The S-RM Cyber Intelligence Briefing is a weekly round-up of the latest cyber security news, trends and indicators, curated by our intelligence specialists.
- Microsoft Exchange servers under attack: APTs pile in on Exchange ProxyLogon vulnerabilities.
- Airline supply chain breach: Data of 580,000+ frequent flyer customers compromised.
- Smile! You’re on camera: Hackers access over 150,000 CCTV cameras in Verkada breach.
- Up in flames: OVH data centres destroyed by fire. Numerous customers impacted.
- Ransomware round-up: REvil updates modus operandi. Governments and hospitals under attack.
- Phishing latest: New phishing campaign leverages Google reCAPTCHA.
- Get your patch on! Microsoft’s Patch Tuesday addresses 89 new vulnerabilities.
Microsoft Exchange servers under attack
- Besides the Chinese actor HAFNIUM, at least 10 APTs are reportedly hunting for unpatched Exchange servers. The list of victims continues to grow, while 46,000 servers are still vulnerable.
- What to do now: 1) Patch and continue to track Microsoft’s continuing Exchange server security updates; 2) Scan: Microsoft has updated its MSERT tool to find web shells from Exchange server attacks; 3) Investigate: If you find signs the vulnerabilities were exploited, conduct a forensic investigation.
So what? Time critical patching and scanning for indicators of compromise has never been more important. Read S-RM’s additional advice on Exchange ProxyLogon vulnerabilities.
Airline’s supply chain breach takes off
- SITA, an IT provider for around 400 companies in the airline industry, suffered a coordinated supply chain attack. The adversaries compromised frequent flyer data belonging to over 580,000 passengers. However, no passwords, email addresses, or credit card information was compromised.
- Singapore Airlines was also impacted, despite not being a SITA customer. The airline shared a restricted set of data to facilitate membership tier status verification.
So what? Organisations should leverage vendor risk management programs to confirm suppliers have essential security controls in place.
Smile! You’re on camera
- A hacker group used leaked admin credentials to access over 150,000 live surveillance feeds owned by security camera company Verkada. The hackers found a username and password for a “Super Admin” account publicly exposed on the internet, allowing them root access to the cameras.
- The group have access to complete video archives of Verkada’s customers, as well as live feeds. Locations using these affected cameras include prisons, hospitals, schools, and a Tesla supplier’s production site.
So what? Organisations should thoroughly review the security of IoT devices and the implications if such devices are breached.
OVH datacentres go up in flames
- OVH, a cloud computing company, suffered a fire at its Strasbourg facility on Wednesday, destroying one datacentre and damaging another. Although not damaged in the fire, two further datacentres were also taken offline.
- Numerous organisations have been affected, with the incident rendering many OVH customers’ web services inaccessible. Some customers have even experienced a complete loss of data, with no prospect of recovery.
So what? Even the most advanced cyber security can’t protect organisations from physical incidents like this. The event underscores the importance of regular backups that are tested and stored securely.
- REvil ransomware group announce plan to leverage DOS attacks and VOIP calls to victim’s business partners and journalists. The group plans to use both tactics to exert additional pressure on its victims to pay a ransom.
- Ryuk ransomware hits Spanish government agency for labour, affecting 700 offices nationwide. The Spanish government has extended benefits applications while systems are out of service. We reported on Ryuk last week.
- Third French hospital in four weeks suffers ransomware attack. The hospital’s system to monitor medicine supplies is impacted and comes at a crucial time in France’s COVID-19 vaccination rollout.
So what? Update your ransomware plans and playbooks to now include DOS attacks and phone calls to your affiliates. Ransomware remains a top threat transcending across sectors.
Phishing campaign leverages Google reCAPTCHA
- A new phishing campaign aims to steal Microsoft Office 365 credentials. A fake Google reCAPTCHA and personalised Microsoft login page are leveraged to trick victims into disclosing their corporate credentials.
- Over 2,500 phishing emails have been detected in this campaign, predominantly targeting senior business leaders in the banking and IT sector.
So what? Phishing campaigns will continue to leverage ‘legitimate’ systems to deceive victims. Train your employees on how to identify personalised phishing attempts.
- Microsoft released patches for 89 vulnerabilities, 14 of which are marked as ‘critical’. Five of these (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065 and CVE-2021-26411) are being actively exploited in the wild.
- Two Windows 10 updates – KB5000802 and KB50000808 – are reportedly causing systems to crash when attempting to print. If affected, uninstall these two updates to alleviate the issue.
So what? Install the patches as soon as possible and look out for printing-related issues.