<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>The Breach Report</title>
    <description>Cybersecurity News, AI and Generative AI in Cyber, and Hacking the Planet</description>
    
    <link>https://thebreach.report/</link>
    <atom:link href="https://rss.beehiiv.com/feeds/SyvvEer2H8.xml" rel="self"/>
    
    <lastBuildDate>Mon, 13 Apr 2026 05:24:40 +0000</lastBuildDate>
    <pubDate>Mon, 14 Apr 2025 14:16:28 +0000</pubDate>
    <atom:published>2025-04-14T14:16:28Z</atom:published>
    <atom:updated>2026-04-13T05:24:40Z</atom:updated>
    
      <category>Artificial Intelligence</category>
      <category>Cybersecurity</category>
      <category>Technology</category>
    <copyright>Copyright 2026, The Breach Report</copyright>
    
    <image>
      <url>https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/publication/logo/68b6ebe3-0f42-4f76-b09c-82b488a40373/TBR_header_800x800.jpg</url>
      <title>The Breach Report</title>
      <link>https://thebreach.report/</link>
    </image>
    
    <docs>https://www.rssboard.org/rss-specification</docs>
    <generator>beehiiv</generator>
    <language>en-us</language>
    <webMaster>support@beehiiv.com (Beehiiv Support)</webMaster>

      <item>
  <title>China confesses to Volt Typhoon role in U.S. infrastructure cyberattacks</title>
  <description>Chinese officials admitted responsibility for escalating cyberattacks against U.S. infrastructure in secret talks held in Beijing in December 2024. </description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/5bb85957-5c74-4151-a32c-9342ef87c082/china_digital_flag.jpg" length="439965" type="image/jpeg"/>
  <link>https://thebreach.report/p/china-confesses-to-volt-typhoon-role-in-u-s-infrastructure-cyberattacks</link>
  <guid isPermaLink="true">https://thebreach.report/p/china-confesses-to-volt-typhoon-role-in-u-s-infrastructure-cyberattacks</guid>
  <pubDate>Mon, 14 Apr 2025 04:00:00 +0000</pubDate>
  <atom:published>2025-04-14T04:00:00Z</atom:published>
    <dc:creator>Rob Waters</dc:creator>
    <category><![CDATA[News]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #82b984; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#95dd96; }
  .bh__table_header p { color: #2A2A2A; font-family:'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><div class="section" style="background-color:transparent;border-color:#00A503;border-style:solid;border-width:3px;margin:5.0px 5.0px 5.0px 5.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:left;"><i>Welcome to the latest issue of </i><i><b>The Breach Report</b></i><i>, a cybersecurity newsletter from the creators of the </i><i><a class="link" href="https://www.cybercareers.blog?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-confesses-to-volt-typhoon-role-in-u-s-infrastructure-cyberattacks" target="_blank" rel="noopener noreferrer nofollow">Cybersecurity Careers Blog</a></i><i>. Be sure to subscribe via </i><i><a class="link" href="https://thebreach.report/subscribe?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-confesses-to-volt-typhoon-role-in-u-s-infrastructure-cyberattacks" target="_blank" rel="noopener noreferrer nofollow">email</a></i><i> or </i><i><a class="link" href="https://rss.beehiiv.com/feeds/SyvvEer2H8.xml?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-confesses-to-volt-typhoon-role-in-u-s-infrastructure-cyberattacks" target="_blank" rel="noopener noreferrer nofollow">RSS</a></i><i>.</i></p></div><h1 class="heading" style="text-align:left;" id="cyberattacks-against-us-due-to-amer">Cyberattacks against U.S. due to “American support for Taiwan”</h1><p class="paragraph" style="text-align:left;">According to a new report from <a class="link" href="https://www.wsj.com/politics/national-security/in-secret-meeting-china-acknowledged-role-in-u-s-infrastructure-hacks-c5ab37cb?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-confesses-to-volt-typhoon-role-in-u-s-infrastructure-cyberattacks" target="_blank" rel="noopener noreferrer nofollow"><i>The Wall Street Journal</i></a><a class="link" href="https://www.wsj.com/politics/national-security/in-secret-meeting-china-acknowledged-role-in-u-s-infrastructure-hacks-c5ab37cb?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-confesses-to-volt-typhoon-role-in-u-s-infrastructure-cyberattacks" target="_blank" rel="noopener noreferrer nofollow">,</a> Chinese officials indirectly admitted in a meeting amongst the outgoing Biden administration in December 2024 to its role in supporting damaging cyberattacks against the United States&#39; critical infrastructure. The hacks against U.S. ports, energy utilities, airports, and other infrastructure have been attributed to a Beijing state-sponsored group, <b>Volt Typhoon</b>. </p><p class="paragraph" style="text-align:left;">The stark admission by Beijing officials stunned American counterparts.</p><p class="paragraph" style="text-align:left;">In past talks, China has blamed the cyberattacks attributed to Volt Typhoon on “criminal outfits” or accused the U.S. of having an “overactive imagination.”</p><p class="paragraph" style="text-align:left;">The <i>Wall Street Journal </i>reported that the Chinese official’s remarks at the December meeting “were indirect and somewhat ambiguous, but most of the American delegation in the room interpreted it as a tacit admission and a warning to the U.S. about Taiwan.”</p><p class="paragraph" style="text-align:left;">“China wants U.S. officials to know that, yes, they do have this capability, and they are willing to use it,” Dakota Cary of cybersecurity firm SentinelOne said.</p><p class="paragraph" style="text-align:left;">“We’re not used to China showing their hand,” stated Sean Tufts, managing partner for critical infrastructure at the cybersecurity firm Optiv, to <a class="link" href="https://cybernews.com/cybercrime/china-volt-typhoon-infrastructure-taiwan-warning/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-confesses-to-volt-typhoon-role-in-u-s-infrastructure-cyberattacks" target="_blank" rel="noopener noreferrer nofollow"><i>CyberNews</i></a>.</p><p class="paragraph" style="text-align:left;">“Their modus operandi is always to deny, cover, and distract. It makes me think they are distracting us with Volt/Salt Typhoon to cover other activities,” said Tufts.</p><p class="paragraph" style="text-align:left;">The cyberattacks against U.S. infrastructure have long been justified by American support for Taiwan. According to China’s <a class="link" href="https://en.wikipedia.org/wiki/One_China?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-confesses-to-volt-typhoon-role-in-u-s-infrastructure-cyberattacks" target="_blank" rel="noopener noreferrer nofollow"><i>One China Principle</i></a> (or 一個中國政策), there is only one sovereign state under the name of China. Taiwan is an unalienable part of China, unable to declare its sovereignty as a nation. </p><p class="paragraph" style="text-align:left;">In March 2024, the U.S. Cybersecurity & Infrastructure Security Agency (CISA) <a class="link" href="https://www.cisa.gov/resources-tools/resources/prc-state-sponsored-cyber-activity-actions-critical-infrastructure-leaders?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-confesses-to-volt-typhoon-role-in-u-s-infrastructure-cyberattacks" target="_blank" rel="noopener noreferrer nofollow">warned all critical infrastructure leaders</a> about the urgent risk of a Volt Typhoon. </p><h2 class="heading" style="text-align:left;" id="going-on-the-offensive-against-the-">Going on the offensive against “The Typhoons”</h2><p class="paragraph" style="text-align:left;">Just before being fired as the head of U.S. CYBERCOM and 19th Director of the National Security Agency (NSA), <a class="link" href="https://www.thecipherbrief.com/defending-against-a-digital-storm-how-to-stop-chinas-cyber-typhoons?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-confesses-to-volt-typhoon-role-in-u-s-infrastructure-cyberattacks" target="_blank" rel="noopener noreferrer nofollow">General Timothy Haugh</a> remarked that the U.S. needs government and private-sector collaboration to defend against critical infrastructure cyberattacks. </p><p class="paragraph" style="text-align:left;">This includes going on the offensive against “the Typhoons”: <a class="link" href="https://thebreach.report/p/t-mobile-hacked-salt-typhoon-cyber-espionage-operation?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-confesses-to-volt-typhoon-role-in-u-s-infrastructure-cyberattacks" target="_blank" rel="noopener noreferrer nofollow">Salt Typhoon</a>, Silk Typhoon, and Volt Typhoon–all linked to the CCP.</p><p class="paragraph" style="text-align:left;">“99% of the critical infrastructure in the United States is controlled by private companies, so that really drives us to talk about how we partner with industry and with the commercial sector,” Gen. Haugh said.</p><p class="paragraph" style="text-align:left;">Asked by Senator Ted Budd (R-NC) about if the U.S. has an offensive cyber strategy, Gen. Haugh stated that he has “clear guidance in what the Secretary of Defense expects in terms of our aggressive approach to be able to restore deterrence.”</p><p class="paragraph" style="text-align:left;">Gen. Haugh continued that he’d happily elaborate about the offensive cyber strategy in a closed hearing.</p><hr class="content_break"><h2 class="heading" style="text-align:left;" id="todays-cyber-social-funny">Today’s Cyber Social Funny</h2><p class="paragraph" style="text-align:left;">Attribution? Possibly you!</p><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/lorenzofb/status/1910448917340475604?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-confesses-to-volt-typhoon-role-in-u-s-infrastructure-cyberattacks"><p> Twitter tweet </p></a></blockquote><p class="paragraph" style="text-align:left;">Until next time…</p><p class="paragraph" style="text-align:left;"><b>Rob Waters</b><br><span style="font-size:0.8rem;">Founder</span><br><span style="font-size:0.8rem;">The Breach Report + Cybersecurity Careers Blog</span></p><p class="paragraph" style="text-align:left;"><br><span style="font-size:0.8rem;"><i><b>P.S. - </b></i></span><span style="font-size:0.8rem;"><i>Do you want to start a newsletter yourself? </i></span><br><span style="font-size:0.8rem;"><i><b>You can with beehiiv. </b></i></span><span style="font-size:0.8rem;"><i><b><a class="link" href="https://www.beehiiv.com?via=tbr&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-confesses-to-volt-typhoon-role-in-u-s-infrastructure-cyberattacks" target="_blank" rel="noopener noreferrer nofollow">Create one today with a free trial</a></b></i></span><span style="font-size:0.8rem;"><i><b>.</b></i></span><br><span style="font-size:0.8rem;">Disclaimer: The Breach Report may contain affiliate links. Read our </span><span style="font-size:0.8rem;"><a class="link" href="https://thebreach.report/c/advertising?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-confesses-to-volt-typhoon-role-in-u-s-infrastructure-cyberattacks" target="_blank" rel="noopener noreferrer nofollow">Advertising</a></span><span style="font-size:0.8rem;"> policy page.</span></p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>DOD Air Force Contractor Pleads Guilty to Stealing Top Secret Classified Documents</title>
  <description>Gokhan Gun was charged with unauthorized removal and retention of classified material</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/ad2c7321-3e1d-4c8c-a175-3a0a4db458f3/Pentagon2jpg.jpg" length="189589" type="image/jpeg"/>
  <link>https://thebreach.report/p/dod-air-force-contractor-pleads-guilty-to-stealing-top-secret-classified-documents</link>
  <guid isPermaLink="true">https://thebreach.report/p/dod-air-force-contractor-pleads-guilty-to-stealing-top-secret-classified-documents</guid>
  <pubDate>Mon, 31 Mar 2025 04:00:00 +0000</pubDate>
  <atom:published>2025-03-31T04:00:00Z</atom:published>
    <dc:creator>Rob Waters</dc:creator>
    <category><![CDATA[News]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #82b984; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#95dd96; }
  .bh__table_header p { color: #2A2A2A; font-family:'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><div class="section" style="background-color:transparent;border-color:#00A503;border-style:solid;border-width:3px;margin:5.0px 5.0px 5.0px 5.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:left;"><i>Welcome to the latest issue of </i><i><b>The Breach Report</b></i><i>, a cybersecurity newsletter from the creators of the </i><i><a class="link" href="https://www.cybercareers.blog?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=dod-air-force-contractor-pleads-guilty-to-stealing-top-secret-classified-documents" target="_blank" rel="noopener noreferrer nofollow">Cybersecurity Careers Blog</a></i><i>. Be sure to subscribe via </i><i><a class="link" href="https://thebreach.report/subscribe?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=dod-air-force-contractor-pleads-guilty-to-stealing-top-secret-classified-documents" target="_blank" rel="noopener noreferrer nofollow">email</a></i><i> or </i><i><a class="link" href="https://rss.beehiiv.com/feeds/SyvvEer2H8.xml?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=dod-air-force-contractor-pleads-guilty-to-stealing-top-secret-classified-documents" target="_blank" rel="noopener noreferrer nofollow">RSS</a></i><i>.</i></p></div><h2 class="heading" style="text-align:left;" id="a-word-from-our-sponsor"><span style="color:#00A503;">A word from our Sponsor</span></h2><h3 class="heading" style="text-align:left;" id="your-job-calledit-wants-better-busi">Your job called—it wants better business news</h3><div class="image"><a class="image__link" href="https://morningbrew.com/daily/subscribe?utm_campaign={{publication_alphanumeric_id}}&utm_medium=paid_newsletter&utm_source=beehiiv&_bhiiv=opp_eac19b87-aa07-45e4-8c49-a37a400e9600_652e2efc&bhcl_id=f9c7b38c-098c-4956-a6fe-711f87f8b5fa_{{subscriber_id}}_{{email_address_id}}" rel="noopener" target="_blank"><img class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/15675dca-c875-404f-9d1d-69d5ff06e9d9/Option_13.png?t=1741102004"/></a></div><p class="paragraph" style="text-align:left;">Welcome to <a class="link" href="https://morningbrew.com/daily/subscribe?utm_campaign={{publication_alphanumeric_id}}&utm_medium=paid_newsletter&utm_source=beehiiv&_bhiiv=opp_eac19b87-aa07-45e4-8c49-a37a400e9600_652e2efc&bhcl_id=f9c7b38c-098c-4956-a6fe-711f87f8b5fa_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Morning Brew</a>—the world’s most engaging business newsletter. Seriously, we mean it. </p><p class="paragraph" style="text-align:left;">Morning Brew’s daily email keeps professionals informed on the business news that matters, but with a twist—think jokes, pop culture, quick writeups, and anything that makes traditionally dull news actually enjoyable.</p><p class="paragraph" style="text-align:left;">It’s 100% free—so why not give it a shot? And if you decide you’d rather stick with dry, long-winded business news, you can always unsubscribe.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://morningbrew.com/daily/subscribe?utm_campaign={{publication_alphanumeric_id}}&utm_medium=paid_newsletter&utm_source=beehiiv&_bhiiv=opp_eac19b87-aa07-45e4-8c49-a37a400e9600_652e2efc&bhcl_id=f9c7b38c-098c-4956-a6fe-711f87f8b5fa_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Check it out</a></p><p class="paragraph" style="text-align:left;"></p><hr class="content_break"><h2 class="heading" style="text-align:left;" id="meet-gokhan-gun-a-turk-charged-with">Meet Gokhan Gun: A Turk charged with stealing Top Secret files and trying to flee to Mexico</h2><p id="the-united-states-department-of-jus" class="paragraph" style="text-align:left;">The <b>United States Department of Justice </b><a class="link" href="https://www.justice.gov/opa/pr/department-defense-civilian-employee-pleads-guilty-taking-classified-documents?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=dod-air-force-contractor-pleads-guilty-to-stealing-top-secret-classified-documents" target="_blank" rel="noopener noreferrer nofollow">announced</a> that <b>Gokhan Gun</b>, 51, an electrical engineer for the Department of Defense, pleaded guilty in federal court on March 20, 2025, to unauthorized removal and retention of classified material. </p><p class="paragraph" style="text-align:left;">Gun, a native of Falls Church, Virginia, is a dual citizen of the United States and Turkey. Gun was born in Turkey and became a U.S. citizen in 2021. </p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/7678c976-219a-44db-a63b-6f5359bbbded/Gokhan-Gun.jpg?t=1743427245"/><div class="image__source"><span class="image__source_text"><p>Gokhan Gun, 50, was charged with unauthorized removal and retention of classified material. (image credit: Alexandria Sheriff&#39;s Office)</p></span></div></div><p class="paragraph" style="text-align:left;">His life unraveled on August 9, 2024, when he was arrested as he attempted to board a flight to Puerto Vallarta, Mexico.</p><p class="paragraph" style="text-align:left;">Fox News <a class="link" href="https://www.foxnews.com/us/defense-department-contractor-charged-after-printing-top-secret-documents-trying-leave-them-mexico?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=dod-air-force-contractor-pleads-guilty-to-stealing-top-secret-classified-documents" target="_blank" rel="noopener noreferrer nofollow">reported</a> at the time of his arrest that Gun was leaving for the airport when FBI agents executed a search warrant on him and two of his homes. Agents discovered documents marked as &quot;TOP SECRET&quot; inside a backpack and across his Falls Church, VA home.</p><p class="paragraph" style="text-align:left;">Agents discovered that the documents were printed and transported home as recently as two days before his arrest. <span style="font-family:"Public Sans Web", -apple-system, "system-ui", "Segoe UI", Roboto, Helvetica, Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol";font-size:16px;">Printing and transporting classified documents to an unauthorized location is prohibited.</span></p><p class="paragraph" style="text-align:left;">Until his arrest, Gun was a DOD contractor supporting the U.S. Air Force Joint Warfare Analysis Center, holding a Top-Secret security clearance with access to Sensitive Compartmented Information. </p><h2 class="heading" style="text-align:left;" id="gun-faces-5-years-in-jail-for-steal">Gun faces 5 years in jail for stealing classified documents</h2><p class="paragraph" style="text-align:left;"><span style="font-family:"Public Sans Web", -apple-system, "system-ui", "Segoe UI", Roboto, Helvetica, Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol";font-size:16px;">Gun is scheduled to be sentenced on June 17, 2025, and faces up to five years in prison.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:"Public Sans Web", -apple-system, "system-ui", "Segoe UI", Roboto, Helvetica, Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol";font-size:16px;">A rideshare driver arrived at the scene as FBI investigators were apprehending Gun and approached Gun. It’s safe to say the only ride he got that day was in the back of a federal vehicle.</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:"Public Sans Web", -apple-system, "system-ui", "Segoe UI", Roboto, Helvetica, Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol";font-size:16px;">No word on if he tipped his FBI driver or gave him a five-star rating.</span></p><hr class="content_break"><h3 class="heading" style="text-align:left;" id="todays-cyber-social-wall-of-shame">Today’s Cyber Social Wall of Shame</h3><p class="paragraph" style="text-align:left;"><a class="link" href="https://thebreach.report/p/alleged-oracle-cloud-hack-6-million-records?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=dod-air-force-contractor-pleads-guilty-to-stealing-top-secret-classified-documents" target="_blank" rel="noopener noreferrer nofollow">Oracle still denies any breach</a>, but it’s clear they were hacked. Now, Oracle customers are paying the price for it.</p><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/SecurityWeek/status/1905087126514909210?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=dod-air-force-contractor-pleads-guilty-to-stealing-top-secret-classified-documents"><p> Twitter tweet </p></a></blockquote><p class="paragraph" style="text-align:left;">Until next time…</p><p class="paragraph" style="text-align:left;"><b>Rob Waters</b><br><span style="font-size:0.8rem;">Founder</span><br><span style="font-size:0.8rem;">The Breach Report + Cybersecurity Careers Blog</span></p><p class="paragraph" style="text-align:left;"><br><span style="font-size:0.8rem;"><i><b>P.S. - </b></i></span><span style="font-size:0.8rem;"><i>Do you want to start a newsletter yourself? </i></span><br><span style="font-size:0.8rem;"><i><b>You can with beehiiv. </b></i></span><span style="font-size:0.8rem;"><i><b><a class="link" href="https://www.beehiiv.com?via=tbr&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=dod-air-force-contractor-pleads-guilty-to-stealing-top-secret-classified-documents" target="_blank" rel="noopener noreferrer nofollow">Create one today with a free trial</a></b></i></span><span style="font-size:0.8rem;"><i><b>.</b></i></span><br><span style="font-size:0.8rem;">Disclaimer: The Breach Report may contain affiliate links. Read our </span><span style="font-size:0.8rem;"><a class="link" href="https://thebreach.report/c/advertising?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=dod-air-force-contractor-pleads-guilty-to-stealing-top-secret-classified-documents" target="_blank" rel="noopener noreferrer nofollow">Advertising</a></span><span style="font-size:0.8rem;"> policy page.</span></p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Alleged Oracle Cloud Hack: 6 Million Records at Risk? What We Know So Far</title>
  <description>A hacker known as &quot;rose87168&quot; allegedly breached Oracle Cloud, stealing over 6 million records and selling the data on a renowned hacker forum. Oracle denies any hack has occurred.</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/6883d481-9ce3-432b-a918-5b7204cb51d0/oracle_building_copy.jpg" length="128550" type="image/jpeg"/>
  <link>https://thebreach.report/p/alleged-oracle-cloud-hack-6-million-records</link>
  <guid isPermaLink="true">https://thebreach.report/p/alleged-oracle-cloud-hack-6-million-records</guid>
  <pubDate>Mon, 24 Mar 2025 04:00:00 +0000</pubDate>
  <atom:published>2025-03-24T04:00:00Z</atom:published>
    <dc:creator>Rob Waters</dc:creator>
    <category><![CDATA[News]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #82b984; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#95dd96; }
  .bh__table_header p { color: #2A2A2A; font-family:'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><div class="section" style="background-color:transparent;border-color:#00A503;border-style:solid;border-width:3px;margin:5.0px 5.0px 5.0px 5.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:left;"><i>Welcome to the latest issue of </i><i><b>The Breach Report</b></i><i>, a cybersecurity newsletter from the creators of the </i><i><a class="link" href="https://www.cybercareers.blog?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=alleged-oracle-cloud-hack-6-million-records-at-risk-what-we-know-so-far" target="_blank" rel="noopener noreferrer nofollow">Cybersecurity Careers Blog</a></i><i>. Be sure to subscribe via </i><i><a class="link" href="https://thebreach.report/subscribe?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=alleged-oracle-cloud-hack-6-million-records-at-risk-what-we-know-so-far" target="_blank" rel="noopener noreferrer nofollow">email</a></i><i> or </i><i><a class="link" href="https://rss.beehiiv.com/feeds/SyvvEer2H8.xml?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=alleged-oracle-cloud-hack-6-million-records-at-risk-what-we-know-so-far" target="_blank" rel="noopener noreferrer nofollow">RSS</a></i><i>.</i></p></div><h2 class="heading" style="text-align:left;" id="oracle-denies-breach-after-hacker-c">Oracle denies breach after hacker claims to steal 6 million records</h2><p class="paragraph" style="text-align:left;">Is <b>Oracle Cloud</b> <a class="link" href="https://stocktwits.com/symbol/ORCL?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=alleged-oracle-cloud-hack-6-million-records-at-risk-what-we-know-so-far" target="_blank" rel="noopener noreferrer nofollow" style="text-decoration: none; font-style: normal;"><span style="color:#059669;">$ORCL ( ▲ 0.17% )</span></a> the latest victim of a major cyberattack? A hacker known as <b>“rose87168”</b> has claimed to have breached Oracle Cloud&#39;s login servers and stolen a massive six million customer data records. However, Oracle has <a class="link" href="https://www.bleepingcomputer.com/news/security/oracle-denies-data-breach-after-hacker-claims-theft-of-6-million-data-records/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=alleged-oracle-cloud-hack-6-million-records-at-risk-what-we-know-so-far" target="_blank" rel="noopener noreferrer nofollow">responded</a> to <a class="link" href="https://www.theregister.com/2025/03/23/oracle_cloud_customers_keys_credentials/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=alleged-oracle-cloud-hack-6-million-records-at-risk-what-we-know-so-far" target="_blank" rel="noopener noreferrer nofollow">multiple</a> media inquiries, denying any hack or stolen data from its cloud infrastructure. Let&#39;s dive into the details of this developing story.</p><div class="blockquote"><blockquote class="blockquote__quote"></blockquote></div><h2 class="heading" style="text-align:left;" id="the-hacker-claims-and-demands">The Hacker claims and demands</h2><p class="paragraph" style="text-align:left;">A previously unknown hacker using the handle “rose87168” surfaced on the cyber-crime forum BreachForums earlier this month. The hacker boasted of creating a text file on an Oracle Cloud login server and claimed that information was exfiltrated from the EM2 and US2 login servers. Samples of the stolen data were shared on BreachForums, where the hacker has been trying to sell the pilfered dataset.</p><p class="paragraph" style="text-align:left;">According to a statement provided to <a class="link" href="https://www.bleepingcomputer.com/news/security/oracle-denies-data-breach-after-hacker-claims-theft-of-6-million-data-records/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=alleged-oracle-cloud-hack-6-million-records-at-risk-what-we-know-so-far" target="_blank" rel="noopener noreferrer nofollow"><i>BleepingComputer</i></a>, they first breached Oracle&#39;s cloud infrastructure “40 days ago” after stealing data from the US2 and EM2 cloud regions.</p><div class="image"><img alt="A hacker known as rose87168 on BreachForums claims to have breached Oracle Cloud and stolen 6 million data records" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/35cd370f-aa6e-4ceb-9876-bb4e120cc1b6/oracle_cloud_hack.jpg?t=1742825752"/><div class="image__source"><span class="image__source_text"><p>A hacker known as rose87168 on BreachForums claims to have breached Oracle Cloud and stolen 6 million data records. (image credit: BleepingComputer)</p></span></div></div><p class="paragraph" style="text-align:left;">Other stolen data includes Oracle Cloud customer security keys, encrypted Oracle Cloud SSO passwords, encrypted LDAP passwords, Enterprise Manager JPS keys, and Java KeyStore (JKS) files containing security certificates and keys. The potentially affected customers are said to number in the thousands. </p><p class="paragraph" style="text-align:left;"><i>BleepingComputer</i> reports that the hacker has demanded 100,000 XMR from Oracle for information on how they breached the servers. Oracle refused to pay the ransom, asking instead for all information required to fix and patch the vulnerabilities used.</p><p class="paragraph" style="text-align:left;">The hacker states they will “list the domains of all the companies in this leak. Companies can pay a specific amount to remove their employees&#39; information from the list before it&#39;s sold.”</p><h2 class="heading" style="text-align:left;" id="what-vulnerabilities-the-oracle-clo">What vulnerabilities the Oracle Cloud hack may have exploited</h2><p class="paragraph" style="text-align:left;">While Oracle denies any breach, cybersecurity firm <a class="link" href="https://www.cloudsek.com/blog/the-biggest-supply-chain-hack-of-2025-6m-records-for-sale-exfiltrated-from-oracle-cloud-affecting-over-140k-tenants?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=alleged-oracle-cloud-hack-6-million-records-at-risk-what-we-know-so-far" target="_blank" rel="noopener noreferrer nofollow">CloudSEK</a> conducted its own investigation and offered a contrasting perspective. CloudSEK believes the threat actor may have exploited a known critical vulnerability (<a class="link" href="https://nvd.nist.gov/vuln/detail/cve-2021-35587?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=alleged-oracle-cloud-hack-6-million-records-at-risk-what-we-know-so-far" target="_blank" rel="noopener noreferrer nofollow">CVE-2021-35587</a>) in Oracle Fusion Middleware&#39;s Oracle Access Manager, specifically its OpenSSO Agent.</p><p class="paragraph" style="text-align:left;">This vulnerability, added to the CISA KEV catalog in December 2022, is considered critical and can be exploited over HTTP without authentication. Successful exploitation could potentially grant an intruder access to the sensitive information that is now being offered for sale. CloudSEK notes that a public exploit code exists for this vulnerability.</p><p class="paragraph" style="text-align:left;">CloudSEK&#39;s analysis of the compromised subdomain, <a class="link" href="https://login.us2.oraclecloud.com?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=alleged-oracle-cloud-hack-6-million-records-at-risk-what-we-know-so-far" target="_blank" rel="noopener noreferrer nofollow">login.us2.oraclecloud.com</a>, revealed that it was running Oracle Fusion Middleware 11G. Further investigation suggested that this server might not have been patched to close the CVE-2021-35587 vulnerability. The server was reportedly last updated around September 27, 2014, indicating potentially outdated software.</p><p class="paragraph" style="text-align:left;">CloudSEK researchers stated, &quot;Due to lack of patch management practices and/or insecure coding, the vulnerability in Oracle Fusion Middleware was exploited by the threat actor. This easily exploitable vulnerability allows an unauthenticated attacker with network access via HTTP to compromise Oracle Access Manager&quot;. </p><p class="paragraph" style="text-align:left;">They suggest exploiting this flaw could have provided the initial access needed to move laterally within the Oracle Cloud environment and access other systems and data.</p><p class="paragraph" style="text-align:left;">The fact that the threat actor managed to upload a text file to an Oracle Cloud login server further fuels the speculation that some form of unauthorized access was achieved. Oracle has been contacted for clarification on this point.</p><h2 class="heading" style="text-align:left;" id="potential-impact-of-an-oracle-cloud">Potential impact of an Oracle Cloud hack of 6 million records</h2><p class="paragraph" style="text-align:left;">If the alleged breach is indeed factual, the impact could be substantial. The exposure of six million records significantly increases the risk of unauthorized access and corporate espionage. </p><p class="paragraph" style="text-align:left;">The compromise of JKS files containing cryptographic keys is particularly concerning as it could be used to decrypt sensitive data or gain access to other systems within affected organizations. Similarly, compromised encrypted SSO and LDAP passwords could lead to further breaches across Oracle Cloud environments.</p><h2 class="heading" style="text-align:left;" id="recommendations-to-mitigate-risk-if">Recommendations to mitigate risk if you are an Oracle Cloud customer</h2><p class="paragraph" style="text-align:left;">While Oracle denies the breach, CloudSEK recommends several immediate actions for potentially affected parties, including:</p><ul><li><p class="paragraph" style="text-align:left;">Immediate credential rotation</p></li><li><p class="paragraph" style="text-align:left;">Thorough incident response and forensics</p></li><li><p class="paragraph" style="text-align:left;">Continuous threat intelligence monitoring</p></li><li><p class="paragraph" style="text-align:left;">Engagement with Oracle Security for verification and mitigation</p></li><li><p class="paragraph" style="text-align:left;">Strengthen access controls and audit any existing identity permissions and policies</p></li></ul><p class="paragraph" style="text-align:left;">The situation surrounding the alleged Oracle Cloud hack is still unfolding. While a threat actor claims to possess millions of stolen records and evidence of server access, Oracle vehemently denies any breach. The focus now shifts to further investigation and potential confirmation of the claims. </p><p class="paragraph" style="text-align:left;">The alleged exploitation of a known vulnerability in Oracle Fusion Middleware highlights the critical importance of timely patching and robust security practices in cloud environments. </p><p class="paragraph" style="text-align:left;">We will continue to monitor this story for further updates.</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><hr class="content_break"></div><h3 class="heading" style="text-align:left;" id="todays-cyber-social-wall-of-shame">Today’s Cyber Social Wall of Shame</h3><p class="paragraph" style="text-align:left;"><b>23andMe </b>has filed for bankruptcy. <a class="link" href="https://www.cybercareers.blog/2024/01/23andme-blames-customers-for-stolen-genetic-data-of-7-million-users/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=alleged-oracle-cloud-hack-6-million-records-at-risk-what-we-know-so-far" target="_blank" rel="noopener noreferrer nofollow">Good riddance</a>.</p><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/CyberNews/status/1904148743429271580?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=alleged-oracle-cloud-hack-6-million-records-at-risk-what-we-know-so-far"><p> Twitter tweet </p></a></blockquote><p class="paragraph" style="text-align:left;">Until next time…</p><p class="paragraph" style="text-align:left;"><b>Rob Waters</b><br><span style="font-size:0.8rem;">Founder</span><br><span style="font-size:0.8rem;">The Breach Report + Cybersecurity Careers Blog</span></p><p class="paragraph" style="text-align:left;"><br><span style="font-size:0.8rem;"><i><b>P.S. - </b></i></span><span style="font-size:0.8rem;"><i>Do you want to start a newsletter yourself? </i></span><br><span style="font-size:0.8rem;"><i><b>You can with beehiiv. </b></i></span><span style="font-size:0.8rem;"><i><b><a class="link" href="https://www.beehiiv.com?via=tbr&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=alleged-oracle-cloud-hack-6-million-records-at-risk-what-we-know-so-far" target="_blank" rel="noopener noreferrer nofollow">Create one today with a free trial</a></b></i></span><span style="font-size:0.8rem;"><i><b>.</b></i></span><br><span style="font-size:0.8rem;">Disclaimer: The Breach Report may contain affiliate links. Read our </span><span style="font-size:0.8rem;"><a class="link" href="https://thebreach.report/c/advertising?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=alleged-oracle-cloud-hack-6-million-records-at-risk-what-we-know-so-far" target="_blank" rel="noopener noreferrer nofollow">Advertising</a></span><span style="font-size:0.8rem;"> policy page.</span></p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Justice Department Charges Two Silk Typhoon Chinese Hackers with U.S. Treasury Breach</title>
  <description>Yin Kecheng and Zhou Shuai are two Chinese nationals that are charged with breaching the U.S. Treasury Department and over 100 other American businesses.</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/f9a7bff7-0bec-447d-90f6-73458bf281c2/china_hackers_copy.jpg" length="713295" type="image/jpeg"/>
  <link>https://thebreach.report/p/justice-department-charges-two-silk-typhoon-chinese-hackers-with-u-s-treasury-breach</link>
  <guid isPermaLink="true">https://thebreach.report/p/justice-department-charges-two-silk-typhoon-chinese-hackers-with-u-s-treasury-breach</guid>
  <pubDate>Wed, 19 Mar 2025 04:00:00 +0000</pubDate>
  <atom:published>2025-03-19T04:00:00Z</atom:published>
