<img src="https://secure.ruth8badb.com/159098.png" alt="" style="display:none;">

IT Security Newsletter - 12/12/2023

SHARE

Breaches

Toyota Germany Says Customer Data Stolen in Ransomware Attack

Toyota Germany is notifying customers that their personal information was compromised in a ransomware attack last month. Initially disclosed in mid-November, the incident impacted the systems of Toyota Financial Services Europe & Africa, a subsidiary of the Japanese carmaker. Toyota announced last month that the attackers had gained access to internal systems at various locations, and that it took those systems offline in response. READ MORE...


Northern Ireland cops count human cost of August data breach

An official review of the Police Service of Northern Ireland's (PSNI) August data breach has revealed the full extent of the impact on staff. The incident, which affected 9,483 officers, was branded "the most significant data breach that has ever occurred in the history of UK policing" by Commissioner Pete O'Doherty of the City of London Police, and the damage is said to be "unquantifiable." READ MORE...


Cold storage giant Americold discloses data breach after April malware attack

Cold storage and logistics giant Americold has confirmed that over 129,000 employees and their dependents had their personal information stolen in an April attack, later claimed by Cactus ransomware. Americold employs 17,000 people worldwide and operates more than 24 temperature-controlled warehouses across North America, Europe, Asia-Pacific, and South America. The April network breach led to an outage affecting the company's operations after Americold forced it to shut down its IT network to contain the breach. READ MORE...

Hacking

Over 1,450 pfSense servers exposed to RCE attacks via bug chain

Roughly 1,450 pfSense instances exposed online are vulnerable to command injection and cross-site scripting flaws that, if chained, could enable attackers to perform remote code execution on the appliance. pfSense is a popular open-source firewall and router software that allows extensive customization and deployment flexibility. It is a cost-effective solution that accommodates specific needs, offering a wide range of features typically found in expensive commercial products. READ MORE...


Microsoft: Mystery Group Targeting Telcos Linked to Chinese APTs

Common malware has led a group of researchers to link the once mysterious Sandman threat group, known for cyberattacks against telecom service providers across the world, to a growing web of Chinese government-backed advanced persistent threat (APT) groups. The threat intelligence assessment is the result of a collaboration between Microsoft, SentinelLabs, and PwC, and offers just a small glimpse into the general complexity and breadth of the Chinese APT threat landscape, according to the researchers. READ MORE...

Malware

Memory-safe languages so hot right now, agrees Lazarus Group as it slings DLang malware

Research into Lazarus Group's attacks using Log4Shell has revealed novel malware strains written in an atypical programming language. DLang is among the newer breed of memory-safe languages being endorsed by Western security agencies over the past few years, the same type of language that cyber criminals are switching to. At least three new DLang-based malware strains have been used in attacks on worldwide organizations. READ MORE...

Information Security

The sound of you typing on your keyboard could reveal your password

As if password authentication's coffin needed any more nails, researchers in the UK have discovered yet another way to hammer one in. The technique, developed at Durham University, the University of Surrey, and Royal Holloway University of London, builds on previous work to produce a more accurate way to guess your password by listening to the sound of you typing it on your keyboard. READ MORE...


The growing abuse of QR codes in malware and payment scams prompts FTC warning

The US Federal Trade Commission has become the latest organization to warn against the growing use of QR codes in scams that attempt to take control of smartphones, make fraudulent charges, or obtain personal information. Short for quick response codes, QR codes are two-dimensional bar codes that automatically open a Web browser or app when they're scanned using a phone camera. READ MORE...

Exploits/Vulnerabilities

'5Ghoul' Vulnerabilities Haunt Qualcomm, MediaTek 5G Modems

Academic researchers from the ASSET Research Group at the Singapore University of Technology and Design are raising an alarm for more than a dozen vulnerabilities plaguing hundreds of smartphone models that employ specific 5G modems. Collectively tagged as 5Ghoul, the 14 security defects can be exploited to drop and freeze 5G connections on smartphones and routers, and to conduct downgrading attacks, according to the research team. The majority of the flaws affect 5G modems from Qualcomm and MediaTek. READ MORE...


Flaws in Backup Migration and Elementor WordPress Plugins Allow Remote Code Execution

Critical remote code execution (RCE) vulnerabilities have been found in two popular WordPress plugins. The affected plugins, Backup Migration and Elementor, have a combined user base of more than five million. Elementor is the most popular of the two, with more than five million active installations. A website builder plugin, it helps administrators quickly create sites without writing a single line of code. READ MORE...

On This Date

  • ...in 1787, Pennsylvania becomes the second state to ratify the US Constitution, five days after Delaware.
  • ...in 1863, Expressionist painter Edvard Munch, best known for "The Scream" (1893), is born in Adalsbruk, Norway.
  • ...in 1927, physicist Robert Noyce, co-inventor of the integrated circuit and co-founder of Intel Corporation, is born in Burlington, IA.
  • ...in 1963, Kenya declares its independence from the United Kingdom.