BlogNews
18 JUL, 2024

The Cybersecurity Express – July 18, 2024

Cybourn Media Hub

You stand on the platform, the crisp morning air tingling with anticipation. The sound of an approaching train grows louder, stirring a sense of excitement. This isn’t just any train—it’s The Cybersecurity Express, your gateway to the latest and most vital cybersecurity news. As the sleek, futuristic train glides into view, its polished metal gleaming in the early light, you can almost feel the pulse of information waiting to be discovered.

With a gentle hiss, the doors open, inviting you into a world of digital intrigue and protection. You step inside, the carriage hums softly with an aura of urgency and importance. The conductor nods, signaling the start of an enlightening journey. Each stop promises to unravel a new story, a fresh update in the ever-evolving landscape of cybersecurity. Settle in, as the journey ahead will be filled with crucial insights and breaking news that will keep you ahead in the digital age.

Major Data Breach at 2invoice.ro: 1.8 Million Customer Records Exposed

In a concerning cybersecurity incident, over 1.8 million customers personal records from 2invoice.ro, an online Romanian invoicing service, have been exposed and put up for sale by hackers on Telegram. Among the affected are more than 600,000 customers of the online retail giant Emag. The breach, disclosed by cybersecurity expert Bogdan Albei, includes approximately four million online invoices, revealing personal and fiscal data but reportedly not banking details.

The breach was discovered on July 17, 2024, when hackers posted evidence of their access to 2invoice.ro’s database. This evidence included screenshots indicating the compromised data. The hackers are selling the entire dataset for €4,000. 2invoice.ro responded by stating that they are investigating the incident and will report it as required by legislation. They acknowledged the apparent validity of the data breach, particularly the list of clients from their tables, which includes companies they work with.

Four days prior, Albei had announced a separate incident involving the auctioning of personal information of five million Romanians by another hacker group. He highlighted that phishing attacks and similar breaches occur almost weekly, with many incidents not being publicly disclosed.

Albei mentioned that the breach at 2invoice.ro could have resulted from a software vulnerability or a successful phishing email. While the breach does not seem to include Emag’s banking data or access credentials, the personal and fiscal information leaked can still be highly damaging, containing both individual and corporate information, which could be misused for malicious purposes.

Cybersecurity experts at Emag reassured it’s customers that their data is not directly affected by this breach, as the platform does not work with 2invoice.ro. However, some Emag partners who use 2invoice.ro for invoicing might have had their customer data compromised.

This incident underscores the importance of robust cybersecurity measures and the need for continuous monitoring and improvement of security protocols to protect sensitive information from cyber threats.

SAP AI Core Vulnerabilities Expose Enterprises to Attacks

In a significant cybersecurity revelation, researchers have discovered critical vulnerabilities in SAP’s AI Core, potentially exposing enterprises to severe risks. These flaws enable unauthorized access to customers’ private artifacts and credentials in cloud environments such as Amazon Web Services (AWS), Microsoft Azure, and SAP HANA Cloud. Additionally, attackers could modify Docker images on SAP’s internal container registry, Google Container Registry, and artifacts on SAP’s internal Artifactory server, posing a substantial supply chain attack threat and gain

The vulnerabilities can be weaponized to gain cluster administrator privileges on SAP AI Core’s Kubernetes cluster. This is possible due to the Helm package manager server’s exposure to read and write operations. The access obtained through these vulnerabilities can significantly disrupt business operations and compromise sensitive data. To keep SAP customers relatively safe before patches are released, the researchers keep most of the key details and techniques private.

The researchers are keeping a close eye on the cybercriminal group NullBulge, known for targeting AI- and gaming-focused entities since April 2024, as these types of vulnerabilities seem to be favored by the group. NullBulge aims to steal sensitive data and sell compromised OpenAI API keys on underground forums, masquerading as a hacktivist crew “protecting artists around the world” against AI. Jim Walter from SentinelOne highlighted that “NullBulge targets the software supply chain by weaponizing code in publicly available repositories on GitHub and Hugging Face, leading victims to import malicious libraries, or through mod packs used by gaming and modeling software.”

The implications of these vulnerabilities are far-reaching, potentially leading to severe data breaches and operational disruptions. SAP will soon release patches for the affected versions, and enterprises are urged to apply these patches immediately. Detailed instructions and patch links will be found on SAP’s official security advisory page. Organizations should also review their security configurations, implement network segmentation, enforce strict access controls, and conduct regular security audits to mitigate risks.