    <dc:creator>Rob Waters</dc:creator>
    <category><![CDATA[Special Report]]></category>
    <category><![CDATA[News]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #82b984; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#95dd96; }
  .bh__table_header p { color: #2A2A2A; font-family:'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><div class="section" style="background-color:transparent;border-color:#00A503;border-style:solid;border-width:3px;margin:0.0px 0.0px 0.0px 0.0px;padding:5.0px 5.0px 5.0px 5.0px;"><p class="paragraph" style="text-align:left;"><i>Welcome to the latest issue of </i><i><b>The Breach Report</b></i><i>, a cybersecurity newsletter from the creators of the </i><i><a class="link" href="https://www.cybercareers.blog?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=justice-department-charges-two-silk-typhoon-chinese-hackers-with-u-s-treasury-breach" target="_blank" rel="noopener noreferrer nofollow">Cybersecurity Careers Blog</a></i><i>. Be sure to subscribe via </i><i><a class="link" href="https://thebreach.report/subscribe?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=justice-department-charges-two-silk-typhoon-chinese-hackers-with-u-s-treasury-breach" target="_blank" rel="noopener noreferrer nofollow">email</a></i><i> or </i><i><a class="link" href="https://rss.beehiiv.com/feeds/SyvvEer2H8.xml?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=justice-department-charges-two-silk-typhoon-chinese-hackers-with-u-s-treasury-breach" target="_blank" rel="noopener noreferrer nofollow">RSS</a></i><i>.</i></p></div><h3 class="heading" style="text-align:left;" id="theres-a-reason-400000-professional">There’s a reason 400,000 professionals read this daily. </h3><div class="image"><a class="image__link" href="https://magic.beehiiv.com/v1/31a7c576-0eb2-4ef3-abc7-bc75ede786fe?email={{email}}&utm_source=beehiiv&utm_campaign={{publication_name_param}}_{{publication_alphanumeric_id}}&_bhiiv=opp_400458e1-2ee8-4578-9838-b5ee44c9f173_65769d95&bhcl_id=4c0f1e9e-5fd2-40cf-b33e-2e89b9fcc0fa_{{subscriber_id}}_{{email_address_id}}" rel="noopener" target="_blank"><img class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/0b0ebefb-2cf6-4b9c-ae4a-8e80d23b01e3/Ad_The_AI_report.png?t=1742251212"/></a></div><p class="paragraph" style="text-align:left;">Join <a class="link" href="https://magic.beehiiv.com/v1/31a7c576-0eb2-4ef3-abc7-bc75ede786fe?email={{email}}&utm_source=beehiiv&utm_campaign={{publication_name_param}}_{{publication_alphanumeric_id}}&_bhiiv=opp_400458e1-2ee8-4578-9838-b5ee44c9f173_65769d95&bhcl_id=4c0f1e9e-5fd2-40cf-b33e-2e89b9fcc0fa_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">The AI Report</a>, trusted by 400,000+ professionals at Google, Microsoft, and OpenAI. Get daily insights, tools, and strategies to master practical AI skills that drive results.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://magic.beehiiv.com/v1/31a7c576-0eb2-4ef3-abc7-bc75ede786fe?email={{email}}&utm_source=beehiiv&utm_campaign={{publication_name_param}}_{{publication_alphanumeric_id}}&_bhiiv=opp_400458e1-2ee8-4578-9838-b5ee44c9f173_65769d95&bhcl_id=4c0f1e9e-5fd2-40cf-b33e-2e89b9fcc0fa_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Sign up now for free and work smarter, not harder.</a></p><h2 class="heading" style="text-align:left;" id="yin-kecheng-and-zhou-shuai-among-12">Yin Kecheng and Zhou Shuai among 12 Chinese hackers charged with U.S. Treasury breach </h2><p class="paragraph" style="text-align:left;">The <b>United States Department of Justice</b> <a class="link" href="https://www.justice.gov/usao-dc/pr/chinese-nationals-ties-prc-government-and-apt27-charged-computer-hacking-campaign-profit?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=justice-department-charges-two-silk-typhoon-chinese-hackers-with-u-s-treasury-breach" target="_blank" rel="noopener noreferrer nofollow">confirmed</a> that 12 Chinese hackers have been charged with hacking the U.S. Treasury and over 100 American organizations over the past decade. Two hackers, <b>Yin Kecheng</b> (尹 可成), aka “YKC” (“YIN”), and <b>Zhou Shuai </b>(周帅), aka “Coldface” (“ZHOU”), are confirmed members of <b>APT 27</b>, also known as <b>Silk Typhoon</b>.</p><p class="paragraph" style="text-align:left;">Silk Typhoon is a Chinese state-sponsored hacking group known for conducting cyber espionage.</p><p class="paragraph" style="text-align:left;">The Federal Bureau of Investigation includes <a class="link" href="https://www.fbi.gov/wanted/cyber/yin-kecheng?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=justice-department-charges-two-silk-typhoon-chinese-hackers-with-u-s-treasury-breach" target="_blank" rel="noopener noreferrer nofollow">Kecheng</a> and <a class="link" href="https://www.fbi.gov/wanted/cyber/zhou-shuai?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=justice-department-charges-two-silk-typhoon-chinese-hackers-with-u-s-treasury-breach" target="_blank" rel="noopener noreferrer nofollow">Shuai</a> on their Most Wanted list. Both are charged with the following crimes:</p><div class="blockquote"><blockquote class="blockquote__quote"></blockquote></div><p class="paragraph" style="text-align:left;">Kecheng and Shuai are described as playing “key roles” in hacking over 100 American organizations and the U.S. Treasury. According to the Justice Department, they frequently hack targets “suppressing free speech and religious freedoms” and have carried out hacker-for-hire cyberattacks for over a decade.</p><div class="image"><img alt="Yin Kecheng and Zhou Shuai are on the FBI Most Wanted List for hacking the U.S. Treasury and over 100 other American organizations. The FBI is offering up to $2 million for information leading to the arrest of either individual. " class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/3237ad53-8b99-45a4-a76a-c4f34ea8f7e8/kecheng_shuai.jpg?t=1742399290"/><div class="image__source"><span class="image__source_text"><p>Yin Kecheng and Zhou Shuai are on the FBI Most Wanted List for hacking the U.S. Treasury and over 100 other American organizations. The FBI is offering up to $2 million for information leading to the arrest of either individual. (Source: FBI)</p></span></div></div><h2 class="heading" style="text-align:left;" id="silk-typhoon-used-microsoft-exchang">Silk Typhoon used Microsoft Exchange, Palo Alto Networks Firewall, Citrix NetScaler, and Ivanti Pulse Connect Secure vulnerabilities</h2><p class="paragraph" style="text-align:left;">Microsoft published new research this week on how <a class="link" href="https://www.microsoft.com/en-us/security/blog/2025/03/05/silk-typhoon-targeting-it-supply-chain/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=justice-department-charges-two-silk-typhoon-chinese-hackers-with-u-s-treasury-breach" target="_blank" rel="noopener noreferrer nofollow">Silk Typhoon leveraged multiple vulnerabilities</a> from Microsoft Exchange, Palo Alto Networks Firewalls, Citrix NetScaler, and Ivanti Pulse Connect Secure to hack into targets. </p><p class="paragraph" style="text-align:left;">Microsoft has been tracking cyberattack activity from Silk Typhoon since 2020. The group is also tracked as APT 27 by <a class="link" href="https://cloud.google.com/security/resources/insights/apt-groups?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=justice-department-charges-two-silk-typhoon-chinese-hackers-with-u-s-treasury-breach" target="_blank" rel="noopener noreferrer nofollow">Mandiant</a> (now part of Google), using malware such as PANDORA, SOGU, and GHOST on its victims.</p><p class="paragraph" style="text-align:left;">Prosecutors said the group&#39;s targets include U.S. defense contractors, tech companies, law firms, state and local governments, and universities.</p><p class="paragraph" style="text-align:left;">Silk Typhoon typically utilizes spear phishing to gain initial access to a target network. It then moves laterally across cloud-hosted networks, manipulating service account permissions and exfiltrating data.</p><h2 class="heading" style="text-align:left;" id="fbi-offers-2-million-reward-for-inf">FBI offers $2 million reward for information leading to the arrest of Kecheng or Shuai</h2><p class="paragraph" style="text-align:left;">Kecheng was formally charged with hacking the U.S. Treasury in December 2024. Kecheng was sanctioned by the Treasury Department’s Office of Foreign Assets Control in February after linking Kecheng to China’s Ministry of State Security (MSS), the intelligence agency responsible for the country’s foreign intelligence collection.</p><p class="paragraph" style="text-align:left;">The FBI offers a $2 million reward for information leading to Kecheng and Shuai&#39;s arrest and conviction. </p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><hr class="content_break"></div><h3 class="heading" style="text-align:left;" id="todays-cyber-social-wall-of-shame">Today’s Cyber Social Wall of Shame</h3><p class="paragraph" style="text-align:left;">For more information on Silk Typhoon, their tactics, and targets, check out the research report by Microsoft Threat Intelligence:</p><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/MsftSecIntel/status/1897242826301231356?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=justice-department-charges-two-silk-typhoon-chinese-hackers-with-u-s-treasury-breach"><p> Twitter tweet </p></a></blockquote><p class="paragraph" style="text-align:left;">Until next time…</p><p class="paragraph" style="text-align:left;"><b>Rob Waters</b><br><span style="font-size:0.8rem;">Founder</span><br><span style="font-size:0.8rem;">The Breach Report + Cybersecurity Careers Blog</span></p><p class="paragraph" style="text-align:left;"><br><span style="font-size:0.8rem;"><i><b>P.S. - </b></i></span><span style="font-size:0.8rem;"><i>Do you want to start a newsletter yourself? </i></span><br><span style="font-size:0.8rem;"><i><b>You can with beehiiv. </b></i></span><span style="font-size:0.8rem;"><i><b><a class="link" href="https://www.beehiiv.com?via=tbr&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=justice-department-charges-two-silk-typhoon-chinese-hackers-with-u-s-treasury-breach" target="_blank" rel="noopener noreferrer nofollow">Create one today with a free trial</a></b></i></span><span style="font-size:0.8rem;"><i><b>.</b></i></span><br><span style="font-size:0.8rem;">Disclaimer: The Breach Report may contain affiliate links. Read our </span><span style="font-size:0.8rem;"><a class="link" href="https://thebreach.report/c/advertising?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=justice-department-charges-two-silk-typhoon-chinese-hackers-with-u-s-treasury-breach" target="_blank" rel="noopener noreferrer nofollow">Advertising</a></span><span style="font-size:0.8rem;"> policy page.</span></p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Lockbit Ransomware Developer Extradited to the United States</title>
  <description>Rostislav Panev, an Israeli and Russian national, has been extradited to the United States </description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/136658cd-1e9b-4c9e-a3c8-92b149675310/lockbit_header.jpg" length="53142" type="image/jpeg"/>
  <link>https://thebreach.report/p/lockbit-ransomware-rotislav-panev-extradited-to-us</link>
  <guid isPermaLink="true">https://thebreach.report/p/lockbit-ransomware-rotislav-panev-extradited-to-us</guid>
  <pubDate>Sat, 15 Mar 2025 04:00:00 +0000</pubDate>
  <atom:published>2025-03-15T04:00:00Z</atom:published>
    <dc:creator>Rob Waters</dc:creator>
    <category><![CDATA[News]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #82b984; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#95dd96; }
  .bh__table_header p { color: #2A2A2A; font-family:'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><div class="section" style="background-color:transparent;border-color:#00A503;border-style:solid;border-width:2px;margin:0.0px 0.0px 0.0px 0.0px;padding:2.0px 2.0px 2.0px 2.0px;"><p class="paragraph" style="text-align:left;"><i>Welcome to the latest issue of </i><i><b>The Breach Report</b></i><i>, a cybersecurity newsletter from the creators of the </i><i><a class="link" href="https://www.cybercareers.blog?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=lockbit-ransomware-developer-extradited-to-the-united-states" target="_blank" rel="noopener noreferrer nofollow">Cybersecurity Careers Blog</a></i><i>. Be sure to subscribe via </i><i><a class="link" href="https://thebreach.report/subscribe?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=lockbit-ransomware-developer-extradited-to-the-united-states" target="_blank" rel="noopener noreferrer nofollow">email</a></i><i> or </i><i><a class="link" href="https://rss.beehiiv.com/feeds/SyvvEer2H8.xml?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=lockbit-ransomware-developer-extradited-to-the-united-states" target="_blank" rel="noopener noreferrer nofollow">RSS</a></i><i>.</i></p></div><h3 class="heading" style="text-align:left;">Learn AI in 5 minutes a day</h3><div class="image"><a class="image__link" href="https://magic.beehiiv.com/v1/4d03390d-2481-4299-b949-ffd8b38b4c38?email={{email}}&utm_campaign={{publication_alphanumeric_id}}&redirect_to=https%3A%2F%2Fsubscribe.therundown.ai%2F%3Fform%3Dopen&redirect_delay=1&_gl=1*1qqix25*_gcl_au*MTYwNDc0Mjg2OC4xNzI5NTMyNjYw*_ga*MTk2YzU4MDctZGFlZi00MjQ3LWIzZDYtYTQ1MTUwMmJiZTQ0*_ga_E6Y4WLQ2EC*MTczMjUxMTg2Ny4yNTkzLjEuMTczMjUxMzM4My42MC4wLjE4NTk3NDE3MTE.&_bhiiv=opp_d061b86a-6c84-45a5-bb63-c1385d1716bb_e4221c46&bhcl_id=996cab4b-ca6b-4634-9c5b-8a262cc5196e_{{subscriber_id}}_{{email_address_id}}" rel="noopener" target="_blank"><img class="image__image" style="border-radius:0px 0px 0px 0px;border-style:solid;border-width:0px 0px 0px 0px;box-sizing:border-box;border-color:#E5E7EB;" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/81826e33-9f55-4e89-be2a-d882f2a77bd2/Banner_2.png?t=1732571457"/></a></div><p class="paragraph" style="text-align:left;">This is the easiest way for a busy person wanting to learn AI in as little time as possible: </p><ol start="1"><li><p class="paragraph" style="text-align:left;">Sign up for <a class="link" href="https://magic.beehiiv.com/v1/4d03390d-2481-4299-b949-ffd8b38b4c38?email={{email}}&utm_campaign={{publication_alphanumeric_id}}&redirect_to=https%3A%2F%2Fsubscribe.therundown.ai%2F%3Fform%3Dopen&redirect_delay=1&_gl=1*1qqix25*_gcl_au*MTYwNDc0Mjg2OC4xNzI5NTMyNjYw*_ga*MTk2YzU4MDctZGFlZi00MjQ3LWIzZDYtYTQ1MTUwMmJiZTQ0*_ga_E6Y4WLQ2EC*MTczMjUxMTg2Ny4yNTkzLjEuMTczMjUxMzM4My42MC4wLjE4NTk3NDE3MTE.&_bhiiv=opp_d061b86a-6c84-45a5-bb63-c1385d1716bb_e4221c46&bhcl_id=996cab4b-ca6b-4634-9c5b-8a262cc5196e_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">The Rundown AI</a> newsletter</p></li><li><p class="paragraph" style="text-align:left;">They send you 5-minute email updates on the latest AI news and how to use it</p></li><li><p class="paragraph" style="text-align:left;">You learn how to become 2x more productive by leveraging AI</p></li></ol><p class="paragraph" style="text-align:left;"><a class="link" href="https://magic.beehiiv.com/v1/4d03390d-2481-4299-b949-ffd8b38b4c38?email={{email}}&utm_campaign={{publication_alphanumeric_id}}&redirect_to=https%3A%2F%2Fsubscribe.therundown.ai%2F%3Fform%3Dopen&redirect_delay=1&_gl=1*1qqix25*_gcl_au*MTYwNDc0Mjg2OC4xNzI5NTMyNjYw*_ga*MTk2YzU4MDctZGFlZi00MjQ3LWIzZDYtYTQ1MTUwMmJiZTQ0*_ga_E6Y4WLQ2EC*MTczMjUxMTg2Ny4yNTkzLjEuMTczMjUxMzM4My42MC4wLjE4NTk3NDE3MTE.&_bhiiv=opp_d061b86a-6c84-45a5-bb63-c1385d1716bb_e4221c46&bhcl_id=996cab4b-ca6b-4634-9c5b-8a262cc5196e_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Sign up to start learning.</a></p><h2 class="heading" style="text-align:left;" id="alleged-lock-bit-ransomware-develop">Alleged LockBit Ransomware Developer Rostislav Panev Extradited to the U.S. in Major Cybersecurity Crackdown</h2><p class="paragraph" style="text-align:left;">In a significant victory for international law enforcement, <b>Rotislav Panev</b>, the alleged developer of the notorious <b>LockBit</b> ransomware group, has been extradited from Israel to the United States to face trial. The U.S. Department of Justice (DOJ) <a class="link" href="https://www.justice.gov/usao-nj/pr/dual-russian-and-israeli-national-extradited-united-states-his-role-lockbit-ransomware?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=lockbit-ransomware-developer-extradited-to-the-united-states" target="_blank" rel="noopener noreferrer nofollow">announced</a> the extradition of Panev, a 51-year-old dual Russian and Israeli national, signaling a continued commitment to <a class="link" href="https://www.cybercareers.blog/2024/02/lockbit-ransomware-group-shutdown-by-fbi-nca/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=lockbit-ransomware-developer-extradited-to-the-united-states" target="_blank" rel="noopener noreferrer nofollow">dismantle ransomware operations</a> that have caused billions of dollars in losses worldwide.</p><p class="paragraph" style="text-align:left;">Panev was initially arrested in Israel in August 2024 following a U.S. provisional arrest request. After his extradition, he made an initial court appearance before U.S. Magistrate Judge André M. Espinosa in Newark, New Jersey, and has been detained pending trial.</p><p class="paragraph" style="text-align:left;">U.S. Attorney John Giordano emphasized the significance of this extradition, stating, “Rostislav Panev’s extradition to the District of New Jersey makes it clear: if you are a member of the LockBit ransomware conspiracy, the United States will find you and bring you to justice.” </p><p class="paragraph" style="text-align:left;">He further highlighted the unwavering commitment of his office, the FBI, and international partners to prosecuting cybercriminals despite the increasing sophistication of their methods.<br></p><div class="image"><img alt="Rotislav Panev in an undated picture shared on X. He is charged as a developer of the notorious LockBit ransomware group, helping extort over $500 million from victims" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/e4416386-3b51-4cbd-8871-dcdc3d2985c5/lockbit-rstislav.jpg?t=1742090871"/><div class="image__source"><span class="image__source_text"><p>Rotislav Panev in an undated picture shared on X. He is charged as a developer of the notorious LockBit ransomware group, helping extort over $500 million from victims.</p></span></div></div><h3 class="heading" style="text-align:left;" id="panev-aided-lock-bit-ransomware-gro">Panev aided LockBit ransomware group growth, extorting over $500 million from victims</h3><p class="paragraph" style="text-align:left;">According to court documents and statements, Panev allegedly served as a developer for the LockBit ransomware group from its inception around 2019 through at least February 2024. During this period, LockBit became one of the most active and destructive ransomware groups globally. </p><p class="paragraph" style="text-align:left;">Even after a period of reduced activity following law enforcement disruption in February 2024, the group is linked to over 2,700 victims, triple the number of the next most active group.</p><p class="paragraph" style="text-align:left;">The DOJ stated that the LockBit group claimed responsibility for attacks on over 2,500 victims across at least 120 countries, including approximately 1,800 in the U.S. Victims ranged from individuals and small businesses to multinational corporations, including critical infrastructure like hospitals, schools, and government agencies. </p><p class="paragraph" style="text-align:left;">Notable victims of the LockBit ransomware group include <a class="link" href="https://www.cybercareers.blog/2023/11/lockbit-hackers-claim-icbc-paid-ransom-to-end-cyberattack/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=lockbit-ransomware-developer-extradited-to-the-united-states" target="_blank" rel="noopener noreferrer nofollow">Chinese Bank ICBC</a>, <a class="link" href="https://www.cybercareers.blog/2023/02/ion-group-hit-with-lockbit-ransomware-ransom-paid/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=lockbit-ransomware-developer-extradited-to-the-united-states" target="_blank" rel="noopener noreferrer nofollow">ION Group</a> investments, and the <a class="link" href="https://www.cybercareers.blog/2023/01/housing-authority-of-the-city-of-los-angeles-confirms-lockbit-ransomware-attack/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=lockbit-ransomware-developer-extradited-to-the-united-states" target="_blank" rel="noopener noreferrer nofollow">Housing Authority of the City of Los Angeles</a>.</p><p class="paragraph" style="text-align:left;">LockBit is estimated to have extracted at least $500 million in ransom payments and caused billions of dollars in other losses.</p><h3 class="heading" style="text-align:left;" id="panev-profited-from-lock-bit-infras">Panev profited from LockBit infrastructure and affiliate business model</h3><p class="paragraph" style="text-align:left;">The LockBit operation involved two roles: developers like Panev, who designed the malware code and maintained the operational infrastructure, and affiliates, who carried out the attacks and extorted victims. Ransom payments were then split between these two groups.</p><p class="paragraph" style="text-align:left;">Evidence cited in the superseding complaint against Panev reveals that law enforcement discovered administrator credentials on his computer for a dark web-hosted online repository at the time of his arrest. </p><p class="paragraph" style="text-align:left;">This repository contained source code for multiple LockBit builder versions, allowing affiliates to create custom versions of the ransomware for specific victims. Investigators also found the source code for LockBit’s StealBit tool, which is used for data exfiltration, and access credentials for the LockBit control panel maintained by the developers for the affiliates.</p><p class="paragraph" style="text-align:left;">The complaint further alleges that Panev engaged in direct messages on a cybercriminal forum with LockBit’s primary administrator, identified by the U.S. as <b>Dimitry Yuryevich Khoroshev</b>, also known as <b>LockBitSupp</b>. These messages reportedly discussed tasks related to the LockBit builder and control panel. </p><p class="paragraph" style="text-align:left;">Between June 2022 and February 2024, the primary LockBit administrator allegedly transferred approximately $10,000 per month in cryptocurrency to a wallet owned by Panev, totaling over $230,000 during that period. These funds were allegedly laundered through illicit cryptocurrency mixing or “washing” services designed to obfuscate cryptocurrency transactions and wallet tracing.</p><h3 class="heading" style="text-align:left;" id="panevs-downfall-confessing-to-israe">Panev’s downfall: confessing to Israeli authorities</h3><p class="paragraph" style="text-align:left;">Following his arrest, Panev reportedly admitted to Israeli authorities that he performed coding, development, and consulting work for the LockBit group and received regular cryptocurrency payments, consistent with the transfers identified by U.S. authorities. </p><p class="paragraph" style="text-align:left;">His alleged work included developing code to disable antivirus software, deploy malware across victim networks, and print the LockBit ransom note on all connected printers. He also admitted to writing and maintaining LockBit malware code and providing technical guidance.</p><p class="paragraph" style="text-align:left;">The extradition of Panev follows significant disruption efforts against the LockBit ransomware group in February 2024, led by the U.K. National Crime Agency (NCA) in cooperation with the DOJ, FBI, and international partners. This operation involved seizing LockBit’s public-facing websites and disrupting their infrastructure.</p><p class="paragraph" style="text-align:left;">To date, seven LockBit members have been charged in the District of New Jersey. Besides Panev and Khoroshev, who remains at large, others charged include affiliates Mikhail Vasiliev and Ruslan Astamirov, who have pleaded guilty and are awaiting sentencing, and Artur Sungatov and Ivan Kondratyev, who also remain at large. Mikhail Matveev, another alleged affiliate, remains at large as well. </p><p class="paragraph" style="text-align:left;">The U.S. Department of State is offering rewards of up to $10 million for information leading to the arrest and/or conviction of Khoroshev and Matveev and for information leading to the identification and location of individuals in key leadership positions within LockBit. A reward of up to $5 million is offered for information leading to the arrest and/or conviction of any individual participating in LockBit.</p><h2 class="heading" style="text-align:left;" id="are-you-a-victim-of-lock-bit-ransom">Are you a victim of LockBit ransomware?</h2><p class="paragraph" style="text-align:left;">Law enforcement encourages all past victims of LockBit to contact the FBI and submit information at <a class="link" href="https://www.ic3.gov?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=lockbit-ransomware-developer-extradited-to-the-united-states" target="_blank" rel="noopener noreferrer nofollow">www.ic3.gov</a>. Due to the disruption efforts, decryption capabilities have been developed that may help hundreds of victims restore their encrypted systems. </p><p class="paragraph" style="text-align:left;">Victims are also encouraged to visit <a class="link" href="https://www.justice.gov/usao-nj/lockbit?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=lockbit-ransomware-developer-extradited-to-the-united-states" target="_blank" rel="noopener noreferrer nofollow">www.justice.gov/usao-nj/lockbit</a> for case updates and information regarding their rights.</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><hr class="content_break"></div><h3 class="heading" style="text-align:left;" id="todays-cyber-social-wall-of-shame">Today’s Cyber Social Wall of Shame</h3><p class="paragraph" style="text-align:left;">It&#39;s not a good day when you’re the top news the FBI shares.</p><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/FBI/status/1900571433186505004?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=lockbit-ransomware-developer-extradited-to-the-united-states"><p> Twitter tweet </p></a></blockquote><p class="paragraph" style="text-align:left;">Until next time…</p><p class="paragraph" style="text-align:left;"><b>Rob Waters</b><br><span style="font-size:0.8rem;">Founder</span><br><span style="font-size:0.8rem;">The Breach Report + Cybersecurity Careers Blog</span></p><p class="paragraph" style="text-align:left;"><br><span style="font-size:0.8rem;"><i><b>P.S. - </b></i></span><span style="font-size:0.8rem;"><i>Do you want to start a newsletter yourself? </i></span><br><span style="font-size:0.8rem;"><i><b>You can with beehiiv. </b></i></span><span style="font-size:0.8rem;"><i><b><a class="link" href="https://www.beehiiv.com?via=tbr&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=lockbit-ransomware-developer-extradited-to-the-united-states" target="_blank" rel="noopener noreferrer nofollow">Create one today with a free trial</a></b></i></span><span style="font-size:0.8rem;"><i><b>.</b></i></span><br><span style="font-size:0.8rem;">Disclaimer: The Breach Report may contain affiliate links. Read our </span><span style="font-size:0.8rem;"><a class="link" href="https://thebreach.report/c/advertising?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=lockbit-ransomware-developer-extradited-to-the-united-states" target="_blank" rel="noopener noreferrer nofollow">Advertising</a></span><span style="font-size:0.8rem;"> policy page.</span></p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Army soldier tried to sell Snowflake stolen data and defect to Russia</title>
  <description>United States authorities report 21-year-old U.S. Army soldier Cameron Wagenius tried to sell stolen data to a foreign intelligence service and defect to Russia.</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/3f67711c-5149-4657-b088-4e4419be7fab/usarmy_header_cyber.jpg" length="213351" type="image/jpeg"/>
  <link>https://thebreach.report/p/army-soldier-tried-to-sell-snowflake-stolen-data-and-defect-to-russia</link>
  <guid isPermaLink="true">https://thebreach.report/p/army-soldier-tried-to-sell-snowflake-stolen-data-and-defect-to-russia</guid>
  <pubDate>Wed, 05 Mar 2025 05:00:00 +0000</pubDate>
  <atom:published>2025-03-05T05:00:00Z</atom:published>
    <dc:creator>Rob Waters</dc:creator>
    <category><![CDATA[News]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #82b984; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#95dd96; }
  .bh__table_header p { color: #2A2A2A; font-family:'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><i>Welcome to the latest issue of </i><i><b>The Breach Report</b></i><i>, a cybersecurity newsletter from the creators of the </i><i><a class="link" href="https://www.cybercareers.blog?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=army-soldier-tried-to-sell-snowflake-stolen-data-and-defect-to-russia" target="_blank" rel="noopener noreferrer nofollow">Cybersecurity Careers Blog</a></i><i>. Be sure to subscribe via </i><i><a class="link" href="https://thebreach.report/subscribe?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=army-soldier-tried-to-sell-snowflake-stolen-data-and-defect-to-russia" target="_blank" rel="noopener noreferrer nofollow">email</a></i><i> or </i><i><a class="link" href="https://rss.beehiiv.com/feeds/SyvvEer2H8.xml?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=army-soldier-tried-to-sell-snowflake-stolen-data-and-defect-to-russia" target="_blank" rel="noopener noreferrer nofollow">RSS</a></i><i>.</i></p><h2 class="heading" style="text-align:left;" id="cameron-wagenius-aka-kiberphant-0-m">Cameron Wagenius, aka Kiberphant0m and cyb3rph4nt0m charged with data theft and extortion</h2><p class="paragraph" style="text-align:left;">United States authorities have charged <b>Cameron John Wagenius</b>, a 21-year-old U.S. Army soldier, for his involvement in a cybercrime spree targeting <a class="link" href="https://thebreach.report/p/snowflake-data-breach-malware?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=army-soldier-tried-to-sell-snowflake-stolen-data-and-defect-to-russia" target="_blank" rel="noopener noreferrer nofollow">Snowflake and exfiltrating data from over 165 major companies</a>. Known online as &quot;Kiberphant0m&quot; and &quot;cyb3rph4nt0m,&quot; Wagenius has a history of malicious cyber activity while maintaining a security clearance. He is formally charged in U.S. district courts with unlawfully posting and transferring confidential phone records information, including those allegedly of high-ranking public officials.</p><p class="paragraph" style="text-align:left;">Wagenius allegedly attempted to sell stolen data to a foreign intelligence service and extort victims, including AT&T.</p><p class="paragraph" style="text-align:left;">In November 2024, while on active duty, Wagenius attempted to extort $500,000 from AT&T, threatening to leak phone records of high-ranking officials. AT&T confirmed in July that cybercriminals accessed their Snowflake environment in April, stealing six months of customer phone and text records.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://storage.courtlistener.com/recap/gov.uscourts.wawd.343000/gov.uscourts.wawd.343000.30.0.pdf?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=army-soldier-tried-to-sell-snowflake-stolen-data-and-defect-to-russia" target="_blank" rel="noopener noreferrer nofollow">Court filings </a>state Wagenius is accused of attempting to sell stolen data to a foreign intelligence service—although the service is not named. </p><div class="blockquote"><blockquote class="blockquote__quote"></blockquote></div><p class="paragraph" style="text-align:left;">However, forensic investigations of personal devices and accounts show repeated use of VPNs and search engine history. Court documents redact the country names, but Wagenius’s search engine queries give the public a strong indication of which foreign intelligence service. </p><p class="paragraph" style="text-align:left;">Search engine history revealed that Wagenius was researching information on defecting to Russia. He also searched for “Can hacking be treason?” and “How to defect to countries that do not extradite to the United States.”</p><p class="paragraph" style="text-align:left;">Wagenius&#39; alleged co-conspirators, Connor Moucka and John Binns, were indicted in November for allegedly <a class="link" href="https://cyberscoop.com/army-soldier-alleged-cybercriminal-foreign-spies/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=army-soldier-tried-to-sell-snowflake-stolen-data-and-defect-to-russia" target="_blank" rel="noopener noreferrer nofollow">extorting</a> more than 10 organizations after breaking into cloud platforms used by AT&T and other major companies. Binns has also been charged with the 2021 T-Mobile breach that exposed the personal information of at least 76.6 million customers.</p><h2 class="heading" style="text-align:left;" id="wagenius-pleads-guilty-considered-a">Wagenius pleads guilty, considered a flight risk</h2><p class="paragraph" style="text-align:left;">Wagenius, known online as &quot;Kiberphant0m&quot; and &quot;cyb3rph4nt0m,&quot; has a history of malicious cyber activity.</p><p class="paragraph" style="text-align:left;">His boldness as a cyber criminal despite being an active Army soldier was apparent throughout his activities. Court documents state Wagenius violated his commanding officer’s orders by purchasing a new laptop after a federal search warrant was executed at his barracks room and his electronic devices were seized. He further leveraged VPNs and other technologies to try and conceal his geographic location or identity.</p><p class="paragraph" style="text-align:left;">Wagenius pleaded guilty to unlawfully transferring confidential phone records. The court deemed him a flight risk, citing his online searches for non-extradition countries and the Russian embassy. </p><p class="paragraph" style="text-align:left;"> The incident also raises concerns about the security of cloud data storage services and the importance of multi-factor authentication [9].</p><h2 class="heading" style="text-align:left;" id="national-security-implications-of-w">National Security implications of Wagenius</h2><p class="paragraph" style="text-align:left;">This case has several potential implications for national security and international relations.</p><p class="paragraph" style="text-align:left;">Insider threats are some of the most challenging to detect and prevent. Financially motivated cybercrime can directly intersect with and undermine national security interests when individuals with access to highly sensitive data or in positions of trust can become compromised.</p><p class="paragraph" style="text-align:left;">Wagenius&#39; alleged attempt to sell data to a foreign intelligence service suggests a willingness to engage with state-level actors, blurring the lines with espionage.</p><p class="paragraph" style="text-align:left;">His online research of defecting to countries without the ability to extradite to the U.S. would have enormous national security concerns if he were successful. Attempting to flee the country and potentially seek refuge with a foreign government is deja vu for those intimately familiar with Edward Snowden’s actions.</p><p class="paragraph" style="text-align:left;">If Wagenius did attempt to sell stolen data to a foreign intelligence service, this could strain relations between the U.S. and the country involved. Despite current President Donald Trump&#39;s complicated relationship with Russian President Vladimir Putin, this would be the last thing Trump wants to deal with in his early second term.</p><hr class="content_break"><h2 class="heading" style="text-align:left;" id="latest-cybersecurity-news">Latest Cybersecurity News</h2><p class="paragraph" style="text-align:left;">What we’re reading across the wire about the latest cybersecurity hacks, breaches, industry news, and more. </p><p class="paragraph" style="text-align:left;"><b>New from our favorite blogs and journalists:</b></p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.404media.co/buying-a-250-residency-card-from-a-tropical-island-let-me-bypass-u-s-crypto-laws/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=army-soldier-tried-to-sell-snowflake-stolen-data-and-defect-to-russia" target="_blank" rel="noopener noreferrer nofollow">Buying a $250 Residency Card From a Tropical Island Let Me Bypass U.S. Crypto Laws</a> (404 Media)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.404media.co/at-t-hacker-tried-to-sell-stolen-data-to-foreign-government/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=army-soldier-tried-to-sell-snowflake-stolen-data-and-defect-to-russia" target="_blank" rel="noopener noreferrer nofollow">AT&T Hacker Tried to Sell Stolen Data to Foreign Government</a> (404 Media)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.404media.co/flock-threatens-open-source-developer-mapping-its-surveillance-cameras/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=army-soldier-tried-to-sell-snowflake-stolen-data-and-defect-to-russia" target="_blank" rel="noopener noreferrer nofollow">Flock Threatens Open Source Developer Mapping Its Surveillance Cameras</a> (404 Media)</p></li><li><p class="paragraph" style="text-align:left;"> <a class="link" href="https://cyberscoop.com/dhs-cisa-wont-stop-looking-at-russian-cyber-threats/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=army-soldier-tried-to-sell-snowflake-stolen-data-and-defect-to-russia" target="_blank" rel="noopener noreferrer nofollow">DHS says CISA won’t stop looking at Russian cyber threats</a> (CyberScoop)’</p></li><li><p class="paragraph" style="text-align:left;"> <a class="link" href="https://cyberscoop.com/microsoft-generative-ai-azure-hacking-for-hire-amended-complaint/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=army-soldier-tried-to-sell-snowflake-stolen-data-and-defect-to-russia" target="_blank" rel="noopener noreferrer nofollow">Microsoft IDs developers behind alleged generative AI hacking-for-hire scheme</a> (CyberScoop)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://techcrunch.com/2025/03/03/lee-enterprises-ransomware-attack-hits-freelance-and-contractor-payments/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=army-soldier-tried-to-sell-snowflake-stolen-data-and-defect-to-russia" target="_blank" rel="noopener noreferrer nofollow">Lee Enterprises ransomware attack hits freelance and contractor payments</a> (TechCrunch)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://techcrunch.com/2025/03/03/us-said-to-halt-offensive-cyber-operations-against-russia/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=army-soldier-tried-to-sell-snowflake-stolen-data-and-defect-to-russia" target="_blank" rel="noopener noreferrer nofollow">US said to halt offensive cyber operations against Russia</a> (TechCrunch)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://techcrunch.com/2025/02/28/the-biggest-data-breaches-of-2025-so-far/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=army-soldier-tried-to-sell-snowflake-stolen-data-and-defect-to-russia" target="_blank" rel="noopener noreferrer nofollow">The biggest data breaches of 2025 — so far</a> (TechCrunch)</p><p class="paragraph" style="text-align:left;"></p></li></ul><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><hr class="content_break"></div><h3 class="heading" style="text-align:left;" id="todays-cyber-wall-of-shame">Today’s Cyber Wall of Shame</h3><p class="paragraph" style="text-align:left;">Busted….</p><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/vxdb/status/1874157115155063099?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=army-soldier-tried-to-sell-snowflake-stolen-data-and-defect-to-russia"><p> Twitter tweet </p></a></blockquote><p class="paragraph" style="text-align:left;">Until next time…</p><p class="paragraph" style="text-align:left;"><b>Rob Waters</b><br><span style="font-size:0.8rem;">Founder</span><br><span style="font-size:0.8rem;">The Breach Report + Cybersecurity Careers Blog</span></p><p class="paragraph" style="text-align:left;"><br><span style="font-size:0.8rem;"><i><b>P.S. - </b></i></span><span style="font-size:0.8rem;"><i>Do you want to start a newsletter yourself? </i></span><br><span style="font-size:0.8rem;"><i><b>You can with beehiiv. </b></i></span><span style="font-size:0.8rem;"><i><b><a class="link" href="https://www.beehiiv.com?via=tbr&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=army-soldier-tried-to-sell-snowflake-stolen-data-and-defect-to-russia" target="_blank" rel="noopener noreferrer nofollow">Create one today with a free trial</a></b></i></span><span style="font-size:0.8rem;"><i><b>.</b></i></span><br><span style="font-size:0.8rem;">Disclaimer: The Breach Report may contain affiliate links. Read our </span><span style="font-size:0.8rem;"><a class="link" href="https://thebreach.report/c/advertising?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=army-soldier-tried-to-sell-snowflake-stolen-data-and-defect-to-russia" target="_blank" rel="noopener noreferrer nofollow">Advertising</a></span><span style="font-size:0.8rem;"> policy page.</span></p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Evgenii Ptitsyn Extradited to U.S. for Phobos Ransomware</title>
