CISO Talk by James Azar
CyberHub Podcast
American Water Shuts Down after Cyberattack, Russian State Media Cyberattack, ADT & Moneygram Breach
0:00
Current time: 0:00 / Total time: -15:41
-15:41

American Water Shuts Down after Cyberattack, Russian State Media Cyberattack, ADT & Moneygram Breach

Today’s top cybersecurity news and the latest threats from Practicing CISO James Azar, tune in to hear how practitioner’s breakdown the latest to bolster their cybersecurity

The latest episode of the CyberHub Podcast, hosted by James Azar, covered a variety of critical cybersecurity topics affecting industries and infrastructures around the world.

Leave a comment

American Water Cyberattack

The largest publicly traded U.S. water and wastewater utility, American Water, experienced a cyberattack that shut down their IT systems, including customer service portals, but did not affect their water supply. This incident likely involved ransomware and demonstrated the importance of network segmentation between IT and OT systems. Organizations in critical infrastructure sectors need to take such threats seriously to avoid catastrophic outcomes.

Russian State Media Attack

Russia's state media company, VGTRK, suffered a cyberattack that disrupted broadcasts on its major TV channels for several hours. While details remain unverified, it’s believed the attackers wiped data, possibly as part of ongoing cyber warfare linked to the Russia-Ukraine conflict, potentially involving Ukrainian hacktivists.

MoneyGram Data Breach

MoneyGram confirmed that attackers stole sensitive customer data, including names, social security numbers, and government ID documents, in a September attack that caused a five-day outage. The breach exposed the risks of consolidating extensive customer data into single systems, making them vulnerable to cyber threats.

ADT Data Breach

ADT, a leading home and small business security firm, disclosed its second data breach in two months. The most recent breach involved the theft of employee credentials from a third-party vendor, which gave attackers access to ADT's systems. This highlights the dangers of supply chain vulnerabilities in cybersecurity.

Lego Website Phishing Scam

Cybercriminals briefly hacked the official Lego website to promote a fake Lego cryptocurrency token, tricking users into purchasing it with Ethereum. While the scam was relatively short-lived, it serves as a reminder that even trusted brands can be targeted for sophisticated crypto-related scams.

Google Extensions Vulnerability

Researchers demonstrated how malicious actors can exploit vulnerabilities in Google browser extensions, even after the company’s Manifest V3 security updates. These extensions can steal user data, including live video feeds from platforms like Zoom and Google Meet, highlighting the need for stricter security measures in browser extensions.

Trinity Ransomware Targeting Healthcare

A new ransomware family, "Trinity," has been targeting healthcare organizations, using phishing and software vulnerabilities to infiltrate systems, steal data, and encrypt files. The group has already compromised several healthcare organizations, posing significant risks to patient safety and healthcare operations.

Cybersecurity Industry Financial Health

Despite a slow IPO market, the cybersecurity industry remains robust, with companies like Rubrik raising hundreds of millions in private funding. This trend shows that private investors still have confidence in the sector, even as the market consolidates through high-profile acquisitions such as MasterCard's purchase of Recorded Future.

Lastly, the podcast touched on the financial health of the cybersecurity industry. Despite some hesitation in the IPO market, private funding continues to flow, with companies like Rubrik raising substantial amounts, indicating that demand for cybersecurity solutions remains strong.

Action Item for Cybersecurity Professionals

1. Strengthen Network Segmentation and Incident Response Plans: Organizations, particularly those in critical infrastructure sectors like water, healthcare, and utilities, must ensure robust network segmentation between IT and OT systems to contain cyberattacks and prevent operational disruptions. Regular testing of incident response plans is crucial for minimizing downtime and mitigating the effects of breaches.

2. Enhance Supply Chain and Vendor Security Management: As shown by the ADT and MoneyGram breaches, attackers often exploit vulnerabilities in third-party vendors and partners. Implement stricter security protocols for third-party access, conduct regular vendor audits, and ensure that partners adhere to cybersecurity best practices to prevent supply chain-related breaches.

CISO Talk by James Azar is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.

✅ Story Links: 

https://www.bleepingcomputer.com/news/security/american-water-shuts-down-online-services-after-cyberattack/

https://therecord.media/russian-state-media-company-disrupted-cyberattack

https://www.bleepingcomputer.com/news/security/moneygram-confirms-hackers-stole-customer-data-in-cyberattack/

https://www.bleepingcomputer.com/news/security/adt-discloses-second-breach-in-2-months-hacked-via-stolen-credentials/

https://www.bleepingcomputer.com/news/security/legos-website-hacked-to-push-cryptocurrency-scam/

https://www.darkreading.com/cyber-risk/malicious-chrome-extensions-past-google-updated-security

https://www.securityweek.com/healthcare-organizations-warned-of-trinity-ransomware-attacks/

https://www.darkreading.com/cyber-risk/mideast-turkey-cyber-threats-spike-defense-changes

https://www.wsj.com/articles/cyber-providers-see-strong-demand-but-few-feel-confident-enough-to-list-cb933fec?mod=cybersecurity_news_article_pos1

🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1  

✅ Important Links to Follow: 

👉Substack:

👉Listen here: https://linktr.ee/cyberhubpodcast   

Stay Connected With Us.

👉Facebook: https://www.facebook.com/CyberHubpodcast/ 

👉LinkedIn: https://www.linkedin.com/company/cyberhubpodcast/ 

👉Twitter (X): https://twitter.com/cyberhubpodcast 

👉Instagram: https://www.instagram.com/cyberhubpodcast 

✅ For Business Inquiries:  info@cyberhubpodcast.com

=============================

About The CyberHub Podcast.

The Hub of the Infosec Community. 

Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. 

Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.

Discussion about this podcast

CISO Talk by James Azar
CyberHub Podcast
Today’s top cybersecurity news and the latest from Practicing CISO James Azar, tune in to hear how practitioners read, view and work after hearing the latest headlines and how these stories help keep practitioners sharp and ready.