27 targets entities in Taiwan and the Philippines
Security researchers report that APT27, a Chinese threat actor, compromised the servers of Mimi, a messaging application, in a supply-chain attack, to spread malware. The campaign targeted entities in Taiwan and the Philippines.
Supply-chain attack,
Chinese threat actor
APT31 targeting Russian companies
Security researchers report that APT31, a Chinese threat actor, compromised Russian companies by using phishing via legitimate cloud storage platforms. The group used the Yandex.Disk service and Dropbox.
Supply chain attack,
Chinese threat actor
Android malware used by APT groups
Meta reports that two APT groups have adopted a new Android malware. The two threat actors convince their targets to install the malware following lengthy interactions on social media.
Social media,
Android
Meta removes two Asian cyberespionage groups from their social media platforms
Meta also reports that it has taken action against two cyberespionage groups, active in Asia. The first, Bitter APT, based in south Asia, targets countries in the South Asia region as well as the UK. The second, APT36, based in Pakistan, targets India, the Middle East and Afghanistan. Both groups were showing low sophistication activity using social engineering, Android malware and a rudimentary iOS app.
Social media
RedAlpha APT active in cyberespionage globally
Security researchers report that RedAlpha APT group, a Chinese threat actor, has engaged in espionage activities since at least 2015. The group targeted humanitarian aid organisations, think tanks, and government organisations globally.
Human rights organisations,
Chinese threat actor
Kimsuky campaign in the Korean peninsula
Security researchers report that Kimsuky, a North Korean threat actor, deployed a new cyberespionage campaign, dubbed GoldDragon, against various targets in the Korean peninsula. Among the targets were South Korean government officials, university professors and think tank researchers.
North Korean threat actor
Iran-based Mercury threat actor targets Israeli organisations
Microsoft reported detecting a threat actor dubbed Mercury leveraging two Log4j vulnerabilities in SysAid applications against organisations in Israel. Microsoft assesses with high confidence that Mercury is affiliated with Iran’s Ministry of Intelligence and Security.
Log4j,
Iranian threat actor
TA423 targeting Australia and South China Sea
Proofpoint reports uncovering a cyberespionage campaign which used the ScanBox malware to target entities involved in Australian governmental affairs as well as offshore energy production (wind turbine fleets) in the South China Sea. Proofpoint attributes the campaign to TA423, an espionage-motivated threat actor.
Energy,
Chinese threat actor

Cybercrime

Ransomware

Fin7 group switching to its own ransomware operation
The cybercrime group Fin7 reportedly intends to launch its own ransomware operation. The group previously initiated attacks to facilitate the distribution of malware by other ransomware-as-a-service (RaaS) operations.
Ransomware
Cisco suffers unauthorised access to data
Cisco confirmed that the Yanluowang ransomware group had breached its corporate network in late May. The confirmation came after threat actors published data supposedly originating from Cisco and claiming to have exfiltrated 2,8GB of data in total.
Ransomware,
IT
Quantum ransomware disrupts a government agency in Dominican Republic
The Dominican Republic's Instituto Agrario Dominicano suffered a Quantum ransomware attack which encrypted multiple services and workstations throughout the government agency.
Ransomware,
Government
Lockbit attacked security vendor Entrust
The operators of the Lockbit RaaS claimed responsibility for the breach of security company Entrust. Later, Lockbit's data leak website suffered a DDoS attack, which Lockbit claims came from Entrust. Lockbit later leaked data supposedly belonging to Entrust on BreachForum, a LockBit 3.0 data leak website.
Ransomware,
IT Security company