  <description>The Justice Department charges Russian hacker Evgenii Ptitsyn as the administrator of a ransomware-as-a-service organization extorting millions from victims</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/d0cc2b9a-9022-44fe-bfef-373c4d073d6f/Firefly_A_hacker_wearing_an_intimidating_face_mask_and_hoodie_using_a_laptop_in_a_dark_room_with_a_l_1_.jpg" length="235242" type="image/jpeg"/>
  <link>https://thebreach.report/p/evgenii-ptitsyn-extradited-to-u-s-for-phobos-ransomware</link>
  <guid isPermaLink="true">https://thebreach.report/p/evgenii-ptitsyn-extradited-to-u-s-for-phobos-ransomware</guid>
  <pubDate>Wed, 20 Nov 2024 06:00:00 +0000</pubDate>
  <atom:published>2024-11-20T06:00:00Z</atom:published>
    <dc:creator>Rob Waters</dc:creator>
    <category><![CDATA[News]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #82b984; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#95dd96; }
  .bh__table_header p { color: #2A2A2A; font-family:'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><i>Welcome to the latest issue of </i><i><b>The Breach Report</b></i><i>, a cybersecurity newsletter from the creators of the </i><i><a class="link" href="https://www.cybercareers.blog?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=evgenii-ptitsyn-extradited-to-u-s-for-phobos-ransomware" target="_blank" rel="noopener noreferrer nofollow">Cybersecurity Careers Blog</a></i><i>. Be sure to subscribe via </i><i><a class="link" href="https://thebreach.report/subscribe?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=evgenii-ptitsyn-extradited-to-u-s-for-phobos-ransomware" target="_blank" rel="noopener noreferrer nofollow">email</a></i><i> or </i><i><a class="link" href="https://rss.beehiiv.com/feeds/SyvvEer2H8.xml?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=evgenii-ptitsyn-extradited-to-u-s-for-phobos-ransomware" target="_blank" rel="noopener noreferrer nofollow">RSS</a></i><i>.</i></p><h2 class="heading" style="text-align:left;" id="russian-national-extradited-for-pho">Russian National Extradited for Phobos Ransomware Attacks</h2><p class="paragraph" style="text-align:left;"><b>Evgenii Ptitsyn</b>, a 42-year-old Russian national, has been extradited from South Korea to the United States to face charges for his alleged role as an administrator of the <b>Phobos ransomware</b>. Ptitsyn appeared in the U.S. District Court in Maryland on November 4th, 2024, facing charges for his cyber criminal activities that included extorting over $16 million from over 1,000 victims in the U.S. alone. The arrest is a significant victory for international law enforcement agencies working to combat the growing threat of ransomware attacks.</p><p class="paragraph" style="text-align:left;">Ptitsyn was also known as “derxan” and “zimmermanx” in his cybercriminals activities. If convicted, Ptitsyn could face significant prison time: up to 20 years for each wire fraud count, 10 years for computer hacking, and five years for conspiracy.</p><p class="paragraph" style="text-align:left;">The Phobos ransomware is a type of malware that encrypts a victim&#39;s files, making them inaccessible until a ransom is paid. The <a class="link" href="https://www.justice.gov/opa/pr/phobos-ransomware-administrator-extradited-south-korea-face-cybercrime-charges?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=evgenii-ptitsyn-extradited-to-u-s-for-phobos-ransomware" target="_blank" rel="noopener noreferrer nofollow">Justice Department</a> alleges that Ptitsyn and his co-conspirators developed the Phobos ransomware and offered access to other criminals, or “affiliates,” in exchange for fees from successful ransomware attacks. </p><p class="paragraph" style="text-align:left;">Once the victim’s data was successfully infected with the Phobos ransomware and paid a ransom, criminal affiliates paid fees to Phobos administrators like Ptitsyn for a decryption key to regain access to the encrypted files.</p><p class="paragraph" style="text-align:left;">These attacks, which began as far back as 2020, targeted a wide range of victims, including schools, hospitals, government agencies, and enterprises globally. </p><h2 class="heading" style="text-align:left;" id="charges-against-ptitsyn">Charges Against Ptitsyn</h2><p class="paragraph" style="text-align:left;">Ptitsyn is facing a 13-count indictment that includes:</p><ul><li><p class="paragraph" style="text-align:left;">Wire fraud conspiracy</p></li><li><p class="paragraph" style="text-align:left;">Wire fraud</p></li><li><p class="paragraph" style="text-align:left;">Conspiracy to commit computer fraud and abuse</p></li><li><p class="paragraph" style="text-align:left;">Four counts of causing intentional damage to protected computers</p></li><li><p class="paragraph" style="text-align:left;">Four counts of extortion in relation to hacking</p></li></ul><p class="paragraph" style="text-align:left;">If convicted on all counts, Ptitsyn faces a maximum penalty of 20 years in prison for each wire fraud count, 10 years for each computer hacking count, and 5 years for conspiracy to commit computer fraud and abuse.</p><h2 class="heading" style="text-align:left;" id="international-collaboration-leads-t">International Collaboration Leads to Arrest</h2><p class="paragraph" style="text-align:left;">Ptitsyn&#39;s extradition results from a collaborative effort between law enforcement agencies in multiple countries, including South Korea, the United States, the United Kingdom, Japan, Spain, Belgium, Poland, the Czech Republic, France, and Romania. This case highlights the importance of international cooperation in combating cybercrime, which often transcends national borders.</p><p class="paragraph" style="text-align:left;">It also staggeringly illustrates the extent to which international law enforcement agencies and the United States will hold hackers accountable. </p><p class="paragraph" style="text-align:left;">No matter where they are in the world, this case is a major step forward in the fight against ransomware and a reminder of the importance of international cooperation in combating this growing threat.</p><h3 class="heading" style="text-align:left;" id="phobos-ransomware-finally-on-the-de">Phobos Ransomware: Finally on the decline</h3><p class="paragraph" style="text-align:left;">Phobos ransomware is a particularly insidious form of malware because it often targets organizations that provide essential services, such as healthcare and education. The disruption caused by these attacks can significantly impact ordinary people&#39;s lives. In February 2024, the Cybersecurity and Infrastructure Security Agency (CISA) and the FBI <a class="link" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-060a?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=evgenii-ptitsyn-extradited-to-u-s-for-phobos-ransomware" target="_blank" rel="noopener noreferrer nofollow">warned that Phobos was targeting state and local government services</a>.</p><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/aejleslie/status/1858595426930487524?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=evgenii-ptitsyn-extradited-to-u-s-for-phobos-ransomware"><p> Twitter tweet </p></a></blockquote><p class="paragraph" style="text-align:left;">Cybersecurity researchers have noted a recent decline in Phobos activity, possibly related to Ptitsyn&#39;s arrest. Alexander Leslie, a threat intelligence analyst for Recorded Future, <a class="link" href="https://cyberscoop.com/alleged-russian-phobos-ransomware-administrator-extradited-to-u-s-in-custody?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=evgenii-ptitsyn-extradited-to-u-s-for-phobos-ransomware" target="_blank" rel="noopener noreferrer nofollow">observed</a> a significant drop in Phobos activity and a complete stall in the operations of 8Base ransomware, which used a variant of Phobos.</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><hr class="content_break"></div><h3 class="heading" style="text-align:left;" id="todays-cyber-wall-of-shame">Today’s Cyber Wall of Shame</h3><p class="paragraph" style="text-align:left;">Veterans’ data is a valuable target to our adversaries. The United States Department of Veterans Affairs must do better. </p><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/RepLuttrell/status/1859267522870288820?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=evgenii-ptitsyn-extradited-to-u-s-for-phobos-ransomware"><p> Twitter tweet </p></a></blockquote><p class="paragraph" style="text-align:left;">Until next time…</p><p class="paragraph" style="text-align:left;"><b>Rob Waters</b><br><span style="font-size:0.8rem;">Founder</span><br><span style="font-size:0.8rem;">The Breach Report + Cybersecurity Careers Blog</span></p><p class="paragraph" style="text-align:left;"><br><span style="font-size:0.8rem;"><i><b>P.S. - </b></i></span><span style="font-size:0.8rem;"><i>Do you want to start a newsletter yourself? </i></span><br><span style="font-size:0.8rem;"><i><b>You can with beehiiv. </b></i></span><span style="font-size:0.8rem;"><i><b><a class="link" href="https://www.beehiiv.com?via=tbr&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=evgenii-ptitsyn-extradited-to-u-s-for-phobos-ransomware" target="_blank" rel="noopener noreferrer nofollow">Create one today with a free trial</a></b></i></span><span style="font-size:0.8rem;"><i><b>.</b></i></span><br><span style="font-size:0.8rem;">Disclaimer: The Breach Report may contain affiliate links. Read our </span><span style="font-size:0.8rem;"><a class="link" href="https://thebreach.report/c/advertising?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=evgenii-ptitsyn-extradited-to-u-s-for-phobos-ransomware" target="_blank" rel="noopener noreferrer nofollow">Advertising</a></span><span style="font-size:0.8rem;"> policy page.</span></p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Snowflake hackers charged with stealing 50 billion AT&amp;T records</title>
  <description>U.S. DoJ charges Connor Moucka and John Binns with stealing AT&amp;T data from a breached Snowflake instance, extorting $2.5M in bitcoin from victims, and $370K ransom from AT&amp;T</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/7faad25c-3809-47d1-9518-a182e36c7242/att-usa.jpg" length="146310" type="image/jpeg"/>
  <link>https://thebreach.report/p/snowflake-hackers-charged-with-stealing-50-billion-att-records</link>
  <guid isPermaLink="true">https://thebreach.report/p/snowflake-hackers-charged-with-stealing-50-billion-att-records</guid>
  <pubDate>Mon, 18 Nov 2024 05:00:00 +0000</pubDate>
  <atom:published>2024-11-18T05:00:00Z</atom:published>
    <dc:creator>Rob Waters</dc:creator>
    <category><![CDATA[News]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #82b984; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#95dd96; }
  .bh__table_header p { color: #2A2A2A; font-family:'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><i>Welcome to the latest issue of </i><i><b>The Breach Report</b></i><i>, a cybersecurity newsletter from the creators of the </i><i><a class="link" href="https://www.cybercareers.blog?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-hackers-charged-with-stealing-50-billion-at-t-records" target="_blank" rel="noopener noreferrer nofollow">Cybersecurity Careers Blog</a></i><i>. Be sure to subscribe via </i><i><a class="link" href="https://thebreach.report/subscribe?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-hackers-charged-with-stealing-50-billion-at-t-records" target="_blank" rel="noopener noreferrer nofollow">email</a></i><i> or </i><i><a class="link" href="https://rss.beehiiv.com/feeds/SyvvEer2H8.xml?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-hackers-charged-with-stealing-50-billion-at-t-records" target="_blank" rel="noopener noreferrer nofollow">RSS</a></i><i>.</i></p><h3 class="heading" style="text-align:left;" id="writer-rag-tool-build-productionrea">Writer RAG tool: build production-ready RAG apps in minutes</h3><div class="image"><a class="image__link" href="https://writer.com/engineering/rag-tool/?utm_source=beehiiv&utm_medium=newsletter&utm_campaign=rag-tool_{{publication_alphanumeric_id}}_{{publication_name_param}}&_bhiiv=opp_d4ed8efe-0b0b-4d52-8102-ad51500b8ee3_3b00bf9b&bhcl_id=9396bcff-e9a5-48d9-b796-a24e0d57e56e_{{subscriber_id}}_{{email_address_id}}" rel="noopener" target="_blank"><img class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/e2028307-3de3-43f9-b7a5-f2c31418a552/2024-12_Writer_RAG_tool__build_production-ready_RAG_apps_in_minutes_-_16_9_Newsletter.png?t=1734711822"/></a></div><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://writer.com/engineering/rag-tool/?utm_source=beehiiv&utm_medium=newsletter&utm_campaign=rag-tool_{{publication_alphanumeric_id}}_{{publication_name_param}}&_bhiiv=opp_d4ed8efe-0b0b-4d52-8102-ad51500b8ee3_3b00bf9b&bhcl_id=9396bcff-e9a5-48d9-b796-a24e0d57e56e_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Writer RAG Tool</a>: build production-ready RAG apps in minutes with simple API calls.</p></li><li><p class="paragraph" style="text-align:left;">Knowledge Graph integration for intelligent data retrieval and AI-powered interactions.</p></li><li><p class="paragraph" style="text-align:left;">Streamlined full-stack platform eliminates complex setups for scalable, accurate AI workflows.</p></li></ul><p class="paragraph" style="text-align:left;"><a class="link" href="https://writer.com/engineering/rag-tool/?utm_source=beehiiv&utm_medium=newsletter&utm_campaign=rag-tool_{{publication_alphanumeric_id}}_{{publication_name_param}}&_bhiiv=opp_d4ed8efe-0b0b-4d52-8102-ad51500b8ee3_3b00bf9b&bhcl_id=9396bcff-e9a5-48d9-b796-a24e0d57e56e_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Learn more about our production ready RAG tooling here.</a></p><h2 class="heading" style="text-align:left;" id="us-department-of-justice-indicts-co">U.S. Department of Justice indicts Connor Moucka and John Binns of hacking</h2><p class="paragraph" style="text-align:left;">In June 2024, I reported along with major tech outlets that the <a class="link" href="https://thebreach.report/p/snowflake-data-breach-malware?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-hackers-charged-with-stealing-50-billion-at-t-records" target="_blank" rel="noopener noreferrer nofollow"><b>Snowflake</b></a><a class="link" href="https://thebreach.report/p/snowflake-data-breach-malware?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-hackers-charged-with-stealing-50-billion-at-t-records" target="_blank" rel="noopener noreferrer nofollow"> data breach</a> had escalated to be regarded as one of the worst breaches ever. Now, the hacker duo responsible are both formally identified and charged.</p><p class="paragraph" style="text-align:left;">The <b>United States Department of Justice </b>has publicly released its indictments against <b>Connor Moucka</b> and <b>John Binns</b>, two suspected cybercriminals allegedly responsible for hacking into Snowflake. Once the pair breached the vulnerable Snowflake instances, they exfiltrated data from at least ten organizations and received at least $2.5M in Bitcoin cryptocurrency payments. </p><p class="paragraph" style="text-align:left;"><a class="link" href="https://techcrunch.com/2024/11/05/canadian-authorities-say-they-arrested-hacker-linked-to-snowflake-data-breaches/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-hackers-charged-with-stealing-50-billion-at-t-records" target="_blank" rel="noopener noreferrer nofollow">Moucka</a> was arrested in Canada last week, where he was living, and <a class="link" href="https://www.404media.co/american-hacker-in-turkey-linked-to-massive-at-t-breach/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-hackers-charged-with-stealing-50-billion-at-t-records" target="_blank" rel="noopener noreferrer nofollow">Binns</a> was previously arrested and jailed in Turkey in July 2024. Binns is a U.S. citizen but was living in Turkey for unknown reasons.</p><p class="paragraph" style="text-align:left;">Prosecutors confirmed that Moucka was known online as “judische,” “catist,” “waif,” and “cllyels.” Binns went by “irdev”and “j_irdev1337.”</p><p class="paragraph" style="text-align:left;">Although the victims weren’t named in the indictment, it mentions a telecom provider, which aligns with AT&T as a victim. </p><p class="paragraph" style="text-align:left;">In a separate breach unrelated to Snowflake, the same pair <a class="link" href="https://www.wsj.com/articles/t-mobile-hacker-who-stole-data-on-50-million-customers-their-security-is-awful-11629985105?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-hackers-charged-with-stealing-50-billion-at-t-records" target="_blank" rel="noopener noreferrer nofollow">hacked T-Mobile in 2021</a>, calling its security “awful,” stealing over 50 million customer records.</p><p class="paragraph" style="text-align:left;">The Snowflake breach was massively damaging for both Snowflake and its victims. According to reports by <i><a class="link" href="https://www.404media.co/suspected-snowflake-hacker-arrested-in-canada/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-hackers-charged-with-stealing-50-billion-at-t-records" target="_blank" rel="noopener noreferrer nofollow">404 Media</a></i>, over 165 Snowflake instances and organizations were said to be affected by the hacker duo. While not all Snowflake victims are made public, known organizations affected include Santander, Ticketmaster, LendingTree, and Advance Auto Parts.</p><h2 class="heading" style="text-align:left;" id="att-snowflake-breach-includes-50-bi">AT&T Snowflake breach includes 50 billion customer text and call records</h2><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.wired.com/story/atandt-paid-hacker-300000-to-delete-stolen-call-records/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-hackers-charged-with-stealing-50-billion-at-t-records" target="_blank" rel="noopener noreferrer nofollow"><i>Wired</i></a> reported in July 2024 that AT&T reportedly paid the hackers $370,000 not to release the stolen data but did so anyway.</p><p class="paragraph" style="text-align:left;">With the recent news of <a class="link" href="https://thebreach.report/p/t-mobile-hacked-salt-typhoon-cyber-espionage-operation?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-hackers-charged-with-stealing-50-billion-at-t-records" target="_blank" rel="noopener noreferrer nofollow">Salt Typhoon, a PRC-linked cyber espionage group hacking major U.S. telecom providers</a> like AT&T, T-Mobile, and Verizon, it’s easy to forget that AT&T has suffered other unrelated but highly damaging breaches in recent years. </p><p class="paragraph" style="text-align:left;">It also speaks to the complexity and difficulty of securing infrastructure against various threats and vulnerabilities.</p><p class="paragraph" style="text-align:left;">The Snowflake breach included over 50 million customer text and call records, comprising virtually all of AT&T’s customers, or 110 million people. According to forensic experts, Moucka and Binns were in the Snowflake instances for over six months, possibly longer.</p><p class="paragraph" style="text-align:left;">The pair of hackers are believed to be associated with “The Com,” an online ecosystem that includes groups participating in cybercriminal activities, violence, extortion, kidnappings, shootings, and robberies, according to <i><a class="link" href="https://cyberscoop.com/connor-moucka-snowflake-data-breach-indictment-john-binns/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-hackers-charged-with-stealing-50-billion-at-t-records" target="_blank" rel="noopener noreferrer nofollow">CyberScoop</a></i>.</p><p class="paragraph" style="text-align:left;">The full indictment is available for download below in Adobe PDF format.</p><div class="recommendation"><figure class="recommendation__logo"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="currentColor"><path d="M14.8287 7.75737L9.1718 13.4142C8.78127 13.8047 8.78127 14.4379 9.1718 14.8284C9.56232 15.219 10.1955 15.219 10.586 14.8284L16.2429 9.17158C17.4144 8.00001 17.4144 6.10052 16.2429 4.92894C15.0713 3.75737 13.1718 3.75737 12.0002 4.92894L6.34337 10.5858C4.39075 12.5384 4.39075 15.7042 6.34337 17.6569C8.29599 19.6095 11.4618 19.6095 13.4144 17.6569L19.0713 12L20.4855 13.4142L14.8287 19.0711C12.095 21.8047 7.66283 21.8047 4.92916 19.0711C2.19549 16.3374 2.19549 11.9053 4.92916 9.17158L10.586 3.51473C12.5386 1.56211 15.7045 1.56211 17.6571 3.51473C19.6097 5.46735 19.6097 8.63317 17.6571 10.5858L12.0002 16.2427C10.8287 17.4142 8.92916 17.4142 7.75759 16.2427C6.58601 15.0711 6.58601 13.1716 7.75759 12L13.4144 6.34316L14.8287 7.75737Z"></path></svg></figure><h3 class="recommendation__title"> DOJ_ConnorMoucka_JohnBinns_Snowflake.pdf </h3><p class="recommendation__description"></p><p class="recommendation__description"> 2.17 MB • PDF File </p><a class="recommendation__link" href="https://beehiiv-publication-files.s3.amazonaws.com/uploads/downloadables/68b6ebe3-0f42-4f76-b09c-82b488a40373/33a82727-dfa0-474d-8626-42a46f84b827/DOJ_ConnorMoucka_JohnBinns_Snowflake.pdf?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAQCMHTQSE2JGAGXHJ%2F20260413%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20260413T052445Z&X-Amz-Expires=604800&X-Amz-SignedHeaders=host&X-Amz-Signature=40332566a02024fdf7ea9d960285d737695714b5cdedfae75a271de76b4b29d6" download="DOJ_ConnorMoucka_JohnBinns_Snowflake.pdf" target="_blank" data-skip-utms data-skip-link-id> Download </a></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><hr class="content_break"></div><h3 class="heading" style="text-align:left;" id="todays-cyber-wall-of-shame">Today’s Cyber Wall of Shame</h3><p class="paragraph" style="text-align:left;">Fix your security, Snowflake. Please.</p><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/josephfcox/status/1811717059526504517?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-hackers-charged-with-stealing-50-billion-at-t-records"><p> Twitter tweet </p></a></blockquote><p class="paragraph" style="text-align:left;">Until next time…</p><p class="paragraph" style="text-align:left;"><b>Rob Waters</b><br><span style="font-size:0.8rem;">Founder</span><br><span style="font-size:0.8rem;">The Breach Report + Cybersecurity Careers Blog</span></p><p class="paragraph" style="text-align:left;"><br><span style="font-size:0.8rem;"><i><b>P.S. - </b></i></span><span style="font-size:0.8rem;"><i>Do you want to start a newsletter yourself? </i></span><br><span style="font-size:0.8rem;"><i><b>You can with beehiiv. </b></i></span><span style="font-size:0.8rem;"><i><b><a class="link" href="https://www.beehiiv.com?via=tbr&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-hackers-charged-with-stealing-50-billion-at-t-records" target="_blank" rel="noopener noreferrer nofollow">Create one today with a free trial</a></b></i></span><span style="font-size:0.8rem;"><i><b>.</b></i></span><br><span style="font-size:0.8rem;">Disclaimer: The Breach Report may contain affiliate links. Read our </span><span style="font-size:0.8rem;"><a class="link" href="https://thebreach.report/c/advertising?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-hackers-charged-with-stealing-50-billion-at-t-records" target="_blank" rel="noopener noreferrer nofollow">Advertising</a></span><span style="font-size:0.8rem;"> policy page.</span></p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>T-Mobile hacked in Chinese cyber-espionage operation</title>
  <description>Salt Typhoon hackers breached T-Mobile network for months in massive telecom intelligence gathering operation</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/93d89aee-4e98-488d-b8f6-f1d9a608a895/tmobilehack.jpeg" length="141759" type="image/jpeg"/>
  <link>https://thebreach.report/p/t-mobile-hacked-salt-typhoon-cyber-espionage-operation</link>
  <guid isPermaLink="true">https://thebreach.report/p/t-mobile-hacked-salt-typhoon-cyber-espionage-operation</guid>
  <pubDate>Sat, 16 Nov 2024 05:00:00 +0000</pubDate>
  <atom:published>2024-11-16T05:00:00Z</atom:published>
    <dc:creator>Rob Waters</dc:creator>
    <category><![CDATA[Special Report]]></category>
    <category><![CDATA[News]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #82b984; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#95dd96; }
  .bh__table_header p { color: #2A2A2A; font-family:'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><i>Welcome to the latest issue of </i><i><b>The Breach Report</b></i><i>, a cybersecurity newsletter from the creators of the </i><i><a class="link" href="https://www.cybercareers.blog?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=t-mobile-hacked-in-chinese-cyber-espionage-operation" target="_blank" rel="noopener noreferrer nofollow">Cybersecurity Careers Blog</a></i><i>. Be sure to subscribe via </i><i><a class="link" href="https://thebreach.report/subscribe?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=t-mobile-hacked-in-chinese-cyber-espionage-operation" target="_blank" rel="noopener noreferrer nofollow">email</a></i><i> or </i><i><a class="link" href="https://rss.beehiiv.com/feeds/SyvvEer2H8.xml?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=t-mobile-hacked-in-chinese-cyber-espionage-operation" target="_blank" rel="noopener noreferrer nofollow">RSS</a></i><i>.</i></p><h3 class="heading" style="text-align:left;" id="start-learning-ai-in-2025">Start learning AI in 2025</h3><div class="image"><a class="image__link" href="https://magic.beehiiv.com/v1/4d03390d-2481-4299-b949-ffd8b38b4c38?email={{email}}&utm_campaign={{publication_alphanumeric_id}}&redirect_to=https%3A%2F%2Fsubscribe.therundown.ai%2F%3Fform%3Dopen&redirect_delay=1&_gl=1*1qqix25*_gcl_au*MTYwNDc0Mjg2OC4xNzI5NTMyNjYw*_ga*MTk2YzU4MDctZGFlZi00MjQ3LWIzZDYtYTQ1MTUwMmJiZTQ0*_ga_E6Y4WLQ2EC*MTczMjUxMTg2Ny4yNTkzLjEuMTczMjUxMzM4My42MC4wLjE4NTk3NDE3MTE.&_bhiiv=opp_ae9b92da-2e90-4167-abbe-8a8912ae73b9_e4221c46&bhcl_id=9b45ba04-4f40-4130-85ad-9560b9475595_{{subscriber_id}}_{{email_address_id}}" rel="noopener" target="_blank"><img class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/f58a9eaf-b0c9-44d2-b0f4-a4507e19576c/Banner_2.png?t=1732571346"/></a></div><p class="paragraph" style="text-align:left;">Everyone talks about AI, but no one has the time to learn it. So, we found the easiest way to learn AI in as little time as possible: <a class="link" href="https://magic.beehiiv.com/v1/4d03390d-2481-4299-b949-ffd8b38b4c38?email={{email}}&utm_campaign={{publication_alphanumeric_id}}&redirect_to=https%3A%2F%2Fsubscribe.therundown.ai%2F%3Fform%3Dopen&redirect_delay=1&_gl=1*1qqix25*_gcl_au*MTYwNDc0Mjg2OC4xNzI5NTMyNjYw*_ga*MTk2YzU4MDctZGFlZi00MjQ3LWIzZDYtYTQ1MTUwMmJiZTQ0*_ga_E6Y4WLQ2EC*MTczMjUxMTg2Ny4yNTkzLjEuMTczMjUxMzM4My42MC4wLjE4NTk3NDE3MTE.&_bhiiv=opp_ae9b92da-2e90-4167-abbe-8a8912ae73b9_e4221c46&bhcl_id=9b45ba04-4f40-4130-85ad-9560b9475595_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">The Rundown AI.</a></p><p class="paragraph" style="text-align:left;">It&#39;s a free AI newsletter that keeps you up-to-date on the latest AI news, and teaches you how to apply it in just 5 minutes a day.</p><p class="paragraph" style="text-align:left;">Plus, complete the quiz after signing up and they’ll recommend the best AI tools, guides, and courses – tailored to your needs.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://magic.beehiiv.com/v1/4d03390d-2481-4299-b949-ffd8b38b4c38?email={{email}}&utm_campaign={{publication_alphanumeric_id}}&redirect_to=https%3A%2F%2Fsubscribe.therundown.ai%2F%3Fform%3Dopen&redirect_delay=1&_gl=1*1qqix25*_gcl_au*MTYwNDc0Mjg2OC4xNzI5NTMyNjYw*_ga*MTk2YzU4MDctZGFlZi00MjQ3LWIzZDYtYTQ1MTUwMmJiZTQ0*_ga_E6Y4WLQ2EC*MTczMjUxMTg2Ny4yNTkzLjEuMTczMjUxMzM4My42MC4wLjE4NTk3NDE3MTE.&_bhiiv=opp_ae9b92da-2e90-4167-abbe-8a8912ae73b9_e4221c46&bhcl_id=9b45ba04-4f40-4130-85ad-9560b9475595_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Sign up to start learning.</a></p><h2 class="heading" style="text-align:left;" id="salt-typhoon-hack-part-of-major-us-">Salt Typhoon hack part of major U.S. telecom infrastructure spying operation</h2><p class="paragraph" style="text-align:left;">The <a class="link" href="https://www.wsj.com/politics/national-security/t-mobile-hacked-in-massive-chinese-breach-of-telecom-networks-4b2d7f92?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=t-mobile-hacked-in-chinese-cyber-espionage-operation" target="_blank" rel="noopener noreferrer nofollow"><i>Wall Street Journal</i></a> and <a class="link" href="https://www.reuters.com/technology/cybersecurity/t-mobile-hacked-massive-chinese-breach-telecom-networks-wsj-reports-2024-11-16/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=t-mobile-hacked-in-chinese-cyber-espionage-operation" target="_blank" rel="noopener noreferrer nofollow"><i>Reuters</i></a> have confirmed that <b>T-Mobile’s </b>network was part of a major intrusion and hacking operation by <b>Salt Typhoon</b>, an advanced persistent threat group with ties to a Chinese intelligence agency. Previous reports in October confirmed that <a class="link" href="https://thebreach.report/p/salt-typhoon-hacks-verizon-att?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=t-mobile-hacked-in-chinese-cyber-espionage-operation" target="_blank" rel="noopener noreferrer nofollow">Salt Typhoon had breached AT&T, Verizon, and Lumen Technologies</a>. Investigators believe hackers aimed at a host of well-connected Americans, including the presidential candidates—reflecting the scope and potential severity of the hack.</p><p class="paragraph" style="text-align:left;">As a quick refresher, Microsoft has dubbed the APT group “Salt Typhoon,” but it is also known as UNC2286 (Mandiant), GhostEmperor (Kaspersky Labs), and FamousSparrow (ESET).</p><h2 class="heading" style="text-align:left;" id="experts-claim-hack-is-catastrophic-">Experts claim hack is “catastrophic in scope and severity”</h2><p class="paragraph" style="text-align:left;">Although it is unclear what information Salt Typhoon extracted, if any, the breach of every major U.S. telecom provider is massively damaging. Salt Typhoon managed to breach and access systems maintained by the carriers to comply with U.S. surveillance requests. </p><p class="paragraph" style="text-align:left;">At this time, T-Mobile has stated that no customer data has been impacted.</p><p class="paragraph" style="text-align:left;">“T-Mobile is closely monitoring this industry-wide attack, and at this time, T-Mobile systems and data have not been impacted in any significant way, and we have no evidence of impacts to customer information,” the spokesperson said.</p><p class="paragraph" style="text-align:left;">However, federal investigators, cybersecurity experts, and T-Mobile personnel are conducting an investigation to confirm the extent of the breach. As with any cybersecurity incident, the breadth of the hack will take time to verify with forensic analysis.</p><h2 class="heading" style="text-align:left;" id="counterintelligence-concerns-over-s">Counterintelligence concerns over Salt Typhoon hacks</h2><p class="paragraph" style="text-align:left;">Using the U.S.’s surveillance infrastructure against its citizens raises serious counterintelligence concerns.</p><p class="paragraph" style="text-align:left;">According to the <i>Wall Street Journal</i>, other unnamed international carriers with close ties to the U.S. were also breached as part of the operation.</p><p class="paragraph" style="text-align:left;">The hacks are so damaging that the U.S. Consumer Financial Protection Bureau (CFPB) has <a class="link" href="https://www.securityweek.com/us-gov-agency-urges-employees-to-limit-phone-use-after-china-salt-typhoon-hack/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=t-mobile-hacked-in-chinese-cyber-espionage-operation" target="_blank" rel="noopener noreferrer nofollow">urged</a> its employees to minimize or eliminate conducting business matters over a cellular phone. The directive <a class="link" href="https://www.wsj.com/us-news/u-s-agency-warns-employees-about-phone-use-amid-ongoing-china-hack-dd459273?