In this week’s digest we dive into the Russian threat actors were able to gain months long access to the Danish Central Bank and how 700 million LinkedIn users’ data was posted for sale on a hacking forum. Keeping reading to get up to date with the latest cyber security news from around the world.
Russian state threat actors compromised Denmark’s central bank and deployed malware, giving them access to the network for more than half a year undetected. The compromise came to light due to official documents from the Danish central bank in a freedom of information request. The breach was part of the SolarWinds cyber espionage campaign last year. Despite the hackers’ long-term access, the bank said that it found no evidence of compromise beyond the first stage of the attack.
This week another data-scraping operation has been discovered, in which 700 million LinkedIn users’ data was posted for sale. The threat actors who posted the LinkedIn data have since boosted the data listing to 1 billion users as this operation follows the data-scrape LinkedIn experienced in May. The data has since been collated and refined by attackers to identify specific targets, the targets include 88,000 U.S. business owners who have changed jobs in the last 90 days. LinkedIn’s response acknowledges the abuse of LinkedIn data, but points out that it’s not technically a breach since the information was public. Although the data is in fact public information, this could mark a wave of targeted LinkedIn attacks.
This week the technical details and a proof-of-concept were accidentally leaked after confusion over another Windows Print Spooler vulnerability, which had already been patched by Microsoft. The remote code execution (RCE) bug, tracked as CVE-2021-3452, impacts all versions of Windows per Microsoft. It is still being investigated to find out if the vulnerability is exploitable on all of them. The vulne