CISO Talk by James Azar
CyberHub Podcast
Car Dealerships paralyzed after CDK Attack, Change Healthcare Lists Medical Data, Russian Cyber Threats
0:00
-19:04

Car Dealerships paralyzed after CDK Attack, Change Healthcare Lists Medical Data, Russian Cyber Threats

Today’s top cybersecurity news and the latest threats from Practicing CISO James Azar, tune in to hear how practitioners breakdown the latest to bolster their cybersecurity programs

Good Morning, Security Gang!

Welcome to another episode of the CyberHub Podcast. We have a packed show today, covering major cyber incidents and the latest threats affecting businesses and individuals. Let's dive into the details.

CDK Global Cyber Attack Cripples

CDK Global, a leading provider of technology solutions for car dealerships, was hit by a severe cyber attack last week. The attack has paralyzed operations at 15,000 car dealerships, impacting sales, parts distribution, and various operational activities.

The attack was carried out by the BlackSuit ransomware gang, a rebranded faction of the notorious Royal ransomware group. CDK's attempts to restore systems were thwarted by persistent threat actors, further complicating the recovery process.

Action Items:

1. Implement immediate backup and disaster recovery plans. Ensure that backups are stored securely and tested regularly to prevent similar disruptions.

2. Conduct a thorough review of cybersecurity protocols and enhance defenses against ransomware attacks, focusing on endpoint security and network monitoring and MFA on all access points.

CISA Chemical Facility Breach

The Cybersecurity and Infrastructure Security Agency (CISA) notified participants of its Chemical Facility Anti-Terrorism Standards program that personal information and user accounts might have been compromised in a January hack.

The attackers exploited a zero-day vulnerability in the Ivanti Connect Secure appliance. Although there is no evidence of data exfiltration, sensitive information was accessed, potentially exposing vulnerabilities at chemical facilities.

Action Items:

1. Notify affected individuals promptly and review security measures to protect sensitive data.

2. Patch all known vulnerabilities in critical systems and implement robust incident response plans to mitigate potential impacts.

Change Healthcare Ransomware Attack Fallout

Change Healthcare, a subsidiary of United Healthcare, confirmed a significant data breach resulting from a ransomware attack. The breach exposed a vast amount of medical and personal data, potentially affecting a substantial portion of the U.S. population. Compromised information includes health insurance details, medical records, and financial data.

Action Items:

1. Inform patients about the breach and provide resources for identity protection and credit monitoring.

2. Monitor financial accounts and health insurance statements for suspicious activity and consider freezing credit reports to prevent identity theft.

LA Unified School District Data Breach

The Los Angeles Unified School District (LAUSD) confirmed a data breach after a threat actor accessed student and employee data via a compromised Snowflake account. The stolen data, now being sold for $150,000, includes personal, demographic, and medical information of students.

Action Items:

1. Strengthen cybersecurity measures, including enforcing multi-factor authentication (MFA) on all accounts.

2. Stay vigilant for potential phishing attacks and monitor personal information for any signs of misuse.

Intel Firmware Vulnerability

A high-severity vulnerability in Phoenix Technologies' SecureCore UEFI firmware, affecting numerous Intel processors, has been discovered. The vulnerability could allow local attackers to escalate privileges and execute arbitrary code. This issue impacts devices from major manufacturers, including Lenovo, Acer, Dell, and HP.

Action Items:

1. Apply firmware updates provided by Phoenix Technologies to mitigate the vulnerability.

2. Ensure all device firmware is up-to-date and regularly check for security patches.

SolarWinds Vulnerability Exploitation

Threat actors are exploiting a recently patched SolarWinds server vulnerability, allowing them to read sensitive files on affected systems. The flaw, identified as CVE-2024-2890905, is being actively targeted, making it crucial for SolarWinds customers to update to the latest hotfix immediately.

Action Items:

1. Apply the latest hotfix to secure systems against potential exploitation.

2. Monitor systems for signs of compromise and ensure all software is up-to-date.

Chinese and Russian Cyber Threats

Chinese APT group Sneaky Chef has been targeting government ministries across the eastern hemisphere, including South Korea and Uzbekistan. In Russia, a ransomware attack on London hospitals has left the NHS struggling to recover, with patient data potentially leaked online. The U.S. has also banned Kaspersky antivirus software due to national security concerns.

Stay Cyber Safe:

Make sure to subscribe, follow, and share the CyberHub Podcast for more updates and in-depth analysis. Visit [Nudge Security](https://www.nudgesecurity.com) for a 14-day free trial to strengthen your cybersecurity posture. Stay vigilant and protect your digital assets.

Have a great day, and stay cyber safe!

Share

👀 SHOW Supporters:

Today’s Episode is supported by our friends at Nudge Security free 14-day trial to all CyberHub Podcast community members at https://www.nudgesecurity.com/cyberhub

✅ Story Links: 

https://www.securityweek.com/disruptions-at-many-car-dealerships-continue-as-cdk-hack-worsens/

https://www.bleepingcomputer.com/news/security/cdk-global-outage-caused-by-blacksuit-ransomware-attack/

https://www.securityweek.com/personal-and-facility-information-potentially-accessed-in-cisa-hack/

https://www.bleepingcomputer.com/news/security/change-healthcare-lists-the-medical-data-stolen-in-ransomware-attack/

https://www.bleepingcomputer.com/news/security/los-angeles-unified-confirms-student-data-stolen-in-snowflake-account-hack/

https://www.securityweek.com/hundreds-of-pc-server-models-possibly-affected-by-serious-phoenix-uefi-vulnerability/

https://www.securityweek.com/recent-solarwinds-serv-u-vulnerability-exploited-in-the-wild/

https://www.darkreading.com/threat-intelligence/sneakychef-apt-slices-up-foreign-affairs-with-sugargh0st

https://www.securityweek.com/investigation-of-russian-hack-on-london-hospitals-may-take-weeks-amid-worries-over-online-data-dump/

https://www.darkreading.com/cybersecurity-operations/kaspersky-us-customers-deadline-govt-ban

🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1  

✅ Important Links to Follow: 

👉Website: https://www.cyberhubpodcast.com

👉Substack:

👉Listen here: https://linktr.ee/cyberhubpodcast   

Stay Connected With Us.

👉Rumble: https://rumble.com/c/c-1353861 

👉Facebook: https://www.facebook.com/CyberHubpodcast/ 

👉LinkedIn: https://www.linkedin.com/company/cyberhubpodcast/ 

👉Twitter (X): https://twitter.com/cyberhubpodcast 

👉Instagram: https://www.instagram.com/cyberhubpodcast 

✅ For Business Inquiries:  info@cyberhubpodcast.com

=============================

About The CyberHub Podcast.

The Hub of the Infosec Community. 

Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. 

0 Comments
CISO Talk by James Azar
CyberHub Podcast
Today’s top cybersecurity news and the latest from Practicing CISO James Azar, tune in to hear how practitioners read, view and work after hearing the latest headlines and how these stories help keep practitioners sharp and ready.