Alert for Software Developers: North Korea’s Lazarus Group Targets with Malicious Emails

A recent study by ReversingLabs has revealed that North Korea’s Lazarus Group is actively targeting software developers through a sophisticated email campaign. This campaign, part of the larger VMConnect initiative, uses deceptive job interview invitations to deliver malware, backdoors, data stealers, and data-wiping threats. The attackers have been impersonating the Capital One company logo in LinkedIn messages to increase their credibility and success rate.

Shannon Sharpe’s Instagram Account Hacked

Shannon Sharpe, the Hall of Fame NFL player with a storied 14-season career, has fallen victim to a cyber attack resulting in the hack of his Instagram account. Sharpe, who has over 3 million followers, issued a statement explaining that explicit content shared from his account was the work of cybercriminals. He urged his followers to disregard the inappropriate video and thanked them for their patience during the ordeal.

Teenager Arrested for Hack of Transport for London

In early September, Transport for London (TfL) experienced a cyber attack that led the National Crime Agency (NCA) to investigate and arrest a 17-year-old from Walsall under the Computer Misuse Act. The hack caused temporary suspensions of some TfL travel app services and website sections. The teenager, currently out on bail, will face further legal proceedings in the coming weeks.

Fortinet Faces Unauthorized Network Access

Fortinet has reported unauthorized access to its corporate network by a third party, suspected to be a ransomware attack. The breach affected servers of its software partners, impacting a portion of its Asia Pacific clientele. The company is still gathering details and will provide further updates once the situation is fully assessed.

Iranian OilRig Group Targets Iraqi Government Websites

Iranian threat actor group OilRig has recently been identified targeting Iraqi government websites with malware. According to cybersecurity firm Check Point, the compromised sites included those of the Ministry of Foreign Affairs and the Prime Minister’s office. OilRig, also known by aliases such as GreenBug, Hazel Sandstorm, Crambus, APT34, and Cobalt Gypsy, continues to be a significant cyber threat.

Australia Steps Up to Defend Pacific Islands Forum from Chinese Hackers

In response to a cyber attack on the Pacific Islands Forum Secretariat in February, the Australian government has dispatched technical teams to Fiji. With local cybersecurity expertise insufficient to counter the sophisticated, state-sponsored attacks from China, Australia’s intervention aims to bolster the region’s defenses and mitigate ongoing cyber threats.

The post Trending Cybersecurity news headlines on Google for today appeared first on Cybersecurity Insiders.

Transport for London (TfL) recently experienced a cyber-attack that disrupted its digital operations. Fortunately, initial assessments indicate that no data breaches occurred, and the system is expected to recover using backup resources.

Both the National Crime Agency and the National Cyber Security Centre have been notified of the incident, and an investigation is currently underway to address the situation.

TfL’s Chief Technology Officer, Shashi Verma, has confirmed the cyber-security breach and has promised to provide more details as the investigation progresses.

Cybercriminals often launch attacks to either disrupt services or gain unauthorized access to sensitive information stored on servers. In this case, the attack seems aimed at halting network services to create concern and potentially incite political turmoil in the UK.

Earlier this year, in June, another major incident involved the NHS, which faced a cyber-attack resulting in the cancellation of thousands of appointments and the rerouting of emergency services to other facilities. This breach was linked to the Qilin Ransomware gang, which targeted Synnovis, a software-based pathology services provider. The attack led to significant disruptions within the NHS.

When the NHS refused to comply with the hackers’ demands, the Qilin group responded by leaking 400GB of stolen data on the dark web through a Telegram channel. This compromised information included patient names, dates of birth, blood test results, and diagnostic details.

In today’s landscape, many cybercriminals are turning to ransomware attacks, often facilitated by ransomware-as-a-service companies or by purchasing malware online. These attacks not only compromise sensitive information but also leverage extortion tactics to force victims into paying substantial ransoms.

The post Potential Ransomware Threat to Transport for London appeared first on Cybersecurity Insiders.

Citizens residing in the European Union are facing challenges in settling fines sent by Transport for London (TFL), with penalties ranging from £1000 to £6000 or more. The concern lies not only in the imposed fines but also in the alleged fraudulent acquisition of data and the treatment of London’s visitors as lucrative targets.

Upon delving into the matter, TFL is accused of unlawfully obtaining data concerning millions of drivers from the European Union, issuing penalties to nearly all those who recently visited London. This situation particularly affects individuals traveling from countries like Spain, Belgium, Germany, and the Netherlands, as residents of these regions are required to obtain permission to visit Britain post-Brexit.

Some visitors regard these penalties as a blatant violation of basic human rights, asserting that Ultra Low Emission Zone (ULEZ) fines are being applied without practical violation.

In recent weeks, the Transport authority of London, led by Sadiq Khan, has issued over 316,000 penalty charging notices to visitors arriving in London by vehicle. One such case involves a French driver who received a staggering £25,000 penalty for allegedly violating Low Emission Zone (LEZ) and ULEZ rules while driving a minibus.

According to an exclusive report by The Guardian, more than 100 French drivers and over 60 lorry owners from the Netherlands are contemplating legal action against TFL. They claim that TFL purchased data from Euro Parking Collection centers to impose hefty penalties on vehicles that, despite emitting very low emissions, were deemed non-compliant with ULEZ rules.

A subset of affected individuals argues that penalties were erroneously issued based on 2021 data, even though they had since transitioned to electric vehicles.

In response, Transport for London (TFL) asserts that any instances of wrongly issued notices, if reported promptly, will be addressed through legal channels and rectified accordingly.

The post Controversy Surrounds TFL’s Alleged Data Fraud and Hefty Penalties appeared first on Cybersecurity Insiders.

Clop ransomware gang has targeted the databases of Transport for London (TfL) customers, thus stealing information of over 13,000 drivers listed on the Ulez and Congestion Charges Repository. Clop is the same gang that struck MoveIT file transfer software last week and the TFL seems to be one of the impacted customers worldwide. And TfL became a victim as one of its customers incharge of storing and securing the databases was affected by the file encrypting malware spreading gang.

Ultra Low Emissions Zone (Ulez) is an area in London where drivers of vehicles that do not meet emission standards are charged £12.50 per day. First this charge used to be applicable to only those drivers who were driving their vehicles in North and South circles and was imposed by Mayor Sadiq Khan. But was extended in August last year to those driving in Boroughs.

Why the Russian gang of hackers is behind the driver details storing database is unknown. It can be an income minting scheme or a retaliation effort, as the Rishi Sunak led nation is supporting Ukraine in its war with the Putin led nation by sending arms and ammunition along with essentials and some financial aid.

NOTE- TfL is a government owned organization accountable for smooth functioning of the entire transport network in London, UK. It includes functioning of buses, taxis, cycling provisions, trams, and water transport services. Although it doesn’t have total control over the rail network. It still holds control over the Elizabeth line and overground network in London.

The post Clop Ransomware gang strikes London Transport for London (TfL) appeared first on Cybersecurity Insiders.