Descriptive Alt Text

This Week in Cybersecurity: Looking Back at Week 45

November 8, 2024 Reading Time: 6 minutes

This week in the news:

Cyberattack Disrupts SETU Waterford Campus, Forcing Class Cancellations

South East Technological University’s Waterford (SETU) campus has been hit by a significant cyberattack, leading to the cancellation of classes and severe disruption of IT services. The incident, which targeted the university’s IT systems, has left the campus without internet access, internal email capabilities, and other online facilities.

SETU officials have stated that the attack was identified early and that their IT team acted swiftly to safeguard systems.

While there is currently no evidence of data compromise, the full extent of the damage remains unknown.

The attack has only affected the Waterford campus, with other SETU locations continuing normal operations.

Staff have been advised to prepare for teaching without internet connectivity, and the Teachers Union of Ireland has recommended using home computers for class preparation.

View Source

Ireland’s NCSC Reports Successful Cybersecurity Efforts in 2023 Annual Update

The National Cyber Security Centre (NCSC) of Ireland has released its Annual Update for 2023, revealing significant progress in the country’s cybersecurity efforts.

Out of 5,276 reports received, 721 were confirmed as cybersecurity incidents, leading to 309 investigations.

Notably, the majority of these incidents were classified at the lower end of the severity scale, with no incidents reaching the top two severity categories. This outcome is attributed to the NCSC’s effective preventative measures in safeguarding state infrastructure.

View Source

Pro-Russian Hackers Target UK Local Authorities in Cyber Attack Wave

Portsmouth City Council has become the latest victim in a series of cyber attacks targeting UK local authorities.

The council reported being affected by a distributed denial-of-service (DDoS) attack orchestrated by a group calling itself NoName057(16), which has been linked to pro-Russian hackers. This attack is part of a broader campaign that has also impacted other councils, including Salford and Middlesbrough.

Despite the disruption to their website, Portsmouth City Council assured residents that no council services were affected and that personal data remained secure.

The council is actively working to resolve the issue and has maintained alternative channels for residents to access services and make payments.

The National Cyber Security Centre (NCSC) has acknowledged the attacks and is providing guidance to affected councils, noting that while DDoS attacks are relatively unsophisticated, they can cause significant disruption to online services.

View Source

UK Businesses Face Mounting Supply Chain Cybersecurity Challenges

A recent study revealed that an overwhelming 95% of UK organisations experienced supply chain cybersecurity incidents in the past year, with 59% reporting between 2 to 5 incidents.

Although 92% of respondents reported an increase in budget for managing risk, the priority given to third-party cybersecurity risk management has slightly decreased.

The study also highlighted a decline in supply chain monitoring and visibility, with only 34% of businesses monitoring third-party supplier risk monthly or more frequently, down from 46% in 2023. This lack of regular monitoring has left 34% of firms unable to detect when a cyber incident occurs.

The primary reasons for this visibility gap include a lack of expertise, technology, and resources, with 57% of firms admitting they don’t assess all vendors.

View Source

New FakeCall Malware: A Sophisticated Threat to Android Users’ Financial Security

Cybersecurity researchers have uncovered a new variant of the FakeCall Android malware, which employs advanced voice phishing techniques to compromise users’ personal and financial information. This sophisticated malware takes extensive control of infected devices, intercepting calls and mimicking legitimate user experiences.

FakeCall can capture a wide range of sensitive data, including SMS messages, contact lists, and location information, while also capable of taking pictures, recording audio, and even live-streaming device activities. What makes this variant particularly dangerous is its ability to set itself as the default dialer app, allowing it to monitor and manipulate all incoming and outgoing calls. The malware can redirect calls intended for banks to fraudulent numbers controlled by attackers, displaying a convincing fake UI that mimics the genuine Android call interface.

View Source

Interpol’s Operation Synergia II Deals Major Blow to Global Cybercrime

Interpol’s recent Operation Synergia II has delivered a significant strike against international cybercrime, resulting in the takedown of over 22,000 servers and IP addresses linked to various cyber threats.

The operation, which ran from April to August 2024, involved law enforcement agencies from 95 countries and led to the arrest of 41 individuals, with 65 others under investigation.

Targeting phishing, ransomware, and information stealers, the operation seized 59 servers and 43 electronic devices.

Interpol reported a 40% increase in infostealer data sales and a 70% rise in global ransomware attacks last year, highlighting the growing sophistication of cybercriminals, particularly in using AI for creating more convincing phishing emails.

View Source

Windows Server 2025 Faces Critical Install and Blue Screen Issues

Microsoft has confirmed multiple issues impacting Windows Server 2025, including Blue Screen of Death (BSOD) errors and prolonged install times on systems with more than 256 logical processors.

Affected users may experience long restarts, failed installations, and app crashes. Microsoft advises admins to limit logical processors to 256 until a fix is released in an upcoming monthly update.

View Source

Critical Zero-Click Vulnerability in Synology NAS Devices

Synology has issued an urgent patch for a critical zero-click vulnerability (CVE-2024-10443) affecting its DiskStation and BeeStation NAS devices.

Known as RISK, this flaw could allow attackers to remotely execute code and gain root access without user interaction.

Users are strongly advised to install the latest updates to protect their data, as this vulnerability impacts millions of devices worldwide.

View Source

Emulated Linux Environment Used to Conceal Malicious Cyber Activity

Cybersecurity researchers have identified a sophisticated cyberattack dubbed CRON#TRAP, where attackers use an emulated Linux environment within QEMU to hide their activities on compromised systems.

Through a phishing campaign, attackers deploy this virtualised setup to avoid detection, allowing them to execute commands and exfiltrate data stealthily. Notable for targeting North America, this method demonstrates a new level of persistence, leveraging tools like SSH keys for ongoing access.

View Source

Critical Security Alert for Nvidia GeForce Users

Nvidia has identified eight high-severity vulnerabilities in its GeForce GPU display drivers, affecting GeForce, RTX, Quadro, NVS, and Tesla models on both Windows and Linux.

These flaws could allow hackers to access entire systems, execute malicious code, and steal data.

To protect your system, Nvidia urges users to update to the latest driver versions, including 566.03 for Windows and multiple versions for Linux. Visit Nvidia’s site or use the GeForce Experience app to download the latest security patches.

View Source

If you would like to discover how Secora Consulting can assist you in keeping your business secure, please get in touch by filling out the form below 👇.

Let's Talk About Your Project

Leave us your details and one of our team will reach out to explore how we can assist with your cybersecurity requirements.

Postal address

The BASE Enterprise Centre

Railway Road

Stranorlar

Co. Donegal

Ireland

F93 VAK6

Phone number
IE: +353 74 970 7876 | UK: +44 20 4538 2818

To learn more about your data and privacy rights, visit our Privacy Statement.