CISO Talk by James Azar
CyberHub Podcast
🚨 Halliburton Ransomware Attack, German & Seattle Airport Cyber-attacks, AI Legislation
1×
0:00
-15:11

🚨 Halliburton Ransomware Attack, German & Seattle Airport Cyber-attacks, AI Legislation

Today’s top cybersecurity news and the latest threats from Practicing CISO James Azar, tune in to hear how practitioner’s breakdown the latest to bolster their cybersecurity programs

Good Morning Security Gang!

On this Labor Day episode of the Cyber Help Podcast, the team was back in the studio to deliver a packed show, despite the holiday. As cybersecurity never sleeps, neither does the CyberHub team.

Here's a detailed summary of the stories covered, along with actionable items to help you stay ahead of the latest threats.

RansomHub Ransomware Gang Behind Halliburton Cyber Attack

The U.S. government suspects the RansomHub ransomware gang is responsible for the August 21 cyber attack on Halliburton. While details are scarce, a joint advisory from CISA, FBI, DHS, and MS-ISAC was issued, outlining TTPs (Tactics, Techniques, and Procedures) and IOCs (Indicators of Compromise). The RansomHub’s victim list includes 180 organizations, mostly within critical infrastructure sectors such as healthcare, financial services, and government facilities.

Action Items:

  • Review TTPs and IOCs: Ensure your security teams review the latest advisory and update your defenses accordingly.

  • Monitor for Indicators of Compromise: Regularly scan your network for any signs of the RansomHub's presence.

  • Incident Response Planning: Ensure your incident response plan is up-to-date and tested against ransomware attacks.

Cyber Attacks Disrupt Airports in Germany and Seattle

Airports in Langen, Germany, and Seattle, USA, were hit by significant cyber attacks. The German attack, attributed to APT group Fancy Bear (linked to the Russian GRU), targeted the Deutsche Flugsicherung's communication networks but did not impact air traffic control. Meanwhile, Seattle’s airport continues to suffer from disruptions, with some airlines resorting to manual processes, leading to long delays.

Action Items:

  • Strengthen OT/IT Separation: Review and enforce the separation between your OT and IT networks to limit damage from cyber attacks.

  • Improve Cyber Resilience Plans: Airports and similar infrastructure should enhance their resilience strategies, ensuring manual processes are well-prepared for cyber disruptions.

JAS Worldwide Cyber Attack Update

JAS Worldwide, a global logistics firm, experienced a cyber attack on August 27, which severely disrupted its operations. While many services have been restored, the recovery process is ongoing, and no group has claimed responsibility. The attack is suspected to be ransomware-related.

Action Items:

  • Backup and Recovery Drills: Regularly test and validate your backup and recovery procedures to ensure they are effective and timely.

  • Vendor and Customer Communication: If impacted by similar attacks, maintain clear communication with customers and vendors about the status of services.

  • Monitor for Ransomware Activity: Keep an eye on ransomware trends and update your defenses to protect against evolving threats.

    CISO Talk by James Azar is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.

  • North Korean Threat Actor Exploits Chrome Zero-Day

A North Korean threat actor exploited a Chrome remote code execution flaw (CVE-2023-4791) to target the cryptocurrency sector. Google patched the vulnerability on August 21, marking it as the seventh Chrome zero-day exploited this year.

Action Items:

  • Update Chrome Immediately: Ensure all systems are updated to the latest version of Chrome to mitigate the risk of this vulnerability.

  • Educate on Phishing Risks: Reinforce phishing awareness training, especially in sectors targeted by North Korean actors, like cryptocurrency.

  • Monitor Cryptocurrency Transactions: Organizations in the cryptocurrency sector should enhance monitoring of transactions for any unusual activity.

Ciceda3301 Ransomware as a Service (RaaS) Emerges

A new ransomware operation, Ciceda3301, is targeting ESXi environments using tactics similar to the notorious BlackCat group. They employ double extortion methods, and their malware shares significant overlaps with BlackCat's techniques.

Action Items:

  • Harden ESXi Servers: Ensure your ESXi servers are fully patched and monitored for unusual activity.

  • Prepare for Double Extortion: Develop and test response strategies specifically for double extortion ransomware attacks.

  • Update TTPs and IOCs: Incorporate the latest TTPs and IOCs related to Ciceda 3301 into your security monitoring systems.

