CISO Talk by James Azar
CyberHub Podcast
FBI has Lockbit Decryption Keys, Advance Auto Parts Data for Sale, ESXi Ransomware
0:00
Current time: 0:00 / Total time: -16:54
-16:54

FBI has Lockbit Decryption Keys, Advance Auto Parts Data for Sale, ESXi Ransomware

Today’s top cybersecurity news and the latest threats from Practicing CISO James Azar, tune in to hear how practitioners breakdown the latest to bolster their cybersecurity programs

Good morning, Security Gang!

Welcome to another episode of the CyberHub Podcast. Today's show is brought to you by our good friends at Nudge Security.

Tomorrow at 11 a.m. Eastern, Jaime Belasco, the CTO and co-founder of Nudge, will join us live to discuss supply chain risks and tactical mitigation strategies. Don't miss it!

For the latest updates, check out our Substack at JamesAzar.substack.com.

FBI Takes Down LockBit Ransomware Group

The FBI has successfully obtained over 7,000 decryption keys from the LockBit ransomware group by dismantling their infrastructure. At the 2024 Boston Conference on Cybersecurity, Brian Vorndran, Assistant Director of the FBI's Cyber Division, announced that victims can recover their encrypted data by filling out a form with the agency. Additionally, a decrypter developed by Japanese police is available on the No More Ransom project website.

Action Points:

1. Victims of LockBit 3.0: Contact the FBI to recover encrypted files.

2. Utilize Decryption Tools: Access the Japanese police decrypter via the No More Ransom project.

Advanced Auto Parts Data Breach

Threat actors claim to have stolen three terabytes of data from Advanced Auto Parts' Snowflake account, affecting 380 million customer profiles and 358,000 employee records. Despite the breach, Advanced Auto Parts has not yet disclosed the incident publicly or notified the SEC.

Action Points:

1. Monitor for Updates: Keep an eye on Advanced Auto Parts' official communications for breach details.

2. Data Security Measures: Advanced Auto Parts should enhance security protocols and promptly inform stakeholders.

Kiuwan Security Vulnerabilities

It took nearly two years for Kiuwan, owned by Idera, to patch several serious vulnerabilities in their SaaS products. SEC Consult discovered the flaws, including cross-site scripting and XXE injection vulnerabilities, first reported in November 2022 but only patched in 2024.

Action Points:

1. Apply Updates: Ensure all users of K1's SaaS products update to the latest versions.

2. Review Security Protocols: Conduct regular security assessments to avoid delayed patching.

PyPi Supply Chain Attack

A rogue package named crypticcompilers, a typosquatting version of a legitimate library, was found on PyPi. It contained an information stealer called LumaC2, targeting Windows OS. The package was downloaded 441 times before removal.

Action Points:

1. Verify Package Integrity: Double-check package names and sources before downloading.

2. Use Security Tools: Implement tools to detect and prevent typosquatting attacks.

Share

Linux Variant of TargetCompany Ransomware

Researchers have identified a new Linux variant of the TargetCompany ransomware, targeting ESXi environments using a custom shell script. This variant collects extensive victim information before encrypting files.

Action Points:

1. Strengthen ESXi Security: Implement additional security measures for ESXi environments.

2. Monitor for Threats: Stay vigilant for signs of ransomware activity and respond swiftly.

Abuse of Packer Software for Malware Distribution

Threat actors are increasingly using legitimate Packer software like Box App to distribute malware, including remote access trojans and information stealers. This trend, identified by Checkpoint researchers, highlights the evolving methods of cybercriminals.

Action Points:

1. Educate Teams: Train IT and security teams on the risks of Packer software misuse.

2. Deploy Detection Tools: Use advanced security solutions to identify and mitigate such threats.

Poland Invests in Cyber Defense

Poland announced a $760 million investment in cyber defense to counter ongoing Russian cyberattacks. The new Cyber Shield program aims to bolster the resiliency of critical infrastructure and government services.

Apple Refuses Bug Bounty to Kaspersky

Kaspersky disclosed four zero-day vulnerabilities in iPhone software but was denied a bug bounty by Apple. The refusal was speculated to be due to sanctions or other reasons.

Closing Message from Nudge Security

When your CEO asks if you're using a recently breached SaaS app, how quickly can you respond? Nudge Security discovers and categorizes every SaaS app account in your organization, offering a full inventory within minutes. Start a 14-day trial at nudgesecurity.com/cyberhub. Don't miss tomorrow's live show with Jaime Belasco at 11 a.m. discussing supply chain attacks. Stay cyber safe!

Stay Connected!

Connect with us on social media and subscribe to our podcast on your favorite platform. Have a great day, and most importantly, stay cyber safe!

Leave a comment

👀 SHOW Supporters:

Today’s Episode is supported by our friends at Nudge Security free 14-day trial to all CyberHub Podcast community members at https://www.nudgesecurity.com/cyberhub

✅ Story Links: 

https://www.securityweek.com/fbi-says-it-has-7000-lockbit-ransomware-decryption-keys/

https://www.bleepingcomputer.com/news/security/advance-auto-parts-stolen-data-for-sale-after-snowflake-attack/

https://www.securityweek.com/vulnerabilities-patched-in-kiuwan-code-security-products-after-long-disclosure-process/

https://thehackernews.com/2024/06/hackers-target-python-developers-with.html

https://www.bleepingcomputer.com/news/security/linux-version-of-targetcompany-ransomware-focuses-on-vmware-esxi/

https://thehackernews.com/2024/06/hackers-exploit-legitimate-packer.html

https://therecord.media/kaspersky-apple-bug-bounty-declined

https://therecord.media/poland-cyberdefense-spending-russian-attacks

🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1  

✅ Important Links to Follow: 

👉Website: https://www.cyberhubpodcast.com

👉Substack:

👉Listen here: https://linktr.ee/cyberhubpodcast   

Stay Connected With Us.

👉Rumble: https://rumble.com/c/c-1353861 

👉Facebook: https://www.facebook.com/CyberHubpodcast/ 

👉LinkedIn: https://www.linkedin.com/company/cyberhubpodcast/ 

👉Twitter (X): https://twitter.com/cyberhubpodcast 

👉Instagram: https://www.instagram.com/cyberhubpodcast 

✅ For Business Inquiries:  info@cyberhubpodcast.com

=============================

About The CyberHub Podcast.

The Hub of the Infosec Community. 

Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. 

Discussion about this podcast

CISO Talk by James Azar
CyberHub Podcast
Today’s top cybersecurity news and the latest from Practicing CISO James Azar, tune in to hear how practitioners read, view and work after hearing the latest headlines and how these stories help keep practitioners sharp and ready.