top of page
  • Writer's pictureSean Doggett

Cyber Weekly Digest - Week #21

Updated: May 29, 2020

This week our news feed includes an airliner cyber-attack, new phishing campaigns and how COVID-19 affected cyber-activity on financial institutions. Let us go and see what happened.

1. One of the biggest cyber-security headlines this week was the EasyJet hack which exposed the data of around 9 million customers. Among the stolen data are email addresses and travel data, while it is believed that the hackers were able able to access the credit card details of 2,208 customers. The company reported that the point of entry has been close and that it has notified those whose credit card information was exposed and will contact the rest of the customers the following days.

2. As reported from KrebsonSecurity, a malware testing service has emerged, offering vulnerability tests in a variety of malware. The service is operated by a Russian team called "RedBear", and their key selling point is that crooks, being crooks, you can't trust them completely. As proof of their service effectiveness, the group publishes articles on security sites detailing flaws found in high-profile malware.

3. This week, the Ukrainian authorities arrested a hacker known as Sanix that is believed to be involved in the release of 773 million stolen passwords and usernames. Authorities claim they found records that validate the possession and auction of confidential data like PIN codes and bank cards by the suspect.

4. According to WMware Carbon Black, attacks on financial institutions spiked by a massive 238% from the beginning of February to the end of April. This dramatic increase is mostly attributed to the COVID-19 crisis, and the way attackers try to take advantage of the pandemic to spread malware.

5. A new major COVID-19 phishing campaign has been witnessed, this time using malicious Excel macros to achieve remote access of victims machines. Microsoft Security Intelligence shared the news on twitter claiming the campaign began on May 12. We are advising people to deploy training as regularly as possible and always to be suspicious of attachments on emails.

bottom of page