In recent times, due to rapid advancements in technology, increased connectivity, and sophisticated tactics that threat actors use, cyber attacks are evolving at a rapid pace.
The rise of AI and ML technologies enables threat actors to:-.
These seamless revolutions make it harder for security analysts and solutions to detect and mitigate evolving threats.
The expanding attack surface, driven by the expansion of the following things, provides more entry points for exploitation to the threat actors:-.
This extortion-only attack targeted dozens of organizations using the MOVEit file transfer software.
In this event, the threat actors behind Clop, a Russian group, exploited a vulnerability in the software to steal sensitive data and demanded ransom for not leaking it online.
The major victims are IBM, Cognizant, Deloitte, PwC, and EY. This series of attacks exploited a zero-day vulnerability in Cisco's IOS XE operating system, which runs on routers, switches, and firewalls.
The attackers used a malicious module to execute commands and install backdoors on the affected devices.
In this massive attack, threat actors compromised more than 42,000 devices via a critical privilege escalation vulnerability discovered on October 16 with a severity rating of 10.0.
That's why security analysts marked this attack as one of the most significant edge attacks.
Even Okta's CISO revealed the threat actor accessed and downloaded a report with user names and emails but no sensitive data.
This was a cyber attack that targeted Western Digital's My Book Live and My Book Live Duo network-attached storage devices, disrupting the operations at Western Digital.
It's been confirmed that the threat actors obtained the data from a cloud server that was misconfigured and left unprotected on the internet.
The attackers exploited a vulnerability in the software to steal data and demanded ransom for not leaking it online.
In this attack, NationsBenefits, one of the innovative healthcare management solution providers, suffered a massive hack, impacting over 3 million members.
In March, 3CX, a major communications software maker, faced a SolarWinds-like attack.
3CX's compromise stemmed from a prior attack on Trading Technologies, a financial software firm.
This marks the first case of one software supply chain attack triggering another.
During the attack, it's been discovered that the threat actors inserted a malicious code into the software update that allowed them to execute commands and install malware on the systems that were affected.
Besides this, researchers at CrowdStrike and Mandiant attributed the 3CX attack to North Korea.
This Cyber News was published on cybersecuritynews.com. Publication date: Fri, 29 Dec 2023 09:25:12 +0000