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=t-mobile-hacked-in-chinese-cyber-espionage-operation" target="_blank" rel="noopener noreferrer nofollow">states</a>, “Do NOT conduct CFPB work using mobile voice calls or text messages.”</p><p class="paragraph" style="text-align:left;">Instead, it recommends conducting business matters on platforms like Microsoft Teams or Cisco WebEx to minimize risk.</p><p class="paragraph" style="text-align:left;">The Federal Bureau of Investigation and Cybersecurity and Infrastructure Security Agency also <a class="link" href="https://www.cisa.gov/news-events/news/joint-statement-fbi-and-cisa-peoples-republic-china-prc-targeting-commercial-telecommunications?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=t-mobile-hacked-in-chinese-cyber-espionage-operation" target="_blank" rel="noopener noreferrer nofollow">stressed</a> the severity of the attack. </p><p class="paragraph" style="text-align:left;">“Chinese government-linked hackers compromised networks at multiple telecommunications companies to enable the theft of customer call records data, the compromise of private communications of a limited number of individuals who are primarily involved in government or political activity, and the copying of certain information that was subject to U.S. law enforcement requests pursuant to court orders.”</p><h2 class="heading" style="text-align:left;" id="how-salt-typhoon-hacked-t-mobile-at">How Salt Typhoon Hacked T-Mobile, AT&T, Verizon, and Lumen Technologies</h2><p class="paragraph" style="text-align:left;">Details are still emerging, but according to the Journal report, it is believed Salt Typhoon leveraged vulnerabilities from Cisco routers and used artificial intelligence and machine learning to penetrate the U.S. telecom providers further. </p><p class="paragraph" style="text-align:left;">Salt Typhoon is believed to have been active for at least eight months within AT&T, Verizon, T-Mobile, and Lumen Technologies.</p><p class="paragraph" style="text-align:left;">Senior national security and policy officials across the U.S. were targeted, and the access allowed them to extract call logs, unencrypted texts, and some audio from targets.</p><p class="paragraph" style="text-align:left;">This is in addition to other extensive <a class="link" href="https://thebreach.report/p/iran-apt42-phishing-trump-biden-campaigns?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=t-mobile-hacked-in-chinese-cyber-espionage-operation" target="_blank" rel="noopener noreferrer nofollow">spear phishing and cyberattacks against the Biden, Harris, and Trump Presidential Campaigns</a> by Iran since 2020, as we previously reported.</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><hr class="content_break"></div><h3 class="heading" style="text-align:left;" id="todays-cyber-social-wall-of-shame">Today’s Cyber Social Wall of Shame</h3><p class="paragraph" style="text-align:left;">T-Mobile doesn’t seem to learn from their mistakes. Here’s evidence of no rate-limiting on its internal systems from a separate, unrelated hack back in 2021:</p><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/Jeremy_Kirk/status/1427144723731402756?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=t-mobile-hacked-in-chinese-cyber-espionage-operation"><p> Twitter tweet </p></a></blockquote><p class="paragraph" style="text-align:left;">And if you don’t think that is bad… <i>another</i> unrelated T-Mobile breach in 2023 allowed hackers to steal the <a class="link" href="https://www.cybercareers.blog/2023/01/t-mobile-hacked-personal-data-of-37-million-customers-stolen/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=t-mobile-hacked-in-chinese-cyber-espionage-operation" target="_blank" rel="noopener noreferrer nofollow">personal data of 37 million customers</a>. </p><p class="paragraph" style="text-align:left;">But wait, there’s more! </p><p class="paragraph" style="text-align:left;">Hackers breached T-Mobile’s network <i>again</i> in 2023, having access to hundreds of its customers for <a class="link" href="https://www.bleepingcomputer.com/news/security/t-mobile-discloses-second-data-breach-since-the-start-of-2023/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=t-mobile-hacked-in-chinese-cyber-espionage-operation" target="_blank" rel="noopener noreferrer nofollow">over a month</a>.</p><p class="paragraph" style="text-align:left;">If you’re on T-Mobile, it may be time to switch to another carrier. They’re all compromised at this point, but wow.</p><p class="paragraph" style="text-align:left;">Until next time…</p><p class="paragraph" style="text-align:left;"><b>Rob Waters</b><br><span style="font-size:0.8rem;">Founder</span><br><span style="font-size:0.8rem;">The Breach Report + Cybersecurity Careers Blog</span></p><p class="paragraph" style="text-align:left;"><br><span style="font-size:0.8rem;"><i><b>P.S. - </b></i></span><span style="font-size:0.8rem;"><i>Do you want to start a newsletter yourself? </i></span><br><span style="font-size:0.8rem;"><i><b>You can with beehiiv. </b></i></span><span style="font-size:0.8rem;"><i><b><a class="link" href="https://www.beehiiv.com?via=tbr&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=t-mobile-hacked-in-chinese-cyber-espionage-operation" target="_blank" rel="noopener noreferrer nofollow">Create one today with a free trial</a></b></i></span><span style="font-size:0.8rem;"><i><b>.</b></i></span><br><span style="font-size:0.8rem;">Disclaimer: The Breach Report may contain affiliate links. Read our </span><span style="font-size:0.8rem;"><a class="link" href="https://thebreach.report/c/advertising?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=t-mobile-hacked-in-chinese-cyber-espionage-operation" target="_blank" rel="noopener noreferrer nofollow">Advertising</a></span><span style="font-size:0.8rem;"> policy page.</span></p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Why Hacking the United States Presidential Election is Nearly Impossible</title>
  <description>Despite multiple threats, the November 2024 Presidential Election had no evidence of cheating or foreign interference</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/8363e8ab-5def-4387-baad-4eb83193d407/election2024.jpg" length="224831" type="image/jpeg"/>
  <link>https://thebreach.report/p/why-hacking-the-united-states-presidential-election-is-nearly-impossible</link>
  <guid isPermaLink="true">https://thebreach.report/p/why-hacking-the-united-states-presidential-election-is-nearly-impossible</guid>
  <pubDate>Sun, 10 Nov 2024 17:00:00 +0000</pubDate>
  <atom:published>2024-11-10T17:00:00Z</atom:published>
    <dc:creator>Rob Waters</dc:creator>
    <category><![CDATA[Special Report]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #82b984; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#95dd96; }
  .bh__table_header p { color: #2A2A2A; font-family:'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><i>Welcome to the latest issue of </i><i><b>The Breach Report</b></i><i>, a cybersecurity newsletter from the creators of the </i><i><a class="link" href="https://www.cybercareers.blog?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=why-hacking-the-united-states-presidential-election-is-nearly-impossible" target="_blank" rel="noopener noreferrer nofollow">Cybersecurity Careers Blog</a></i><i>. Be sure to subscribe via </i><i><a class="link" href="https://thebreach.report/subscribe?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=why-hacking-the-united-states-presidential-election-is-nearly-impossible" target="_blank" rel="noopener noreferrer nofollow">email</a></i><i> or </i><i><a class="link" href="https://rss.beehiiv.com/feeds/SyvvEer2H8.xml?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=why-hacking-the-united-states-presidential-election-is-nearly-impossible" target="_blank" rel="noopener noreferrer nofollow">RSS</a></i><i>.</i></p><h3 class="heading" style="text-align:left;" id="tackle-your-credit-card-debt-with-0">Tackle Your Credit Card Debt With 0% Interest Until Nearly 2027 AND Earn 5% Cash Back</h3><div class="image"><a class="image__link" href="https://www.yrxtrk.com/aff_c?offer_id=22303&aff_id=1837&aff_sub4={{publication_alphanumeric_id}}&_bhiiv=opp_3acab420-c47b-4666-9c78-3d4b163001e2_15d0936e&bhcl_id=d6d329c1-1c9f-44ff-8cd4-81de6d246c56_{{subscriber_id}}_{{email_address_id}}" rel="noopener" target="_blank"><img class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/b8b21f2e-e907-4ffe-bbdb-af67bcdaf53f/Goldhand_Cashback.png?t=1739566256"/></a></div><p class="paragraph" style="text-align:left;">Some credit cards can help you get out of debt faster with a 0% intro APR on balance transfers. Transfer your balance, pay it down interest-free, and save money. <a class="link" href="https://www.yrxtrk.com/aff_c?offer_id=22303&aff_id=1837&aff_sub4={{publication_alphanumeric_id}}&_bhiiv=opp_3acab420-c47b-4666-9c78-3d4b163001e2_15d0936e&bhcl_id=d6d329c1-1c9f-44ff-8cd4-81de6d246c56_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">FinanceBuzz</a> reviewed top cards and found the best options—one even offers 0% APR into 2027 + 5% cash back! </p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.yrxtrk.com/aff_c?offer_id=22303&aff_id=1837&aff_sub4={{publication_alphanumeric_id}}&_bhiiv=opp_3acab420-c47b-4666-9c78-3d4b163001e2_15d0936e&bhcl_id=d6d329c1-1c9f-44ff-8cd4-81de6d246c56_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Learn How To Apply Now</a></p><h2 class="heading" style="text-align:left;" id="hacking-may-be-too-difficult-so-dis">Hacking may be too difficult, so disinformation is the weapon of choice</h2><p class="paragraph" style="text-align:left;">In the digital information age, the specter of election hacking looms large in the public consciousness. However, the reality is far more complex. Despite sensationalized news reports and conspiracy theories, successfully hacking the US presidential election is an incredibly difficult, if not impossible, task. Multi-layered technical and procedural safeguards are in place to protect the integrity of US elections, as I’ll outline below, drawing on expert opinions from the White House, NIST, CISA, and the FBI.</p><p class="paragraph" style="text-align:left;">For clarity, the term “hack” in this writing is defined as using a computer or internet-connected device to gain unauthorized access to a system. </p><p class="paragraph" style="text-align:left;">Last week, I covered how <a class="link" href="https://thebreach.report/p/cisa-fbi-us-elections-are-secure-despite-russian-interference?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=why-hacking-the-united-states-presidential-election-is-nearly-impossible" target="_blank" rel="noopener noreferrer nofollow">CISA, the FBI, and the ODNI released a joint statement on election security</a> to assure American voters. The statement included debunking <a class="link" href="https://cyberscoop.com/fbi-fake-videos-ballot-fraud-democrats-doppelganger/?hss_channel=tw-720664083767435264&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=why-hacking-the-united-states-presidential-election-is-nearly-impossible" target="_blank" rel="noopener noreferrer nofollow">viral videos</a> of Haitians voting illegally in Georgia, with a faux FBI terrorism warning of ongoing ballot fraud. </p><p class="paragraph" style="text-align:left;">Misusing U.S. agency logos, names, and terminology can be highly effective when weaponized. When malicious actors take the logo of an entity or agency that we trust to communicate false narratives that seem plausible (given recent media sensationalism and voter anxiety), it attempts to <i>appeal to our emotions and ideology</i> in the hope that we act upon it. </p><p class="paragraph" style="text-align:left;">The malicious actor bets that a portion will succumb to the disinformation campaign, stir confusion and distrust in the election process, or impact your vote.</p><p class="paragraph" style="text-align:left;">The disinformation campaign fails if the videos are unconvincing or quickly debunked (as is the case with the faux ballot voting).</p><h2 class="heading" style="text-align:left;" id="fbi-financial-and-data-fraud-more-l">FBI: Financial and data fraud more likely ahead of elections</h2><p class="paragraph" style="text-align:left;">The 2024 U.S. Presidential Election has passed, and <a class="link" href="https://www.nextgov.com/cybersecurity/2024/11/cisa-has-no-data-supporting-claims-election-cheating-official-says/400856/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=why-hacking-the-united-states-presidential-election-is-nearly-impossible" target="_blank" rel="noopener noreferrer nofollow">CISA reports no proof of election fraud or cheating</a>. </p><p class="paragraph" style="text-align:left;">Sadly, you have a higher likelihood of becoming a victim of financial fraud and scams by your fellow American citizens than the Presidential Election being hacked. </p><p class="paragraph" style="text-align:left;">In the months ahead of the election, the <a class="link" href="https://www.ic3.gov/PSA/2024/PSA241029?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=why-hacking-the-united-states-presidential-election-is-nearly-impossible" target="_blank" rel="noopener noreferrer nofollow">FBI warned Americans of scams and fraudulent activities</a> that would try to extort money, data, or other personally identifiable information (PII). </p><p class="paragraph" style="text-align:left;">The FBI stated that malicious actors purporting to be part of a political campaign or political action committee (PAC) or offering to sell merchandise of a candidate (but never shipping the item) are targeting voters.</p><p class="paragraph" style="text-align:left;">Palo Alto Networks’ Unit 42, which offers expert cybersecurity threat intelligence, research analysis, and guidance, corroborated the report:</p><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/Unit42_Intel/status/1851579848264716712?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=why-hacking-the-united-states-presidential-election-is-nearly-impossible"><p> Twitter tweet </p></a></blockquote><h2 class="heading" style="text-align:left;" id="five-reasons-hacking-the-united-sta">Five reasons hacking the United States Presidential Election is unlikely</h2><p class="paragraph" style="text-align:left;">Now, let’s explore why, despite the sensationalism that (inevitably) occurs each election cycle, hacking the United States Presidential Election is highly unlikely, if not impossible.</p><p class="paragraph" style="text-align:left;">The security of US elections is a multi-layered defense system involving a combination of technical, procedural, and human safeguards. Here are five key factors that make large-scale election hacking nearly impossible:</p><ol start="1"><li><p class="paragraph" style="text-align:left;"><b>Decentralized Voting Infrastructure</b></p><ul><li><p class="paragraph" style="text-align:left;"><b>Diverse Systems: </b>The <a class="link" href="https://apnews.com/article/election-trump-disinformation-russia-harris-9eb05358d444aa848c0a6db139458c3d?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=why-hacking-the-united-states-presidential-election-is-nearly-impossible" target="_blank" rel="noopener noreferrer nofollow">US election infrastructure is decentralized</a>, with each state and county using a variety of voting machines and systems. This diversity makes it significantly harder for a single attack to compromise the entire system.</p></li></ul><ul><li><p class="paragraph" style="text-align:left;"><b>Paper Trails: </b>Most jurisdictions use paper ballots, which serve as a verifiable record of votes. These <a class="link" href="https://www.ncsl.org/elections-and-campaigns/post-election-audits?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=why-hacking-the-united-states-presidential-election-is-nearly-impossible" target="_blank" rel="noopener noreferrer nofollow">paper trails can be used to audit election results</a> and detect any discrepancies.</p><p class="paragraph" style="text-align:left;"></p></li></ul></li><li><p class="paragraph" style="text-align:left;"><b>Robust Cybersecurity Measures</b></p><ul><li><p class="paragraph" style="text-align:left;"><b>CISA Guidance: </b>As I covered extensively above, the Cybersecurity and Infrastructure Security Agency (CISA) provides guidance and support to state and local election officials to enhance their cybersecurity practices.</p></li><li><p class="paragraph" style="text-align:left;"><b>NIST Standards: </b>The National Institute of Standards and Technology (NIST) <a class="link" href="https://www.nist.gov/itl/voting/research-and-projects/election-security?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=why-hacking-the-united-states-presidential-election-is-nearly-impossible" target="_blank" rel="noopener noreferrer nofollow">develops standards and guidelines</a> for secure information systems, including those used in elections.</p></li><li><p class="paragraph" style="text-align:left;"><b>Continuous Monitoring:</b> Election officials and cybersecurity experts continuously monitor the election infrastructure for signs of malicious activity.</p><p class="paragraph" style="text-align:left;"></p></li></ul></li><li><p class="paragraph" style="text-align:left;"><b>Rigorous Post-Election Audits</b></p><ul><li><p class="paragraph" style="text-align:left;"><b>Risk-Limiting Audits: </b>Many states conduct <a class="link" href="https://www.eac.gov/election-officials/election-audits-across-united-states?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=why-hacking-the-united-states-presidential-election-is-nearly-impossible" target="_blank" rel="noopener noreferrer nofollow">risk-limiting audits to verify the accuracy of election results</a>. These audits involve randomly selecting a sample of ballots and comparing them to the machine-counted results.</p></li><li><p class="paragraph" style="text-align:left;"><b>Manual Recounts:</b> In some cases, <a class="link" href="https://www.eac.gov/sites/default/files/document_library/files/EMG_chapt_15_august_26_2010_1.pdf?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=why-hacking-the-united-states-presidential-election-is-nearly-impossible" target="_blank" rel="noopener noreferrer nofollow">manual recounts are conducted to further verify election results</a>, especially in close races.</p><p class="paragraph" style="text-align:left;"></p></li></ul></li><li><p class="paragraph" style="text-align:left;"><b>Intelligence Community Oversight</b></p><ul><li><p class="paragraph" style="text-align:left;"><b>FBI and CISA Collaboration: </b>The Federal Bureau of Investigation (FBI) and CISA work closely to identify and mitigate threats to election security.</p></li><li><p class="paragraph" style="text-align:left;"><b>Foreign Interference Monitoring:</b> Intelligence agencies monitor for foreign interference in elections and take steps to counter such threats.</p><p class="paragraph" style="text-align:left;"></p></li></ul></li><li><p class="paragraph" style="text-align:left;"><b>Public Awareness and Transparency</b></p><ul><li><p class="paragraph" style="text-align:left;"><b>Transparent Processes:</b> Election officials strive to be transparent about their processes and procedures, building public trust.</p></li><li><p class="paragraph" style="text-align:left;"><b>Public Education:</b> CISA and other organizations <a class="link" href="https://www.cisa.gov/topics/election-security/protect2024?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=why-hacking-the-united-states-presidential-election-is-nearly-impossible" target="_blank" rel="noopener noreferrer nofollow">conduct public education campaigns such as #Protect2024</a> to raise awareness about election security and encourage citizens to report suspicious activity.</p></li></ul></li></ol><p class="paragraph" style="text-align:left;">So this Thanksgiving, when your crazy Uncle believes the election was “rigged,” “hacked,” or “compromised” by Iran, Russia, or some other foreign nation–you have the facts.</p><p class="paragraph" style="text-align:left;">You’re welcome. 🇺🇸 </p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><hr class="content_break"></div><h3 class="heading" style="text-align:left;" id="todays-cyber-wall-of-shame">Today’s Cyber Wall of Shame</h3><p class="paragraph" style="text-align:left;">Nothing to see here. Nothing at all.</p><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/MikeFritzell/status/1853987508608221670?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=why-hacking-the-united-states-presidential-election-is-nearly-impossible"><p> Twitter tweet </p></a></blockquote><p class="paragraph" style="text-align:left;">Until next time…</p><p class="paragraph" style="text-align:left;"><b>Rob Waters</b><br><span style="font-size:0.8rem;">Founder</span><br><span style="font-size:0.8rem;">The Breach Report + Cybersecurity Careers Blog</span></p><p class="paragraph" style="text-align:left;"><br><span style="font-size:0.8rem;"><i><b>P.S. - </b></i></span><span style="font-size:0.8rem;"><i>Do you want to start a newsletter yourself? </i></span><br><span style="font-size:0.8rem;"><i><b>You can with beehiiv. </b></i></span><span style="font-size:0.8rem;"><i><b><a class="link" href="https://www.beehiiv.com?via=tbr&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=why-hacking-the-united-states-presidential-election-is-nearly-impossible" target="_blank" rel="noopener noreferrer nofollow">Create one today with a free trial</a></b></i></span><span style="font-size:0.8rem;"><i><b>.</b></i></span><br><span style="font-size:0.8rem;">Disclaimer: The Breach Report may contain affiliate links. Read our </span><span style="font-size:0.8rem;"><a class="link" href="https://thebreach.report/c/advertising?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=why-hacking-the-united-states-presidential-election-is-nearly-impossible" target="_blank" rel="noopener noreferrer nofollow">Advertising</a></span><span style="font-size:0.8rem;"> policy page.</span></p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>CISA, FBI: U.S. Elections are secure despite Russian interference attempts</title>
  <description>Joint statement by ODNI, CISA, and FBI states Russian disinformation campaigns spread false videos of ballot fraud and illegal voting across social media platforms</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/99fcf321-cb9c-46a8-bacb-abb744ec0bd4/cisa_logo_darkbluebg.png" length="578857" type="image/png"/>
  <link>https://thebreach.report/p/cisa-fbi-us-elections-are-secure-despite-russian-interference</link>
  <guid isPermaLink="true">https://thebreach.report/p/cisa-fbi-us-elections-are-secure-despite-russian-interference</guid>
  <pubDate>Tue, 05 Nov 2024 05:00:00 +0000</pubDate>
  <atom:published>2024-11-05T05:00:00Z</atom:published>
    <dc:creator>Rob Waters</dc:creator>
    <category><![CDATA[Special Report]]></category>
    <category><![CDATA[News]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #82b984; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#95dd96; }
  .bh__table_header p { color: #2A2A2A; font-family:'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><i>Welcome to the latest issue of </i><i><b>The Breach Report</b></i><i>, a cybersecurity newsletter from the creators of the </i><i><a class="link" href="https://www.cybercareers.blog?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=cisa-fbi-u-s-elections-are-secure-despite-russian-interference-attempts" target="_blank" rel="noopener noreferrer nofollow">Cybersecurity Careers Blog</a></i><i>. Be sure to subscribe via </i><i><a class="link" href="https://thebreach.report/subscribe?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=cisa-fbi-u-s-elections-are-secure-despite-russian-interference-attempts" target="_blank" rel="noopener noreferrer nofollow">email</a></i><i> or </i><i><a class="link" href="https://rss.beehiiv.com/feeds/SyvvEer2H8.xml?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=cisa-fbi-u-s-elections-are-secure-despite-russian-interference-attempts" target="_blank" rel="noopener noreferrer nofollow">RSS</a></i><i>.</i></p><h2 class="heading" style="text-align:left;" id="cisa-us-elections-have-never-been-m">CISA: U.S. elections have never been more secure</h2><p class="paragraph" style="text-align:left;">Today is November 5, 2024, and millions of voters across the United States are headed to the polls to vote on the next President. Since the 2016 U.S. election, Americans have been on guard about social media manipulation, foreign interference, and election integrity. Most of the concern revolves around foreign interference, with nations such as <a class="link" href="https://thebreach.report/p/iran-apt42-phishing-trump-biden-campaigns?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=cisa-fbi-u-s-elections-are-secure-despite-russian-interference-attempts" target="_blank" rel="noopener noreferrer nofollow">Iran and China trying to hack political campaigns</a> (including Biden, Harris, and Trump members) or somehow hack and disrupt statewide voting machines.</p><p class="paragraph" style="text-align:left;">The good news?</p><p class="paragraph" style="text-align:left;">Jen Easterly, Director of the Cybersecurity and Infrastructure Security Agency (CISA), <a class="link" href="https://www.axios.com/2024/11/04/election-security-trump-harris-outcome-cisa?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=cisa-fbi-u-s-elections-are-secure-despite-russian-interference-attempts" target="_blank" rel="noopener noreferrer nofollow">told reporters</a> in a media briefing yesterday that “our election infrastructure has never been more secure.”</p><p class="paragraph" style="text-align:left;">Cybersecurity hacks against organizations, government agencies, and consumers have become normalized. However, the Federal Bureau of Investigation (FBI), CISA, and Office of the Director of National Intelligence (ODNI) want Americans to trust that their vote will count and not be erased in a cyberattack.</p><div class="blockquote"><blockquote class="blockquote__quote"></blockquote></div><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/jjL7YOXG6gs" width="100%"></iframe><h2 class="heading" style="text-align:left;" id="russian-disinformation-spreads-on-u">Russian disinformation spreads on U.S. Election ballot fraud</h2><p class="paragraph" style="text-align:left;">Despite the measures the U.S. government is taking to secure the election, it doesn’t mean that foreign interference attempts will stop.</p><p class="paragraph" style="text-align:left;">The <a class="link" href="https://www.fbi.gov/news/press-releases/joint-odni-fbi-and-cisa-statement-on-russian-election-influence-efforts?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=cisa-fbi-u-s-elections-are-secure-despite-russian-interference-attempts" target="_blank" rel="noopener noreferrer nofollow">FBI, CISA, and ODNI released a joint statement</a> on November 1, 2024, to assure voters that <a class="link" href="https://t.co/xQUN7IiesQ?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=cisa-fbi-u-s-elections-are-secure-despite-russian-interference-attempts" target="_blank" rel="noopener noreferrer nofollow">viral videos</a> pretending to be from the FBI about ballot fraud were fake:</p><p class="paragraph" style="text-align:left;">“The IC [sic: Intelligence Community] assesses that Russian influence actors manufactured a recent video that falsely depicted individuals claiming to be from Haiti and voting illegally in multiple counties in Georgia. This judgment is based on information available to the IC and prior activities of other Russian influence actors, including videos and other disinformation activities. The Georgia Secretary of State has already refuted the video’s claims as false.”</p><p class="paragraph" style="text-align:left;">The statement continues, “Russian influence actors also manufactured a video falsely accusing an individual associated with the Democratic presidential ticket of taking a bribe from a U.S. entertainer.”</p><p class="paragraph" style="text-align:left;">The group <a class="link" href="https://www.fbi.gov/news/press-releases/joint-odni-fbi-and-cisa-statement-110424?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=cisa-fbi-u-s-elections-are-secure-despite-russian-interference-attempts" target="_blank" rel="noopener noreferrer nofollow">released an update on November 4</a> elaborating on Russia’s disinformation and foreign interference activities:</p><p class="paragraph" style="text-align:left;">“Russia is the most active threat. Influence actors linked to Russia in particular are manufacturing videos and creating fake articles to undermine the legitimacy of the election, instill fear in voters regarding the election process, and suggest Americans are using violence against each other due to political preferences, judging from information available to the IC. These efforts risk inciting violence, including against election officials. We anticipate Russian actors will release additional manufactured content with these themes through election day and in the days and weeks after polls close.”</p><h2 class="heading" style="text-align:left;" id="where-to-get-accurate-election-and-">Where to get accurate election and polling information</h2><p class="paragraph" style="text-align:left;">According to CISA Director Jen Easterly, state and local election officials and websites are the best sources for accurate information about the voting process and election operations.</p><p class="paragraph" style="text-align:left;">Nation-states and foreign adversaries heavily utilize social media platforms to spread disinformation, so any news on the platforms should be preceded with caution. Each social media platform has its own rules and policies for verifying or removing inaccurate information, and it may spread virally before it is flagged for inaccuracies or taken down.</p><p class="paragraph" style="text-align:left;">You should also be aware that foreign nations and entities have made many other attempts to sow discord and distrust in the U.S. Election process. To learn more about these tactics and how to spot them, read about pre- and post-election tactics on <a class="link" href="https://cyberscoop.com/2024-us-election-disinformation-threats-post-election-warning?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=cisa-fbi-u-s-elections-are-secure-despite-russian-interference-attempts" target="_blank" rel="noopener noreferrer nofollow">Cyberscoop</a>.</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><hr class="content_break"></div><h3 class="heading" style="text-align:left;" id="todays-cyber-wall-of-shame">Today’s Cyber Wall of Shame</h3><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/Hadas_Gold/status/1853596537513009404?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=cisa-fbi-u-s-elections-are-secure-despite-russian-interference-attempts"><p> Twitter tweet </p></a></blockquote><p class="paragraph" style="text-align:left;">Be sure to vote, America. </p><p class="paragraph" style="text-align:left;">Until next time…</p><p class="paragraph" style="text-align:left;"><b>Rob Waters</b><br><span style="font-size:0.8rem;">Founder</span><br><span style="font-size:0.8rem;">The Breach Report + Cybersecurity Careers Blog</span></p><p class="paragraph" style="text-align:left;"><br><span style="font-size:0.8rem;"><i><b>P.S. - </b></i></span><span style="font-size:0.8rem;"><i>Do you want to start a newsletter yourself? </i></span><br><span style="font-size:0.8rem;"><i><b>You can with beehiiv. </b></i></span><span style="font-size:0.8rem;"><i><b><a class="link" href="https://www.beehiiv.com?via=tbr&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=cisa-fbi-u-s-elections-are-secure-despite-russian-interference-attempts" target="_blank" rel="noopener noreferrer nofollow">Create one today with a free trial</a></b></i></span><span style="font-size:0.8rem;"><i><b>.</b></i></span><br><span style="font-size:0.8rem;">Disclaimer: The Breach Report may contain affiliate links. Read our </span><span style="font-size:0.8rem;"><a class="link" href="https://thebreach.report/c/advertising?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=cisa-fbi-u-s-elections-are-secure-despite-russian-interference-attempts" target="_blank" rel="noopener noreferrer nofollow">Advertising</a></span><span style="font-size:0.8rem;"> policy page.</span></p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>China-linked Salt Typhoon hacks Verizon, AT&amp;T in intelligence gathering operation</title>
  <description>FBI warns China is hacking western governments &quot;at an unprecedented scale&quot;</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/3fe77e52-f8f8-4035-89a4-6a6f198ee8f8/china_cyber_flag.jpg" length="1382791" type="image/jpeg"/>
  <link>https://thebreach.report/p/salt-typhoon-hacks-verizon-att</link>
  <guid isPermaLink="true">https://thebreach.report/p/salt-typhoon-hacks-verizon-att</guid>
  <pubDate>Wed, 16 Oct 2024 04:00:00 +0000</pubDate>
  <atom:published>2024-10-16T04:00:00Z</atom:published>
    <dc:creator>Rob Waters</dc:creator>
    <category><![CDATA[News]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #82b984; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#95dd96; }
