Skip to main content
News

Cyber News Rundown: Stolen data published from University of Duisburg-Essen breach

  • January 20, 2023
  • 9 replies
  • 213 views
Cyber News Rundown: Stolen data published from University of Duisburg-Essen breach
Forum|alt.badge.img+7
  • Threat Research Analyst
  • 4 replies

The Vice Society threat group has published data acquired during a breach of the University of Duisburg-Essen after the school refused to pay a demanded ransom. In other cybersecurity news, maritime software supplier DNV suffered a breach of their internal systems that has left roughly 1,000 ships operating at limited capacity.

Software vendor exposes Nissan customer data

Officials for Nissan North America announced that 18,000 of their US customers have had their information compromised due to a poorly secured database owned by a third-party software vendor. The investigation into the database breach revealed an initial security incident last June. Further digging identified that an unauthorized user had gained access to a significant amount of sensitive customer data. This breach continues the pattern of threat actors targeting car manufacturers through improperly configured servers and GitHub repositories.

Vice Society publishes data from University of Duisburg-Essen attack

Following the refusal by the University of Duisburg-Essen (UDE) to pay the ransom demanded from the November attack by the Vice Society, the threat group has begun publishing data that was stolen during their intrusion into the UDE systems. While the exact amount of stolen data is still unclear, officials are processing the data published on the Vice Society leak site to verify which students and staff have been affected.

Magecart targets Liquor Control Board of Ontario (LCBO)

Last week it was discovered that malicious code had been injected into the main website for the Liquor Control Board of Ontario (LCBO), which is Canada’s largest alcohol retailer. The code had been actively stealing payment card data for nearly a week. Segments of the injected code point towards the Magecart group being responsible for the attack and will be posting the stolen data for sale to a variety of web forums that specialize in the trafficking of identity and payment card information.

Ransomware attack on maritime supplier affects 1,000 active ships

Maritime software supplier DNV suffered a ransom attack on their internal network that forced staff to temporarily shut down their ShipManager system to avoid additional damage. While officials for DNV are still working to determine if any sensitive data was stolen during the attack, they have confirmed that impacted customers should still be able to use the offline functionalities of ShipManager until the incident has been resolved. It is believed that 70 customers of DNV are involved, which translates to 1,000 ships being unable to operate at full capacity.

Contractor breach exposes millions of Japanese insurance customers

After a data breach at an unnamed third-party vendor, about 2 million Japanese customers of both Aflac and Zurich insurance have had all their stored information compromised. The investigation into this breach has revealed that the threat actors used previously leaked credentials to hack into the third-party vendor, though the actual source of those credentials remains a mystery.

Did this help you find an answer to your question?

9 replies

TripleHelix
Moderator
Forum|alt.badge.img+63
  • Moderator
  • 8952 replies
  • January 20, 2023

Thanks @ConnorM Great information as always!


ProTruckDriver
Moderator

Thank you @ConnorM for posting this information.


Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54

Thank you @ConnorM 


russell.harris
Popular Voice
Forum|alt.badge.img+5

Yes, thanks as always. Good summary


FasteasyPhil
New Member
Forum|alt.badge.img+3
  • New Member
  • 39 replies
  • January 21, 2023

More and more the threat is now leaking data thats been breached.  People must be using better backup systems to secure their data, so can recover from encrypted files.

I think that it hardly matters if the criminals breach data to the public when they have the data anyway and will sell it if they can.  Its probably more beneficial to see what has been breached than wondering what data they have.  Less ransom payments will be beneficial in the long term.

I remember the “we’ve been watching you on your webcam and have your hacked your password which is **** “ emails that seemed scary but actually were useful in telling you how burned that old password actually was.

At some point  I beleive every person online will have had some of their details breached, its just all about impact, which I hope for most people will be minimal.


tasystems
New Voice
Forum|alt.badge.img+8
  • New Voice
  • 156 replies
  • January 21, 2023

Wouldn't it be nice to know what software and hardware security they had in place that got breeched, so that others could learn HOW this was done? I'm sure the software and hardware vendors would never agree to this, but it could allow many other people to learn how to protect their systems better.


Martin.1
Popular Voice
Forum|alt.badge.img+4
  • Popular Voice
  • 424 replies
  • January 23, 2023

@ConnorM  thank you for sharing as always 


Martin.1
Popular Voice
Forum|alt.badge.img+4
  • Popular Voice
  • 424 replies
  • January 23, 2023
FasteasyPhil wrote:

More and more the threat is now leaking data thats been breached.  People must be using better backup systems to secure their data, so can recover from encrypted files.

I think that it hardly matters if the criminals breach data to the public when they have the data anyway and will sell it if they can.  Its probably more beneficial to see what has been breached than wondering what data they have.  Less ransom payments will be beneficial in the long term.

I remember the “we’ve been watching you on your webcam and have your hacked your password which is **** “ emails that seemed scary but actually were useful in telling you how burned that old password actually was.

At some point  I beleive every person online will have had some of their details breached, its just all about impact, which I hope for most people will be minimal.

Backup is always your last line of refence. You can NEVER have enough backups. A decent and well tested BCDR is always at the forefront, yet in majority of the cases overlooked.


kleinmat4103
Popular Voice
Forum|alt.badge.img+6
  • Popular Voice
  • 512 replies
  • January 23, 2023
tasystems wrote:

Wouldn't it be nice to know what software and hardware security they had in place that got breeched, so that others could learn HOW this was done? I'm sure the software and hardware vendors would never agree to this, but it could allow many other people to learn how to protect their systems better.

Agreed. There is something to learning from others’ mistakes. I wish there was some requirement to explain in some detail what happened. Doesn’t have to be super-detailed. I’m thinking something like:
User with admin privileges was phished, or they left the default password on their firewall, or their file server was still running Windows 2000, or they were a victim of a sophisticated nation-state attack.


Reply