The Target: Newman Regional Health, a U.S based Kansas hospital
The Take: Exposure of Personally Identifiable Information of 52,000 individuals including: names, medical record numbers, employee information, dates of birth, email addresses, phone numbers, and physical addresses.
The Vector: A threat actor gained access to compromised employee email accounts, and acting with all the same permissions as the breached credentials, exfiltrated the above data.
This breach is a stark reminder of the importance of not only robust employee credential authentication and password hygiene, but also regular internal system scanning. The threat actor had access to the compromised system for nearly a year. Performing regular monitoring on account behaviour is critical to ensure access is kept within the firm. Additionally, locking down appropriate permissions, admin access, and ensuring users only need the tools they need to do their jobs, and no more, will reduce the risk of these attacks.
The Guardian: When Downing Street was recently named as the suspected victim of a phone hack by the United Arab Emirates using the Israeli-made spyware, Pegasus, few were surprised at who was behind the discovery.
Help Net Security: Info-Tech Research Group has published its annual report on the priorities for security leaders. The report combines insights from the 2022 security priorities survey and other related industry reports that the firm releases throughout the year.
Financial Post: According to the Fortinet report released, the skills gap isn’t just a talent shortage challenge, but it’s also severely impacting business, making it a top concern for executive leaders worldwide.
Bleeping Computer: In partnership with the NSA and the FBI, cybersecurity authorities worldwide have released today a list of the top 15 vulnerabilities routinely exploited by threat actors during 2021.
Hedge Week: The outbreak of the Covid-19 pandemic has created a breeding ground for an increase in fraudulent activity, as the world shifted to working from home and reliance on digital technology was heightened in all aspects of daily life. This underscored the need for tighter procedures and processes around detection and protection within all sectors, but especially financial services.
BNN Bloomberg: J.P. Morgan Chase Bank N.A. was sued by a unit of the French maker of Ray-Ban glasses, which claims the bank ignored red flags as international cybercriminals drained $272 million from its New York bank account.
The Target: Army Futures Command, a division of the United States’ Depart of Defense.
The Take: Exposure of Personally Identifiable Information of an unknown amount.
The Vector: Settings controlling access to Shared files on Microsoft Teams were accidentally set to “public” instead of private, resulting in any shared files being exposed to all users across the firm. The default settings were set to public, and the company did not investigate these settings prior using the messaging platform.
This breach is a stark reminder of the importance of access control around shared files and the configuration of settings that control them. Sensitive information must be protected and trusting in default settings to be sufficient is not part of maintaining a robust cybersecurity posture. Investigating any avenue through which information is shared, even inside the firm, is critical to get a full and clear picture of how information is handled.
Evening Standard: Six of the top UK “challenger” banks have weak financial controls that leave them at risk of being victims of money laundering, terrorist financing, fraud and cyber-crime, the top City watchdog warned today.
Help Net Security: VMware released a report which takes the pulse of the financial industry’s top CISOs and security leaders on the changing behavior of cybercriminal cartels and the defensive shift of the financial sector.
Yahoo Finance: An Israeli private investigator pleaded guilty in a probe of a vast hacking-for-hire ring that allegedly targeted hedge funds, short sellers, journalists and advocacy groups fighting climate change.
Funds Tech: Europe’s financial institutions have been urged by regulators to makes themselves more resilient to a growing risk of cyber security that has been intensified by war and has stalled the economic recovery from Covid.
Cision: This new investment will support Fortress's mission of securing U.S. critical industries from cybersecurity and operational threats emanating from their supply chains.
The Target: Christie Business Holdings Company, a major medical firm based out of Illinois in the United States.
The Take: Personally Identifiable Data belonging to 500,000 individuals. The data accesses contained: names, addresses, medical and insurance information, and Social Security Numbers.
The Vector: The threat actors gained access through BEC attack (Business Email Compromise) on an employee’s email account, therefore able to act with all the permissions of said employee, and attempted to intercept business transactions as well as view the exposed personal data.
This breach is a stark reminder of the important not only robust employee credential authentication and password hygiene, but also the principle of least privilege. When a firm’s employee account is breached, it’s critical to note the attackers can access and perform all the same actions as the employee. Locking down appropriate permissions, admin access, and ensuring users only need the tools they need to do their jobs, and no more, will reduce the risk of these attacks.
ZDNet: Founded in 2003, Barracuda is the developer of cybersecurity solutions, including email protection, app and cloud defenses, data management, and network security. Products include Secure Access Service Edge (SASE) offerings, threat detection and response, and data inspection.
