Cybersecurity News – March 21, 2022

CISA, FBI tell satellite communications network owners to watch out for hacks after Ukraine attack

The alert is part of CISA’s “Shields Up” initiative to respond to potential Russian cyberattacks spilling over from the Ukraine conflict. It requests that all organizations significantly lower their threshold for reporting and sharing indications of malicious cyber activity. The digital sabotage of Viasat’s KA-SAT satellite hours before the Russian invasion led to “huge loss in communications in the very beginning of the war.” As a consequence, lawmakers in the US are pressing the DHS to name space as another critical infrastructure sector like health care or energy.

(Cyberscoop)

Hackers claim to breach TransUnion South Africa with ‘Password’ password

TransUnion South Africa has disclosed that hackers breached one of their servers demanded a ransom payment not to release stolen data. A Brazilian hacking group known as “N4ughtysecTU” has claimed responsibility for the attack and told BleepingComputer that they downloaded 4TB of data during the cyberattack. The “N4ughtysecTu” threat actor also told Bleeping Computer they didn’t steal any user credentials but performed a brute force attack on the SFTP server. The account they ultimately breached was allegedly using the password “Password”, so it was quick and straightforward to brute-force. TransUnion has noted it will not pay the ransom.

(Bleeping Computer)

Developer sabotages own npm module prompting open-source supply chain security questions

The developer of a popular JavaScript component hosted on the npm repository decided to protest Russia’s invasion of Ukraine by adding code to their own component that would add or delete files on people’s computers in a way they didn’t expect. The component, called node-ipc, is a dependency for a variety of other projects. Some people have started referring to such acts of self-sabotage by developers as protestware. Experts believe that while developers certainly have the right to modify their own software, such acts risk damaging trust in the open-source ecosystem, which has faced increased supply-chain security challenges in recent years.

(CSOOnline)

Cloud-based email threats surge 50% in 2021

This corresponds with a drop in ransomware and business email compromise (BEC) detections as attacks become more targeted, according to Trend Micro in a recent report. The number of phishing attempts almost doubled during the period, as threat actors continued to target home workers. Of these, 38% were focused on stealing credentials, the report claimed. The report also mentions that misconfigured cloud systems were also a critical risk factor in 2021, with AWS Key Management Service (AWS KMS) and Amazon Elastic Container Service (Amazon ECS) having some of the highest misconfiguration rates

(InfoSecurity Magazine)

Thanks to our episode sponsor, Varonis

On average, an employee can access 17 million files on day one. Varonis will show you where critical data is vulnerable, detect anomalies, and automatically right-size privileges to get you to “Zero Trust.” Their data security platform can test your ransomware readiness and show you where you stack up. Learn more at www.varonis.com/cisoseries.

Avoslocker ransomware gang targets US critical infrastructure

The FBI has published a joint cybersecurity advisory in conjunction with the US Treasury Department and the Financial Crimes Enforcement Network, warning of AvosLocker ransomware attacks targeting multiple US critical infrastructure. The AvosLocker ransomware-as-a-service emerged in the threat landscape in September 2021, and since January has expanded its targets by implementing the support for encrypting Linux systems, specifically VMware ESXi servers. AvosLocker claims to directly handle ransom negotiations, as well as the publishing and hosting of exfiltrated victim data after their affiliates infect targets.

(Security Affairs)

New Phishing toolkit lets anyone create fake Chrome browser login windows

A phishing kit has been released that allows red teamers and wannabe cybercriminals to create effective single sign-on phishing login forms using fake Chrome browser windows, known as a “Browser in the Browser (BitB) Attack.” Security researcher mr.d0x told BleepingComputer that these templates are easy to use in creating convincing Chrome windows to display single sign-on login forms for any online platform. Mr.d0x, who released the templates Google Chrome for Windows and Mac on GitHub, said that redteamers could simply download the templates, edit them to contain the desired URL and Window title, and then use an iframe to display the login form. Kuba Gretzky, creator of the Evilginx phishing toolkit, tested the new method and showed how it worked perfectly with the Evilginx platform, meaning it could be adapted to steal 2FA keys during phishing attacks.

(Bleeping Computer)

DarkHotel APT targets Wynn, Macao Hotels to steal guest data

The group has been targeting luxury hotels in Macao with a spear-phishing campaign aimed at breaching their networks and stealing the sensitive data of high-profile guests staying at resorts. A threat research report from Trellix “cautiously” identified the South Korean DarkHotel APT group as the culprit behind the attacks. The researchers said the spear-phishing campaign began at the tail end of November, with emails loaded with malicious Excel macros being sent to ranking hotel management with access to hotel networks, including human resources and office managers.

(ThreatPost)

Anonymous leaks data stolen from Russian pipeline company Transneft

The Anonymous collective claims it has hacked Omega Company, which is the in-house R&D unit of Transneft, the Russia-based state-controlled oil pipeline company. Transneft is the largest oil pipeline company in the world, and the hacktivists claim to have stolen 79GB of emails and published them on the leak site of the non-profit whistleblower organization Distributed Denial of Secrets. The stolen data includes invoices, equipment technical configurations, and product shipment information. The Omega Company produces high-tech acoustic and temperature monitoring systems for oil pipelines.

(Security Affairs)


Steve Prentice
Author, speaker, expert in the area where people and technology crash into each other, viewed from the organizational psychology perspective. Host of many podcasts, voice actor and narrator for corporate media and audiobooks. Ghost-writer for busy executives.