  .bh__table_header p { color: #2A2A2A; font-family:'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><i>Welcome to the latest issue of </i><i><b>The Breach Report</b></i><i>, a cybersecurity newsletter from the creators of the </i><i><a class="link" href="https://www.cybercareers.blog?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation" target="_blank" rel="noopener noreferrer nofollow">Cybersecurity Careers Blog</a></i><i>. Be sure to subscribe via </i><i><a class="link" href="https://thebreach.report/subscribe?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation" target="_blank" rel="noopener noreferrer nofollow">email</a></i><i> or </i><i><a class="link" href="https://rss.beehiiv.com/feeds/SyvvEer2H8.xml?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation" target="_blank" rel="noopener noreferrer nofollow">RSS</a></i><i>.</i></p><h2 class="heading" style="text-align:left;" id="united-states-wiretap-systems-breac">United States wiretap systems breached by China-linked hacking group “Salt Typhoon”</h2><p class="paragraph" style="text-align:left;">Another day, another ominous hack by a Chinese hacking group against critical infrastructure and United States businesses. You’d be forgiven for having Chinese hacking news fatigue, but they remain a force to be reckoned with and seemingly grab headlines every month.</p><p class="paragraph" style="text-align:left;">An <a class="link" href="https://www.wsj.com/tech/cybersecurity/u-s-wiretap-systems-targeted-in-china-linked-hack-327fc63b?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation" target="_blank" rel="noopener noreferrer nofollow">exclusive report by The Wall Street Journal</a> revealed that a cyberattack tied to the People’s Republic of China&#39;s government breached the networks of multiple U.S. broadband providers. The targets included Verizon, AT&T, and Lumen Technologies. </p><p class="paragraph" style="text-align:left;">The hacking group, known as <b>“Salt Typhoon” </b>- a name given to it by Microsoft—is also known as UNC2286 (Mandiant), GhostEmperor (Kaspersky Labs), and FamousSparrow (ESET).</p><div class="blockquote"><blockquote class="blockquote__quote"></blockquote></div><p class="paragraph" style="text-align:left;">The breach by Salt Typhoon is problematic because the group exploited backdoors within each U.S. broadband provider intended for use by U.S. intelligence agencies for foreign intelligence surveillance. According to The Wall Street Journal, the U.S. wiretap systems hack could be one of the most damaging China-backed cyber espionage hacks ever.</p><p class="paragraph" style="text-align:left;">According to reports, the hackers were within the foreign intelligence surveillance systems for “months, maybe longer” and obtained highly sensitive intelligence and law enforcement data.</p><p class="paragraph" style="text-align:left;">According to the report, the hackers accessed the same network infrastructure that U.S. broadband providers use to comply with legal requests for domestic information related to criminal and national security investigations. </p><p class="paragraph" style="text-align:left;">U.S. agencies such as the FBI are still investigating the incident to confirm the extent of the hack and how much data may have been accessed or exfiltrated.</p><p class="paragraph" style="text-align:left;">More generic internet traffic of U.S. citizens was likely monitored, but according to reports, it would be too challenging to abstract value from it.</p><p class="paragraph" style="text-align:left;">This incident validates the concerns of many privacy and security advocates, including Apple, who famously denied providing a <a class="link" href="https://www.wired.com/story/the-time-tim-cook-stood-his-ground-against-fbi/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation" target="_blank" rel="noopener noreferrer nofollow">“secure backdoor” to its iOS mobile operating system</a> for use by the U.S. government. </p><h2 class="heading" style="text-align:left;" id="who-is-salt-typhoon">Who is Salt Typhoon?</h2><p class="paragraph" style="text-align:left;">Microsoft has tracked Salt Typhoon since 2020, while ESET has tracked the group under the name FamousSparrow since 2019. The disparity is that different cybersecurity researchers and vendors see different cyber activity. While they can reach a consensus over a distinctive group signature for tactics, techniques, and procedures (TTPs), it doesn’t require perfect alignment in activity and history.</p><p class="paragraph" style="text-align:left;">Microsoft has primarily linked the group to cyber espionage campaigns. According to Microsoft&#39;s report from August 2024, the group specializes in espionage, data theft, and packet capture.</p><p class="paragraph" style="text-align:left;">Salt Typhoon targets organizations and entities primarily in North America and Southeast Asia. Cybersecurity firm ESET has attributed the group to global hacks targeting hotel and government agencies.</p><p class="paragraph" style="text-align:left;">China has denied allegations that they are responsible for Salt Typhoon or other China-linked sophisticated hacking groups. </p><p class="paragraph" style="text-align:left;">Liu Pengyu, a spokesman at the Chinese Embassy in Washington D.C., said, “China firmly opposes and combats cyberattacks and cyber theft in all forms,” according to The Wall Street Journal.</p><hr class="content_break"><h2 class="heading" style="text-align:left;" id="latest-cybersecurity-news">Latest Cybersecurity News</h2><p class="paragraph" style="text-align:left;">What we’re reading across the wire about the latest cybersecurity hacks, breaches, industry news, and more. </p><p class="paragraph" style="text-align:left;"><b>New from our blog:</b></p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.cybercareers.blog/2024/10/north-korea-funding-its-nuclear-program-espionage-linkedin-hiring-scams/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation" target="_blank" rel="noopener noreferrer nofollow">North Korea is funding its nuclear program with cyber espionage and LinkedIn hiring scams</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.cybercareers.blog/2024/10/american-water-company-hit-with-cyberattack/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation" target="_blank" rel="noopener noreferrer nofollow"><b>American Water Company hit with cyberattack</b></a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.cybercareers.blog/2024/09/the-best-google-cloud-data-analytics-training-for-professionals/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation" target="_blank" rel="noopener noreferrer nofollow"><b>The Best Google Cloud Data Analytics Training for Professionals</b></a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.cybercareers.blog/2024/09/open-source-software-security-risks-what-you-need-to-know/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation" target="_blank" rel="noopener noreferrer nofollow"><b>Open-Source Software Security Risks: What You Need to Know</b></a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.cybercareers.blog/2024/09/how-to-opt-out-of-linkedin-using-your-data-for-its-generative-ai-models/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation" target="_blank" rel="noopener noreferrer nofollow"><b>How to Opt-Out of LinkedIn using your data for its Generative AI Models</b></a></p></li></ul><p class="paragraph" style="text-align:left;"><b>New from our favorite blogs and journalists:</b></p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://techcrunch.com/2024/10/14/national-public-data-the-hacked-data-broker-that-lost-millions-of-social-security-numbers-and-more-files-for-bankruptcy/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation" target="_blank" rel="noopener noreferrer nofollow">National Public Data, the hacked data broker that lost millions of Social Security numbers and more, files for bankruptcy</a> (TechCrunch)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://techcrunch.com/2024/10/14/european-cyber-insurance-startup-stoik-secures-27-million/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation" target="_blank" rel="noopener noreferrer nofollow">European cyber insurance startup Stoïk secures $27M</a> (TechCrunch)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://techcrunch.com/2024/10/13/meet-the-chinese-typhoon-hackers-preparing-for-war/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation" target="_blank" rel="noopener noreferrer nofollow">Meet the Chinese ‘Typhoon’ hackers preparing for war</a> (TechCrunch)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://arstechnica.com/security/2024/10/ai-chatbots-can-read-and-write-invisible-text-creating-an-ideal-covert-channel/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation" target="_blank" rel="noopener noreferrer nofollow"><b>Invisible text that AI chatbots understand and humans can’t? Yep, it’s a thing</b></a> (ArsTechnica)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://arstechnica.com/ai/2024/10/llms-cant-perform-genuine-logical-reasoning-apple-researchers-suggest/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation" target="_blank" rel="noopener noreferrer nofollow">Apple study exposes deep cracks in LLMs’ “reasoning” capabilities</a> (ArsTechnica)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://arstechnica.com/tech-policy/2024/10/record-labels-win-again-court-says-isp-must-terminate-users-accused-of-piracy/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation" target="_blank" rel="noopener noreferrer nofollow">5th Circuit rules ISP should have terminated Internet users accused of piracy</a> (ArsTechnica)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://gizmodo.com/how-meta-brings-in-millions-off-of-political-violence-2000511364?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation" target="_blank" rel="noopener noreferrer nofollow">How Meta Brings in Millions Off of Political Violence</a> (Gizmodo)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://gizmodo.com/hacked-robot-vacuums-across-the-us-started-yelling-slurs-2000511013?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation" target="_blank" rel="noopener noreferrer nofollow">Hacked Robot Vacuums Across the U.S. Started Yelling Slurs</a> (Gizmodo)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://gizmodo.com/hacktivists-claim-responsibility-for-taking-down-the-internet-archive-2000510339?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation" target="_blank" rel="noopener noreferrer nofollow">Hacktivists Claim Responsibility for Taking Down the Internet Archive</a> (Gizmodo)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://gizmodo.com/doj-reveals-its-plan-for-breaking-up-googles-search-monopoly-2000509815?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation" target="_blank" rel="noopener noreferrer nofollow">DOJ Reveals Its Plan for Breaking Up Google’s Search Monopoly</a> (Gizmodo)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.wsj.com/tech/ai/yann-lecun-ai-meta-aa59e2f5?mod=tech_feat2_ai_pos1&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation" target="_blank" rel="noopener noreferrer nofollow">This AI Pioneer Thinks AI Is Dumber Than a Cat</a> (The Wall Street Journal)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.wsj.com/articles/specter-of-dead-california-ai-safety-bill-haunts-cio-event-42db9a6b?mod=tech_feat2_ai_pos5&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation" target="_blank" rel="noopener noreferrer nofollow">California’s AI Safety Bill Is Dead, but the Regulation Debate Lives On</a> (The Wall Street Journal)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.wsj.com/tech/biotech/23andme-board-resigns-in-new-blow-to-dna-testing-company-12f1a355?mod=tech_feat3_biotech_pos4&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation" target="_blank" rel="noopener noreferrer nofollow">23andMe Board Resigns in New Blow to DNA-Testing Company</a> (The Wall Street Journal)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://open.substack.com/pub/socialdawn/p/the-future-of-the-us-internet-is?r=n3ns2&utm_campaign=post&utm_medium=web" target="_blank" rel="noopener noreferrer nofollow">The Future of the US Internet is Enforced Interoperability</a> (Quinn Chasan)</p></li></ul><hr class="content_break"><h2 class="heading" style="text-align:left;" id="cybersecurity-job-openings">Cybersecurity Job Openings</h2><p class="paragraph" style="text-align:left;">Are you looking for a new job or trying to get started in cybersecurity? We’ll post notable new openings across the industry here.</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.usajobs.gov/job/813256000?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation" target="_blank" rel="noopener noreferrer nofollow"><b>Intelligence Specialist (Cyber) - United States Department of the Army</b></a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.usajobs.gov/job/812540000?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation" target="_blank" rel="noopener noreferrer nofollow"><b>Cybersecurity Threat Analysis - Leadership - Department of Homeland Security</b></a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.usajobs.gov/job/811901700?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation" target="_blank" rel="noopener noreferrer nofollow"><b>Cybersecurity Engineering - Technical - Department of Homeland Security</b></a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.usajobs.gov/job/811013600?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation" target="_blank" rel="noopener noreferrer nofollow"><b>Cybersecurity Architecture - Leadership - Department of Homeland Security</b></a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.usajobs.gov/job/813489100?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation" target="_blank" rel="noopener noreferrer nofollow"><b>IT Specialist - Cybersecurity and Infrastructure Security Agency</b></a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.usajobs.gov/job/813407200?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation" target="_blank" rel="noopener noreferrer nofollow">Supervisory Operational Planner (Branch Chief) - Cybersecurity and Infrastructure Security Agency</a></p></li></ul><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><hr class="content_break"></div><h3 class="heading" style="text-align:left;" id="todays-cyber-wall-of-shame">Today’s Cyber Wall of Shame</h3><p class="paragraph" style="text-align:left;">I agree; please, somebody, anyone, empty my student loan balances, please.</p><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/morgan_sung/status/1844457266763923845?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation"><p> Twitter tweet </p></a></blockquote><p class="paragraph" style="text-align:left;">Until next time…</p><p class="paragraph" style="text-align:left;"><b>Rob Waters</b><br><span style="font-size:0.8rem;">Founder</span><br><span style="font-size:0.8rem;">The Breach Report + Cybersecurity Careers Blog</span></p><p class="paragraph" style="text-align:left;"><br><span style="font-size:0.8rem;"><i><b>P.S. - </b></i></span><span style="font-size:0.8rem;"><i>Do you want to start a newsletter yourself? </i></span><br><span style="font-size:0.8rem;"><i><b>You can with beehiiv. </b></i></span><span style="font-size:0.8rem;"><i><b><a class="link" href="https://www.beehiiv.com?via=tbr&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation" target="_blank" rel="noopener noreferrer nofollow">Create one today with a free trial</a></b></i></span><span style="font-size:0.8rem;"><i><b>.</b></i></span><br><span style="font-size:0.8rem;">Disclaimer: The Breach Report may contain affiliate links. Read our </span><span style="font-size:0.8rem;"><a class="link" href="https://thebreach.report/c/advertising?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=china-linked-salt-typhoon-hacks-verizon-at-t-in-intelligence-gathering-operation" target="_blank" rel="noopener noreferrer nofollow">Advertising</a></span><span style="font-size:0.8rem;"> policy page.</span></p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Trump, Biden, Harris targeted in Iran phishing cyberattacks</title>
  <description>New Google report confirms Iranian hacking attempts</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/07c2bda4-6f5a-471f-ada4-de0598214a3e/iranflag_hackers.jpg" length="287221" type="image/jpeg"/>
  <link>https://thebreach.report/p/iran-apt42-phishing-trump-biden-campaigns</link>
  <guid isPermaLink="true">https://thebreach.report/p/iran-apt42-phishing-trump-biden-campaigns</guid>
  <pubDate>Mon, 19 Aug 2024 13:00:00 +0000</pubDate>
  <atom:published>2024-08-19T13:00:00Z</atom:published>
    <dc:creator>Rob Waters</dc:creator>
    <category><![CDATA[News]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #82b984; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#95dd96; }
  .bh__table_header p { color: #2A2A2A; font-family:'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><i>Welcome to the latest issue of </i><i><b>The Breach Report</b></i><i>, a cybersecurity newsletter from the creators of the </i><i><a class="link" href="https://www.cybercareers.blog?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=trump-biden-harris-targeted-in-iran-phishing-cyberattacks" target="_blank" rel="noopener noreferrer nofollow">Cybersecurity Careers Blog</a></i><i>. Be sure to subscribe via </i><i><a class="link" href="https://thebreach.report/subscribe?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=trump-biden-harris-targeted-in-iran-phishing-cyberattacks" target="_blank" rel="noopener noreferrer nofollow">email</a></i><i> or </i><i><a class="link" href="https://rss.beehiiv.com/feeds/SyvvEer2H8.xml?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=trump-biden-harris-targeted-in-iran-phishing-cyberattacks" target="_blank" rel="noopener noreferrer nofollow">RSS</a></i><i>.</i></p><div class="image"><img alt="Google has released a new report confirming that hackers from Iran have been using phishing attacks against former President Trump, President Biden, and Vice President Harris." class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/07c2bda4-6f5a-471f-ada4-de0598214a3e/iranflag_hackers.jpg?t=1724069288"/><div class="image__source"><span class="image__source_text"><p>Google has released a new report confirming that hackers from Iran have been using phishing attacks against former President Trump, President Biden, and Vice President Harris.</p></span></div></div><h2 class="heading" style="text-align:left;" id="iran-using-spearphishing-attacks-ag">Iran using spear-phishing attacks against President Trump, President Biden, and Vice President Harris</h2><p class="paragraph" style="text-align:left;"><b>Iran</b> is quickly becoming a dangerous cyber threat to the United States Presidential Election Campaigns across party isles, according to new reports from <b>Google</b>, <a class="link" href="https://www.cybercareers.blog/2024/08/iranian-hackers-targeting-2024-us-presidential-election/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=trump-biden-harris-targeted-in-iran-phishing-cyberattacks" target="_blank" rel="noopener noreferrer nofollow"><b>Microsoft</b></a>, and multiple news outlets. If that wasn’t enough, they were just banned by <a class="link" href="https://openai.com/index/disrupting-a-covert-iranian-influence-operation/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=trump-biden-harris-targeted-in-iran-phishing-cyberattacks" target="_blank" rel="noopener noreferrer nofollow"><b>OpenAI</b></a> for using ChatGPT for creating AI-assisted influence operations, generating disinformation on volatile political and ideological topics.</p><p class="paragraph" style="text-align:left;">According to <a class="link" href="https://www.wsj.com/politics/national-security/iran-emerges-as-the-most-aggressive-foreign-threat-to-u-s-election-b61161ad?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=trump-biden-harris-targeted-in-iran-phishing-cyberattacks" target="_blank" rel="noopener noreferrer nofollow">The Wall Street Journal</a>, the <b>Federal Bureau of Investigation (FBI)</b> has been investigating sophisticated spear-phishing cyberattacks by Iranian hackers against United States Presidential Election Campaigns since June. </p><p class="paragraph" style="text-align:left;">Former <a class="link" href="https://www.politico.com/news/2024/08/14/trump-iran-hack-campaign-00174002?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=trump-biden-harris-targeted-in-iran-phishing-cyberattacks" target="_blank" rel="noopener noreferrer nofollow">President Trump is blaming Iran</a> for “hacking his campaign” and even praises the FBI for their efforts in responding to the incident.</p><p class="paragraph" style="text-align:left;">Yet, until a <a class="link" href="https://blog.google/threat-analysis-group/how-were-tackling-evolving-online-threats/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=trump-biden-harris-targeted-in-iran-phishing-cyberattacks" target="_blank" rel="noopener noreferrer nofollow">new report from Google’s Threat Analysis Group (TAG)</a> released last week, no independent third party had confirmed the scope or hack attempts. The new Google report confirms the same Iranian hacking group known as “APT42” is targeting former President Trump, President Biden, and Vice President Harris.</p><p class="paragraph" style="text-align:left;">The attacks date back to the 2020 United States Presidential Election cycle, targeting then-President Trump and the Biden-Harris presidential campaigns.</p><h2 class="heading" style="text-align:left;" id="who-is-apt-42">Who is APT42?</h2><p class="paragraph" style="text-align:left;">According to cybersecurity research and response firm Mandiant, <a class="link" href="https://www.mandiant.com/resources/reports/apt42-spears-phishing-and-surveillance?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=trump-biden-harris-targeted-in-iran-phishing-cyberattacks" target="_blank" rel="noopener noreferrer nofollow">Advanced Persistent Threat 42 (APT42)</a> is an Iranian state-sponsored cyber-espionage group. Mandiant also believes that APT42 operates for the Islamic Revolutionary Guard Corps (IRGC) Intelligence Organization (IRGC-IO).</p><p class="paragraph" style="text-align:left;">Prior cybersecurity incidents attributed to APT42 confirm the group’s intent to deploy invasive malware on targets’ devices to track, perform espionage, record audio conversations, and exfiltrate data. Targets include government officials and journalists who pose a threat to the Iranian government regime.</p><h2 class="heading" style="text-align:left;" id="apt-42-tt-ps-for-luring-targets-in-">APT42 TTPs for luring targets in phishing campaigns</h2><p class="paragraph" style="text-align:left;">Iranian hackers associated with APT42 are effective by luring targets to establish trust using multiple platforms to exchange files before finally delivering a malicious payload.</p><p class="paragraph" style="text-align:left;">APT42 hackers frequently build trust with their targets over chat platforms such as WhatsApp, Telegram, or Signal before attempting to grab their target&#39;s valid credentials.</p><p class="paragraph" style="text-align:left;">Google’s TAG reports that APT42 would include PDF attachments in emails or utilize legitimate virtual meeting links from providers like Google, Skype, and others. Upon joining the virtual meeting platform, a linked landing page on attacker-controlled platforms like a Google Site, OneDrive, or Dropbox had a malicious payload.</p><p class="paragraph" style="text-align:left;">Other times, credential harvesting toolkits such as GCollection, LCollection, YCollection, or DWP were utilized to gather credentials from a target that uses a Google, Hotmail, or Yahoo account. </p><p class="paragraph" style="text-align:left;">Google’s TAG observes that APT42 hackers would perform extensive research on their targets, using “open-source marketing and social media research tools to identify personal email addresses that might not have default multi-factor authentication or other protection measures” that corporate accounts typically enforce.</p><p class="paragraph" style="text-align:left;">Once APT42 gains access to the targeted account, they would add recovery email accounts (that APT42 controls) and use features that allow applications that do not support multi-factor authentication, like application-specific passwords.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.cybercareers.blog/2024/07/google-advanced-protection-program-now-supports-passkeys/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=trump-biden-harris-targeted-in-iran-phishing-cyberattacks" target="_blank" rel="noopener noreferrer nofollow">Google’s Advanced Protection Program</a> revokes and disables these application-specific passwords in Gmail, protecting users from these attacks. The Advanced Protection Program also supports using a passkey for stronger user authentication.</p><h2 class="heading" style="text-align:left;" id="apt-42-targeting-the-united-states-">APT42 targeting the United States Presidential Election Campaigns</h2><p class="paragraph" style="text-align:left;">Google has assessed that APT42 deployed spear-phishing attacks on approximately a dozen individuals tied to former President Trump&#39;s and President Biden&#39;s 2024 election campaigns. APT42 also targeted both campaigns in the 2020 Presidential Election cycle.</p><p class="paragraph" style="text-align:left;">Targets also include current and former officials in the U.S. government. </p><p class="paragraph" style="text-align:left;">APT42 attempted to attack the Biden-Harris campaign before President Biden stepped down from his reelection campaign and endorsed current Vice President Harris as the Democratic nominee.</p><p class="paragraph" style="text-align:left;">The Trump campaign first blamed Iran for hacking his 2024 election campaign when an internal campaign vetting document on J.D. Vance, his running mate, was <a class="link" href="https://www.washingtonpost.com/national-security/2024/08/12/trump-hack-iran-fbi/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=trump-biden-harris-targeted-in-iran-phishing-cyberattacks" target="_blank" rel="noopener noreferrer nofollow">leaked to members of the press</a>.</p><p class="paragraph" style="text-align:left;">Trump claims that the hacks occurred against his campaigns because “Iran is no friend of mine, a lot of bad signals get sent.”</p><h2 class="heading" style="text-align:left;" id="apt-42-is-banned-from-open-ai-for-u">APT42 is banned from OpenAI for using ChatGPT to influence elections</h2><div class="image"><img alt="Example fake news outlets and blogs that APT42 used to spread disinformation and for influence operations. Iranian hackers used OpenAI’s ChatGPT to create divisive content against both the U.S. Republican and Democratic parties. " class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/1f023a4b-5c11-4282-9aa6-6454c47ae261/openai_apt42.jpeg?t=1724073358"/><div class="image__source"><span class="image__source_text"><p>Example fake news outlets and blogs that APT42 used to spread disinformation and for influence operations. Iranian hackers used OpenAI’s ChatGPT to create divisive content against both the U.S. Republican and Democratic parties. (source: OpenAI) </p></span></div></div><p class="paragraph" style="text-align:left;">Separately from Google and Microsoft’s reports, <a class="link" href="https://openai.com/index/disrupting-a-covert-iranian-influence-operation/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=trump-biden-harris-targeted-in-iran-phishing-cyberattacks" target="_blank" rel="noopener noreferrer nofollow">OpenAI has banned APT42</a> from its platforms for using ChatGPT to create disinformation and influence operations against the U.S. Presidential campaigns.</p><p class="paragraph" style="text-align:left;">OpenAI found that APT42 used ChatGPT to generate content on numerous topics to spread disinformation or sway public opinion on political issues. The content was then spread across fake news outlets and social media platforms. </p><p class="paragraph" style="text-align:left;">Divisive content was created to influence both Democratic and Republican campaign issues.</p><p class="paragraph" style="text-align:left;">However, the majority of social media posts that OpenAI detected were not effective, generating minimal likes, shares, or comments.</p><p class="paragraph" style="text-align:left;">Iran has denied any involvement in the hacks, according to <a class="link" href="https://en.irna.ir/news/85564387/Iran-rejects-claims-of-involvement-in-Trump-s-campaign-hacking?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=trump-biden-harris-targeted-in-iran-phishing-cyberattacks" target="_blank" rel="noopener noreferrer nofollow">state media</a>.</p><hr class="content_break"><h2 class="heading" style="text-align:left;" id="latest-cybersecurity-news">Latest Cybersecurity News</h2><p class="paragraph" style="text-align:left;">What we’re reading across the wire about the latest cybersecurity hacks, breaches, industry news, and more. </p><p class="paragraph" style="text-align:left;"><b>New from our blog:</b></p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.cybercareers.blog/2024/08/iranian-hackers-targeting-2024-us-presidential-election/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=trump-biden-harris-targeted-in-iran-phishing-cyberattacks" target="_blank" rel="noopener noreferrer nofollow"><b>Microsoft Report: Iranian Cyber Operations Targeting U.S. Presidential Election</b></a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.cybercareers.blog/2024/08/chainguard-cybersecurity-raises-140m-at-1-1b-valuation/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=trump-biden-harris-targeted-in-iran-phishing-cyberattacks" target="_blank" rel="noopener noreferrer nofollow"><b>New Cybersecurity Unicorn: Chainguard Raises $140M at $1.12B Valuation</b></a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.cybercareers.blog/2024/08/review-apple-ipad-pro-m4-11-with-magic-keyboard/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=trump-biden-harris-targeted-in-iran-phishing-cyberattacks" target="_blank" rel="noopener noreferrer nofollow">Review: Apple iPad Pro 11″ M4 with Magic Keyboard</a></p></li></ul><p class="paragraph" style="text-align:left;"><b>New from our favorite blogs and journalists:</b></p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.axios.com/2024/08/14/google-biden-harris-trump-iran-cyberattacks?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=trump-biden-harris-targeted-in-iran-phishing-cyberattacks" target="_blank" rel="noopener noreferrer nofollow">Trump, Biden, Harris targeted in Iran phishing campaign, Google finds</a> (Axios)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.wsj.com/politics/national-security/iran-emerges-as-the-most-aggressive-foreign-threat-to-u-s-election-b61161ad?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=trump-biden-harris-targeted-in-iran-phishing-cyberattacks" target="_blank" rel="noopener noreferrer nofollow">FBI Is Investigating Suspected Iranian Hack Attempts Against Trump and Biden Campaigns</a> (The Wall Street Journal)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.wsj.com/tech/cybersecurity/cyberattacks-hospitals-healthcare-industry-lessons-c31469f3?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=trump-biden-harris-targeted-in-iran-phishing-cyberattacks" target="_blank" rel="noopener noreferrer nofollow">What We Learned From the Cyberattack on Change Healthcare</a> (The Wall Street Journal)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.wsj.com/tech/cybersecurity/unused-online-accounts-data-safety-38fa675e?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=trump-biden-harris-targeted-in-iran-phishing-cyberattacks" target="_blank" rel="noopener noreferrer nofollow">Those Online Accounts You No Longer Use? For Your Own Safety, Get Rid of Them</a> (The Wall Street Journal)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.wsj.com/tech/sam-altman-openai-humanness-iris-scanning-4d0e1dab?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=trump-biden-harris-targeted-in-iran-phishing-cyberattacks" target="_blank" rel="noopener noreferrer nofollow">Sam Altman’s Worldcoin Is Battling With Governments Over Your Eyes</a> (The Wall Street Journal)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.theguardian.com/technology/article/2024/aug/16/open-ai-chatgpt-iran?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=trump-biden-harris-targeted-in-iran-phishing-cyberattacks" target="_blank" rel="noopener noreferrer nofollow">Iranian group used ChatGPT to try to influence US election, OpenAI says</a> (The Guardian)</p><p class="paragraph" style="text-align:left;"></p></li></ul><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><hr class="content_break"></div><h3 class="heading" style="text-align:left;" id="todays-cyber-wall-of-shame">Today’s Cyber Wall of Shame</h3><p class="paragraph" style="text-align:left;"><b>Palo Alto Networks</b> didn’t use common sense when they used real women to model and pose as “lamp women” at this year’s Black Hat event in Las Vegas. The company has since apologized and backtracked on the display. <a class="link" href="https://www.theregister.com/2024/08/14/palo_alto_networks_execs_apologize/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=trump-biden-harris-targeted-in-iran-phishing-cyberattacks" target="_blank" rel="noopener noreferrer nofollow">More on this PR disaster…</a></p><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/johndjohnson/status/1824188611807297789?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=trump-biden-harris-targeted-in-iran-phishing-cyberattacks"><p> Twitter tweet </p></a></blockquote><p class="paragraph" style="text-align:left;">Until next time…</p><p class="paragraph" style="text-align:left;"><b>Rob Waters</b><br><span style="font-size:0.8rem;">Founder</span><br><span style="font-size:0.8rem;">The Breach Report + Cybersecurity Careers Blog</span></p><p class="paragraph" style="text-align:left;"><br><span style="font-size:0.8rem;"><i><b>P.S. - </b></i></span><span style="font-size:0.8rem;"><i>Do you want to start a newsletter yourself? </i></span><br><span style="font-size:0.8rem;"><i><b>You can with beehiiv. </b></i></span><span style="font-size:0.8rem;"><i><b><a class="link" href="https://www.beehiiv.com?via=tbr&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=trump-biden-harris-targeted-in-iran-phishing-cyberattacks" target="_blank" rel="noopener noreferrer nofollow">Create one today with a free trial</a></b></i></span><span style="font-size:0.8rem;"><i><b>.</b></i></span><br><span style="font-size:0.8rem;">Disclaimer: The Breach Report may contain affiliate links. Read our </span><span style="font-size:0.8rem;"><a class="link" href="https://thebreach.report/c/advertising?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=trump-biden-harris-targeted-in-iran-phishing-cyberattacks" target="_blank" rel="noopener noreferrer nofollow">Advertising</a></span><span style="font-size:0.8rem;"> policy page.</span></p><div class="section" style="background-color:transparent;border-color:#00A503;border-radius:2px;border-style:dashed;border-width:2px;margin:10.0px 10.0px 10.0px 10.0px;padding:4.0px 4.0px 4.0px 4.0px;"><p class="paragraph" style="text-align:left;"><b>THANK YOU FOR READING!</b></p><p class="paragraph" style="text-align:left;">Thank you for reading<b> The Breach Report</b>. If you haven’t already, <a class="link" href="https://www.thebreach.report/subscribe?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=trump-biden-harris-targeted-in-iran-phishing-cyberattacks" target="_blank" rel="noopener noreferrer nofollow">please subscribe to our free cybersecurity newsletter</a>.</p></div></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Microsoft Azure confirms outage due to DDoS cyberattack</title>
  <description>Microsoft Azure, 365 and Purview services were down for 8 hours</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/69d0928c-ce15-4760-b4e9-7fee10579bc7/_microsoft_azure_red.jpeg" length="59858" type="image/jpeg"/>
  <link>https://thebreach.report/p/microsoft-azure-confirms-outage-due-ddos-cyberattack</link>
  <guid isPermaLink="true">https://thebreach.report/p/microsoft-azure-confirms-outage-due-ddos-cyberattack</guid>
  <pubDate>Thu, 01 Aug 2024 13:00:00 +0000</pubDate>
  <atom:published>2024-08-01T13:00:00Z</atom:published>
    <dc:creator>Rob Waters</dc:creator>
    <category><![CDATA[News]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #82b984; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#95dd96; }
