Cybercrime Recap - Dec 3

  • By David Lukic
  • Published: Dec 22, 2021
  • Last Updated: May 18, 2022
This has been quite an active week in terms of cyberattacks.  Sort through the digital attacks in the previous seven days, and you will be inundated with an avalanche of news.  Let's take a look at the most significant cyber attacks from the week gone by.

Panasonic 

Panasonic representatives revealed a significant digital security breach this week.  A hacker illegally accessed data from a file server of this Japan-based electronics giant.  The extent of the unauthorized access has yet to be revealed.  The breach started this past summer and extended through early November.  Though Panasonic has implemented protocols to prevent a similar breach from occurring, the data access is concerning for Panasonic business partners, clients, and shareholders.

AT&T

Earlier this week, it was revealed that a botnet known as EwDoor targeted AT&T devices.  The botnets used bots to steal the data of AT&T customers, perform DDoS attacks and send spam messages. The attack was initially identified in the final days of October.  All in all, 6,000+ AT&T devices throughout the United States were infected.

Apple

Apple is in the news for pursuing legal action against NSO Group, a spyware firm that allegedly attacked Apple users' computing devices.  The lawsuit strives to secure a permanent injunction that stops NSO group from using the computing giant's products and services.  The alleged attack occurred through a ForcedEntry exploit related to an iOS shortcoming.  It is alleged that a bug installed Pegasus software to spy on Apple users, including professors and government employees.  It is also alleged that NSO Group transmitted harmful data to Apple computing devices.

Additional Digital Breaches and Hacks of Note

A threat actor in Pakistan shared sensitive data from government computers with anti-government groups.  The hacker's motivation appears to be to target both the Afghan and Indian governments. 
 
The Cybersecurity & Infrastructure Security Agency (CISA) recently issued a directive stating more than 300 vulnerabilities are threatening digital security here in the United States and abroad.  Those vulnerabilities include a coreboard vulnerability relating to the Apache HTTP Server in which attackers run code to initiate an attack.  CISA also warned of a vulnerability in the Zoho ManageEngine ServiceDesk.
 
Malware hiding within Nginx Process on Linux servers has emerged to steal payment data.  The code uses a host Nginx application that so far is nearly impossible to identify.  This code steals data stored on eCommerce servers.  
 
Digital security researchers announced 17 unique malicious frameworks used to violate air-gapped networks. These frameworks are used to conduct espionage. 
 
Researchers also warned Iranian computer users of extensive SMS phishing operations underway this December. SMS messages meant to install malware on Iranians' Android devices are successfully impersonating members of the Iranian government and those who work for social security services.  Social engineering aims to steal credit card information and bank account funds.
About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

Personal vs Sensitive Personal Information (SPI): What’s the Difference

Personal vs Sensitive Personal Information (SPI): What’s the Difference

What is there to know about a person? Certainly, their name, but how about their affiliations, philosophical beliefs, or sexual orientation?

What Is An On-Path Attack and How Does It Work? 

What Is An On-Path Attack and How Does It Work? 

Suppose someone left their home, got in their car, and drove to the grocery store. Much like data packets that travel over Internet highways, the car will use various pathways to reach its destination; however, once the car gets to the store, a question remains: what happened between the generating point and the destination?

What is Bait and Switch Scams: How it Works and How to Avoid It

What is Bait and Switch Scams: How it Works and How to Avoid It

Ever follow an ad featuring limited-time products to a company's web page only to find they're selling something else entirely?

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Free Identity Exposure Scan
Instantly and Securely Check if Your Personal Information is Exposed on the Dark Web or Sold by Data Brokers
Please enter first name
Please enter last name
Please select a state
Close
Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close