Significant Security Events for the Week of Feb. 28th

This report summarizes notable information security incidents affecting businesses globally, focusing on data breaches, ransomware attacks, newly discovered vulnerabilities, and supply chain attacks.

I. Ransomware Attacks:
  • Lee Enterprises: This media company, owning over 70 daily newspapers and hundreds of publications, experienced a significant cyberattack disrupting printing, website operations, and publication schedules. While the specific ransomware used wasn’t disclosed, the attackers encrypted and stole files. This highlights the vulnerability of even large organizations to ransomware.
  • Sault Tribe/Kewadin Casinos (Michigan): A ransomware attack targeted the Sault Ste. Marie Tribe of Chippewa Indians and its Kewadin Casinos, temporarily shutting down gaming operations, health centers, and other tribal businesses. The attack’s scope and the specific ransomware are still under investigation. This underscores the growing threat to critical infrastructure and essential services.
  • University of The Bahamas: The University was hit by a ransomware attack impacting unspecified systems and operations. Further details regarding the extent of the damage and the type of ransomware are yet to be released. This incident is a reminder that educational institutions are increasingly becoming targets.
  • Unimicron (Taiwan): This printed circuit board manufacturer was targeted by the Sarcoma ransomware group, which threatened to leak stolen data. This highlights the global reach of ransomware attacks targeting various sectors.
  • Other Notable Mentions: Reports indicate continued activity from various ransomware groups, including Anubis (a Ransomware-as-a-Service offering), and ongoing concerns about supply chain attacks leveraging vulnerabilities in third-party suppliers to target larger organizations.
II. Data Breaches:
  • Wendy’s: Malware targeting point-of-sale (PoS) systems compromised 300 Wendy’s locations, potentially leading to the theft of customer payment card information. This incident emphasizes the ongoing vulnerability of PoS systems despite industry efforts toward enhanced security.
  • Hyatt Hotels: A data breach impacted 250 Hyatt Hotels across 50 countries, likely due to malware compromising payment processing systems. This highlights the vulnerability of the hospitality sector, repeatedly targeted for payment card data breaches.
  • Hilton Worldwide: Similar to Hyatt, Hilton also experienced a PoS malware attack compromising payment card data over a 17-week period. The repetitive nature of these attacks necessitates proactive security measures by hospitality businesses.
  • DISA Global Solutions: A data breach impacting over 3.3 million individuals was disclosed. The breach occurred in 2024, related to background and drug screening data, but only recently came to light. This emphasizes the importance of timely incident response and vulnerability remediation.
  • Other Notable Mentions: Several other data breaches were reported this week, including breaches affecting FBI and DHS employees, the Qatar National Bank (QNB), and various other organizations. The scale and specifics of the breaches vary, but cumulatively highlight the pervasive threat of data breaches across multiple sectors.
III. Newly Discovered Vulnerabilities:

Multiple vulnerabilities were disclosed this week affecting various software applications and systems, including:

  • Several vulnerabilities in FooGallery, WP Activity Log, and Mastodon, classified as medium severity.
  • Critical vulnerabilities in LinZhaoguan pb-cms and zyx0814 Pichome allowing for cross-site request forgery and path traversal.
  • A vulnerability in Dell Support Tools installing self-signed root digital certificates, creating security risks.
  • Vulnerabilities in OpenSSH and Palo Alto Networks PAN-OS firewalls allowing for Man-in-the-Middle (MitM) attacks, Denial-of-Service (DoS) attacks, and authentication bypass.
  • Critical vulnerabilities in Ivanti Connect Secure & Policy Secure, and Microsoft Power Pages allowing for privilege escalation.

Organizations should promptly patch affected systems to mitigate these risks. Regular vulnerability scanning and patching remain crucial for proactive security.

IV. Supply Chain Attacks:

While specific new supply chain attacks weren’t prominently reported this week, the ongoing risk remains a critical concern. Moody’s recent report highlights the increasing likelihood of larger organizations being targeted through supply chain vulnerabilities, emphasizing the need for robust vendor risk management and supply chain security strategies.

V. Additional Trends:
  • The FBI has confirmed North Korea’s Lazarus Group’s involvement in the Bybit cryptocurrency hack.
  • Chinese cyber espionage continues to be a significant concern, with reported increases in activity.
  • API security remains a weak point, with a majority of organizations reporting API-related issues.
  • The development of new ransomware and info-stealer tools continues at a rapid pace.
Conclusion:

The past week demonstrates a persistent and evolving threat landscape. IT leaders and cybersecurity professionals must remain vigilant, proactively manage vulnerabilities, enforce strong security practices, and maintain robust incident response plans. The increasing sophistication of attacks and the blurring lines between different attack vectors (ransomware, data breaches, supply chain compromises) require a holistic security approach.

More Articles & Posts