Other cybercrime

Blockchain platform heist
Solana, a US blockchain platform, suffered a cyber attack which reportedly resulted in the draining at least 7700 wallets of cryptocurrency, including Slope, Phantom, Solflare, and Trust Wallet. The value of the stolen crypto assets (including SOL, NFTs, and Solana-based tokens) is valued at 5,2 million US dollars. The platform has not yet determined how the threat actor gained initial access to its system. On Twitter, Solana’s cofounder suggested the hack seemed like a supply-chain attack targeting both iOS and Android applications.
Blockchain,
Supply-chain attack
Crypto tokens being stolen worth 190 million US dollars
A token bridge allowing the transfer of digital tokens between Ethereal, Evmos, Moonbeam, Avalanche, and Milkomeda C1 was exploited by threat actors who stole more than 190 million US dollars in crypto tokens.
Cryptocurrency
Fake wallet website pushing malware
A security researcher identified a fake website impersonating the official portal of Atomic wallet, a cryptocurrency exchange portal, which distributed copies of the Mars Stealer information-stealing malware.
Cryptocurrency
Lazarus Group targets cryptocurrency employees with social engineering
Lazarus Group, a North Korean threat actor, reportedly lured employees of cryptocurrency companies with fake Coinbase job offers in order to compromise them.
Social engineering,
Cryptocurrency,
North Korean threat actor
Lazarus Group attempted stealing crypto assets
Lazarus Group attempted to breach the cryptocurrency asset exchange protocol deBridge Finance, aiming to steal funds, through a malicious email campaign.
Phishing,
Cryptocurrency,
North Korean threat actor
CISA released a list of the most detected malware strains of 2021
According to the list, the most prolific malware users of the top malware strains are cyber criminals, who use malware to deliver ransomware or facilitate theft of personal and financial information. The top malware strains observed in 2021 include Agent Tesla, AZORult, Formbook, Ursnif, LokiBot, MOUSEISLAND, NanoCore, Qakbot, Remcos, TrickBot and GootLoader.
Malware
US law enforcement warns of residential proxies used in credentials stuffing attacks
US law enforcement warned that cybercrime groups use residential proxies to conduct large-scale credential stuffing attacks without being tracked, flagged, or blocked.
Credential stuffing
Malicious PyPl package used to spread minerware
Security researchers report that Secretslib, a malicious PyPl package, infected Linux systems with minerware in what appears to be a supply-chain attack. The package downloads a Linux executable which it runs with elevated privileges, to install and execute a Monero miner.
Supply chain attack,
Cryptominer
LastPass password management firm breached
Threat actors reportedly accessed the password management firm LastPass' source code and proprietary technical information. LastPass acknowledged a breach and released a security advisory. A threat actor compromised a developer's account and used it to access the company's development environment.
Breach,
Password management
130 organisations impacted by the Okta phishing campaign
Security researchers reports that a cybercrime group targeted over 130 organisations using a phishing kit codenamed '0ktapus'. The campaign resulted in unauthorised access to 9.931 credentials. The threat actor used the stolen credentials to gain access to corporate networks and systems through VPNs and other remote access devices. The campaign, dubbed 0ktapus, has been underway since at least March 2022.
Phishing
Cloud messaging company breached
The cloud messaging company Twilio disclosed that it was breached by an unknown actor that targeted it employees with SMS phishing messages. The breach resulted in the unauthorised access of some customer data. Since Twilio provides SMS verification services for other parties, the online messaging platform Signal was also affected. Via Twilio, attackers may have accessed the phone numbers and SMS registration codes of about 1.900 Signal users. Food delivery firm DoorDash disclosed a data breach exposing customer and employee data that is reportedly linked to the Twilio incident.
Cloud messaging
Email marketing service breached
Email marketing service Klaviyo confirmed a data breach compromising the personal data of its subscribers. Threat actors obtained an employeeʼs login credentials through phishing and subsequently used the credentials to access the employeeʼs Klaviyo account and the firmʼs internal support tools, allowing the threat actor to steal the information of 38 subscribers, all of whom are involved in the cryptocurrency industry.
Email marketing service
Email services provider breached
A breach of the email services provider Mailchimp resulted in the exposure of personal data of the managed services provider DigitalOcean.
Managed Services Provider
Hiden malware in James Webb telescope images
Security researchers uncovered an email phishing campaign dubbed GO#WEBBFUSCATOR in which attackers use space images from the James Webb telescope to spread malware.
Phishing

Hacktivism

Taiwan’s Presidential Office website hit by DDoS attack
Taiwan’s Presidential Office confirmed that its website suffered a DDoS attack on August 2, causing the website to be down for 20 minutes. In addition to the attacks on the president's website, experts noted that the websites of the Ministry of National Defence, the Ministry of Foreign Affairs and the country's largest airport, Taiwan Taoyuan International, were also affected.
DDoS,
Taiwan,
Chinese threat actor
Defacements in Taiwan
On August 2, supermarkets in Taiwan began reporting that their televisions were hacked and began displaying messages telling US House Speaker Nancy Pelosi to leave Taiwan. Taiwanese media outlets also reported that TV screens at a Taiwan Railways Administration station seemed compromised and displayed a message in simplified Chinese referring to Pelosi in derogatory terms, the message was claimed by a pro-China purported hacktivist.
Defacement,
Taiwan,
Chinese threat actor
Pro-Russia purported hacktivist claims supposed attack on Lockheed Martin
Pro-Russia purported hacktivist Killmilk, called on other hacktivists to target Lockheed Martin as well as to disseminate personal data of employees of the company. The group leaked supposed credentials of employees which were collected during a previous incident.
Defence sector,
US,
Russian threat actor

Disruption and hijacking

Google reports observing the largest DDoS attack so far
Google reports having observed the largest DDoS attack in history against one of its customers. The attack took place on June 1 and targeted a Google Cloud Armor customer with 46 million requests per second via an HTTPS DDoS attacks. It is reportedly the most powerful Level 7 DDoS attack to date.
DDoS

Information operations

Meta removes disinformation network
Meta reported that it had removed an entity called Cuber Front Z from its social media platforms. The entity ran a low-sophistication inauthentic operation that spread content in favour of Russia in relation to Russia's war on Ukraine.
Disinformation,
Social media
Pro-Western influence campaign uncovered on social media
Graphika and the Stanford internet Observatory investigated an interconnected web of accounts on Twitter, Facebook, Instagram, and five other social media platforms which used deceptive tactics to promote pro-Western narratives in the Middle East and Central Asia.
Analyst note: This is the first observed large-scale takedown of a pro-Western influence operation by a social media platform.
Influence operation,
Social media