GitHub Abused to Distribute Luma Stealer Malware

Hackers are using GitHub to distribute the Luma Stealer malware under the guise of fake fixes in projects. This malware targets credentials, cookies, and browsing history across various browsers.

Action Items:

  • Verify Fixes and Updates: Before applying any updates or fixes from GitHub, verify their authenticity and source.

  • Use Endpoint Protection: Implement and update endpoint protection solutions to detect and block malware like Luma Stealer.

  • Raise awareness among developers about the risks of downloading and applying unverified fixes from public repositories.

Slow Tempest Espionage Campaign Uncovered in China

Researchers have identified a sophisticated espionage campaign named Slow Tempest, targeting entities within China. The campaign focuses on long-term access and data exfiltration, with a potential for sabotage.

GM Faces Lawsuit Over Data Collection Practices

General Motors is under legal scrutiny for allegedly selling driving data of 1.5 million Texans to third parties without consent. The lawsuit claims GM used this data to score driver behavior and sold it to insurers, potentially influencing insurance rates.

Action Items:

  • Review Data Privacy Practices: Ensure your organization’s data collection and sharing practices comply with all relevant privacy laws and regulations.

  • Monitor Legal Developments: Stay informed on the outcomes of this lawsuit and any changes to privacy regulations that may affect your business.

California’s AI Safety Bill Moves Forward

California is advancing a bill aimed at regulating AI safety, requiring companies to disclose safety protocols to prevent misuse, such as tampering with the state’s electric grid or creating chemical weapons. The bill is awaiting the governor's decision.

If your company develops AI technologies, begin preparing to comply with potential new regulations in California. Assess and document your AI safety measures, focusing on preventing misuse and ensuring responsible AI deployment. Monitor the progress of this bill and other AI-related legislation that could impact your business.

Closing Thoughts

The CyberHub Podcast reminds us that in the fast-paced world of cybersecurity, staying informed and prepared is crucial. As you digest these updates, consider how each story might impact your organization and what steps you can take to bolster your defenses.

Stay Cyber Safe and Tune in Tomorrow!

Leave a comment

👀 SHOW Supporters:

Today’s Episode is supported by our friends at Nudge Security free 14-day trial to all CyberHub Podcast community members at https://www.nudgesecurity.com/cyberhub

✅ Story Links: 

https://www.securityweek.com/us-government-issues-advisory-on-ransomware-group-blamed-for-halliburton-cyberattack/

https://thecyberexpress.com/russian-deutsche-flugsicherung-cyberattack/

https://therecord.media/labor-day-travel-seattle-airport-hack

https://thecyberexpress.com/cyberattack-on-jas-worldwide/

https://www.securityweek.com/microsoft-says-north-korean-cryptocurrency-thieves-behind-chrome-zero-day/

https://www.securityweek.com/fortra-patches-critical-vulnerability-in-filecatalyst-workflow/

https://therecord.media/espionage-campaign-china-slowtempest

https://www.bleepingcomputer.com/news/security/cicada3301-ransomwares-linux-encryptor-targets-vmware-esxi-systems/

https://www.bleepingcomputer.com/news/security/github-comments-abused-to-push-password-stealing-malware-masked-as-fixes/

https://www.cybersecuritydive.com/news/ftc-data-privacy-connected-cars/725434/

https://www.securityweek.com/california-advances-landmark-legislation-to-regulate-large-ai-models/

🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1  

✅ Important Links to Follow: 

👉Substack:

👉Listen here: https://linktr.ee/cyberhubpodcast   

✅ Stay Connected With Us.

👉Facebook: https://www.facebook.com/CyberHubpodcast/ 

👉LinkedIn: https://www.linkedin.com/company/cyberhubpodcast/ 

👉Twitter (X): https://twitter.com/cyberhubpodcast 

👉Instagram: https://www.instagram.com/cyberhubpodcast 

✅ For Business Inquiries:  info@cyberhubpodcast.com

=============================

✅ About The CyberHub Podcast.

The Hub of the Infosec Community. 

Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure. 

Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.

Discussion about this podcast

CISO Talk by James Azar
CyberHub Podcast
Today’s top cybersecurity news and the latest from Practicing CISO James Azar, tune in to hear how practitioners read, view and work after hearing the latest headlines and how these stories help keep practitioners sharp and ready.