Plus, new bug found in GPS trackers
Part of Network | |
Presented by |
Building industry behemoth The Knauf Group has been hit with a cyberattack by hackers. The threat actor responsible for the cyberattack is Black Basta. More: - The breach caused the company to shut down all of its IT systems in order to prevent further damage from being caused.
- Knauf stated that the cyberattack happened on June 29, but the effects of the breach are still being mitigated. The company is especially worried about customer data.
- The Knauf Group, located in Germany, is the world's largest drywall producer, having an 81% global market share. Knauf is also active in the U.S.
- Researchers believe that Knauf was breached through a ransomware attack, as Black Basta has taken responsibility for this breach.
- The hacker group claims that they have stolen authentic data such as emails, customer ID numbers, employee information, production information, etc.
- The group has published a part of these documents on its website, stating that there are more stolen documents that it is not revealing yet.
Zoom Out: - Black Basta ransomware group has been of the most active hacker gangs recently. The threat actor became active soon after the Conti ransomware group was shut down, managing to breach 12 companies within one month.
| |
A new report shows that Russian hackers falsely made Ukrainians believe they were hacking Russian websites and infected them with malware. The attack is credited to Turla, a threat actor with governmental ties. More: - Russian hackers managed to infect Android users by creating an app that claimed it would launch a DDoS attack every time users tapped a button.
- Google is the company that noticed the breach, claiming that Turla used third-party messaging apps to spread the malware. This could have been done due to the fact that the victims were more likely to believe a message that came in their personal number than those on social media.
- The threat actor created a fake website, pretending to be the Azov regiment. This app was not downloaded many times, but it is a sign of consistent efforts made by Russia and Russian-backed actors to breach Ukraine's government websites as well as its citizens.
Zoom Out: - Russia has launched numerous cyber attacks against Ukraine since the war started. Russia attacked 70 government websites in Ukraine on the night the invasion began.
- Russian threat actors have recently used phishing as a threat vector to breach their victims, utilizing Google Drive and Dropbox to hack Western diplomats.
- Threat actors from Russia have also previously targeted DTEK Group, one of the largest energy companies in Ukraine.
| |
A message from SECURITY COMPASS Current approaches to Threat Modeling simply don’t work. - They are manual and inconsistent
- They take too long
- They don’t scale
- They don’t give developers what they need
Here you can find a series of posts breaking down how you can anticipate threats earlier in the software development life cycle to create more secure software. Learn more about current threat modeling challenges. See how a new, developer-centric approach to threat modeling can help your organization deliver secure software faster. Read Series on Threat Modeling And, yes, we understand that threat modeling is a time-consuming process that requires the expertise of security professionals and figuring out the best approach to mature application security programs can be difficult, especially with increasing internal demands for a faster time to market. According to this Total Economic Impact™study, SD Elements enabled its users to decrease the time needed to develop security requirements for products by 90%. See how | |
A GPS tracker bug could enable hackers to breach vehicles. The bug is found in trackers used in 1.5 million vehicles around the world. More: - CISA has warned that a bug in the Micodus GPS trackers can potentially leave drivers susceptible to remote access control hacks.
- Threat actors could use the flaws to not only gain control over the vehicle but also use surveillance on its location or stop it from being filled with fuel.
- The GPS tracker is used in 169 countries, while the list of bugs being tracked includes CVE-2022-2107, CVE-2022-2141, CVE-2022-2199, CVE-2022-34150, CVE-2022-33944, etc.
- Micodus GPS trackers are made in China and are sold for $20.
| |
A hacker group known as 8220 has infected over 30,000 victims with its botnet. The botnet attacks Linux vulnerabilities. More: - The group has been active since 2017 and uses methods such as brute force attacks.
- The 8220 hacker gang recently hacked Atlassian servers in an attempt to gain remote access control and mine cryptocurrency through user devices.
- The threat actors use the PwnRig miner, utilizing a fake FBI subdomain with an IP address connected with another false Brasilian government address. The address then leads to a request that transfers the money to a specific wallet belonging to the threat actor.
| |
A message from LAIKA If you’re trying to close deals, SOC 2 is probably a thorn in your side. What is it, and who cares? Your business needs SOC 2. But building compliance from scratch is complicated, time-consuming, and the cost can be crippling. Laika has you covered. Uncomplicate SOC 2 with our guide for growth-minded founders. In the guide by Laika you’ll learn: - What is SOC 2 compliance and why it matters for your startup
- How to close more deals faster by becoming SOC 2 compliant
- How to prepare for SOC 2 compliance
- What to expect in terms of time and cost
- What to do after the report is in
What makes Laika the authority on SOC 2? They’re the only compliance automation solution that was built by compliance experts. Learn how to turn compliance from a pain point into a secret edge over your competitors. Download Now | |
The Albanian government has been hit with a cyberattack again. The threat actor is not known at this point, but the country is cooperating with fellow NATO members to track the responsible actor. More: - The government has shut down the National Agency of Information Society, including all online administrative procedures such as extracting personal documents, paying taxes, etc.
- Government representatives stated that the threat actor responsible for the breach might be the same one that has been active on the international scene during the last few years.
- Albania reportedly cooperated with its fellow NATO states as well as companies such as Microsoft to mitigate the risk, and it claims that citizen data is safe.
- Some researchers believe that Russia may have had a reason to launch a cyberattack after Albania and North Macedonia officially started their journey toward joining the EU, receiving a green light after years of waiting for the decision.
- Albania was hit by a cyberattack a few months ago when the salaries of the entire labor force in the entire country were leaked. The hackers are still not known.
| |
Quick Hits: - Ransomware attacks grew by 485% in 2020. This multi-pronged approach can help organizations respond to and recover from ransomware attacks.*
- Several legal experts in the U.K. have stated that recent cybersecurity and privacy legislation changes proposed by government officials could be counterproductive for its citizens, mainly because it has vast differences from the current EU GDPR.
- A Romanian hacker that sent a virus tracked as Gozi to 1 million computers has been extradited to the U.S. He will face multiple charges of cybercrime, malware distribution, computer fraud, etc.
- The DOJ has stated that it has managed to retrieve over $500,000 of stolen corporate money from North Korean hackers and has redistributed it to the victims.
- How’s your current digital marketing strategy? Make it even stronger with our new interactive worksheet.*
*This is a sponsored post. | |
Upcoming events at Inside: | |
| | Arbër is an Inside writer who also has experience in entrepreneurship. He has experience covering Consumer Tech, Venture Capital, NFTs, Crypto, etc. Arbër holds a Bachelor's degree in Business from XAMK University in Finland. When he is not reading(and writing) business news, he chooses to watch sports or anime...and then read news about sports or anime. | | Editor | Aaron Crutchfield is based in the high desert of California. Over the last two decades, he has spent time writing and editing at various local newspapers and defense contractors in California. When he's not working, he can often be found looking at the latest memes with his kids or working on his 1962 Ford. | |
Security Compass is on a mission to accelerate software time-to-market while managing risk. | |
Laika is a unified compliance platform that automates workflows for audits, infosec monitoring, and vendor due diligence in a single, collaborative space. | |
767 Bryant St. #203, San Francisco, CA 94107 Copyright © 2022 Inside.com | |
|