top of page
Untitled design.png

Weekly INK

Each week we compile an advisory on the latest threats, trends and newsworthy topics from the cyber security industry affecting small and medium enterprises. Join our subscribers below and help us prevent cybersecurity breaches.

watermark4.png

Issue #82 - January 29, 2024

Vastaamo hacker traced via ‘untraceable’ Monero transactions, police says

Source: Bleeping Computer

Julius Aleksanteri Kivimäki, the suspect believed to be behind an attack against one of Finland's largest psychotherapy clinics, Vastaamo, was allegedly identified by tracing what has been believed to be untraceable Monero transactions. In October 2020, psychotherapy Center Vastaamo announced it had been breached in 2018 by someone who stole thousands of patient records and demanded a payment of 40 Bitcoins ($450,000 at the time) to not publicly release the stolen data.




Here's How the FBI Stopped a Major Chinese Hacking Campaign

Source: Data Breach Today

Federal authorities shut down attempts by a Chinese government hacking group to attack U.S. critical infrastructure through a malware campaign that gained unauthorized access to "hundreds" of personally owned routers, FBI Director Christopher Wray testified Wednesday.




Ransomware Attack Hits Schneider Electric Sustainability Unit

Source: Info Risk Today

Schneider Electric built its business on manufacturing circuit breakers and other electrical parts, but nowadays it also helps clients go green. The company collects data from more than 2,000 companies in its Resource Advisor software to track energy consumption, emissions and their overall sustainability scores.




FritzFrog Returns with Log4Shell and PwnKit, Spreading Malware Inside Your Network

Source: The Hacker News

The threat actor behind a peer-to-peer (P2P) botnet known as FritzFrog has made a return with a new variant that leverages the Log4Shell vulnerability to propagate internally within an already compromised network. "The vulnerability is exploited in a brute-force manner that attempts to target as many vulnerable Java applications as possible," web infrastructure and security company Akamai said in a report shared with The Hacker News.




CISA Orders Ivanti VPN Appliances Disconnected: What to Do

Source: Dark Reading

The United States Cybersecurity and Infrastructure Security Agency (CISA) has given Federal Civilian Executive Branch agencies 48 hours to rip out all Ivanti appliances in use on federal networks, over concerns that multiple threat actors are actively exploiting multiple security flaws in these systems. The order is part of the supplemental direction accompanying last week's emergency directive (ED 24-01).



108 views

Comments


Help us Prevent Breaches.

We will never share or sell your information. Unsubscribe at any time.

Email: *

Received.

bottom of page