Ninja News! : A Weekly Roundup of Cybersecurity News and Updates

We are kicking off Privacy Ninja’s very first Medium blog with a roundup article on cyber news this week! *applause

To begin with, there had been few major data breach incidents recorded in a span of seven days. This goes to show that the pandemic is really affecting the cyber landscape especially when it comes to security.

It seems like cybercriminals love to WFH too!

Major data breaches on three major companies

Last Sunday, the leading Swiss price comparison platform Comparis notified its valued customers of a data breach. This is a week following a ransomware attack which took down their entire network.

“Should your data be affected, we cannot rule out the possibility of it being used by third parties for commercial or fraudulent purposes,” the company warns.

On the same day, Campbell Conroy & O’Neil, P.C. (Campbell), a US law firm which counsels dozens of Fortune 500 and Global 500 companies, has disclosed a data breach following a February 2021 ransomware attack incident.

Unfortunately, Campbell didn’t reveal the identity of the ransomware group behind the attack.

A third major ransomware attack happened last Tuesday, which dates back to March 2021. CNA Financial’s network, catering to hundreds of insured individuals, was breached via a fake browser update.

The alleged perpetrator was Phoenix CryptoLocker operators.

CNA has said that “there is no evidence that the threat actor viewed, retained or shared the exported data and, thus, no risk of harm to individuals arising from the incident.”

Next we go to some international dispute;

A brewing conflict between tech giants

China is in the hot seat as US and allies, including the European Union, the United Kingdom, and NATO, officially blame it for this year’s widespread Microsoft Exchange hacking campaign.

To keep you in the loop, these early 2021 cyberattacks targeted over a quarter of a million Microsoft Exchange servers, belonging to tens of thousands of organizations worldwide.

On a related note, the US Department of Justice (DOJ) indicted four members of the Chinese state-sponsored hacking group known as APT40 last Monday. This is with regard to APT40’s hacking of various companies, universities, and government entities in the US and worldwide between 2011 and 2018.

Could this be tied up to China’s move to develop cyberattacks capable of disrupting US pipeline operations? Hmm..

Just 2 days ago, Wednesday, Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) issued a joint advisory that Chinese state-sponsored attackers have breached 13 US oil and natural gas (ONG) pipeline companies way back 2011–2013.

This is developing news so be sure to check out our next week’s release!

Finally, we give you a quick overview of the new malwares in the cyber landscape to keep tab on.

MosaicLoader and XLoader, has joined the game

Bitdefender researchers have confirmed a novel malware posing as a cracked software via search engine advertising. MosaicLoader is a malware downloader designed by its creators to deploy more second-stage payloads on infected systems.

A more niche-specific malware which is known to steal information from Windows systems, was also reported this week to have been modified. The “new and improved” malware can now target macOS. This is definitely the upgrade we never want!

The revamped malware is dubbed as XLoader. Sounds like a console right?

That’s a wrap for this week’s happenings on cybersecurity. Never miss important updates on data breaches, new data protection policies, and other techno trends by following Privacy Ninja!