Descriptive Alt Text

This Week in Cybersecurity: Looking Back at Week 51

December 20, 2024 Reading Time: 5 minutes

Headlines

Here are the article headings formatted as requested:


Russian-Israeli Suspected LockBit Ransomware Coder Charged by US

US authorities have filed charges against a Russian-Israeli national believed to be a developer behind the notorious LockBit ransomware, a strain responsible for numerous high-profile cyberattacks. The suspect allegedly contributed to the malware’s code, which significantly evolved and advanced the ransomware-as-a-service model. Such prosecution underscores the intensifying global effort to hold cybercriminals accountable, even if they operate across borders. Experts say this may slightly deter future illicit activities by making developers of cybercriminal tools more cautious.

View Source

Ascension Health Data Breach Impacts 56 Million Individuals

A massive ransomware attack on Ascension Health led to the theft of personal and health-related data affecting approximately 56 million patients. This is one of the largest healthcare data breaches to date, exposing both patient and operational information. Security experts warn that the stolen data could be exploited for identity theft, insurance fraud, and further targeted scams. In response, Ascension is strengthening its cybersecurity measures and offering resources to those affected.

View Source

Lazarus Group Targets Nuclear Research Organizations

North Korea-linked Lazarus Group has been spotted launching targeted cyberattacks against organizations involved in nuclear research. Leveraging sophisticated phishing campaigns and previously unknown vulnerabilities, they aim to access sensitive intellectual property and strategic research data. These operations indicate an escalation in state-sponsored cyber espionage, potentially undermining national security and global nuclear non-proliferation efforts. Security analysts advise heightened vigilance and stronger endpoint defenses in these critical sectors.

View Source

Critical Apache Struts Flaw Exploited in the Wild

A newly discovered critical Apache Struts vulnerability is reportedly being actively exploited by hackers to identify and compromise vulnerable servers. Successful exploitation can give attackers control over application servers, potentially exposing sensitive enterprise data or enabling larger supply-chain attacks. Organizations using Apache Struts are urged to apply the released security patch immediately and to enhance their overall patch management processes. Delays in remediation can open the door to wide-scale breaches and regulatory consequences.

View Source

Dutch DPA Fines Netflix $475 Million for Data Handling Violations

Netflix has been fined $475 million by the Dutch Data Protection Authority for violations related to user data handling and privacy non-compliance. The streaming giant allegedly failed to follow proper consent procedures and neglected transparent user data practices. Such hefty fines underscore the importance of stringent data governance and compliance with GDPR-like regulations. Privacy advocates hope this serves as a wake-up call for other global tech companies.

View Source

HubSpot Phishing Targets 20,000 Microsoft Azure Accounts

A large-scale phishing campaign is leveraging compromised HubSpot marketing tools to target at least 20,000 Microsoft Azure accounts. Attackers craft highly convincing emails that appear to come from trusted vendors, tricking recipients into clicking malicious links. Once compromised, attackers gain unauthorized access to cloud environments, leading to data breaches and service disruptions. Organizations are advised to educate their staff, tighten email security filters, and closely monitor suspicious login activity.

View Source

The US government is evaluating a potential ban on TP-Link routers due to escalating cybersecurity and espionage concerns. Officials fear that certain devices may include backdoors or vulnerabilities that could be exploited by foreign actors. If enacted, such a ban would represent a significant move to fortify national cyber defenses and control the hardware supply chain. Consumers are advised to follow government guidance and choose devices from vetted, reputable vendors.

View Source

Critical FortiWLM Bug Allows Hackers Admin Privileges

Fortinet warns of a critical vulnerability in its FortiWLM wireless LAN management product that enables attackers to gain administrative privileges. Exploiting this flaw could allow remote code execution and unfettered control over network configurations, data, and connected devices. Fortinet has released patches and strongly recommends immediate updates, emphasizing the urgency due to active exploit attempts. This event highlights the critical need for timely patching and proactive network monitoring.

View Source

RSPack NPM Packages Compromised with Malicious Code

Several RSPack-related NPM packages have been compromised, injecting malicious code into the software supply chain. Developers who inadvertently install these tainted packages could expose their systems and end-users to data theft or remote takeover. This incident underscores the growing threat of supply-chain attacks in open-source ecosystems. Experts urge developers to carefully review package trustworthiness, verify package integrity, and maintain vigilant security practices.

View Source

Over 25,000 SonicWall VPN Firewalls Exposed to Critical Flaws

More than 25,000 SonicWall VPN firewalls remain vulnerable to critical security flaws that could grant attackers unauthorized access to network resources. Despite vendor patches, many devices remain unpatched, leaving organizations exposed to data breaches and ransomware attacks. Security researchers warn that exploits targeting these flaws are being circulated in dark web forums. Businesses should prioritize updating their devices and implementing strict access controls to prevent compromise.

View Source

If you would like to discover how Secora Consulting can assist you in keeping your business secure, please get in touch by filling out the form below 👇

Let's Talk About Your Project

Leave us your details and one of our team will reach out to explore how we can assist with your cybersecurity requirements.

Postal address

The BASE Enterprise Centre

Railway Road

Stranorlar

Co. Donegal

Ireland

F93 VAK6

Phone number
IE: +353 74 970 7876 | UK: +44 20 4538 2818

To learn more about your data and privacy rights, visit our Privacy Statement.