Categories
The Week in Breach

The Week in Breach: 16/06/21 – 22/06/21

Misconfiguration is the name of the game this week, as errors abound Carnival leaked data again (and Wegman’s joined them), nation-state cybercrime hits South Korea

United Kingdom – Cake Box

Exploit: Hacking

Cake Box: Bakery Chain

cybersecurity news represented by agauge showing severe risk

Risk to Business: 1.661 = Severe

UK celebration cake chain Cake Box isn’t celebrating this week. The company has disclosed a data breach after threat actors hacked their website and obtained credit card numbers. According to the release, the breach occurred way back in April 2020 and they’re just informing consumers. Payment skimming malware is to blame. Experts suspect that this breach is the result of a Magecart attack.

cybersecurity news represented by agauge showing severe risk

Individual Risk 2.802 = Severe

When customers made purchases on the site while it was infected malicious scripts sent the first name and surname, email address, postal address, and payment card information including the three-digit CVV code to a remote server controlled by the attackers. This is an ancient breach in terms of the time it took for consumers to be informed, and the damage has definitely already been done.

Customers Impacted: Unknown

Cognyte

Exploit: Unsecured Database

Cognyte: Data Analytics Firm

cybersecurity news represented by agauge showing severe risk

Risk to Business: 1.802= Severe

Data analytics company Cognyte warns folks about data exposure from third-party sources, and it had to send one out for itself this week. Researchers discovered an unsecured database operated by Cognyte that left some 5 billion records collected from a range of data incidents exposed online. The stored data is part of Cognyte’s cyber intelligence service, which is used to alert customers to third-party data exposures. The incident is under investigation.

Individual Impact: No sensitive personal or financial information for clients has been declared compromised in this incident and the investigation is ongoing.

Customers Impacted: Unknown

Invenergy LLC

Exploit: Ransomware

Invenergy LLC: Energy Company

cybersecurity news represented by agauge showing severe risk

Risk to Business: 1.916 = Severe

REvil has claimed responsibility for a recent cyberattack on renewable energy company Invenergy. The gang claims to have compromised the company’s computer systems and exfiltrated four terabytes of data. Among the information allegedly taken by REvil are contracts and project data. In a bizarre twist, REvil also claims to have obtained “very personal and spicy” information regarding Invenergy’s chief executive officer, Michael Polsky.

Individual Impact: No sensitive personal or financial information for clients has been declared compromised in this incident and the investigation is ongoing.

Customers Impacted: Unknown

CVS

Exploit: Thitd-Party Threat (Misconfiguration)

CVS: Drug Store Chain

cybersecurity news gauge indicating extreme risk

Risk to Business: 1.416= Extreme

CVS is in hot water after researchers discovered a trove of over one billion records online that were connected to the US healthcare and pharmaceutical giant. The unsecured databasewas extimated to be 204GB in size. According to reports, the databases contained an astonishing assortment of sensitive data like event and configuration data, visitor IDs, session IDs, device access information and details on how the logging system operated from the backend. Search records exposed also included queries for medications, COVID-19 vaccines and a variety of CVS products, referencing both CVS Health and CVS.com.

Individual Impact: There has not yet been confirmation that consumer personal or financial information has been compromised in this incident but the investigation is ongoing.

Customers Impacted: Unknown

egman’s

Exploit: Third-Party Threat (Misconfiguration)

Wegman’s: Grocery Store Chain 

cybersecurity news represented by agauge showing severe risk

Risk to Business: 2.227= Severe

East Coast gourmet grocer Wegmans issued a release announcing that a service provider had failed to correctly configure two of its databases, exposing a large quantity of customer data. According to Wegmans, the databases that the contractor maintained contained customer identity and shopping habit information as well as an assortment of client PII. The company says the issue is resolved.

cybersecurity news represented by a gauge indicating moderate risk

Risk to Business: 2.776 = Moderate

The release says that customer information exposed in the data breach included names, addresses, phone numbers, birth dates, Shoppers Club numbers, Wegmans.com account e-mail addresses and passwords. No Social Security, financial or medical information was stolen and only salted password hashes were stored in the databases maintained by the negligent contractor.

Customers Impacted: Unknown

Carnival Cruise Line

Exploit: Hacking

Carnival Cruise Lines: Cruise Ship Operator 

cybersecurity news represented by agauge showing severe risk

Risk to Business: 1.651= Severe

Perennially cybersecurity challenged cruise line Carnival issued a breach disclosure on Thursday confirming hackers attacked email accounts and gained access to data about its customers and employees. The company said that the data snatched was collected during the travel booking process, through the course of employment or from providing services to the company, including COVID or other safety testing.

cybersecurity news represented by agauge showing severe risk

Risk to Business: 1.802= Severe

The poassenger data accessed included names, addresses, phone numbers, passport numbers, dates of birth, health information, and, in some limited instances, additional personal information like social security or national identification numbers. No clear information was provided about the employee information that was exposed.