Tech Central: Since the beginning of the pandemic and the HSE ransomware attack, there has been a stark increase in phishing e-mails and ransomware attacks.
Tech Radar: Year after year, we see attackers, ranging from entry-level hackers to nation-state cyber armies, add new tactics, techniques and procedures (TTPs) to their cyberattack playbooks.
Beta News: The COVID-19 pandemic has led to a technology leapfrog beyond anything we’ve seen in decades. But now that we’ve made this leap is there any going back? And do we have the right technology for enterprises to keep up with new demands?
Cision: Critical Start (or "the Company"), a leading provider of Managed Detection and Response (MDR) cybersecurity solutions, announced an over $215 million strategic growth investment from Vista Equity Partners ("Vista"), a leading global investment firm focused exclusively on enterprise software, data and technology-enabled businesses.
Top Class Actions: Morgan Stanley agreed to a $60 million settlement to resolve a class action lawsuit regarding its 2016 and 2019 data breaches.
GDPR Buzz: The Danish Data Protection Agency (DPA) has proposed a fine of 10 million Danish Kroner – around $1.48 million – on the country’s largest lender, Danske Bank, for failing to implement GDPR-compliant procedures concerning the storage and deletion of the personal data of its customers. The DPA has also filed a criminal complaint against the bank and has reported it to the police over the failure to delete customers’ personal data from its systems.
The Target: Fox News, a U.S based news organization.
The Take: Exposure of Personally Identifiable Information including: internal employee emails, usernames, employee ID numbers, affiliate information, event logging, host names, IP address, and device data.
The Vector: A misconfiguration of a storage server left the data exposed online, meaning anyone with an internet connection could have accessed and downloaded the information.
This breach highlights the critical importance of employing robust practices of credential management, user authentication and validation. An unprotected point of entry on a key piece of equipment like a storage server can lead to a breach with a cascading effect on data security. The detailed personal information, along with the event logs and sensitive company information, can lead to highly effective phishing attacks.
ZDNet: Losses from Australians to investment scams increased by 90% to AU$103 million from the start of the year to March 20, with the Australian Competition and Consumer Commission saying payments made to scammers are most often made in cryptocurrency.
Crunchbase News: Funding to venture-backed cybersecurity startups continues at an impressive clip—although significantly off the record high set last quarter.
RTE: Bank of Ireland has been fined €463,000 by the Data Protection Commission for data breaches affecting more than 50,000 customers.
The Straits Times: Financial institutions today rely heavily on technology to deliver financial services, Monetary Authority of Singapore (MAS) board member Alvin Tan told Parliament on Monday (April 4) during the second reading of the Financial Services and Markets Bill.
Bleeping Computer: Email marketing firm MailChimp disclosed that they had been hit by hackers who gained access to internal customer support and account management tools to steal audience data and conduct phishing attacks.
The Target: Palo Alto Networks, a U.S based cybersecurity company.
The Take: Exposure of Personally Identifiable Information including: names, business contact information, conversation records, conversation records, email addresses, and support tickets with attachments such as firewall logs, configurations, and other debugging assets.
The Vector: A misconfiguration of Palo Alto’s support ticketing system allowed anyone with an internet connection to login and view support tickets, gaining access to personal and client company information.
The breach is critical reminder of the importance of credential management and authentication around points of access which expose customer data. The information gathered in support scenarios is especially sensitive as the exposed details can greatly aid malicious actors in crafting highly targeted and effective spear-phishing campaigns. All points of access should be appropriately locked down and employing another layer of security like Two-Facto Authentication is highly recommended.
ZDNet: A new report examines how an organization's approach to cyberattack incident and response strategies can have implications for investment in the broader cybersecurity market.
Hedge Week: The IT and cyber security infrastructure of a start-up fund is instrumental to its fate and can be key to determining whether it fails or succeeds. Therefore, a consultative approach in this regard can ensure their framework is fit for purpose and can effectively support the fund’s growth objectives.
BNN Bloomberg: President Joe Biden has urged U.S. companies to “harden your cyber defenses immediately” amid a growing risk of Russian cyberattacks. For many, that won’t be easy.
ABA Banking Journal: With a joint agency final rule requiring banks to notify their primary regulatory within 36 hours of becoming aware of computer security incidents that are considered “notification incidents” taking effect on May 1, the OCC issued a bulletin reminding banks of their notification responsibilities and specifying points of contact.
CNN: The latest crypto hack has targeted a gaming-focused blockchain network that supports the popular video game Axie Infinity. Hackers made off with about $625 million worth of Ethereum and USDC, two cryptocurrencies, in one of the largest crypto hacks of all time.