Daily Cybersecurity Wire – January 25, 2024
January 25, 2024
Posted By: Research Team
Daily Cybersecurity Wire
January 25, 2024

 

NEW DEVELOPMENTS

 

Global Retailer BuyGoods.com Leaks 198GB of Internal and User PII, KYC data
Source: Hack Read
A misconfigured cloud database on BuyGoods.com, a worldwide e-commerce marketplace and business management platform, unintentionally exposed 198.3 gigabytes of sensitive data. Invoices, refund transactions, affiliate payouts, and extremely sensitive Know Your Customer (KYC) and Personally Identifiable Information (PII) were among the exposed data. Customers’ passports, licenses, selfies, and unredacted credit card information were all included in the records. The database’s open access without security authentication could lead to identity theft and financial fraud for impacted users.
Article Link

 

HPE: Russian hackers breached its security team’s email accounts
Source: Bleeping Computer
Hewlett Packard Enterprise (HPE) revealed a breach by suspected Russian hackers, Midnight Blizzard (APT29), who gained unauthorized access to HPE’s Microsoft Office 365 email environment in May 2023. The breach, discovered on December 12, 2023, affected a small percentage of mailboxes, including those in cybersecurity and business segments. While the incident reportedly had no operational impact, HPE is working with experts and law enforcement. Midnight Blizzard, associated with the SolarWinds attack, is known for cyber espionage. HPE experienced similar breaches in 2018 and 2021.
Article Link

 

Jason’s Deli says customer data exposed in credential stuffing attack
Source: Bleeping Computer
American restaurant chain Jason’s Deli issued a data breach warning to customers, revealing that their data was exposed in a credential stuffing attack. The attack occurred on December 21, 2023, and reportedly used credentials obtained from other sources. The exposed information includes names, addresses, phone numbers, birthdays, and more–depending on the customer’s online profile. While Jason’s Deli detected various account access attempts, the number of impacted accounts remains unknown. The company advises affected users to reset their passwords and encourages password uniqueness across online platforms.
Article Link

 

Tesla hacked, 24 zero-days demoed at Pwn2Own Automotive 2024
Source: Bleeping Computer
Security researchers demonstrated 24 zero-day exploits and successfully hacked a Tesla Modem on the first day of Pwn2Own Automotive 2024, earning awards totaling $722,500. The Synacktiv Team showcased their expertise by exploiting three zero-day bugs on the Tesla Modem and two unique two-bug chains on other EV stations. The contest focuses on various automotive technologies, including in-vehicle infotainment systems, electric vehicle chargers, and car operating systems.
Article Link

 

A ransomware attack against the Finnish IT services provider Tietoevry disrupted the services of some Swedish government agencies and shops.
Source: Security Affairs
Tietoevry, a Finnish IT services provider, experienced a ransomware attack affecting services for Swedish government agencies and businesses. The Akira ransomware incident targeted a data center in Sweden, impacting the managed Payroll and HR system and leading to disruptions in online services. Tietoevry is actively addressing the incident, notifying affected parties, and working to restore services. The complete restoration process may extend over several days or weeks.
Article Link

 


VULNERABILITIES TO WATCH

 

Over 5,300 GitLab servers exposed to zero-click account takeover attacks
Source: Bleeping Computer
Over 5,300 GitLab servers are exposed to a critical zero-click account takeover flaw (CVE-2023-7028), allowing attackers to manipulate password reset emails. Despite GitLab’s patches, these instances are at risk of supply chain attacks, code disclosure, API key leaks, etc. Most vulnerable servers are in the United States, Germany, Russia, and China. Admins are urged to patch immediately, rotate credentials, enable two-factor authentication, and check for signs of compromise.
Article Link

 

 

SPECIAL REPORTS

 

Organizations invest more in data protection but recover less
Source: Help Net Security
According to Veeam Software, organizations will raise data protection investment in 2024 to improve cyber resilience in the face of escalating threats like ransomware. Despite increased investment, a poll found that just a small minority of businesses feel they can recover from a crisis, even a minor one, in under a week. Cyberattacks remain the leading cause of business interruptions, with 76% of firms reporting attacks in the previous year. While this figure has fallen from 85% in 2023, recovery concerns remain, with only 13% confidence in orchestrating recovery amid a crisis.
Article Link

 

 

 

WaterISAC: 15 Security Fundamentals You Need to Know
Source: Tripwire
WaterISAC has issued 15 security fundamentals for water utilities in response to recent cyberattacks. These fundaments emphasize proactive measures, which include: asset inventory, risk assessment, control system exposure reduction, user access controls, physical access restriction, cyber-physical safety systems, vulnerability management, digital security culture, security policies, threat detection, incident response plans, insider threat management, supply chain security, smart device configuration, and participation in information-sharing communities.
Article Link