Car dealerships have been brought to a standstill across the United States after a software provider was hit by a ransomware attack. The attack, believed to be by the BlackSuit ransomware gang, forced CDK Global, makers of a platform widely used by car dealerships to conduct their everyday business, to down its IT systems and data centers. Read more in my article on the Exponential-e blog.
Wikileaks's Julian Assange is a free man, deepfakes cause trouble in the playground, and we hear hot takes about ransomware and tales from inside a devastating denial-of-service attack. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Eleanor Dallaway.

The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning to all chemical facilities operating in the United States regarding a potential data breach that may have exposed sensitive information to hackers. This includes details such as business names, place of birth, citizenship, redress system number, and global entry ID.

CISA’s alert follows a confirmed report that the Chemical Security Assessment Tool (CSAT) was compromised by a known threat actor through a vulnerability in the Ivanti Connect Secure Appliance earlier this year. This breach affects all participants of the Chemical Facility Anti-Terrorism Standards (CFATS), prompting immediate attention due to the potential exposure of sensitive data.

CFATS is a program that regulates cybersecurity measures in chemical facilities to mitigate risks associated with hazardous materials being used for malicious purposes. It mandates compliance to ensure operational security and continuity.

CISA’s investigation revealed that the breach on CFATS involved the deployment of an advanced webshell on the Ivanti device. Although the threat actor accessed the system over a two-day period, there is currently no evidence of misuse or sale of the compromised information, even six months after the incident.

As a precautionary measure, CISA recommends a password reset for all CSAT accounts to bolster defenses against potential brute force attacks and further unauthorized access.

The post CISA warns chemical facilities in America about possible data breach appeared first on Cybersecurity Insiders.

There's a wee data breach with unhealthy implications in Scotland, privacy has gone off the rails in the UK, and a cheater blames Apple for his expensive divorce. All this and much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Lianne Potter of the "Compromising Positions" podcast. Plus don't miss our featured interview with Abhishek Agrawal, CEO of Material Security.
UK-based gym chain Total Fitness has been accused of sloppy security, following the discovery of an unsecured database containing the images of 470,000 members and staff - all accessible to anyone on the internet, no password required. Read more in my article on the Hot for Security blog.

The Department of Public Health (DPH) under the County of Los Angeles has been involved in a significant data breach affecting potentially over 200,000 individuals, resulting in the unauthorized exposure of personal medical and financial information.

Initial investigations suggest that the breach occurred when hackers successfully obtained login credentials from more than 53 public health employees through a phishing email. The cyber-attack took place overnight between February 19th and February 20th of this year, ultimately leading to the compromise of sensitive details.

The compromised information includes employees’ first and last names, medical histories, treatment details, Medicare numbers, health insurance information, social security numbers, and other financial data.

Upon discovering the phishing attack and subsequent data breach, the Los Angeles County DPH expressed deep concern and committed to taking necessary steps to prevent such incidents in the future. All affected individuals have been notified, and arrangements are being made to provide them with free credit monitoring services for a specified period following the conclusion of the investigation.

In light of this incident, affected individuals are advised to exercise heightened vigilance, especially regarding their digital transactions and credit activities, to promptly identify any suspicious or unauthorized activities.

A phishing email is a fraudulent attempt where an email appears to originate from a legitimate source but is actually designed to deceive recipients into disclosing sensitive information. Such attacks aim to gather credentials and other valuable information that can be used to gain unauthorized access to networks or accounts.

The post Los Angeles County suffers data breach impacting 200000 individuals appeared first on Cybersecurity Insiders.

23andMe, the California-based company which sells DNA testing kits to help people learn about their ancestry and potential health risks, is facing scrutiny from British and Canadian data protection authorities following a security breach that saw hackers compromise the personal data of nearly seven million users. Read more in my article on the Hot for Security blog.