Car rental giant Sixt hit by cyberattack, customer service delayed

Car rental company Sixt confirmed on May 1, 2022 that it had detected “IT irregularities” on April 29, and had been subject to a cyberattack. A statement made by the company said: “Response measures were implemented immediately in accordance with pre-planned security protocols. Subsequently, it has been confirmed that Sixt SE was subject to a cyber-attack, which Sixt was able to contain at an early stage.” The statement further said: “As a standard precautionary measure, access to IT systems was immediately restricted and the pre-planned recovery processes were initiated. Many central Sixt systems, in particular the website and apps were kept up and running.”

Customers who called the company heard a recorded message telling them, “Due to a technical problem, we are currently unavailable and can only process e-mail inquiries with a delay.”

The type of attack has not been made public, and it is unclear if it was a ransomware attack. The company also declined to say whether customer or employee data was accessed during the cyberattack.

Sixt employs 7,000 people and operates about 2,000 locations across 110 countries.

Read more about it here.

Atlassian addresses a critical Jira authentication bypass vulnerability

Atlassian, an Australian software company that develops products for software developers, has published a security advisory to alert that its Jira and Jira Service Management products are affected by a critical authentication bypass vulnerability in Seraph, the company’s web application security framework.

Seraph is used in its Jira and Confluence products for handling all login and logout requests via a system of pluggable core elements.

The flaw is tracked as CVE-2022-0540, and comes with a severity rating of 9.9 out of 10 on the CVSS scoring system. It allows a remote attacker to bypass authentication by sending a specially crafted HTTP request to vulnerable endpoints.

The affects products are Jira Core Server, Jira Software Server, Jira Software Data Center, Jira Service Management Server, and Jira Service Management Data Center.

Only specific versions are impacted.

Users are strongly advised to update to one of the fixed versions. If this is not possible, Atlassian recommends updating the affected apps to a version that has remediated the risk, or disabling the vulnerable apps until patching is possible.

Read more about it here.

Wind turbine manufacturer Nordex shuts down IT systems in response to cyberattack

Nordex Group, one of the largest manufacturers of wind turbines, was hit by a cyberattack that forced the company to shut down some of its IT systems.

Based in Hamburg, German, Nordex designs, manufactures and sells wind turbines, employing about 8,500 people.

On April 2, 2022, the company announced that on March 31, 2022, it detected it was “subject to a cyber security incident. The intrusion was noted in an early stage and response measures initiated immediately in line with crisis management protocols. As a precautionary measure, the company decided to shut down IT systems across multiple locations and business units.”

Nordex did not disclose further technical details of the cyberattack.

Read more about it here.

Hackers breached Mailchimp to phish crypto users

Mailchimp, a veteran email marketing platform, has confirmed that hackers used an internal tool on it platform to steal data from 102 of its clients, with the data being used to send phishing emails to users of cryptocurrency services.

The breach became more apparent when users of the Trezor hardware cryptocurrency wallet reported being targeted by sophisticated phishing emails. Trezor users received emails claimed to be from Trezor, telling them that their accounts were compromised in a data breach. The email included a link to an updated version of Trezor Suite, along with instructions on how to set up a new pin. In reality, the email was pointing to a phishing site meant to capture the contents of their digital wallets.

Users of Trezor devices have been advised to report any new phishing attempts directly to Trezor, at security@trezor.io.

Read more about it here.

US FCC adds Kaspersky to its Covered List due to unacceptable national security risk

On March 25, 2022, the US Federal Communications Commission (FCC) added Kaspersky and two Chinese companies to its Covered List, because it poses unacceptable risk to US national security.

“The Federal Communications Commission’s Public Safety and Homeland Security Bureau today added equipment and services from three entities – AO Kaspersky Lab, China Telecom (Americas) Corp, and China Mobile International USA Inc. – to its list of communications equipment and services that have been deemed a threat to national security, consistent with requirements in the Secure and Trusted Communications Networks Act of 2019.” reads the FCC statement.

The FCC’s decision follows an advisory released by Germany’s Federal Office of Information Security (BSI) this month against using the company’s security solutions in the country over doubts about the reliability of the manufacturer, as it still has to abide by Russian laws and regulation.

Read more about it here.

Hundreds of GoDaddy-hosted sites backdoored in hacking campaign

A new hacking campaign infecting hundreds of sites hosted by GoDaddy-hosted sites has been uncovered. The discovery comes from Wordfence, whose team first observed the malicious activity on March 11, 2022, with 298 websites infected by the backdoor within 24 hours, 281 of which were hosted on GoDaddy’s Managed WordPress service.

The backdoor infecting the sites is a 2015 Google search SEO-poisoning tool implanted on PHP file wp-config.php to get spam link templates from Command and Control (C2) domains that are used to inject malicious pages into search results. The campaign uses mostly pharmaceutical spam templates, served to visitors of the compromised websites instead of the actual websites content.

Users of GoDaddy’s Managed WordPress platform should scan the wp-config.php file to locate potential backdoor injections.

Read more about it here.

Ukrainian WordPress sites see massive attack volumes

Internet security companies have recorded a massive wave of cyberattacks against Ukrainian WordPress sites since Russia invaded Ukraine.

