Date Reported: 2024-02-17 Country: USA Victim: Otolaryngology Associates (OA) | otolaryn.com Additional Information :
Otolaryngology Associates (OA) was targeted in a cyberattack on February 17, 2024. Although the medical records system was not compromised, it is believed that data may have been exfiltrated. The stolen information includes billing data and, for some individuals, sensitive information such as social security numbers and bank details.…Tag: BANK
Date Reported: 2024-02-28 Country: France (FRA) Victim: Sidaction | sidaction.org Additional Information :
The non-profit organization Sidaction, engaged in the fight against AIDS, has fallen victim to a cyber attack. The attack resulted in a breach of personal data of certain donors, with a risk of disclosure of names, addresses, phone numbers, donation amounts, and IBAN/BIC bank details for approximately 3% of the affected individuals.…Threat Actor: Unknown | Unknown Victim: Bank Syariah Indonesia | Bank Syariah Indonesia Price: Free of charge Exfiltrated Data Type: Unauthorized access to employee account of Bank Syariah Indonesia’s cash management system
Additional Information:
The unauthorized access is being offered for an employee account of Bank Syariah Indonesia’s cash management system.…Key Points
In early April 2024, ReliaQuest investigated numerous similar incidents targeting customers in the health care sector.We concluded that these intrusions form part of a new campaign targeting health care organizations with the goal of accessing banking information.The attacks used social engineering techniques against help desk staff to bypass account access controls.…Threat Actor: Unknown Victim: City of Hope
Key Points: * City of Hope, a renowned cancer research and treatment center, suffered a data breach. * The breach impacted over 827,000 individuals. * Personal and health information of the victims was compromised. * The compromised information included names, contact information, social security numbers, financial details, medical records, and unique identifiers.…
____________________
INC Ransom claims responsibility for cyber incident at Leicester City Council involving data theft and ransom demands.
____________________
Key Point :
Leicester City Council is the victim of a ransomware attack by INC Ransom.
The attackers claimed to have stolen 3 TB worth of council data.…
Resecurity has detected a new version of JSOutProx, targeting financial services and organizations in the APAC and MENA regions. JSOutProx is a sophisticated attack framework utilizing both JavaScript and .NET. It employs the .NET (de)serialization feature to interact with a core JavaScript module running on the victim’s machine.…
____________________ Losses linked to impersonation scams top $1 billion yearly, FTC says Key Point : * Impersonation scams reported to the Federal Trade Commission cost victims about $1.1 billion in 2023. * 40 percent of reported cases started online, while scam phone calls accounted for 32 percent.…
Summary : KuCoin has been charged with AML violations for allowing cybercriminals to launder billions through their platform.
Key Point :
KuCoin founders charged with AML violations by the U.S. Department of Justice.
KuCoin failed to implement KYC system and report suspicious activity.
Platform used to launder $9 billion from criminal sources.…
Recently, Morphisec Labs identified a significant increase in activity linked to Mispadu (also known as URSA), a banking trojan first flagged by ESET in 2019. Initially concentrated on LATAM countries and Spanish-speaking individuals, Mispadu has broadened its scope in the latest campaign. …
Slovenia Targeted by Cyber Attacks Amidst Growing Tensions Over Support for Ukraine – Daily Dark Web
Threat Actor: – Unknowns group – CyberDragon group – Cyber Army of Russia group
Victim: – Government of Slovenia – NLB (largest commercial bank in Slovenia) – Chamber of Commerce and Industry
Information: – The Unknowns group is believed to be behind the series of disruptive DDoS attacks targeting key state websites in Slovenia.…
It’s tax season, that wonderful time of year when a refund check might be showing up in your mailbox—or going out to be sent to the government.
Around the world, many countries are gearing up for tax time.
This becomes a common time for hackers to step in.…
Summary: The State Department is warning employees about a fraudulent scheme targeting their payroll accounts, involving phishing and social engineering tactics.
Key Point:
Cybercriminals are using phishing, email takeovers, and social engineering to redirect employee payroll deposits.
The scheme initially targeted annuity accounts before evolving into phishing attempts for login data.…
The Brazilian financial sector is facing a formidable cyber threat known as CHAVECLOAK, a banking trojan that has emerged as a significant menace. This sophisticated malware is designed to breach security measures and extract sensitive financial information from potential victims.
An AI illustration of the CHAVECLOAK campaign
The CHAVECLOAK banking trojan primarily affects Microsoft Windows platforms and targets it’s users, especially those residing in Brazil.…
Malware loaders, critical for deploying malware, enable threat actors to deliver and execute malicious payloads, facilitating criminal activities like data theft and ransomware. Utilizing advanced evasion techniques, loaders bypass security measures and exploit various distribution channels for extensive impact, threat groups enhance their ability to download and execute various malware types as demonstrated by Smoke Loader and GuLoader, highlighting their role in extensive malware distribution.…
Article Summary :
A U.S. senator is raising questions about a report that $7.5 million was stolen by cyber thieves from the Department of Health and Human Services (HHS) last year.
The hackers took over email accounts of grantees and tricked HHS into sending funds to their bank accounts.…
Article Summary:
Customers of bankrupt crypto platform BlockFi have been targeted with a convincing phishing email impersonating the platform, resulting in millions being stolen in just five days.
The latest BlockFi phishing campaign is well-made, impersonating the BlockFi team with no typos and quality brand impersonation.…
During the month of Ramadan, Resecurity observed a significant increase in fraudulent activities and scams, coinciding with a surge in retail and online transactions. Middle Eastern enterprises, facing this heightened risk, are urged to bolster consumer protection and reinforce their brand security. Notably, in the Kingdom of Saudi Arabia (KSA), consumer spending topped regional charts, exceeding $16 billion.…
The South China Athletic Association (SCAA) was rocked by a cyberattack as unauthorized third parties breached the organization’s computer servers, sparking concerns over the security of member data. In response to the SCAA cyberattack, the Association swiftly implemented measures to address the breach and protect its members.…