In this week's digest, we take a look into a ransomware gang looking to recruit insiders with "millions of dollars" and how attackers were unable to sell data stolen by EA games. Keep reading to find out about the biggest cyber security stories from across the globe.
In June, the LockBit ransomware operation announced the launch of their new LockBit 2.0 ransomware-as-a-service. This week, with the recent launch, the LockBit 2.0 ransomware gang updated the Windows wallpaper on encrypted devices to offer "millions of dollars" for corporate insiders who provide access to networks where they have an account. The message is likely targeting those who are responding to an attack, as the message appears once the network has already been breached.
The threat actors behind the Electronic Arts breach this year have released the entire cache of stolen data after failing to extort the company and later sell the stolen files to a third-party buyer. The threat actors breached EA in June and had hoped to sell the stolen data for $26 million; however, they could not find a buyer. The leaked files contain the source code of the FIFA 21 soccer game, including tools to support the company's server-side services. The data was likely unable to be sold because it did not include any personal or financial information.
Researchers have discovered nine vulnerabilities, collectively named PwnedPiper, in the pneumatic tube systems (PTS) used in more than 80 per cent of major hospitals in North America and 3,000 hospitals worldwide. The bugs in Swisslog Healthcare's Translogic PTS, include hard-coded passwords, unencrypted connections and unauthenticated firmware updates that could lead to remote code execution. PwnedPiper could give an unauthenticated attacker root control and could let thre