Cybersecurity firm Wordfence, which protects 8,320 WordPress websites belonging to universities, government, military, and law enforcement entities in Ukraine, reported 144,000 attacks on February 25, 2022 alone, which is three times the number of daily attacks from earlier in February across the Ukrainian websites that they protect. The attacks compromised at least 30 Ukrainian university websites. The hacking group behind these attacks is a pro-Russian group called “theMx0nday”.

For the first time in its history, Wordfence has decided to automatically deploy real-time threat intelligence to all Ukrainian websites using this WordPress plugin, regardless of their subscription tier. Normally, this feature is only available to Premium customers. “We are doing this to assist in blocking cyberattacks targeting Ukraine. This update requires no action from users of the Free version of Wordfence on the UA top-level domain.” says their blog post.

Read more about it here.

CISA publishes a list of free cybersecurity tools and services

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) announced that it has compiled a list of free cybersecurity tools and services that can help organizations further advance their security capabilities. This living repository includes cybersecurity services provided by CISA, widely used open source tools, and free tools and services offered by private and public sector organizations across the cybersecurity community. CISA will also implement a process for organizations to submit additional free tools and services for inclusion on this list in the future.

The resources include guidelines on phishing assessment services, remote penetration tests, distributed denial-of-service (DDoS) protection, Project Shield, repositories for threat data, antivirus tools, forensics software, and backup services, among others.

CISO doesn’t endorse the resources for specific use case, so organizations would need to evaluate the tools and services listed to determine if they meet their needs.

Read more about it here.

Criminals Increasing SIM Swap Schemes to Steal Millions of Dollars, FBI warns

The Federal Bureau of Investigation (FBI) issued an announcement to inform mobile carriers and the public of the increasing use of Subscriber Identity Module (SIM) swapping by criminals to steal money. From January 2018 to December 2020, the FBI Internet Crime Complaint Center (IC3) received 320 complaints related to SIM swapping incidents with adjusted losses of about $12 million. In 2021, IC3 received 1,611 SIM swapping complaints with adjusted losses of more than $68 million.

SIM swapping is a malicious technique where cyber criminals target mobile carriers to gain access to victims’ bank accounts and virtual currency accounts. Criminal actors conduct SIM swap schemes using these techniques:
Social engineering, insider threat, or phishing techniques.

  • Social engineering: Cyber criminals impersonate a victim to trick the mobile carrier into switching the victim’s mobile number to a SIM card in the criminal’s possession
  • Insider Threat: Cyber criminals pay off a mobile carrier employee to switch a victim’s mobile number to a SIM card in the criminal’s possession.
  • Phishing: Cyber criminals deceive mobile carrier employees into downloading malware used to hack the mobile carrier systems that handle SIM swaps.

“Once the SIM is swapped, the victim’s calls, texts, and other data are diverted to the criminal’s device. This access allows criminals to send ‘Forgot Password’ or ‘Account Recovery’ requests to the victim’s email and other online accounts associated with the victim’s mobile telephone number. Using SMS-based two-factor authentication, mobile application providers send a link or one-time passcode via text to the victim’s number, now owned by the criminal, to access accounts. The criminal uses the codes to login and reset passwords, gaining control of online accounts associated with the victim’s phone profile.”

The FBI recommends individuals take the following precautions:

  • Do not advertise information about financial assets, including ownership or investment of cryptocurrency, on social media websites and forums.
  • Do not provide your mobile number account information over the phone to representatives that request your account password or pin. Verify the call by dialing the customer service line of your mobile carrier.
  • Avoid posting personal information online, such as mobile phone number, address, or other personal identifying information.
  • Use a variation of unique passwords to access online accounts.
  • Be aware of any changes in SMS-based connectivity.
  • Use strong multi-factor authentication methods such as biometrics, physical security tokens, or standalone authentication applications to access online accounts.
  • Do not store passwords, usernames, or other information for easy login on mobile device applications.

Read more about it here.

Microsoft blocked tens of billions of brute-force and phishing attacks in 2021

Office 365 and Azure Active Directory (Azure AD) customers were the targets of tens of billions of phishing emails and brute force attacks successfully blocked in 2021 by Microsoft.

“From January 2021 through December 2021, we’ve blocked more than 25.6 billion Azure AD brute force authentication attacks and intercepted 35.7 billion phishing emails with Microsoft Defender for Office 365,” said Vasu Jakkal, Corporate Vice President for Security, Compliance and Identity at Microsoft.

“Strong identity authentication, such as multifactor authentication (MFA) and passwordless solutions would make it a lot harder for threat actors to brute force their way into their targets’ Microsoft accounts,” Jakkal added.

“Across industries, only 22 percent of customers using Microsoft Azure Active Directory (Azure AD), Microsoft’s Cloud Identity Solution, have implemented strong identity authentication protection as of December 2021,” Jakkal said.

Microsoft introduced Cyber Signals, a cyber threat intelligence brief informed by the latest Microsoft threat data and research.

Cyber Signals will provide trend analysis and practical guidance to strengthen the defense of its customers.

Read more about it here.