Data exposure and leaks

Twitter user data exposed
Twitter revealed that it suffered a data breach due to an unknown threat actor exploiting a zero-day vulnerability. The breach resulted in the scraping of data from 5,4 million user accounts.
Social network
Over 80.000 exploitable Hikvision cameras are exposed online
Security researchers report having discovered over 80.000 Hikvision cameras vulnerable to command injection vulnerability CVE-2021-36260. The vulnerability was addressed by Hikvision via a firmware update in September 2021.
Email service provider
Plex media streaming service acknowledged unauthorised access to data
The Plex media streaming service informed its users that they should change their passwords following a detection of unauthorised access to a database containing usernames, email addresses and hashed passwords of users.
Media streaming
Russian media streaming platform breached
A data breach has affected the Russian media streaming platform Start, impacting a reported 7,5 million users. Threat actors managed to steal a 2021 database of which they distributed samples online. The stolen database contains email addresses, phone numbers and usernames.
Media streaming
Massive leak of Chinese citizen information
According to news reports a massive Chinese database storing faces and vehicle license plates, containing at least 800 million records, had been left exposed on the internet for months, until discovered and removed in August. The data was handled by a tech company managing systems for physical access control and personnel management, which was gathering face recognition and licence plate information.
Physical access control

Significant vulnerabilities

Critical vulnerabilities in Samba.
The Samba Team has released security updates to address several vulnerabilities in their product. Exploitation of these vulnerabilities may allow an attacker to cause a DoS condition, data leakage, or even to take control of the whole domain. See CERT-EU SA 2022-056.
Samba
Critical vulnerability in VMware products
Multiple critical vulnerabilities were reported by VMware. Exploitation of these vulnerabilities may lead to remote code execution without authentication, on the affected servers. See CERT-EU SA 2022-057.
VMware
Critical shell command injection vulnerability in Apache Spark
On July 18, Apache Spark released a security bulletin regarding a newly found critical vulnerability within Apache Spark's ACL implementation, tracked as CVE-2022-33891 and with a CVSS score of 8.8 out of 10. The flaw was discovered by a security researcher, with the proof of concept (PoC) exploit already available on GitHub and exploitation attempts in the wild being detected since, at least, July 26. Apache Spark is an open-source, unified engine for large-scale data analytics, which executes data engineering, data science, and machine learning tasks. Additionally, it provides high-level APIs in multiple programming languages. See CERT-EU SA 2022-058.
Apache Spark
Critical vulnerabilities in Cisco VPN Routers
On August 3, Cisco released a security advisory and patches regarding several critical vulnerabilities affecting Cisco VPN routers. It is highly recommended to upgrade affected appliances as soon as possible. See CERT-EU SA 2022-059.
Cisco VPN Routers
Windows vulnerabilities reported in Microsoft advisory
On August 9, Microsoft released its August 2022 Patch Tuesday advisory including fixes for 2 zero-day vulnerabilities identified as CVE-2022-34713 and CVE-2022-30134, which affect respectively Microsoft Windows Support Diagnostic Tool (MSDT) and Microsoft Exchange Server. The patch also contained fixes for 17 additional critical vulnerabilities affecting Active Directory Domain Services, Azure Batch Node Agent, Microsoft Exchange Server, as well as other services. See CERT-EU SA 2022-060.
Microsoft
Reflected amplification DoS vulnerability in PAN-OS
On August 10, 2022, PaloAlto released a security advisory regarding a Denial-of-Service (DoS) vulnerability affecting PAN-OS. Exploiting this vulnerability, a network-based attacker would be able to obfuscate its identity and implicate the vulnerable firewall as the source of an attack. While some software updates are not yet available, some mitigation and workarounds are available and should be applied as soon as possible. See CERT-EU SA 2022-061.
Palo Alto Firewalls
Remote Command Execution Vulnerability in Gitlab
On August 22, GitLab released a security advisory regarding a Remote Command Execution affecting its products. This vulnerability exists in the "import via Github" functionality. Exploiting this vulnerability, allows an authenticated user to achieve remote code execution on the affected server. See CERT-EU SA 2022-062.
Gitlab
Path Traversal Vulnerability in Unrar affects Zimbra software
In May 2022, security research team from SonarSource discovered a 0-day vulnerability in the "unrar" utility for Linux and Unix systems. This utility is a third party tool used in Zimbra. The exploitation of this vulnerability allows a remote attacker to execute arbitrary code on a vulnerable Zimbra instance without requiring any prior authentication or knowledge about it. Proof of Concepts (POC) are now publicly available as well as a metasploit module.
Zimbra
Remote command execution vulnerability in Gitlab
On the August 22, 2022, GitLab released a security advisory regarding a remote command execution affecting its products. This vulnerability exists in the "import via Github" functionality. Exploiting this vulnerability, allows an authenticated user to achieve remote code execution on the affected server. See CERT-EU SA 2022-063.
Gitlab

  1. Conclusions or attributions made in this document merely reflect what publicly available sources report. They do not necessarily reflect our stance. 

We got cookies

We only use cookies that are necessary for the technical functioning of our website. Find out more on here.