Mathew J. Schwartz reports: Potential Ukrainian military recruits are being targeted with malware and anti-mobilization messaging through legitimate Telegram channels. A report from Google’s Threat Intelligence Group attributes the “hybrid espionage and information operation” to a suspected Russian group, codenamed UNC5812, whose Telegram persona goes by the handle “Civil Defense.” Telegram remains a vital source of information…
Operation Magnus disrupts Redline and Meta infostealers
From Operation Magnus: On the 28th of October 2024 the Dutch National Police, working in close cooperation with the FBI and other partners of the international law enforcement task force Operation Magnus, disrupted operation of the Redline and Meta infostealers. Involved parties will be notified, and legal actions are underway. Watch their update and stay tuned!…
K12 SIX Releases Updated Framework for School Cybersecurity
Brandi Vesco reports: The K12 Security Information eXchange (K12 SIX) has updated its cybersecurity recommendations for the 2024-25 school year to keep pace with evolving cybersecurity best practices, such as the need for multifactor authentication (MFA) for vendors and segmentation of student traffic. The framework of recommendations is weighted, which means it allows users to…
Since June, two groups claim to have attacked The Eye Clinic Surgicenter. What do we know?
One cyberattack is distressing enough. But has The Eye Clinic Surgicenter been attacked by two different groups this year? Silence is not golden if patient data has already been leaked. Last week, Meow Leaks added The Eye Clinic Surgicenter in Montana to their leak site. Meow’s site indicates that is offering 59 GB of files…
Postel S.p.A. and the 2023 Data Breach: The Medusa Attack and Sanctions from the Data Protection Authority
Over on SuspectFile, Marco A. De Felice writes: In August 2023, Postel S.p.A., a leading Italian company in the postal services and digital communications sector, became the victim of a serious cyberattack. The Medusa cybercriminal group exploited unresolved vulnerabilities in the company’s systems, gaining access to a large amount of sensitive data. This breach raised significant…
In legal first, Japan convicts man of abusing AI to generate ransomware
Malay Mail reports: A 25-year-old man has become the first person in Japan to be convicted for criminal activities involving generative AI. According to The Yomiuri Shimbun, the Tokyo District Court found Ryuki Hayashi guilty of creating a computer virus using interactive generative artificial intelligence. He was sentenced to three years in prison, suspended for four…