  .bh__table_header p { color: #2A2A2A; font-family:'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><i>Welcome to the latest issue of </i><i><b>The Breach Report</b></i><i>, a cybersecurity newsletter from the creators of the </i><i><a class="link" href="https://www.cybercareers.blog?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=microsoft-azure-confirms-outage-due-to-ddos-cyberattack" target="_blank" rel="noopener noreferrer nofollow">Cybersecurity Careers Blog</a></i><i>. Be sure to subscribe via </i><i><a class="link" href="https://thebreach.report/subscribe?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=microsoft-azure-confirms-outage-due-to-ddos-cyberattack" target="_blank" rel="noopener noreferrer nofollow">email</a></i><i> or </i><i><a class="link" href="https://rss.beehiiv.com/feeds/SyvvEer2H8.xml?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=microsoft-azure-confirms-outage-due-to-ddos-cyberattack" target="_blank" rel="noopener noreferrer nofollow">RSS</a></i><i>.</i></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/c3bbda81-acaa-4b38-8ee6-b0e98c160838/microsoft_bldg.jpeg?t=1722517379"/><div class="image__source"><span class="image__source_text"><p>Microsoft suffered from a distributed denial of service (DDoS) cyberattack that resulted in outages across its Azure, Microsoft 365, and Microsoft Purview services.</p></span></div></div><h2 class="heading" style="text-align:left;" id="microsoft-azure-365-and-purview-ser">Microsoft Azure, 365 and Purview service outage caused by DDoS cyberattack</h2><p class="paragraph" style="text-align:left;">If you tried to access Microsoft Azure, 365, or Purview services on Tuesday, you may have experienced the latest outage to hit these platforms. Microsoft confirmed that a distributed denial of service (DDoS) cyberattack led to an eight-hour outage on Tuesday, July 30, 2024. Abnormal traffic spikes and timeouts affected Azure global services such as Azure Front Door and Azure Content Delivery Network. </p><p class="paragraph" style="text-align:left;">Microsoft is investigating the outage. It will conduct a preliminary review of the incident within 72 hours and a detailed review within two weeks to understand what went wrong and how to better mitigate future attacks.</p><p class="paragraph" style="text-align:left;">The outage comes only days after a global IT outage affected <a class="link" href="https://www.cybercareers.blog/2024/07/crowdstrike-falcon-how-to-mitigate-the-it-outage/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=microsoft-azure-confirms-outage-due-to-ddos-cyberattack" target="_blank" rel="noopener noreferrer nofollow">Microsoft Windows endpoints with Crowdstrike Falcon</a>, an endpoint detection and response (EDR) tool. The defective Falcon update caused a “blue screen of death” (BSOD) on all affected systems, rendering the devices useless until remediation could be applied.</p><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/AzureSupport/status/1818611924034011441?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=microsoft-azure-confirms-outage-due-to-ddos-cyberattack"><p> Twitter tweet </p></a></blockquote><h2 class="heading" style="text-align:left;" id="microsofts-response-to-d-do-s-may-h">Microsoft’s response to DDoS may have made outage worse</h2><p class="paragraph" style="text-align:left;"><a class="link" href="https://azure.status.microsoft/en-us/status/history/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=microsoft-azure-confirms-outage-due-to-ddos-cyberattack" target="_blank" rel="noopener noreferrer nofollow">Microsoft said</a> once the Azure DDoS protection mechanisms were triggered, “initial investigations suggest that an error in the implementation of our defenses amplified the impact of the attack rather than mitigating it.”</p><p class="paragraph" style="text-align:left;">Customer impact was first recorded at 11:45 UTC on July 30, and by 19:43 UTC, failure rates returned to pre-incident levels. Additional escalated incident response monitoring continued, and Microsoft declared the incident mitigated at 20:48 UTC.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://aka.ms/ash-alerts?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=microsoft-azure-confirms-outage-due-to-ddos-cyberattack" target="_blank" rel="noopener noreferrer nofollow">Microsoft offers Azure Service Health alerts</a> that trigger emails, SMS, push notifications, and webhooks.</p><p class="paragraph" style="text-align:left;">Microsoft has not confirmed the origin of the attack or who is responsible at this time. </p><p class="paragraph" style="text-align:left;">On the same day of the incident, Microsoft CEO <a class="link" href="https://apnews.com/article/microsoft-earnings-artificial-intelligence-ai-bc142c90bba052d438264a4a2fa7dd61?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=microsoft-azure-confirms-outage-due-to-ddos-cyberattack" target="_blank" rel="noopener noreferrer nofollow">Satya Nadella stated in an earnings call</a> that “cybersecurity is a top priority for the company.”</p><hr class="content_break"><h2 class="heading" style="text-align:left;" id="latest-cybersecurity-news">Latest Cybersecurity News</h2><p class="paragraph" style="text-align:left;">What we’re reading across the wire about the latest cybersecurity hacks, breaches, industry news, and more. </p><p class="paragraph" style="text-align:left;"><b>New from our blog:</b></p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.cybercareers.blog/2024/07/wiz-turns-down-23-billion-acquisition-offer-from-google/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=microsoft-azure-confirms-outage-due-to-ddos-cyberattack" target="_blank" rel="noopener noreferrer nofollow">Wiz Turns Down $23 Billion Acquisition Offer from Google: Pursuing IPO Instead</a></p></li></ul><p class="paragraph" style="text-align:left;"><b>New from our favorite blogs and journalists:</b></p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.cybersecuritydive.com/news/CrowdStrike-software-outage-CEO-Microsoft/722526/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=microsoft-azure-confirms-outage-due-to-ddos-cyberattack" target="_blank" rel="noopener noreferrer nofollow">CrowdStrike CEO says 97% of Windows sensors restored in IT outage recovery effort</a> (Cybersecurity Dive)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.cybersecuritydive.com/news/ransomware-cyber-attack-security-payment/722856/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=microsoft-azure-confirms-outage-due-to-ddos-cyberattack" target="_blank" rel="noopener noreferrer nofollow">Some companies pay ransomware attackers multiple times, survey finds</a> (Cybersecurity Dive)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.cybersecuritydive.com/news/business-interruption-claims-will-drive-insurance-losses-linked-to-crowdstr/722775/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=microsoft-azure-confirms-outage-due-to-ddos-cyberattack" target="_blank" rel="noopener noreferrer nofollow">Business interruption claims will drive insurance losses linked to CrowdStrike IT disruption</a> (Cybersecurity Dive)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.wsj.com/articles/crowdstrike-software-bug-global-tech-outage-96a9c937?mod=tech_feat3_cybersecurity_pos2&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=microsoft-azure-confirms-outage-due-to-ddos-cyberattack" target="_blank" rel="noopener noreferrer nofollow">CrowdStrike Explains What Went Wrong Days After Global Tech Outage</a> (The Wall Street Journal)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.wsj.com/tech/cybersecurity/crowdstrike-outage-puts-its-financial-reporting-under-scrutiny-too-25ad9e9b?mod=tech_feat3_cybersecurity_pos1&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=microsoft-azure-confirms-outage-due-to-ddos-cyberattack" target="_blank" rel="noopener noreferrer nofollow">CrowdStrike Outage Puts Its Financial Reporting Under Scrutiny, Too</a> (The Wall Street Journal)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://thehackernews.com/2024/08/google-chrome-adds-app-bound-encryption.html?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=microsoft-azure-confirms-outage-due-to-ddos-cyberattack" target="_blank" rel="noopener noreferrer nofollow">Google Chrome Adds App-Bound Encryption to Protect Cookies from Malware</a> (The Hacker News)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/city-of-columbus-says-data-compromised-in-ransomware-attack/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=microsoft-azure-confirms-outage-due-to-ddos-cyberattack" target="_blank" rel="noopener noreferrer nofollow">City of Columbus Says Data Compromised in Ransomware Attack</a> (Security Week)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/exploited-vulnerability-could-impact-20k-internet-exposed-vmware-esxi-instances/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=microsoft-azure-confirms-outage-due-to-ddos-cyberattack" target="_blank" rel="noopener noreferrer nofollow">Exploited Vulnerability Could Impact 20k Internet-Exposed VMware ESXi Instances</a> (Security Week)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.reuters.com/technology/cybersecurity/ransomware-attack-forces-hundreds-small-indian-banks-offline-sources-say-2024-07-31/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=microsoft-azure-confirms-outage-due-to-ddos-cyberattack" target="_blank" rel="noopener noreferrer nofollow">Ransomware attack forces hundreds of small Indian banks offline, sources say</a> (Reuters)</p></li></ul><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><hr class="content_break"></div><h3 class="heading" style="text-align:left;" id="todays-cyber-wall-of-shame">Today’s Cyber Wall of Shame</h3><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/tferris/status/1814198867094872266?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=microsoft-azure-confirms-outage-due-to-ddos-cyberattack"><p> Twitter tweet </p></a></blockquote><p class="paragraph" style="text-align:left;">Until next time…</p><p class="paragraph" style="text-align:left;"><b>Rob Waters</b><br><span style="font-size:0.8rem;">Founder</span><br><span style="font-size:0.8rem;">The Breach Report + Cybersecurity Careers Blog</span></p><p class="paragraph" style="text-align:left;"><br><span style="font-size:0.8rem;"><i><b>P.S. - </b></i></span><span style="font-size:0.8rem;"><i>Do you want to start a newsletter yourself? </i></span><br><span style="font-size:0.8rem;"><i><b>You can with beehiiv. </b></i></span><span style="font-size:0.8rem;"><i><b><a class="link" href="https://www.beehiiv.com?via=tbr&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=microsoft-azure-confirms-outage-due-to-ddos-cyberattack" target="_blank" rel="noopener noreferrer nofollow">Create one today with a free trial</a></b></i></span><span style="font-size:0.8rem;"><i><b>.</b></i></span><br><span style="font-size:0.8rem;">Disclaimer: The Breach Report may contain affiliate links. Read our </span><span style="font-size:0.8rem;"><a class="link" href="https://thebreach.report/c/advertising?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=microsoft-azure-confirms-outage-due-to-ddos-cyberattack" target="_blank" rel="noopener noreferrer nofollow">Advertising</a></span><span style="font-size:0.8rem;"> policy page.</span></p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>AT&amp;T confirms hackers stole nearly all customer records</title>
  <description>FBI investigating massive hack affecting 73 million customers</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/47f4a6db-2cb5-4458-bf54-4b2f1a851c9c/att-usa-hack.jpeg" length="153680" type="image/jpeg"/>
  <link>https://thebreach.report/p/att-hack-data-breach-73million</link>
  <guid isPermaLink="true">https://thebreach.report/p/att-hack-data-breach-73million</guid>
  <pubDate>Wed, 17 Jul 2024 13:00:00 +0000</pubDate>
  <atom:published>2024-07-17T13:00:00Z</atom:published>
    <dc:creator>Rob Waters</dc:creator>
    <category><![CDATA[News]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #82b984; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#95dd96; }
  .bh__table_header p { color: #2A2A2A; font-family:'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><i>Welcome to the latest issue of </i><i><b>The Breach Report</b></i><i>, a cybersecurity newsletter from the creators of the </i><i><a class="link" href="https://www.cybercareers.blog?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=at-t-confirms-hackers-stole-nearly-all-customer-records" target="_blank" rel="noopener noreferrer nofollow">Cybersecurity Careers Blog</a></i><i>. Be sure to subscribe via </i><i><a class="link" href="https://thebreach.report/subscribe?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=at-t-confirms-hackers-stole-nearly-all-customer-records" target="_blank" rel="noopener noreferrer nofollow">email</a></i><i> or </i><i><a class="link" href="https://rss.beehiiv.com/feeds/SyvvEer2H8.xml?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=at-t-confirms-hackers-stole-nearly-all-customer-records" target="_blank" rel="noopener noreferrer nofollow">RSS</a></i><i>.</i></p><h3 class="heading" style="text-align:left;">Your Brilliant Business Idea Just Got a New Best Friend </h3><div class="image"><a class="image__link" href="https://ae.studio/lh/ai-ideas?utm_source=beehiiv_7_18_24&utm_medium=email&utm_campaign={{publication_name_param}}_{{publication_alphanumeric_id}}&_bhiiv=opp_8cbcae38-0723-4f6d-949f-68cecb106891_c8da7d83&bhcl_id=c3f5eff0-cf5a-48af-9753-e4673353bfa5_{{subscriber_id}}_{{email_address_id}}" rel="noopener" target="_blank"><img class="image__image" style="border-radius:0px 0px 0px 0px;border-style:solid;border-width:0px 0px 0px 0px;box-sizing:border-box;border-color:#E5E7EB;" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/8d245a5c-0c91-4b22-9f46-032af4ebbf51/Unnamed_from_Google.png?t=1721347080"/></a></div><p class="paragraph" style="text-align:left;"><b>Got a business idea? Any idea?</b> We&#39;re not picky. Big, small, &quot;I thought of this in the shower&quot; type stuff–we want it all. Whether you&#39;re dreaming of building an empire or just figuring out how to stop shuffling spreadsheets, we&#39;re here for it.</p><p class="paragraph" style="text-align:left;">Our <a class="link" href="https://ae.studio/lh/ai-ideas?utm_source=beehiiv_7_18_24&utm_medium=email&utm_campaign={{publication_name_param}}_{{publication_alphanumeric_id}}&_bhiiv=opp_8cbcae38-0723-4f6d-949f-68cecb106891_c8da7d83&bhcl_id=c3f5eff0-cf5a-48af-9753-e4673353bfa5_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">AI Ideas Generator</a> asks you 3 questions and emails you a custom-built report of AI-powered solutions <b>unique to your business</b>.</p><p class="paragraph" style="text-align:left;">Imagine having a hyper-intelligent, never-sleeps, doesn&#39;t-need-coffee AI solutions machine at your beck and call. That&#39;s our AI Ideas Generator. It takes your business conundrum, shakes it up with some LLM magic and–voila!--emails you a bespoke report of AI-powered solutions.</p><p class="paragraph" style="text-align:left;"><b>Outsmart, Outpace, Outdo</b>: Whether you&#39;re aiming to leapfrog the competition or just be best-in-class in your industry, our custom AI solutions have you covered. </p><p class="paragraph" style="text-align:left;"><a class="link" href="https://ae.studio/lh/ai-ideas?utm_source=beehiiv_7_18_24&utm_medium=email&utm_campaign={{publication_name_param}}_{{publication_alphanumeric_id}}&_bhiiv=opp_8cbcae38-0723-4f6d-949f-68cecb106891_c8da7d83&bhcl_id=c3f5eff0-cf5a-48af-9753-e4673353bfa5_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Ready to turn your business into the talk of the town (or at least the water cooler)? Let&#39;s get cracking!</a> (And yes, it’s free!)</p><p class="paragraph" style="text-align:left;"></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/5d6cbc41-6d11-4af5-b782-a85df6831702/att-data-breach-cybersecurity.jpeg?t=1721216193"/><div class="image__source"><span class="image__source_text"><p>The FBI is investigating the massive hack that affected 73 million AT&T customers. Between May 1 and October 31, 2022, and January 2, 2023, approximately six months&#39; worth of phone calls and text records were stolen.</p></span></div></div><h2 class="heading" style="text-align:left;" id="att-confirms-records-data-for-73-mi">AT&T confirms records data for 73 million customers stolen and available on hacker forums</h2><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.wired.com/story/atandt-paid-hacker-300000-to-delete-stolen-call-records/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=at-t-confirms-hackers-stole-nearly-all-customer-records" target="_blank" rel="noopener noreferrer nofollow"><b>AT&T</b></a><a class="link" href="https://www.wired.com/story/atandt-paid-hacker-300000-to-delete-stolen-call-records/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=at-t-confirms-hackers-stole-nearly-all-customer-records" target="_blank" rel="noopener noreferrer nofollow"> has confirmed</a> that approximately six months’ worth of phone call and text message records for nearly all of its 73 million customers have been stolen. While AT&T has stated that the data doesn’t include actual phone or text content (i.e., transcriptions), it can potentially reveal sensitive information about millions of its customers in the United States.</p><p class="paragraph" style="text-align:left;">The data stolen was part of the ever-increasing list of affected customers using the <a class="link" href="https://thebreach.report/p/snowflake-data-breach-malware?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=at-t-confirms-hackers-stole-nearly-all-customer-records" target="_blank" rel="noopener noreferrer nofollow">Snowflake data platform breached in April 2024</a>.</p><h3 class="heading" style="text-align:left;" id="att-paid-a-hacker-370000-to-delete-">AT&T paid a hacker $370,000 to delete the data</h3><p class="paragraph" style="text-align:left;">One of the hackers responsible for the breach confirmed to <i>Wired</i> that <a class="link" href="https://www.wired.com/story/atandt-paid-hacker-300000-to-delete-stolen-call-records/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=at-t-confirms-hackers-stole-nearly-all-customer-records" target="_blank" rel="noopener noreferrer nofollow">AT&T had paid him $370,000</a> to delete data related to the breach and provide video proof of deletion. </p><p class="paragraph" style="text-align:left;">The hacker was paid 5.7 bitcoin on May 17, 2024, worth $373,646 at the time of the transaction. <i>Wired</i> and TRM Labs, a global cryptocurrency investigation firm, independently verified the exchange.</p><p class="paragraph" style="text-align:left;">An investigation by <i><a class="link" href="https://www.bleepingcomputer.com/news/security/att-says-leaked-data-of-70-million-people-is-not-from-its-systems/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=at-t-confirms-hackers-stole-nearly-all-customer-records" target="_blank" rel="noopener noreferrer nofollow">BleepingComputer</a></i> found that the data includes “names, addresses, mobile phone numbers, encrypted date of birth, encrypted social security numbers, and other internal information.”</p><p class="paragraph" style="text-align:left;">However, the hackers have decrypted the birth dates and social security numbers and added them to another file in the leak, making those also accessible.</p><p class="paragraph" style="text-align:left;">After initially <a class="link" href="https://www.bleepingcomputer.com/news/security/att-says-leaked-data-of-70-million-people-is-not-from-its-systems/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=at-t-confirms-hackers-stole-nearly-all-customer-records" target="_blank" rel="noopener noreferrer nofollow">denying the data was stolen</a> from its systems, AT&T stated in an <a class="link" href="https://www.sec.gov/ix?doc=%2FArchives%2Fedgar%2Fdata%2F0000732717%2F000073271724000046%2Ft-20240506.htm&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=at-t-confirms-hackers-stole-nearly-all-customer-records" target="_blank" rel="noopener noreferrer nofollow">SEC filing</a> that it learned from an internal investigation in April 2024 that “hackers unlawfully accessed and copied AT&T call logs” saved on a third-party cloud platform.</p><p class="paragraph" style="text-align:left;">The U.S. Department of Justice and the Federal Bureau of Investigation are aiding AT&T in investigating the hack. U.S. Senators are also <a class="link" href="https://therecord.media/senate-letter-att-snowflake?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=at-t-confirms-hackers-stole-nearly-all-customer-records" target="_blank" rel="noopener noreferrer nofollow">calling for an investigation</a> after pressing the heads of AT&T and Snowflake in a new letter addressed to AT&T Chief Executive Officer John Stankey.</p><h3 class="heading" style="text-align:left;" id="why-the-stolen-att-customer-data-ma">Why the stolen AT&T customer data matters</h3><p class="paragraph" style="text-align:left;">Analyzing numbers within the breach could be valuable for malicious actors trying to understand patterns or “networks” of communication between people.</p><p class="paragraph" style="text-align:left;">This metadata—or data used to describe other forms of data—is what intelligence agencies or law enforcement globally analyze when conducting research or investigations on suspects, for example.</p><p class="paragraph" style="text-align:left;">Using publicly available tools could also aid malicious actors in associating phone numbers with customer names. </p><h3 class="heading" style="text-align:left;" id="what-att-customers-should-do-after-">What AT&T customers should do after the hack</h3><p class="paragraph" style="text-align:left;">A large dataset of 73 million Americans could prove very valuable for understanding patterns of behavior, personal networks, and perhaps even what businesses or organizations they support. </p><p class="paragraph" style="text-align:left;">If you were or currently still are an AT&T customer throughout the affected timeline, we highly recommend you take the following precautionary measures:</p><ul><li><p class="paragraph" style="text-align:left;"><b>Enroll in a credit and identity monitoring service. </b>Most major credit card providers now provide free identity or at least credit monitoring. Check here first to see if your credit card provider does, and enroll today. If you were affected by a different breach, you may also be entitled to free monitoring. <br><br>If none of this applies to you, start a new enrollment with a service such as TransUnion, Equifax, or Experian. Many offer free monitoring levels with advanced notifications and protections under a paid membership.<br></p></li><li><p class="paragraph" style="text-align:left;"><b>Change your phone number–or obtain a secondary one. </b>Yes, we realize it’s inconvenient to change your phone number. Phone numbers are tied to so much of our everyday lives, whether it’s utilities, banks, or social networks. But that’s precisely why it’s so valuable in the hands of the wrong person. Your number is already compromised, and you’d be better off obtaining a new number. Just make sure you do some Googling on any new proposed number your mobile provider offers to see what the <i>new</i> number is associated with–or who. <br><br>You can also obtain a secondary number (e.g., <a class="link" href="https://voice.google.com?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=at-t-confirms-hackers-stole-nearly-all-customer-records" target="_blank" rel="noopener noreferrer nofollow">Google Voice</a>) and associate this new number with whatever you want, whether it’s your social circle or utilities, subscriptions, etc.</p></li></ul><hr class="content_break"><h2 class="heading" style="text-align:left;" id="latest-cybersecurity-news">Latest Cybersecurity News</h2><p class="paragraph" style="text-align:left;">What we’re reading across the wire about the latest cybersecurity hacks, breaches, industry news, and more. </p><p class="paragraph" style="text-align:left;"><b>New from our blog:</b></p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.cybercareers.blog/2024/07/google-in-talks-to-acquire-cybersecurity-startup-wiz/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=at-t-confirms-hackers-stole-nearly-all-customer-records" target="_blank" rel="noopener noreferrer nofollow"><b>Google in talks to acquire cybersecurity startup Wiz</b></a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.cybercareers.blog/2024/07/nsa-releases-zero-trust-through-automation-and-orchestration-guidance/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=at-t-confirms-hackers-stole-nearly-all-customer-records" target="_blank" rel="noopener noreferrer nofollow"><b>NSA Releases Zero Trust through Automation and Orchestration Guidance</b></a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.cybercareers.blog/2024/07/google-advanced-protection-program-now-supports-passkeys/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=at-t-confirms-hackers-stole-nearly-all-customer-records" target="_blank" rel="noopener noreferrer nofollow"><b>Google Advanced Protection Program now supports passkeys</b></a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.cybercareers.blog/2024/07/using-generative-ai-llm-agents-to-exploit-zero-day-vulnerabilities/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=at-t-confirms-hackers-stole-nearly-all-customer-records" target="_blank" rel="noopener noreferrer nofollow"><b>Using Generative AI LLM agents to exploit zero-day vulnerabilities</b></a></p></li></ul><p class="paragraph" style="text-align:left;"><b>New from our favorite blogs and journalists:</b></p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://open.substack.com/pub/socialdawn/p/the-worlds-four-internets?r=n3ns2&utm_campaign=post&utm_medium=web" target="_blank" rel="noopener noreferrer nofollow">The World’s Four Internets</a> (Quinn Chasan - Social Dawn)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://socialdawn.substack.com/p/anti-anti-big-tech?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=at-t-confirms-hackers-stole-nearly-all-customer-records" target="_blank" rel="noopener noreferrer nofollow">Anti-Anti-Big Tech</a> (Quinn Chasan - Social Dawn)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/mandiant-highlights-russian-and-chinese-cyber-threats-to-nato-on-eve-of-75th-anniversary-summit?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=at-t-confirms-hackers-stole-nearly-all-customer-records" target="_blank" rel="noopener noreferrer nofollow">Mandiant Highlights Russian and Chinese Cyber Threats to NATO on Eve of 75th Anniversary Summit</a> (SecurityWeek)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/global-coalition-blames-chinas-apt40-for-hacking-government-networks/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=at-t-confirms-hackers-stole-nearly-all-customer-records" target="_blank" rel="noopener noreferrer nofollow">Global Coalition Blames China’s APT40 for Hacking Government Networks</a> (SecurityWeek)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/hackers-stole-secrets-from-openai/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=at-t-confirms-hackers-stole-nearly-all-customer-records" target="_blank" rel="noopener noreferrer nofollow">Hacker Stole Secrets From OpenAI</a> (SecurityWeek)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.securityweek.com/microsoft-banning-chinese-staff-from-using-android-phones/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=at-t-confirms-hackers-stole-nearly-all-customer-records" target="_blank" rel="noopener noreferrer nofollow">Microsoft Banning Android Phones for Staff in China</a> (SecurityWeek)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.wsj.com/politics/national-security/u-s-allies-issue-rare-warning-on-chinese-hacking-group-9eebb0ce?mod=hp_lead_pos5&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=at-t-confirms-hackers-stole-nearly-all-customer-records" target="_blank" rel="noopener noreferrer nofollow">U.S. Allies Issue Rare Warning on Chinese Hacking Group</a> (Wall Street Journal)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.wsj.com/tech/ai/microsoft-withdraws-from-openais-board-amid-antitrust-scrutiny-aab6ff1e?mod=tech_lead_story&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=at-t-confirms-hackers-stole-nearly-all-customer-records" target="_blank" rel="noopener noreferrer nofollow">Microsoft Quits OpenAI’s Board Amid Antitrust Scrutiny</a> (Wall Street Journal)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.justice.gov/opa/pr/justice-department-leads-efforts-among-federal-international-and-private-sector-partners?mod=djemCybersecruityPro&tpl=cs&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=at-t-confirms-hackers-stole-nearly-all-customer-records" target="_blank" rel="noopener noreferrer nofollow">U.S. disrupts Russian bot farm suspected of spreading disinformation in several countries </a>(U.S. Department of Justice)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/hackers-leak-39-000-print-at-home-ticketmaster-tickets-for-154-events/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=at-t-confirms-hackers-stole-nearly-all-customer-records" target="_blank" rel="noopener noreferrer nofollow">Hackers leak 39,000 print-at-home Ticketmaster tickets for 154 events</a> (BleepingComputer)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/google-advanced-protection-program-gets-passkeys-for-high-risk-users/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=at-t-confirms-hackers-stole-nearly-all-customer-records" target="_blank" rel="noopener noreferrer nofollow">Google Advanced Protection Program gets passkeys for high-risk users</a> (BleepingComputer)</p></li><li><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://therecord.media/iraq-cybercriminals-python-based-infostealer-pypi?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=at-t-confirms-hackers-stole-nearly-all-customer-records" target="_blank" rel="noopener noreferrer nofollow">Iraq-based cybercriminals deploy malicious Python packages to steal data</a></b>(The Record)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://therecord.media/senate-letter-att-snowflake?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=at-t-confirms-hackers-stole-nearly-all-customer-records" target="_blank" rel="noopener noreferrer nofollow"><b>Senators press AT&T, Snowflake for answers on wide-ranging data breach</b></a>(The Record)</p></li></ul><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><hr class="content_break"></div><h3 class="heading" style="text-align:left;" id="todays-cyber-wall-of-shame">Today’s Cyber Wall of Shame</h3><p class="paragraph" style="text-align:left;">It&#39;s not a good time to be an executive at AT&T.</p><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/LindseyOD123/status/1813564229158650270?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=at-t-confirms-hackers-stole-nearly-all-customer-records"><p> Twitter tweet </p></a></blockquote><p class="paragraph" style="text-align:left;">Until next time…</p><p class="paragraph" style="text-align:left;"><b>Rob Waters</b><br><span style="font-size:0.8rem;">Founder</span><br><span style="font-size:0.8rem;">The Breach Report + Cybersecurity Careers Blog</span></p><p class="paragraph" style="text-align:left;"><br><span style="font-size:0.8rem;"><i><b>P.S. - </b></i></span><span style="font-size:0.8rem;"><i>Do you want to start a newsletter yourself? </i></span><br><span style="font-size:0.8rem;"><i><b>You can with beehiiv. </b></i></span><span style="font-size:0.8rem;"><i><b><a class="link" href="https://www.beehiiv.com?via=tbr&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=at-t-confirms-hackers-stole-nearly-all-customer-records" target="_blank" rel="noopener noreferrer nofollow">Create one today with a free trial</a></b></i></span><span style="font-size:0.8rem;"><i><b>.</b></i></span><br><span style="font-size:0.8rem;">Disclaimer: The Breach Report may contain affiliate links. Read our </span><span style="font-size:0.8rem;"><a class="link" href="https://thebreach.report/c/advertising?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=at-t-confirms-hackers-stole-nearly-all-customer-records" target="_blank" rel="noopener noreferrer nofollow">Advertising</a></span><span style="font-size:0.8rem;"> policy page.</span></p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Hacker Amin Stigal Wanted For Russian GRU Malware Operations</title>
  <description>Rewards for Justice posts $10M bounty for information or location for Stigal</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/6df6707a-9c8c-4221-99f4-81ea7c29fa5f/russia_hack.jpg" length="436898" type="image/jpeg"/>
  <link>https://thebreach.report/p/amin-stigal-russia-whispergate-malware</link>
  <guid isPermaLink="true">https://thebreach.report/p/amin-stigal-russia-whispergate-malware</guid>
  <pubDate>Tue, 02 Jul 2024 20:30:00 +0000</pubDate>
  <atom:published>2024-07-02T20:30:00Z</atom:published>
    <dc:creator>Rob Waters</dc:creator>
    <category><![CDATA[News]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #82b984; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#95dd96; }
  .bh__table_header p { color: #2A2A2A; font-family:'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><i>Welcome to the latest issue of </i><i><b>The Breach Report</b></i><i>, a cybersecurity newsletter from the creators of the </i><i><a class="link" href="https://www.cybercareers.blog?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=hacker-amin-stigal-wanted-for-russian-gru-malware-operations" target="_blank" rel="noopener noreferrer nofollow">Cybersecurity Careers Blog</a></i><i>. Be sure to subscribe via </i><i><a class="link" href="https://thebreach.report/subscribe?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=hacker-amin-stigal-wanted-for-russian-gru-malware-operations" target="_blank" rel="noopener noreferrer nofollow">email</a></i><i> or </i><i><a class="link" href="https://rss.beehiiv.com/feeds/SyvvEer2H8.xml?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=hacker-amin-stigal-wanted-for-russian-gru-malware-operations" target="_blank" rel="noopener noreferrer nofollow">RSS</a></i><i>.</i></p><div class="image"><img alt="Rewards for Justice is offering up to $10 million for information or the location of Amin Stigal. Stigal is linked to the Russian GRU for WhisperGate malware operations." class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/009319d5-20ca-47b1-8248-a16c0348ec91/GRU_Stigal_ENG.jpeg?t=1719933556"/><div class="image__source"><span class="image__source_text"><p>Rewards for Justice is offering up to $10 million for information or the location of Amin Stigal. Stigal is linked to the Russian GRU for WhisperGate malware operations. (source: Rewards for Justice)</p></span></div></div><h2 class="heading" style="text-align:left;" id="10-million-reward-for-information-o">$10 Million Reward for Information on GRU Hacker Amin Stigal Targeting US Critical Infrastructure</h2><p class="paragraph" style="text-align:left;"><b>Rewards for Justice</b> is offering a <b>$10 million reward</b> for information leading to the location of <b>Amin Timovich Stigal (Амин Тимович Стигал)</b>, a hacker linked to Russian Military Intelligence (also known as GRU) and its WhisperGate malware operations. Stigal, 22 years old, is a Russian citizen and is still at large.</p><p class="paragraph" style="text-align:left;">Stigal was <a class="link" href="https://www.justice.gov/opa/pr/russian-national-charged-conspiring-russia-military-intelligence-destroy-ukrainian?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=hacker-amin-stigal-wanted-for-russian-gru-malware-operations" target="_blank" rel="noopener noreferrer nofollow">indicted last week</a> by a federal judge of the Department of Justice in Maryland with conspiracy to hack into and destroy computer systems and data. In advance of the full-scale Russian invasion of Ukraine in February 2022, targets included Ukrainian Government systems and data with no military or defense-related roles. </p><p class="paragraph" style="text-align:left;">Later targets included computer systems in countries that were providing support to Ukraine, including NATO members and the United States. The indictment alleges that Stigal and members of the GRU conspired to use a U.S.-based company&#39;s services to distribute WhisperGate malware to dozens of Ukrainian government entities, aiming to destroy their computer systems and data.</p><h3 class="heading" style="text-align:left;" id="how-whisper-gate-malware-renders-ta">How WhisperGate malware renders targets unrecoverable</h3><p class="paragraph" style="text-align:left;">WhisperGate malware infected targets, appearing as ransomware, while actually deleting the data, rendering the systems useless. </p><p class="paragraph" style="text-align:left;">These attacks using the WhisperGate malware also defaced websites, leaked stolen data, and rendered compromised systems unrecoverable. </p><p class="paragraph" style="text-align:left;">According to Mandiant, in recent years, the use of &quot;fake&quot; ransomware to carry out destructive attacks has been a recurring tactic, technique, and procedure (TTP) for Russian threat groups.</p><p class="paragraph" style="text-align:left;">Mandiant associates WhisperGate&#39;s attacks closely with threat actor group <a class="link" href="https://cloud.google.com/blog/topics/threat-intelligence/spear-phish-ukrainian-entities?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=hacker-amin-stigal-wanted-for-russian-gru-malware-operations" target="_blank" rel="noopener noreferrer nofollow">UNC2589</a>. UNC2589 was active as early as 2020, supporting Russian government goals.</p><h3 class="heading" style="text-align:left;" id="targeting-us-critical-infrastructur">Targeting U.S. Critical Infrastructure</h3><p class="paragraph" style="text-align:left;">Stigal and the GRU are known to have targeted critical infrastructure in the U.S., particularly in the energy, government, and aerospace sectors. They have scanned for vulnerabilities, mapped networks, and identified potential website weaknesses.</p><h3 class="heading" style="text-align:left;" id="report-information-to-rewards-for-j">Report Information to Rewards for Justice</h3><p class="paragraph" style="text-align:left;">If you have information on Amin Stigal, the GRU&#39;s malicious cyber activity, or associated individuals and entities, contact Rewards for Justice via their Tor-based tips-reporting channel address:</p><p class="paragraph" style="text-align:left;">he5dybnt7sr6cm32xt77pazmtm65flqy6irivtflruqfc5ep7eiodiad.onion (Tor browser required)</p><p class="paragraph" style="text-align:left;">More information is available on the <a class="link" href="https://rewardsforjustice.net/rewards/amin-stigal/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=hacker-amin-stigal-wanted-for-russian-gru-malware-operations" target="_blank" rel="noopener noreferrer nofollow">Rewards for Justice</a> site.