Customers Impacted: Unknown

South Korea – Korea Atomic Energy Research Institute (KAERI) 

Exploit: Nation-State Cybercrime

 Korea Atomic Energy Research Institute (KAERI): Government Agency

cybersecurity news represented by agauge showing severe risk

Risk to Business: 1.633 = Severe

South Korean officials have admitted that the government nuclear think tank Korea Atomic Energy Research Institute (KAERI) was hacked by nation-state threat actors in May 2021 after the incident was brought to light by reporters. The Korean media is accusing the agency of perpetrating a cover-up. According to experts, the North Korean Kimusky cybercrime gang is to blame. This group often uses phishing to mimic websites like Gmail, Outlook, Telegram and more. The group then installs Android and Windows backdoor “AppleSeed” to collect information and frequently makes use of ransomware. The extent of the data theft is unknown.

Individual Impact: No sensitive personal or financial information has been confirmed as compromised in this incident.

Customers Impacted: Unknown

Categories
The Week in Breach

The Week in Breach: 09/06/21 – 15/06/21

We’re celebrating Flag Day with an All-American Edition of the Week in Breach. This week, REvil takes aim at a US nuclear defense contractor, hackers take a bite out of McDonald’s

Electronic Arts Inc (EA)

Exploit: Hacking

Electronic Arts Inc: Game Developer 

cybersecurity news gauge indicating extreme risk

Risk to Business: 1.355= Extreme

Electronic Arts (EA) has announced that it is investigating a data breach. Cybercriminals stole valuable corporate data from the company including game source code and related tools. Early reports noted that hackers had stolen source codes for the popular title “FIFA 21” and source code and tools for the Frostbite engine. Researchers estimate that 780 gigabytes of data was snatched then advertised for sale on underground hacking forums.

Customers Impacted: Unknown

Edward Don

Exploit: Ransomware

Edward Don: Foodservice Distributor 

cybersecurity news represented by agauge showing severe risk

Risk to Business: 1.816 = Severe

Foodservice equipment distributor Edward Don has been hit by a ransomware attack. The incident has disrupted their business operations, including their phone systems, network and email. As a result, employees have been driven to using personal Gmail accounts to communicate with customers regarding urgent orders or fulfillment issues. The incident is under investigation and full functionality was quickly restored,

Individual Impact: No sensitive personal or financial information has been declared compromised in this incident and the investigation is ongoing.

Customers Impacted: Unknown

McDonald’s Corp

Exploit: Ransomware

McDonald’s Corp: Fast Food Chain

cybersecurity news represented by a gauge indicating moderate risk

Risk to Business: 2.606= Moderate

McDonald’s Corp. said hackers exposed US business information and some customer data in South Korea and Taiwan. The attackers accessed e-mails, phone numbers and delivery addresses. The company reported that it had hired external consultants to investigate unauthorized activity on an internal security system, prompted by a specific incident in which the unauthorized access was cut off a week after it was identified. The announcement noted that the burger chain does not believe any customer payment data was stolen but cautioned that there may be employee data exposed.

Individual Impact: There has not yet been confirmation that sensitive personal or financial information has been compromised in this incident but the investigation is ongoing.

Customers Impacted: Unknown

Intuit

Exploit: Account Takeover (ATO)

Intuit: Financial Software Developer 

cybersecurity news represented by agauge showing severe risk

Risk to Business: 1.612= Severe

Accounting software giant Intuit has notified customers that they have suffered a breach. The company warned users of TurboTax that their personal and financial information was accessed by attackers following what looks like a series of account takeover attacks. Intuit announced that the threat actors used credentials (usernames and passwords) obtained from “a non-Intuit source” to gain access to the accounts.

cybersecurity news represented by agauge showing severe risk

Risk to Business: 1.832= Severe

Intuit notified potentially impacted clients by mail that information contained in a prior year’s tax return or current tax returns in progress including their name, Social Security number, address(es), date of birth, driver’s license number and financial information (e.g., salary and deductions) and information of other individuals contained in the tax return may have been exposed.

Customers Impacted: Unknown

Sol Oriens

Exploit: Ransomware

Sol Oriens: Defense Contractor 

cybersecurity news represented by agauge showing severe risk

Risk to Business: 2.337= Severe

REvil has struck again, this time against a tiny but important target in the defense sector. Sol Oriens, which consults for the US Department of Energy’s National Nuclear Safety Administration, is a 50-person firm based in Albuquerque, New Mexico. Researchers noted finding Sol Oriens documents posted on the dark web, told CNBC that they include invoices for NNSA contracts, descriptions of research and development projects managed by defense and energy contractors dated as recently as 2021

Individual Impact: No sensitive personal or financial information has been confirmed as compromised in this incident although some sources are reporting that human resources data is in the mix.