</p><hr class="content_break"><h2 class="heading" style="text-align:left;" id="latest-cybersecurity-news">Latest Cybersecurity News</h2><p class="paragraph" style="text-align:left;">What we’re reading across the wire about the latest cybersecurity hacks, breaches, industry news, and more. </p><p class="paragraph" style="text-align:left;"><b>New from our blog:</b></p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.cybercareers.blog/2024/06/samsung-odyssey-g50d-series-32-monitor-review/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=hacker-amin-stigal-wanted-for-russian-gru-malware-operations" target="_blank" rel="noopener noreferrer nofollow">Review: Samsung Odyssey G50D Series 32″ Monitor</a></p></li></ul><p class="paragraph" style="text-align:left;"><b>New from our favorite blogs and journalists:</b></p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://cloud.google.com/blog/topics/threat-intelligence/unc5537-snowflake-data-theft-extortion?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=hacker-amin-stigal-wanted-for-russian-gru-malware-operations" target="_blank" rel="noopener noreferrer nofollow">UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion</a> (Mandiant)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.404media.co/fiverr-freelancers-offer-to-dox-anyone-with-powerful-u-s-data-tool-tloxp/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=hacker-amin-stigal-wanted-for-russian-gru-malware-operations" target="_blank" rel="noopener noreferrer nofollow">Fiverr Freelancers Offer to Dox Anyone With Powerful U.S. Data Tool</a> (404 Media)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.404media.co/ebay-removes-listing-for-stingray-cellphone-spying-tech/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=hacker-amin-stigal-wanted-for-russian-gru-malware-operations" target="_blank" rel="noopener noreferrer nofollow">eBay Removes Listing for StingRay Cellphone Spying Tech</a> (404 Media)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://arstechnica.com/tech-policy/2024/07/ai-trains-on-kids-photos-even-when-parents-use-strict-privacy-settings/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=hacker-amin-stigal-wanted-for-russian-gru-malware-operations" target="_blank" rel="noopener noreferrer nofollow">AI trains on kids’ photos even when parents use strict privacy settings</a> (Ars Technica)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://arstechnica.com/security/2024/07/regresshion-vulnerability-in-openssh-gives-attackers-root-on-linux/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=hacker-amin-stigal-wanted-for-russian-gru-malware-operations" target="_blank" rel="noopener noreferrer nofollow">“RegreSSHion” vulnerability in OpenSSH gives attackers root on Linux</a> (Ars Technica) </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://arstechnica.com/security/2024/06/mac-info-stealer-malware-distributed-through-google-ads/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=hacker-amin-stigal-wanted-for-russian-gru-malware-operations" target="_blank" rel="noopener noreferrer nofollow">Mac users served info-stealer malware through Google ads</a> (Ars Technica) </p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://arstechnica.com/security/2024/06/critical-moveit-vulnerability-puts-huge-swaths-of-the-internet-at-severe-risk/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=hacker-amin-stigal-wanted-for-russian-gru-malware-operations" target="_blank" rel="noopener noreferrer nofollow">Critical MOVEit vulnerability puts huge swaths of the Internet at severe risk</a> (Ars Technica)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://thehackernews.com/2024/07/new-intel-cpu-vulnerability-indirector.html?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=hacker-amin-stigal-wanted-for-russian-gru-malware-operations" target="_blank" rel="noopener noreferrer nofollow">New Intel CPU Vulnerability &#39;Indirector&#39; Exposes Sensitive Data</a> (The Hacker News)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://thehackernews.com/2024/07/chinese-hackers-exploiting-cisco.html?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=hacker-amin-stigal-wanted-for-russian-gru-malware-operations" target="_blank" rel="noopener noreferrer nofollow">Chinese Hackers Exploiting Cisco Switches Zero-Day to Deliver Malware</a> (The Hacker News)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://thehackernews.com/2024/07/australian-man-charged-for-fake-wi-fi.html?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=hacker-amin-stigal-wanted-for-russian-gru-malware-operations" target="_blank" rel="noopener noreferrer nofollow">Australian Man Charged for Fake Wi-Fi Scam on Domestic Flights</a> (The Hacker News)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://thehackernews.com/2024/06/google-to-block-entrust-certificates-in.html?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=hacker-amin-stigal-wanted-for-russian-gru-malware-operations" target="_blank" rel="noopener noreferrer nofollow">Google to Block Entrust Certificates in Chrome Starting November 2024</a> (The Hacker News)</p></li></ul><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><hr class="content_break"></div><h3 class="heading" style="text-align:left;" id="todays-cyber-wall-of-shame">Today’s Cyber Wall of Shame</h3><p class="paragraph" style="text-align:left;">Amin Stigal, ladies and gentlemen:</p><div class="image"><img alt="A Federal Bureau of Investigation Most Wanted alert for Amin Timovich Stigal, the Russian GRU-linked hacker. " class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/d7bdcd2c-9536-47c5-8bb8-dcabda315402/fbi_amin_stigal.jpeg?t=1719952785"/><div class="image__source"><span class="image__source_text"><p>A Federal Bureau of Investigation Most Wanted alert for Amin Timovich Stigal, the Russian GRU-linked hacker. (source: FBI)</p></span></div></div><h3 class="heading" style="text-align:left;">Join the live session: automate compliance & streamline security reviews</h3><div class="image"><a class="image__link" href="https://www.vanta.com/webinars/how-to-automate-soc-2-iso-27001-compliance-july-2024?utm_campaign=vanta_in_action&utm_source=beehiiv-{{publication_name_param}}&utm_medium=newsletter&_bhiiv=opp_ba397482-5e9f-4156-8f27-3d83c028ba47_ac3d5d85&bhcl_id=83335ba2-f110-4566-9294-013691649d27_{{subscriber_id}}_{{email_address_id}}" rel="noopener" target="_blank"><img class="image__image" style="border-radius:0px 0px 0px 0px;border-style:solid;border-width:0px 0px 0px 0px;box-sizing:border-box;border-color:#E5E7EB;" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/92eba875-fd27-4978-b434-f4fed958d73e/vanta.png?t=1718977000"/></a></div><p class="paragraph" style="text-align:left;">Whether you’re starting or scaling your company’s security program, demonstrating top-notch security practices and establishing trust is more important than ever.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.vanta.com/webinars/how-to-automate-soc-2-iso-27001-compliance-july-2024?utm_campaign=vanta_in_action&utm_source=beehiiv-{{publication_name_param}}&utm_medium=newsletter&_bhiiv=opp_ba397482-5e9f-4156-8f27-3d83c028ba47_ac3d5d85&bhcl_id=83335ba2-f110-4566-9294-013691649d27_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Vanta</a> automates compliance for SOC 2, ISO 27001, and more, saving you time and money — while helping you build customer trust.</p><p class="paragraph" style="text-align:left;">And, you can streamline security reviews by automating questionnaires and demonstrating your security posture with a customer-facing Trust Center, all powered by Vanta AI.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.vanta.com/webinars/how-to-automate-soc-2-iso-27001-compliance-july-2024?utm_campaign=vanta_in_action&utm_source=beehiiv-{{publication_name_param}}&utm_medium=newsletter&_bhiiv=opp_ba397482-5e9f-4156-8f27-3d83c028ba47_ac3d5d85&bhcl_id=83335ba2-f110-4566-9294-013691649d27_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Join Vanta’s 45-minute live session on July 9th at 12 pm PST to see the platform in action and ask your questions. </a></p><p class="paragraph" style="text-align:left;">Until next time…</p><p class="paragraph" style="text-align:left;"><b>Rob Waters</b><br><span style="font-size:0.8rem;">Founder</span><br><span style="font-size:0.8rem;">The Breach Report + Cybersecurity Careers Blog</span></p><p class="paragraph" style="text-align:left;"><br><span style="font-size:0.8rem;"><i><b>P.S. - </b></i></span><span style="font-size:0.8rem;"><i>Do you want to start a newsletter yourself? </i></span><br><span style="font-size:0.8rem;"><i><b>You can with beehiiv. </b></i></span><span style="font-size:0.8rem;"><i><b><a class="link" href="https://www.beehiiv.com?via=tbr&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=hacker-amin-stigal-wanted-for-russian-gru-malware-operations" target="_blank" rel="noopener noreferrer nofollow">Create one today with a free trial</a></b></i></span><span style="font-size:0.8rem;"><i><b>.</b></i></span><br><span style="font-size:0.8rem;">Disclaimer: The Breach Report may contain affiliate links. Read our </span><span style="font-size:0.8rem;"><a class="link" href="https://thebreach.report/c/advertising?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=hacker-amin-stigal-wanted-for-russian-gru-malware-operations" target="_blank" rel="noopener noreferrer nofollow">Advertising</a></span><span style="font-size:0.8rem;"> policy page.</span></p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Kaspersky Antivirus banned in U.S. due to National Security risks</title>
  <description>The company must cease all Kaspersky antivirus sales by July 20, 2024</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/82f79887-c003-4a28-8952-a83d580fc7f9/kaspersky_ban.jpeg" length="120617" type="image/jpeg"/>
  <link>https://thebreach.report/p/kaspersky-antivirus-unitedstates-ban</link>
  <guid isPermaLink="true">https://thebreach.report/p/kaspersky-antivirus-unitedstates-ban</guid>
  <pubDate>Sat, 22 Jun 2024 16:00:00 +0000</pubDate>
  <atom:published>2024-06-22T16:00:00Z</atom:published>
    <dc:creator>Rob Waters</dc:creator>
    <category><![CDATA[Special Report]]></category>
    <category><![CDATA[News]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #82b984; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#95dd96; }
  .bh__table_header p { color: #2A2A2A; font-family:'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><i>Welcome to the latest issue of </i><i><b>The Breach Report</b></i><i>, a cybersecurity newsletter from the creators of the </i><i><a class="link" href="https://www.cybercareers.blog?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=kaspersky-antivirus-banned-in-u-s-due-to-national-security-risks" target="_blank" rel="noopener noreferrer nofollow">Cybersecurity Careers Blog</a></i><i>. Be sure to subscribe via </i><i><a class="link" href="https://thebreach.report/subscribe?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=kaspersky-antivirus-banned-in-u-s-due-to-national-security-risks" target="_blank" rel="noopener noreferrer nofollow">email</a></i><i> or </i><i><a class="link" href="https://rss.beehiiv.com/feeds/SyvvEer2H8.xml?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=kaspersky-antivirus-banned-in-u-s-due-to-national-security-risks" target="_blank" rel="noopener noreferrer nofollow">RSS</a></i><i>.</i></p><h3 class="heading" style="text-align:left;" id="scale-your-grc-program-with-automat">Scale your GRC program with Automation and AI</h3><div class="image"><a class="image__link" href="https://www.vanta.com/landing/demo-grc?utm_campaign=grc&utm_source=beehiiv-{{publication_name_param}}&utm_medium=newsletter&_bhiiv=opp_84d3c040-7946-4375-9dbd-b54855f4083f_d7ee101d&bhcl_id=4513476f-c786-4acd-bb1f-eb7e2d62a863_{{subscriber_id}}_{{email_address_id}}" rel="noopener" target="_blank"><img class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/2a687b86-3b44-46b0-9185-b44d96c29cd4/vanta.png?t=1717613157"/></a></div><p class="paragraph" style="text-align:left;">Spending hours gathering evidence, tracking risk, and answering security questionnaires? Move away from manual work by automating key GRC program needs with <a class="link" href="https://www.vanta.com/landing/demo-grc?utm_campaign=grc&utm_source=beehiiv-{{publication_name_param}}&utm_medium=newsletter&_bhiiv=opp_84d3c040-7946-4375-9dbd-b54855f4083f_d7ee101d&bhcl_id=4513476f-c786-4acd-bb1f-eb7e2d62a863_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Vanta</a>. </p><ul><li><p class="paragraph" style="text-align:left;">Automate evidence collection across 21+ frameworks including SOC 2 and ISO 27001 with continuous monitoring</p></li><li><p class="paragraph" style="text-align:left;">Centralize risk and report on program impact to internal teams</p></li><li><p class="paragraph" style="text-align:left;">Create your own Trust Center to proactively manage buyer needs</p></li><li><p class="paragraph" style="text-align:left;">Leverage AI to answer security questionnaires faster</p></li></ul><p class="paragraph" style="text-align:left;">Over 7,000 global companies like Atlassian, Flo Health, and Quora use Vanta to build trust and prove security in real time. <a class="link" href="https://www.vanta.com/landing/demo-grc?utm_campaign=grc&utm_source=beehiiv-{{publication_name_param}}&utm_medium=newsletter&_bhiiv=opp_84d3c040-7946-4375-9dbd-b54855f4083f_d7ee101d&bhcl_id=4513476f-c786-4acd-bb1f-eb7e2d62a863_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Connect with a team member to learn more. </a></p><h2 class="heading" style="text-align:left;" id="us-bans-kaspersky-antivirus-softwar">U.S. bans Kaspersky antivirus software due to National Security risks</h2><div class="image"><img alt="Eugene Kaspersky, CEO of Kaspersky Labs, maintains that the company has operated independently of any Russian government influence for over 26 years." class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/2e47684d-6117-4e39-b6cc-446698375eb6/eugene-kaspersky.jpeg?t=1719075306"/><div class="image__source"><span class="image__source_text"><p>Eugene Kaspersky, CEO of Kaspersky Labs, maintains that the company has operated independently of any Russian government influence for over 26 years.</p></span></div></div><p class="paragraph" style="text-align:left;">The <b>Biden-Harris Administration</b> and the<b> United States Department of Commerce </b>have announced that they are banning <b>Kaspersky</b> antivirus software across the entire U.S., forcing the company to dismantle and shut down all U.S. operations by September 29, 2024. All sales of its cybersecurity and antivirus products and services to U.S. persons must cease by July 20, 2024.</p><p class="paragraph" style="text-align:left;">Kaspersky antivirus software has &quot;an ability to gather valuable U.S. business information, including intellectual property, and to gather U.S. persons’ sensitive data for malicious use by the Russian Government pose an undue or unacceptable national security risk,” the Department <a class="link" href="https://www.bis.gov/press-release/commerce-department-prohibits-russian-kaspersky-software-us-customers?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=kaspersky-antivirus-banned-in-u-s-due-to-national-security-risks" target="_blank" rel="noopener noreferrer nofollow">stated</a>.</p><p class="paragraph" style="text-align:left;">The September 29, 2024, deadline will force Kaspersky to shut down its U.S.-based Kaspersky Security Network (KSN), antivirus signatures, and codebase updates. Kaspersky is also prohibited from integrating any component of the company’s offerings into third-party software or offerings.</p><p class="paragraph" style="text-align:left;">The only exceptions the Department of Commerce made are Kaspersky Threat Intelligence products and services and Kaspersky Security and Consulting services. The department considers those services “educational” or “informational” and thus avoids the ban.</p><h2 class="heading" style="text-align:left;" id="commerce-kaspersky-antivirus-softwa">Commerce: Kaspersky antivirus software is a surveillance tool of the Kremlin</h2><p class="paragraph" style="text-align:left;">Secretary of Commerce Gina Raimondo articulated the Russian government&#39;s exploitation of Kaspersky for cyber intelligence objectives:</p><p class="paragraph" style="text-align:left;">“Russia has shown time and again they have the capability and intent to exploit Russian companies, like Kaspersky Lab, to collect and weaponize sensitive U.S. information, and we will continue to use every tool at our disposal to safeguard U.S. national security and the American people. Today’s action, our first use of the Commerce Department’s ICTS authorities, demonstrates Commerce’s role in support of our national defense and shows our adversaries we will not hesitate to act when they use their technology poses a risk to United States and its citizens.”</p><p class="paragraph" style="text-align:left;">Banning Kaspersky antivirus and cybersecurity products in the U.S. was not unexpected. In 2017, the Department of Homeland Security ordered federal agencies to remove all Kaspersky products from federal information systems.</p><p class="paragraph" style="text-align:left;">In 2022, the U.S. Federal Communications Commission placed Kaspersky’s products and services on a list that posed a significant threat to national security.</p><p class="paragraph" style="text-align:left;">Today, the US Department of the Treasury’s Office of Foreign Assets Control (OFAC) has <a class="link" href="https://home.treasury.gov/news/press-releases/jy2420?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=kaspersky-antivirus-banned-in-u-s-due-to-national-security-risks" target="_blank" rel="noopener noreferrer nofollow">announced</a> economic sanctions against 12 executives and senior leaders at AO Kaspersky Lab. Notably, Eugene Kaspersky is not one of them.</p><h2 class="heading" style="text-align:left;" id="kaspersky-to-pursue-all-legal-optio"><b>Kaspersky to “pursue all legal options” following ban</b></h2><p class="paragraph" style="text-align:left;">In a prepared statement to <a class="link" href="https://arstechnica.com/tech-policy/2024/06/citing-national-security-us-will-ban-kaspersky-anti-virus-software-in-july/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=kaspersky-antivirus-banned-in-u-s-due-to-national-security-risks" target="_blank" rel="noopener noreferrer nofollow">Ars Technica</a>, Kaspersky has stated that it is willing to “pursue all legal options” following the ban on its antivirus software. Predictably, it also claims that the ban by the Department of Commerce is “purely political.”</p><p class="paragraph" style="text-align:left;">The company has also maintained that it has operated independently of the Russian government for over 26 years.</p><p class="paragraph" style="text-align:left;">Despite the U.S. government ban, It also <a class="link" href="https://fortune.com/2024/06/21/cybersecurity-kapersky-ban-selling-products/?taid=66761d2effc9eb0001c1d1b2&utm_campaign=trueanthem&utm_medium=social&utm_source=twitter" target="_blank" rel="noopener noreferrer nofollow">vows to continue selling</a> its antivirus software.</p><p class="paragraph" style="text-align:left;">A full press release was posted by Kaspersky on their X account:</p><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/kaspersky/status/1803919553669284190?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=kaspersky-antivirus-banned-in-u-s-due-to-national-security-risks"><p> Twitter tweet </p></a></blockquote><h2 class="heading" style="text-align:left;" id="after-kaspersky-is-tik-tok-next">After Kaspersky, is TikTok next?</h2><p class="paragraph" style="text-align:left;">No matter how Kaspersky challenges the ban, it will likely end any significant market capture within the United States. Sinking revenue since the 2017 Homeland Security ban and increasingly negative public sentiment toward Russia–now more than ever due to the ongoing war in Ukraine–has made this brand too toxic.</p><p class="paragraph" style="text-align:left;">It also doesn’t give any confidence in the possibility of a U.S.-based TikTok remaining in operation. The Biden-Harris Administration <a class="link" href="https://thebreach.report/p/bytedance-tiktok-ban-in-unitedstates?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=kaspersky-antivirus-banned-in-u-s-due-to-national-security-risks" target="_blank" rel="noopener noreferrer nofollow">announced in April</a> it is forcing the Beijing-tied social media platform to sell within one year or face a permanent ban.</p><p class="paragraph" style="text-align:left;">Increasing weaponization of data and using software and social media for surveillance purposes originating from China and Russia is a quick way to a ban in today’s political climate.</p><hr class="content_break"><h2 class="heading" style="text-align:left;" id="latest-cybersecurity-news">Latest Cybersecurity News</h2><p class="paragraph" style="text-align:left;">What we’re reading across the wire about the latest cybersecurity hacks, breaches, industry news, and more. </p><p class="paragraph" style="text-align:left;"><b>New from our favorite blogs and journalists:</b></p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://arstechnica.com/tech-policy/2024/06/citing-national-security-us-will-ban-kaspersky-anti-virus-software-in-july/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=kaspersky-antivirus-banned-in-u-s-due-to-national-security-risks" target="_blank" rel="noopener noreferrer nofollow">Citing national security, US will ban Kaspersky anti-virus software in July</a> (Ars Technica)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.reuters.com/technology/cybersecurity/cisco-establish-cybersecurity-centre-taiwan-2024-06-17/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=kaspersky-antivirus-banned-in-u-s-due-to-national-security-risks" target="_blank" rel="noopener noreferrer nofollow">Cisco to establish cybersecurity centre in Taiwan</a> (Reuters)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.infosecurity-magazine.com/news/cybersecurity-burnout-costing-700m/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=kaspersky-antivirus-banned-in-u-s-due-to-national-security-risks" target="_blank" rel="noopener noreferrer nofollow">Cybersecurity Burnout Costing Firms $700m+ Annually</a> (Infosecurity Magazine)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.pymnts.com/cybersecurity/2024/cybersecurity-concerns-test-paris-olympics-preparations/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=kaspersky-antivirus-banned-in-u-s-due-to-national-security-risks" target="_blank" rel="noopener noreferrer nofollow">Cybersecurity Concerns Test Paris Olympics Preparations</a> (PYMNTS)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://thehackernews.com/2024/06/chinese-cyber-espionage-targets-telecom.html?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=kaspersky-antivirus-banned-in-u-s-due-to-national-security-risks" target="_blank" rel="noopener noreferrer nofollow">Chinese Cyber Espionage Targets Telecom Operators in Asia Since 2021</a> (The Hacker News)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://thehackernews.com/2024/06/us-treasury-sanctions-12-kaspersky.html?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=kaspersky-antivirus-banned-in-u-s-due-to-national-security-risks" target="_blank" rel="noopener noreferrer nofollow">U.S. Treasury Sanctions 12 Kaspersky Executives Amid Software Ban</a> (The Hacker News)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://thehackernews.com/2024/06/signal-foundation-warns-against-eus.html?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=kaspersky-antivirus-banned-in-u-s-due-to-national-security-risks" target="_blank" rel="noopener noreferrer nofollow">Signal Foundation Warns Against EU&#39;s Plan to Scan Private Messages for CSAM</a> (The Hacker News)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://thehackernews.com/2024/06/chinese-cyber-espionage-group-exploits.html?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=kaspersky-antivirus-banned-in-u-s-due-to-national-security-risks" target="_blank" rel="noopener noreferrer nofollow">UNC3886 Uses Fortinet, VMware 0-Days and Stealth Tactics in Long-Term Spying</a> (The Hacker News)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.cnn.com/2024/06/20/politics/biden-administration-bans-kaspersky-software/index.html?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=kaspersky-antivirus-banned-in-u-s-due-to-national-security-risks" target="_blank" rel="noopener noreferrer nofollow">Kaspersky: Biden administration bans Americans from using Russian-made cybersecurity software over national security concerns</a> (CNN)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.cnn.com/2024/06/20/tech/tiktok-court-filing-biden-administration/index.html?iid=cnn_buildContentRecirc_end_recirc&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=kaspersky-antivirus-banned-in-u-s-due-to-national-security-risks" target="_blank" rel="noopener noreferrer nofollow">TikTok ramps up attacks on Biden administration in challenging prospective ban</a> (CNN)</p></li></ul><p class="paragraph" style="text-align:left;"><b>Cybersecurity Industry Press Releases:</b></p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3805947/nsa-announces-kristina-walter-as-the-new-chief-of-cybersecurity-collaboration-c/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=kaspersky-antivirus-banned-in-u-s-due-to-national-security-risks" target="_blank" rel="noopener noreferrer nofollow">NSA Announces Kristina Walter as the new Chief of Cybersecurity Collaboration Center</a> (NSA)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3791171/nsa-releases-guidance-on-the-visibility-and-analytics-pillar-of-zero-trust/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=kaspersky-antivirus-banned-in-u-s-due-to-national-security-risks" target="_blank" rel="noopener noreferrer nofollow">NSA Releases Guidance on the Visibility and Analytics Pillar of Zero Trust</a> (NSA) </p></li></ul><h3 class="heading" style="text-align:left;" id="todays-cyber-wall-of-shame">Today’s Cyber Wall of Shame</h3><p class="paragraph" style="text-align:left;">You know you’re going to miss this…</p><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/vxunderground/status/1782926270768046278?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=kaspersky-antivirus-banned-in-u-s-due-to-national-security-risks"><p> Twitter tweet </p></a></blockquote><p class="paragraph" style="text-align:left;">Until next time…</p><p class="paragraph" style="text-align:left;"><b>Rob Waters</b><br><span style="font-size:0.8rem;">Founder</span><br><span style="font-size:0.8rem;">The Breach Report + Cybersecurity Careers Blog</span></p><p class="paragraph" style="text-align:left;"><br><span style="font-size:0.8rem;"><i><b>P.S. - </b></i></span><span style="font-size:0.8rem;"><i>Do you want to start a newsletter yourself? </i></span><br><span style="font-size:0.8rem;"><i><b>You can with beehiiv. </b></i></span><span style="font-size:0.8rem;"><i><b><a class="link" href="https://www.beehiiv.com?via=tbr&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=kaspersky-antivirus-banned-in-u-s-due-to-national-security-risks" target="_blank" rel="noopener noreferrer nofollow">Create one today with a free trial</a></b></i></span><span style="font-size:0.8rem;"><i><b>.</b></i></span><br><span style="font-size:0.8rem;">Disclaimer: The Breach Report may contain affiliate links. Read our </span><span style="font-size:0.8rem;"><a class="link" href="https://thebreach.report/c/advertising?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=kaspersky-antivirus-banned-in-u-s-due-to-national-security-risks" target="_blank" rel="noopener noreferrer nofollow">Advertising</a></span><span style="font-size:0.8rem;"> policy page.</span></p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>CDK Global Software Cyberattack Disrupts 15,000 US Car Dealerships</title>
  <description>Disruption enters third day after multiple cyberattacks</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/9f4d1357-cbe5-41c8-92c7-1b1d3cadbe53/carlot.jpg" length="516619" type="image/jpeg"/>
  <link>https://thebreach.report/p/cdk-global-cyberattack-15000-car-dealers</link>
  <guid isPermaLink="true">https://thebreach.report/p/cdk-global-cyberattack-15000-car-dealers</guid>
  <pubDate>Fri, 21 Jun 2024 20:41:01 +0000</pubDate>
  <atom:published>2024-06-21T20:41:01Z</atom:published>
    <dc:creator>Rob Waters</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #82b984; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#95dd96; }
  .bh__table_header p { color: #2A2A2A; font-family:'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><i>Welcome to the latest issue of </i><i><b>The Breach Report</b></i><i>, a cybersecurity newsletter from the creators of the </i><i><a class="link" href="https://www.cybercareers.blog?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=cdk-global-software-cyberattack-disrupts-15-000-us-car-dealerships" target="_blank" rel="noopener noreferrer nofollow">Cybersecurity Careers Blog</a></i><i>. Be sure to subscribe via </i><i><a class="link" href="https://thebreach.report/subscribe?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=cdk-global-software-cyberattack-disrupts-15-000-us-car-dealerships" target="_blank" rel="noopener noreferrer nofollow">email</a></i><i> or </i><i><a class="link" href="https://rss.beehiiv.com/feeds/SyvvEer2H8.xml?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=cdk-global-software-cyberattack-disrupts-15-000-us-car-dealerships" target="_blank" rel="noopener noreferrer nofollow">RSS</a></i><i>.</i></p><h2 class="heading" style="text-align:left;" id="cdk-global-software-cyberattack-dis">CDK Global Software Cyberattack Disrupts 15,000 US Car Dealerships</h2><p class="paragraph" style="text-align:left;"><b>CDK Global</b>, a company providing dealer management software (DMS) to car dealerships across the United States, has suffered multiple cyberattacks affecting over 15,000 dealerships. CDK has been forced to shut down its systems, leaving clients unable to perform any business operation the software provides. </p><p class="paragraph" style="text-align:left;">The initial cyberattacks were first reported on Tuesday, June 18.</p><p class="paragraph" style="text-align:left;">The CDK platform includes CRM, repair requests, orders, inventory, payroll, and financing, among other administrative functions.</p><p class="paragraph" style="text-align:left;">According to <a class="link" href="https://www.bleepingcomputer.com/news/security/cdk-global-cyberattack-impacts-thousands-of-us-car-dealerships/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=cdk-global-software-cyberattack-disrupts-15-000-us-car-dealerships" target="_blank" rel="noopener noreferrer nofollow">Bleeping Computer</a>, the attacks forced CDK to shut down its IT systems, phones, and applications to prevent the further spread of the attack.</p><p class="paragraph" style="text-align:left;">Customers using CDK’s platform utilize a VPN connection that must remain online to CDK’s datacenters where the software-as-a-service (SaaS) resides. A locally installed application at each dealer accesses the enterprise SaaS through the VPN.</p><p class="paragraph" style="text-align:left;">A CDK client from an affected dealership told Bleeping Computer that CDK advised them to disconnect the VPN out of caution.</p><div class="image"><img alt="The ongoing cyberattacks to CDK Global has forced countless US car dealerships to resort to pen and paper manual processes to continue some level of business. " class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/c708b3f6-572f-40a6-9dd4-93076df9e4c4/cdk_reddit.jpg?t=1719002161"/><div class="image__source"><span class="image__source_text"><p>The ongoing cyberattacks on CDK Global have forced countless US car dealerships to resort to pen-and-paper manual processes to continue some level of business. (source: Reddit)</p></span></div></div><h3 class="heading" style="text-align:left;" id="cdk-confirms-multiple-cyberattacks-">CDK confirms multiple cyberattacks with no time frame for resolution</h3><p class="paragraph" style="text-align:left;">&quot;We are actively investigating a cyber incident,&quot; a CDK spokesperson told <a class="link" href="https://www.cbsnews.com/news/cdk-cyber-attack-outage-auto-dealerships-cbs-news-explains/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=cdk-global-software-cyberattack-disrupts-15-000-us-car-dealerships" target="_blank" rel="noopener noreferrer nofollow">CBS News</a>. &quot;Out of an abundance of caution and concern for our customers, we have shut down most of our systems and are working diligently to get everything up and running as quickly as possible.&quot; </p><p class="paragraph" style="text-align:left;">Some systems were restored on Wednesday, but another round of cyberattacks on the same day further damaged recovery efforts.</p><p class="paragraph" style="text-align:left;">“Late in the evening of June 19, we experienced an additional cyber incident and proactively shut down most of our systems. In partnership with third-party experts, we are assessing the impact and providing regular updates to our customers. We remain vigilant in our efforts to reinstate our services and get our dealers back to business as usual as quickly as possible,” CDK shared on Thursday.</p><p class="paragraph" style="text-align:left;">Calls to CDK Global’s hotlines are met with a busy signal or a prerecorded message.</p><p class="paragraph" style="text-align:left;">The automated recording on CDK Global’s hotline states, &quot; At this time, we do not have an estimated time frame for resolution, and therefore, our dealers’ systems will not likely be available for several days.”</p><h3 class="heading" style="text-align:left;" id="manual-spreadsheets-pen-and-paper-a">Manual spreadsheets, pen and paper as outage persists</h3><p class="paragraph" style="text-align:left;">Employees have reported on Reddit that many car dealerships can only function at a reduced level using manual, static spreadsheets, and pen and paper. </p><p class="paragraph" style="text-align:left;">“Excel spreadsheets and post it notes for any parts we’re handing out. Any big jobs are not happening,” an affected car dealership employee posted on <a class="link" href="https://www.reddit.com/r/Justrolledintotheshop/comments/1djl7iy/comment/l9blify/?utm_source=share&utm_medium=web3x&utm_name=web3xcss&utm_term=1&utm_content=share_button" target="_blank" rel="noopener noreferrer nofollow">Reddit</a>.</p><p class="paragraph" style="text-align:left;">Some dealerships are even sending employees home, as they will not be able to reasonably perform their jobs until CDK is back online.</p><p class="paragraph" style="text-align:left;">&quot;We are almost to that point…no parts, no ROs, no times…just dead vehicles with nothing to show for them or parts to fix them,&quot; another affected car dealership employee posted to <a class="link" href="https://www.reddit.com/r/Justrolledintotheshop/comments/1djn163/comment/l9bssdz/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=cdk-global-software-cyberattack-disrupts-15-000-us-car-dealerships" target="_blank" rel="noopener noreferrer nofollow">Reddit</a>.</p><h3 class="heading" style="text-align:left;">Your Brilliant Business Idea Just Got a New Best Friend </h3><div class="image"><a class="image__link" href="https://ae.studio/lh/ai-ideas?utm_source=beehiiv_7_18_24&utm_medium=email&utm_campaign={{publication_name_param}}_{{publication_alphanumeric_id}}&_bhiiv=opp_2f709a8d-4f05-4511-a460-195ddfcd9bbc_c8da7d83&bhcl_id=c473302c-22c4-4b57-8c71-f13ce6c2aa55_{{subscriber_id}}_{{email_address_id}}" rel="noopener" target="_blank"><img class="image__image" style="border-radius:0px 0px 0px 0px;border-style:solid;border-width:0px 0px 0px 0px;box-sizing:border-box;border-color:#E5E7EB;" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/8d245a5c-0c91-4b22-9f46-032af4ebbf51/Unnamed_from_Google.png?t=1721347080"/></a></div><p class="paragraph" style="text-align:left;"><b>Got a business idea? Any idea?</b> We&#39;re not picky. Big, small, &quot;I thought of this in the shower&quot; type stuff–we want it all. Whether you&#39;re dreaming of building an empire or just figuring out how to stop shuffling spreadsheets, we&#39;re here for it.</p><p class="paragraph" style="text-align:left;">Our <a class="link" href="https://ae.studio/lh/ai-ideas?utm_source=beehiiv_7_18_24&utm_medium=email&utm_campaign={{publication_name_param}}_{{publication_alphanumeric_id}}&_bhiiv=opp_2f709a8d-4f05-4511-a460-195ddfcd9bbc_c8da7d83&bhcl_id=c473302c-22c4-4b57-8c71-f13ce6c2aa55_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">AI Ideas Generator</a> asks you 3 questions and emails you a custom-built report of AI-powered solutions <b>unique to your business</b>.</p><p class="paragraph" style="text-align:left;">Imagine having a hyper-intelligent, never-sleeps, doesn&#39;t-need-coffee AI solutions machine at your beck and call. That&#39;s our AI Ideas Generator. It takes your business conundrum, shakes it up with some LLM magic and–voila!--emails you a bespoke report of AI-powered solutions.</p><p class="paragraph" style="text-align:left;"><b>Outsmart, Outpace, Outdo</b>: Whether you&#39;re aiming to leapfrog the competition or just be best-in-class in your industry, our custom AI solutions have you covered. </p><p class="paragraph" style="text-align:left;"><a class="link" href="https://ae.studio/lh/ai-ideas?utm_source=beehiiv_7_18_24&utm_medium=email&utm_campaign={{publication_name_param}}_{{publication_alphanumeric_id}}&_bhiiv=opp_2f709a8d-4f05-4511-a460-195ddfcd9bbc_c8da7d83&bhcl_id=c473302c-22c4-4b57-8c71-f13ce6c2aa55_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Ready to turn your business into the talk of the town (or at least the water cooler)? Let&#39;s get cracking!</a> (And yes, it’s free!)</p><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><hr class="content_break"></div><h3 class="heading" style="text-align:left;" id="todays-cyber-wall-of-shame">Today’s Cyber Wall of Shame</h3><p class="paragraph" style="text-align:left;">Malicious actors never let a crisis go to waste…</p><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/BleepinComputer/status/1804107210672243130?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=cdk-global-software-cyberattack-disrupts-15-000-us-car-dealerships"><p> Twitter tweet </p></a></blockquote><p class="paragraph" style="text-align:left;">Until next time…</p><p class="paragraph" style="text-align:left;"><b>Rob Waters</b><br><span style="font-size:0.8rem;">Founder</span><br><span style="font-size:0.8rem;">The Breach Report + Cybersecurity Careers Blog</span></p><p class="paragraph" style="text-align:left;"><br><span style="font-size:0.8rem;"><i><b>P.S. - </b></i></span><span style="font-size:0.8rem;"><i>Do you want to start a newsletter yourself? </i></span><br><span style="font-size:0.8rem;"><i><b>You can with beehiiv. </b></i></span><span style="font-size:0.8rem;"><i><b><a class="link" href="https://www.beehiiv.com?via=tbr&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=cdk-global-software-cyberattack-disrupts-15-000-us-car-dealerships" target="_blank" rel="noopener noreferrer nofollow">Create one today with a free trial</a></b></i></span><span style="font-size:0.8rem;"><i><b>.</b></i></span><br><span style="font-size:0.8rem;">Disclaimer: The Breach Report may contain affiliate links. Read our </span><span style="font-size:0.8rem;"><a class="link" href="https://thebreach.report/c/advertising?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=cdk-global-software-cyberattack-disrupts-15-000-us-car-dealerships" target="_blank" rel="noopener noreferrer nofollow">Advertising</a></span><span style="font-size:0.8rem;"> policy page.</span></p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Owners of &quot;Empire Market&quot; Dark Web Store Worth $430 Million Charged</title>