Customers Impacted: Unknown

Volkswagen Group of America

Exploit: Third- Party Data Breach

Volkswagen Group of America: Automotive Manufacturer 

cybersecurity news represented by agauge showing severe risk

Risk to Business: 1.825 = Severe

Volkswagen US has announced that it has suffered a data breach impacting millions of US customers and prospective customers. the car company released information saying that a data breach at a vendor has exposed data on more than 3.3 million buyers and prospective buyers in North America. An unauthorized third party obtained limited personal information about customers and interested buyers from a vendor that its Audi Volkswagen brands and some U.S. and Canadian dealers used for digital sales and marketing.

cybersecurity news represented by agauge showing severe risk

Risk to Business: 2.213 = Severe

The information was gathered for sales and marketing between 2014 and 2019 and was in an electronic file the vendor left unsecured. According to Volkswagen, the majority of people impacted had phone numbers and email addresses exposed, but some clients had their driver’s license information stolen as well. In some cases, information about a vehicle purchased, leased, or inquired about was also obtained. VW said 90,000 Audi customers and prospective buyers also had sensitive data impacted relating to purchase or lease eligibility. VW said it will offer free credit protection services to those individuals.

Customers Impacted: 3.3 million

Categories
Apple

How can you lose Microsoft 365 data? tip 5

Would you rather retain your Microsoft 365 data forever, or for a few months? We can help #MSnetUk https://datto-content.amp.vg/web/cdk74b8gop6t2

Categories
Apple

How can you lose Microsoft 365 data? tip 4

Microsoft 365 may host your data in the cloud, but how do they back it up? We can help #MSnetUk https://datto-content.amp.vg/web/sc80bibndn8z

Categories
Apple

How can you lose Microsoft 365 data? tip 3

How to lose Microsoft 365 data? tip 3: make an employee angry…really really angry.We can help #MSnetUk https://datto-content.amp.vg/web/dmgxynx6tugk3

Categories
Apple

How can you lose Microsoft 365 data? tip 2

How to lose Microsoft 365 data? tip 2: over-write data in #O365, it’s not uncommon We can help #MSnetUk https://datto-content.amp.vg/web/bv3844vjxjbsx

Categories
The Week in Breach

The Week in Breach: 02/06/21 – 08/06/21

This week we’re exploring why Cox TV & radio stations went dark because of cybercrime, how third-party danger ensnared New South Wales Health, what happened when nation-state cybercriminals visited New York .
  United Kingdom – Furniture Village  Exploit: Hacking
Furniture Village: Home Goods Retailer  >> Read full details on our blog  
  United States – iConstituent Exploit: Ransomware
iConstituent: Communications Services >> Read full details on our blog  
  United States – Cox Media Group  Exploit: Ransomware
Cox Media Group: TV & Radio Station Operator   >> Read full details on our blog  
  United States – Navistar International Corporation Exploit: Hacking
Navistar International Corporation: Specialty Vehicle Manufacturer   >> Read full details on our blog  
  United States – New York Metropolitan Transit Authority (M.T.A.)  Exploit: Nation-State Hacking
New York Metropolitan Transit Authority (M.T.A.): Regional Transport Operator  >> Read full details on our blog  
  United States – LineStar Integrity Services Exploit: Ransomware
LineStar Integrity Services: Pipeline Technology Services >> Read full details on our blog  
  Australia – New South Wales Health (NSW Health)  Exploit: Third-Party Data Breach
New South Wales Health (NSW Health): Regional Healthcare Agency  >> Read full details on our blog  
  Japan – Fujifilm  Exploit: Ransomware
Fujifilm: Film & Photo Technology Developer  >> Read full details on our blog  
Categories
Data Protection

How can you lose Microsoft 365 data? tip 1

How to lose Microsoft 365 data, tip 1: accidentally delete your files, it happens all the time! We can help #MSnetUk https://datto-content.amp.vg/web/c5116e7wtrcs8

Categories
The Week in Breach

The Week in Breach: 26/05/21 – 01/06/21

  United States – DailyQuiz  Exploit: Hacking
DailyQuiz: Entertainment App  >> Read full details on our blog  
  United States – Rehoboth McKinley Christian Health Care Services (RMCHCS)  Exploit: Hacking
Rehoboth McKinley Christian Health Care Services (RMCHCS): Health Non-Profit  >> Read full details on our blog  
  United States – Bose Exploit: Ransomware
Bose: Audio Equipment Maker   >> Read full details on our blog  
  Canada – Canada Post Exploit: Third-Party Data Breach
Canada Post: Postal Service  >> Read full details on our blog  
  Brazil – JBS SA Exploit: Ransomware
JBS SA: Meat Processor  >> Read full details on our blog  
  Australia – TPG Telecom  Exploit: Hacking
TPG Telecom: Communications Technology  >> Read full details on our blog  
  Japan – Net Marketing Co. Exploit: Hacking
Net Marketing Co.: App Creator  >> Read full details on our blog  
Categories
Data Protection

Oops. What happened to my 365 data?

Oops you just deleted your #Office365 data…now what? #saas #backup We can help #MSnetUk https://datto-content.amp.vg/web/bo9ctcu987k9h