  <description>Two suspects face life in prison for illegal drugs, goods and services marketplace</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/56003bce-a859-4752-a0ce-13f2e93cdcbe/darkweb_header.jpg" length="120743" type="image/jpeg"/>
  <link>https://thebreach.report/p/empire-market-dark-web-owners-charged</link>
  <guid isPermaLink="true">https://thebreach.report/p/empire-market-dark-web-owners-charged</guid>
  <pubDate>Thu, 20 Jun 2024 14:00:00 +0000</pubDate>
  <atom:published>2024-06-20T14:00:00Z</atom:published>
    <dc:creator>Rob Waters</dc:creator>
    <category><![CDATA[News]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #82b984; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#95dd96; }
  .bh__table_header p { color: #2A2A2A; font-family:'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><i>Welcome to the latest issue of </i><i><b>The Breach Report</b></i><i>, a cybersecurity newsletter from the creators of the </i><i><a class="link" href="https://www.cybercareers.blog?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=owners-of-empire-market-dark-web-store-worth-430-million-charged" target="_blank" rel="noopener noreferrer nofollow">Cybersecurity Careers Blog</a></i><i>. Be sure to subscribe via </i><i><a class="link" href="https://thebreach.report/subscribe?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=owners-of-empire-market-dark-web-store-worth-430-million-charged" target="_blank" rel="noopener noreferrer nofollow">email</a></i><i> or </i><i><a class="link" href="https://rss.beehiiv.com/feeds/SyvvEer2H8.xml?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=owners-of-empire-market-dark-web-store-worth-430-million-charged" target="_blank" rel="noopener noreferrer nofollow">RSS</a></i><i>.</i></p><h2 class="heading" style="text-align:left;" id="the-fall-of-empire-market-a-dark-we"><b>The Fall of Empire Market, a Dark Web Marketplace</b></h2><p class="paragraph" style="text-align:left;">The <b>United States Department of Justice </b>has <a class="link" href="https://www.justice.gov/usao-ndil/pr/owners-empire-market-charged-chicago-operating-430-million-dark-web-marketplace?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=owners-of-empire-market-dark-web-store-worth-430-million-charged" target="_blank" rel="noopener noreferrer nofollow">announced</a> that two suspects have been charged with owning and operating <b>Empire Market</b>, a dark web marketplace. Empire Market provided access to buying, selling, and exchanging illegal goods and services like drugs, counterfeit items, malware, stolen enterprise data, and other services. </p><p class="paragraph" style="text-align:left;">The DOJ has charged <b>Thomas Pavey, aka “Dopenugget,” and Raheim Hamilton, aka “Sydney” and “Zero Angel,</b>” with owning and operating Empire Market from 2018 to 2020. Pavey, 38, resided in Ormond Beach, Florida, and Hamilton, 28, in Suffolk, Virginia.</p><p class="paragraph" style="text-align:left;">Two suspects could now face life in prison for the illegal drugs, goods, and services marketplace.</p><p class="paragraph" style="text-align:left;">Pavey and Hamilton also previously sold counterfeit U.S. currency on AlphaBay, a dark web marketplace that preceded Empire Market. AlphaBay was shut down in 2017.</p><p class="paragraph" style="text-align:left;">In just two years, the pair conducted over four million transactions worth $430 million, according to an indictment in the U.S. District Court in Chicago.</p><p class="paragraph" style="text-align:left;">The indictment charges include drug trafficking, computer fraud, access device fraud, counterfeiting, and money laundering.</p><p class="paragraph" style="text-align:left;">Empire Market was accessible only on the dark web with a .onion address. Multiple vendors sold various drugs and stolen credit card information. At its peak, over 500 new listings were posted per day, and over 52,000 products were for sale across 4,500 vendors.</p><p class="paragraph" style="text-align:left;">For only $750, vendors could register to sell anything customers would be willing to pay for.</p><div class="image"><img alt="An example drug listing of Adderall and Vyvanse on Empire Market while the dark web store was still in operation. " class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/9e863da4-cd83-483b-a192-b5f00f2745af/empiremarket_drug.png?t=1718890106"/><div class="image__source"><span class="image__source_text"><p>An example drug listing of Adderall and Vyvanse on Empire Market while the dark web store was still in operation. (source: webz.io)</p></span></div></div><p class="paragraph" style="text-align:left;">Payments accepted on Empire Market included Bitcoin, Litecoin, and Monero cryptocurrencies.</p><p class="paragraph" style="text-align:left;">The platform became a hub for learning how to conduct money laundering and attempting to conceal cryptocurrency transactions by “tumbling” it through services like Tornado Cash. </p><p class="paragraph" style="text-align:left;">Tornado Cash is <a class="link" href="https://www.wired.com/story/tornado-cash-money-laundering-case-crypto-privacy/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=owners-of-empire-market-dark-web-store-worth-430-million-charged" target="_blank" rel="noopener noreferrer nofollow">used</a> by crypto scammers and dark web users to shuffle cryptocurrency funds across a broad range of cryptocurrencies on the Ethereum blockchain. </p><h2 class="heading" style="text-align:left;" id="lifetime-sentences-await-empire-mar">Lifetime sentences await Empire Market owners</h2><p class="paragraph" style="text-align:left;">Empire Market was taken down in January 2020 after a coordinated effort by law enforcement agencies in the United States and abroad. Authorities seized and took the marketplace&#39;s servers offline, as well as over $75 million in cryptocurrency, cash, and precious metals.</p><p class="paragraph" style="text-align:left;">If Pavey and Hamilton are found guilty and convicted on all counts, they will earn a lifetime sentence each.</p><p class="paragraph" style="text-align:left;">If history tells us anything, AlphaBay, <a class="link" href="https://www.cybercareers.blog/2023/04/genesis-market-cybercrime-marketplace-seized-by-fbi/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=owners-of-empire-market-dark-web-store-worth-430-million-charged" target="_blank" rel="noopener noreferrer nofollow">Genesis Market</a>, and Empire Market may be gone, but clones inevitably rise. Notorious hacker forum BreachForums <a class="link" href="https://www.cybercareers.blog/2023/03/alleged-breachforums-owner-pompompurin-arrested/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=owners-of-empire-market-dark-web-store-worth-430-million-charged" target="_blank" rel="noopener noreferrer nofollow">remains</a> in operation after repeated international efforts to take down the platform. </p><h3 class="heading" style="text-align:left;" id="instantly-calculate-the-time-you-ca">Instantly calculate the time you can save by automating compliance</h3><div class="image"><a class="image__link" href="https://www.vanta.com/automation-value-calculator?utm_campaign=automation_value_calculator&utm_source=beehiiv-{{publication_name_param}}&utm_medium=newsletter&_bhiiv=opp_7d447391-d396-4a72-8be8-0a24193ccb32_58687548&bhcl_id=81df683b-9f4e-4443-93c5-49b031be1975_{{subscriber_id}}_{{email_address_id}}" rel="noopener" target="_blank"><img class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/d8d76322-3e1a-4786-a75b-9265e3a0f3a4/vanta1.png?t=1717796883"/></a></div><p class="paragraph" style="text-align:left;">Whether you’re starting or scaling your security program, <a class="link" href="https://www.vanta.com/automation-value-calculator?utm_campaign=automation_value_calculator&utm_source=beehiiv-{{publication_name_param}}&utm_medium=newsletter&_bhiiv=opp_7d447391-d396-4a72-8be8-0a24193ccb32_58687548&bhcl_id=81df683b-9f4e-4443-93c5-49b031be1975_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">Vanta</a> helps you automate compliance across frameworks like SOC 2, ISO 27001, ISO 42001, HIPAA, HITRUST CSF, NIST AI, and more.</p><p class="paragraph" style="text-align:left;">Plus, you can streamline security reviews by automating questionnaires and demonstrating your security posture with a customer-facing Trust Center, all powered by Vanta AI.</p><p class="paragraph" style="text-align:left;">Instantly calculate how much time you can save with Vanta. </p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.vanta.com/automation-value-calculator?utm_campaign=automation_value_calculator&utm_source=beehiiv-{{publication_name_param}}&utm_medium=newsletter&_bhiiv=opp_7d447391-d396-4a72-8be8-0a24193ccb32_58687548&bhcl_id=81df683b-9f4e-4443-93c5-49b031be1975_{{subscriber_id}}_{{email_address_id}}" target="_blank" rel="noopener noreferrer nofollow">[Calculate now]</a></p><hr class="content_break"><h2 class="heading" style="text-align:left;" id="latest-cybersecurity-news">Latest Cybersecurity News</h2><p class="paragraph" style="text-align:left;">What we’re reading across the wire about the latest cybersecurity hacks, breaches, industry news, and more. </p><p class="paragraph" style="text-align:left;"><b>New from our blog:</b></p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.cybercareers.blog/2024/06/nvidia-nemotron-4-340b-synthetic-data-generation/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=owners-of-empire-market-dark-web-store-worth-430-million-charged" target="_blank" rel="noopener noreferrer nofollow">NVIDIA Nemotron-4 340B: Large Language Model Training with Synthetic Data</a> (Cybersecurity Careers Blog)</p></li></ul><p class="paragraph" style="text-align:left;"><b>New from our favorite blogs and journalists:</b></p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.404media.co/inside-the-underground-site-where-ai-neural-networks-churns-out-fake-ids-onlyfake/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=owners-of-empire-market-dark-web-store-worth-430-million-charged" target="_blank" rel="noopener noreferrer nofollow">Inside the Underground Site Where ‘Neural Networks’ Churn Out Fake IDs</a> (404 Media)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://thehackernews.com/2024/06/kraken-crypto-exchange-hit-by-3-million.html?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=owners-of-empire-market-dark-web-store-worth-430-million-charged" target="_blank" rel="noopener noreferrer nofollow">Kraken Crypto Exchange Hit by $3 Million Theft Exploiting Zero-Day Flaw</a> (The Hacker News)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/legal/empire-market-owners-charged-for-enabling-430m-in-dark-web-transactions/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=owners-of-empire-market-dark-web-store-worth-430-million-charged" target="_blank" rel="noopener noreferrer nofollow">Empire Market owners charged for enabling $430M in dark web transactions</a> (Bleeping Computer)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/cdk-global-cyberattack-impacts-thousands-of-us-car-dealerships/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=owners-of-empire-market-dark-web-store-worth-430-million-charged" target="_blank" rel="noopener noreferrer nofollow">CDK Global cyberattack impacts thousands of US car dealerships</a> (Bleeping Computer)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.bleepingcomputer.com/news/security/fake-google-chrome-errors-trick-you-into-running-malicious-powershell-scripts/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=owners-of-empire-market-dark-web-store-worth-430-million-charged" target="_blank" rel="noopener noreferrer nofollow">Fake Google Chrome errors trick you into running malicious PowerShell scripts</a> (Bleeping Computer)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://therecord.media/government-military-fair-targets-nso-group?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=owners-of-empire-market-dark-web-store-worth-430-million-charged" target="_blank" rel="noopener noreferrer nofollow">Government and military officials fair targets of Pegasus spyware in all cases, NSO Group argues </a>(The Record)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://therecord.media/un-security-council-cybersecurity-threats-debate?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=owners-of-empire-market-dark-web-store-worth-430-million-charged" target="_blank" rel="noopener noreferrer nofollow">UN Security Council to debate cybersecurity threats, despite Russian veto</a> (The Record)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://therecord.media/us-intelligence-russia-interference-uk-election?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=owners-of-empire-market-dark-web-store-worth-430-million-charged" target="_blank" rel="noopener noreferrer nofollow">US intelligence &#39;not seen much&#39; of Russia attempting to interfere in UK elections</a> (The Record)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.telegraph.co.uk/world-news/2024/06/18/russia-may-interfere-in-uk-election-senator-warns/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=owners-of-empire-market-dark-web-store-worth-430-million-charged" target="_blank" rel="noopener noreferrer nofollow">Russia may interfere in UK election, warns senior Democratic senator</a> (The Telegraph)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://arstechnica.com/security/2024/06/men-who-compromised-law-enforcement-database-admit-to-aggravated-id-theft/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=owners-of-empire-market-dark-web-store-worth-430-million-charged" target="_blank" rel="noopener noreferrer nofollow">Men plead guilty to aggravated ID theft after pilfering police database</a> (Ars Technica)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://arstechnica.com/security/2024/06/high-severity-vulnerabilities-affect-a-wide-range-of-asus-router-models/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=owners-of-empire-market-dark-web-store-worth-430-million-charged" target="_blank" rel="noopener noreferrer nofollow">High-severity vulnerabilities affect a wide range of Asus router models</a> (Ars Technica)</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://arstechnica.com/information-technology/2024/06/wells-fargo-fires-over-a-dozen-employees-for-simulating-keyboard-activity-at-work/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=owners-of-empire-market-dark-web-store-worth-430-million-charged" target="_blank" rel="noopener noreferrer nofollow">“Simulation of keyboard activity” leads to firing of Wells Fargo employees</a> (Ars Technica) </p></li></ul><hr class="content_break"><h3 class="heading" style="text-align:left;" id="todays-cyber-wall-of-shame">Today’s Cyber Wall of Shame</h3><p class="paragraph" style="text-align:left;">When <a class="link" href="https://x.com/vxunderground/status/1803592909117120715?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=owners-of-empire-market-dark-web-store-worth-430-million-charged" target="_blank" rel="noopener noreferrer nofollow">someone</a> thinks “cybersecurity” is considered a buzzword… in 2024.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/c987a4ec-9aea-4fa8-9af1-00b1cfcd442e/cyberbuzz.png?t=1718892269"/><div class="image__source"><a class="image__source_link" href="https://x.com/vxunderground/status/1803592909117120715?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=owners-of-empire-market-dark-web-store-worth-430-million-charged" rel="noopener" target="_blank"><span class="image__source_text"><p>h/t vx-underground on X</p></span></a></div></div><p class="paragraph" style="text-align:left;">Until next time…</p><p class="paragraph" style="text-align:left;"><b>Rob Waters</b><br><span style="font-size:0.8rem;">Founder</span><br><span style="font-size:0.8rem;">The Breach Report + Cybersecurity Careers Blog</span></p><p class="paragraph" style="text-align:left;"><br><span style="font-size:0.8rem;"><i><b>P.S. - </b></i></span><span style="font-size:0.8rem;"><i>Do you want to start a newsletter yourself? </i></span><br><span style="font-size:0.8rem;"><i><b>You can with beehiiv. </b></i></span><span style="font-size:0.8rem;"><i><b><a class="link" href="https://www.beehiiv.com?via=tbr&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=owners-of-empire-market-dark-web-store-worth-430-million-charged" target="_blank" rel="noopener noreferrer nofollow">Create one today with a free trial</a></b></i></span><span style="font-size:0.8rem;"><i><b>.</b></i></span><br><span style="font-size:0.8rem;">Disclaimer: The Breach Report may contain affiliate links. Read our </span><span style="font-size:0.8rem;"><a class="link" href="https://thebreach.report/c/advertising?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=owners-of-empire-market-dark-web-store-worth-430-million-charged" target="_blank" rel="noopener noreferrer nofollow">Advertising</a></span><span style="font-size:0.8rem;"> policy page.</span></p></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Snowflake customer data and credentials for sale on dark web</title>
  <description>Data breach affects over 165 customers, hundreds more likely</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/11101ba7-4c88-4558-9131-f7ce803ca97d/snowflake_breach.jpeg" length="158150" type="image/jpeg"/>
  <link>https://thebreach.report/p/snowflake-data-breach-malware</link>
  <guid isPermaLink="true">https://thebreach.report/p/snowflake-data-breach-malware</guid>
  <pubDate>Sun, 16 Jun 2024 16:00:00 +0000</pubDate>
  <atom:published>2024-06-16T16:00:00Z</atom:published>
    <dc:creator>Rob Waters</dc:creator>
    <category><![CDATA[Special Report]]></category>
    <category><![CDATA[News]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #82b984; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#95dd96; }
  .bh__table_header p { color: #2A2A2A; font-family:'Roboto',-apple-system,BlinkMacSystemFont,Tahoma,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><i>Welcome to the latest issue of </i><i><b>The Breach Report</b></i><i>, a cybersecurity newsletter from the creators of the </i><i><a class="link" href="https://www.cybercareers.blog?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-customer-data-and-credentials-for-sale-on-dark-web" target="_blank" rel="noopener noreferrer nofollow">Cybersecurity Careers Blog</a></i><i>. Be sure to subscribe via </i><i><a class="link" href="https://thebreach.report/subscribe?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-customer-data-and-credentials-for-sale-on-dark-web" target="_blank" rel="noopener noreferrer nofollow">email</a></i><i> or </i><i><a class="link" href="https://rss.beehiiv.com/feeds/SyvvEer2H8.xml?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-customer-data-and-credentials-for-sale-on-dark-web" target="_blank" rel="noopener noreferrer nofollow">RSS</a></i><i>.</i></p><div class="section" style="background-color:#007d04;border-color:#006503;border-radius:3px;border-style:solid;border-width:3px;margin:2.0px 2.0px 2.0px 2.0px;padding:2.0px 2.0px 2.0px 2.0px;"><p class="paragraph" style="text-align:left;"><span style="color:#FFFFFF;">This is a </span><span style="color:#FFFFFF;"><b>special report</b></span><span style="color:#FFFFFF;"> on the ongoing </span><span style="color:#FFFFFF;"><b>Snowflake</b></span><span style="color:#FFFFFF;"> data breach, which now includes over 165 customers, according to a joint investigation by Mandiant and Snowflake. </span><br><br><span style="color:#FFFFFF;">Its origins and root cause are still disputed, and hundreds of customers may still be affected. Customer data is now for sale on the dark web with an asking price of millions of dollars.</span></p></div><h2 class="heading" style="text-align:left;" id="165-customers-and-counting-snowflak">165 customers and counting: Snowflake data breach turning into one of the largest ever</h2><p class="paragraph" style="text-align:left;">If you haven’t followed the news, data cloud provider <b>Snowflake</b> suffered a highly damaging breach originating in April. Now, <a class="link" href="https://techcrunch.com/2024/06/05/snowflake-customer-passwords-found-online-infostealing-malware/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-customer-data-and-credentials-for-sale-on-dark-web" target="_blank" rel="noopener noreferrer nofollow">hundreds</a> of customer credentials and terabytes of data are <a class="link" href="https://www.wired.com/story/snowflake-breach-advanced-auto-parts-lendingtree/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-customer-data-and-credentials-for-sale-on-dark-web" target="_blank" rel="noopener noreferrer nofollow">for sale</a> on the dark web. </p><p class="paragraph" style="text-align:left;">The origin of the breach is in dispute; initial <a class="link" href="https://techcrunch.com/2024/06/05/snowflake-customer-passwords-found-online-infostealing-malware/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-customer-data-and-credentials-for-sale-on-dark-web" target="_blank" rel="noopener noreferrer nofollow">reports</a> stated that info-stealing malware infected numerous employees’ computers. Hackers then leveraged the infected employee devices to breach the enterprise platform and gain access to customer account data. </p><p class="paragraph" style="text-align:left;">Snowflake <a class="link" href="https://www.helpnetsecurity.com/2024/06/01/snowflake-breach-data-theft/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-customer-data-and-credentials-for-sale-on-dark-web" target="_blank" rel="noopener noreferrer nofollow">denied</a> the breach and blamed customers affected, such as Santander and Ticketmaster, for poor security of their credentials. They have since changed the definition of “breach” according to their </p><p class="paragraph" style="text-align:left;">Snowflake has vehemently denied that its enterprise network was breached and that customers were directly targeted with info-stealing malware to extract valid credentials without sophisticated identity hardening or multifactor authentication (MFA).</p><p class="paragraph" style="text-align:left;">“We are aware of recent reports related to a potential compromise of the Snowflake production environment. We have no evidence suggesting this activity was caused by any vulnerability, misconfiguration, or breach of Snowflake’s product,” the company shared in a <a class="link" href="https://community.snowflake.com/s/question/0D5VI00000Emyl00AB/detecting-and-preventing-unauthorized-user-access?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-customer-data-and-credentials-for-sale-on-dark-web" target="_blank" rel="noopener noreferrer nofollow">blog post</a>.</p><div class="image"><img alt="The attack path diagram of UNC5537 leverages an info-stealer malware to infect targeted users. Hackers then login with the stolen Snowflake credentials, without MFA enforced, and exfiltrate the customer data. " class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/e17f2831-21a0-4c50-b229-20300855dd54/snowflake-attack-path.jpg?t=1718551370"/><div class="image__source"><span class="image__source_text"><p>The attack path diagram of UNC5537 leverages an info-stealer malware to infect targeted users. Hackers then login with the stolen Snowflake credentials, without MFA enforced, and exfiltrate the customer data. (source: Mandiant)</p></span></div></div><p class="paragraph" style="text-align:left;">Cybersecurity firm Mandiant, now part of Google Cloud, continues investigating the incident with Snowflake. Mandiant has given the hacker group the name UNC5537. “UNC” represents an uncategorized group, which indicates that it is not an advanced persistent threat (APT) group.</p><p class="paragraph" style="text-align:left;">“UNC5537 is systematically compromising Snowflake customer instances using stolen customer credentials, advertising victim data for sale on cybercrime forums, and attempting to extort many of the victims,” Mandiant declared on its <a class="link" href="https://cloud.google.com/blog/topics/threat-intelligence/unc5537-snowflake-data-theft-extortion/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-customer-data-and-credentials-for-sale-on-dark-web" target="_blank" rel="noopener noreferrer nofollow">blog posting</a> of the ongoing investigation.</p><p class="paragraph" style="text-align:left;">The company’s blog and news section do not mention any cybersecurity incident. Snowflake social media only has two June posts denying internal breaches of Snowflake systems. </p><p class="paragraph" style="text-align:left;">These are the only statements by Snowflake on X denying any breach of its systems:</p><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/SnowflakeDB/status/1796972925360415225?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-customer-data-and-credentials-for-sale-on-dark-web"><p> Twitter tweet </p></a></blockquote><h2 class="heading" style="text-align:left;" id="snowflake-customer-data-for-sale-on">Snowflake customer data for sale on BreachForums</h2><p class="paragraph" style="text-align:left;">Despite the FBI <a class="link" href="https://thehackernews.com/2024/05/fbi-seizes-breachforums-again-urges.html?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-customer-data-and-credentials-for-sale-on-dark-web" target="_blank" rel="noopener noreferrer nofollow">seizing</a> the BreachForums domain and assets in May, the hackers responsible for operating the popular breach site cloned and started a new iteration on a new domain. </p><p class="paragraph" style="text-align:left;">Hacker group ShinyHunters, which helps administer the site, quickly posted Snowflake customer&#39;s data and credentials, such as Santander, Ticketmaster, and Cylance, for sale.</p><p class="paragraph" style="text-align:left;">Advance Auto Parts is among the customers listed, and hackers claim to have data on over 380 million of its customers. The asking price is $1.5 million for 3TB of data.</p><p class="paragraph" style="text-align:left;">BreachForums user Sp1d3r is selling up to 2TB of data from LendingTree and QuoteWizard for $2 million. The authenticity of the listings and the legitimacy of the hackers posting the sale offers are unclear.</p><h2 class="heading" style="text-align:left;" id="snowflake-customers-urged-to-enforc">Snowflake customers urged to enforce MFA, still not required by default</h2><p class="paragraph" style="text-align:left;">CISA has <a class="link" href="https://www.cisa.gov/news-events/alerts/2024/06/03/snowflake-recommends-customers-take-steps-prevent-unauthorized-access?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-customer-data-and-credentials-for-sale-on-dark-web" target="_blank" rel="noopener noreferrer nofollow">posted</a> an alert urging Snowflake customers to be aware and take preventative actions.</p><p class="paragraph" style="text-align:left;">Snowflake urges all customers to enable and enforce MFA and harden their security access. Other <a class="link" href="https://community.snowflake.com/s/article/Snowflake-Security-Overview-and-Best-Practices?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-customer-data-and-credentials-for-sale-on-dark-web" target="_blank" rel="noopener noreferrer nofollow">Snowflake platform best practices</a> are also recommended.</p><p class="paragraph" style="text-align:left;">The company recommends that its customers review the IoCs, investigative queries, and preventive actions published in the <a class="link" href="https://community.snowflake.com/s/article/Communication-ID-0108977-Additional-Information?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-customer-data-and-credentials-for-sale-on-dark-web" target="_blank" rel="noopener noreferrer nofollow">Snowflake Community Security Bulletin</a>.</p><p class="paragraph" style="text-align:left;">At the time of this publication, Snowflake still does not require its customers to enable and use MFA–nearly two months after the originating customer data breaches. </p><p class="paragraph" style="text-align:left;">TechCrunch <a class="link" href="https://techcrunch.com/2024/06/10/mandiant-hackers-snowflake-stole-significant-volume-data-customers?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-customer-data-and-credentials-for-sale-on-dark-web" target="_blank" rel="noopener noreferrer nofollow">reports</a> a company spokesperson said they are “developing a plan” to require customers to do so in the future.</p><p class="paragraph" style="text-align:left;">Snowflake stock (<a class="link" href="https://g.co/finance/SNOW:NYSE?window=1M&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-customer-data-and-credentials-for-sale-on-dark-web" target="_blank" rel="noopener noreferrer nofollow">$SNOW</a>) is down 22% in the last 30 days, losing over 37 million in market cap on the New York Stock Exchange.</p><h2 class="heading" style="text-align:left;" id="further-reading-on-the-snowflake-da">Further reading on the Snowflake data breach</h2><p class="paragraph" style="text-align:left;">If you’d like to read more about this breach, I highly recommend the following cybersecurity professional and blogger independent analysis:</p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.reco.ai/blog/what-we-can-learn-from-the-snowflake-data-breach?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-customer-data-and-credentials-for-sale-on-dark-web" target="_blank" rel="noopener noreferrer nofollow">Merritt Baer’s report</a> on Reco.ai</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://techcrunch.com/2024/06/10/mandiant-hackers-snowflake-stole-significant-volume-data-customers/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-customer-data-and-credentials-for-sale-on-dark-web" target="_blank" rel="noopener noreferrer nofollow">Zack Whittaker’s report</a> on TechCrunch</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://x.com/jukelennings?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-customer-data-and-credentials-for-sale-on-dark-web" target="_blank" rel="noopener noreferrer nofollow">Luke Jennings’ commentary</a> on X</p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://infosec.exchange/@mattburgess/112592639229875477?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-customer-data-and-credentials-for-sale-on-dark-web" target="_blank" rel="noopener noreferrer nofollow">Matt Burgess (Wired) on infosec.exchange</a> Mastodon and his <a class="link" href="https://www.wired.com/story/snowflake-breach-advanced-auto-parts-lendingtree/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-customer-data-and-credentials-for-sale-on-dark-web" target="_blank" rel="noopener noreferrer nofollow">Wired reporting</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://cloud.google.com/blog/topics/threat-intelligence/unc5537-snowflake-data-theft-extortion/?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-customer-data-and-credentials-for-sale-on-dark-web" target="_blank" rel="noopener noreferrer nofollow">Mandiant’s ongoing investigation of UNC5537</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://x.com/riskybusiness/status/1802114587904647499?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-customer-data-and-credentials-for-sale-on-dark-web" target="_blank" rel="noopener noreferrer nofollow">Patrick Gray / RiskyBusiness</a> on X</p></li></ul><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><hr class="content_break"></div><h3 class="heading" style="text-align:left;" id="todays-cyber-wall-of-shame">Today’s Cyber Wall of Shame</h3><p class="paragraph" style="text-align:left;">Snowflake is the gift that keeps on giving.</p><blockquote align="center" class="twitter-tweet"><a href="https://twitter.com/laurenbalik/status/1802049651732021710?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-customer-data-and-credentials-for-sale-on-dark-web"><p> Twitter tweet </p></a></blockquote><p class="paragraph" style="text-align:left;">Until next time…</p><p class="paragraph" style="text-align:left;"><b>Rob Waters</b><br><span style="font-size:0.8rem;">Founder</span><br><span style="font-size:0.8rem;">The Breach Report + Cybersecurity Careers Blog</span></p><p class="paragraph" style="text-align:left;"><br><span style="font-size:0.8rem;"><i><b>P.S. - </b></i></span><span style="font-size:0.8rem;"><i>Do you want to start a newsletter yourself? </i></span><br><span style="font-size:0.8rem;"><i><b>You can with beehiiv. </b></i></span><span style="font-size:0.8rem;"><i><b><a class="link" href="https://www.beehiiv.com?via=tbr&utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-customer-data-and-credentials-for-sale-on-dark-web" target="_blank" rel="noopener noreferrer nofollow">Create one today with a free trial</a></b></i></span><span style="font-size:0.8rem;"><i><b>.</b></i></span><br><span style="font-size:0.8rem;">Disclaimer: The Breach Report may contain affiliate links. Read our </span><span style="font-size:0.8rem;"><a class="link" href="https://thebreach.report/c/advertising?utm_source=thebreach.report&utm_medium=newsletter&utm_campaign=snowflake-customer-data-and-credentials-for-sale-on-dark-web" target="_blank" rel="noopener noreferrer nofollow">Advertising</a></span><span style="font-size:0.8rem;"> policy page.</span></p></div></div>
  ]]></content:encoded>
</item>

  </channel>
</rss>