The discovery of these vulnerabilities in SAP AI Core underscores the critical need for robust cybersecurity measures and for safe and steady implementation of AI as it requires running arbitrary code by definition, for self-training; therefore, appropriate guardrails should be in place to assure that untrusted code is properly separated from internal assets and other tenants. Staying informed and proactive in applying security updates is essential to protect against evolving cyber threats.

Interpol Takes Down West African Cybercrime Ring

In a significant victory against cybercrime, Interpol has dismantled a notorious West African cybercriminal network responsible for large-scale online fraud, all over the world. The operation, known as “Operation Jackal III” targeted criminals engaged in various cyber scams, including financial fraud, phishing, vishing and crypto scams. The coordinated effort resulted in the arrest of 300 individuals, the seizure of numerous assets, and the recovery of substantial illicit funds.

Operation Jackal III, led by Interpol and involving multiple law enforcement agencies across 20 countries, aimed to disrupt the activities of a cybercriminal network that has defrauded thousands of victims worldwide. The operation also led to the closure of 750 bank accounts, the seizure of $3 million worth of assets and the interception of $1.2 million in high-quality counterfeit banknotes, known as supernotes.

The cybercriminals employed sophisticated methods to execute their scams. They used phishing emails to gain access to business email accounts, then monitored communications to identify potential targets. Once a target was identified, the criminals would send fraudulent emails from the compromised account, instructing the recipient to transfer funds to an account controlled by the criminals. They also extensively targeted elderly victims, organizing complex stalking operations, then using the information gathered to trick the victims via text messages or call, impersonating banks, charities and utility companies. They also created fake cryptocurrency campaigns or false investment platforms that tricked inexperienced victims to invest. These scams have caused significant financial losses to businesses globally.

Operation Jackal highlighted the power of global collaboration in fighting cybercrime. Interpol’s Cyber Fusion Center played a crucial role, leveraging its cybercrime intelligence and investigation capabilities. The use of advanced tools such as Interpol’s I-24/7 secure communication network facilitated real-time information sharing among participating countries. This coordinated approach enabled law enforcement agencies to act swiftly and effectively, dismantling the criminal network and preventing further financial losses.

The successful take down of this cybercriminal network is a testament to the power of international cooperation in combating cybercrime. It underscores the importance of robust cybersecurity measures and vigilance in protecting against sophisticated online scams. Law enforcement agencies worldwide must continue to collaborate and share intelligence to stay ahead of evolving cyber threats.

The operation also serves as a warning to cybercriminals that international boundaries are not barriers to justice. By pooling resources and expertise, global law enforcement can effectively counter complex cyber threats, ensuring a safer digital environment for everyone.

Kaspersky Exits US Market Following Government Ban

Russian cybersecurity firm Kaspersky has announced its exit from the US market following a ban imposed by the US government. This move comes after years of scrutiny over potential security risks associated with the company’s software, with concerns that Kaspersky could be compelled to assist Russian intelligence agencies. The ban, which prevents federal agencies from using Kaspersky products, has significantly impacted the company’s operations and reputation in the US. Kaspersky has decided to cease its US operations entirely in response to these challenges.

The decision to exit the US market marks a significant shift for Kaspersky, which once held a substantial share of the cybersecurity software market in the region, with a presence in the cybersecurity space for over 20 years. The company has consistently denied any allegations of wrongdoing or collaboration with Russian intelligence, emphasizing its commitment to user security and privacy.

These drastic actions and reactions show just how destabilizing a conflict is, even in the tech industry. Although there is no direct proof of this, the stakes are too high even to take the risk. The move also comes as a show of disapproval of the way Russia chose to handle this delicate matter and is one of the many sanctions that the world has encumbered upon Russia.

This series of cybersecurity incidents underscores the critical importance of robust cybersecurity measures and the need for constant vigilance. From the significant data breach at 2invoice.ro to the vulnerabilities in SAP AI Core, the take down of a West African cybercrime ring by Interpol, and Kaspersky’s exit from the US market, these events highlight the evolving and persistent nature of cyber threats. Staying informed and proactive is essential for protecting sensitive information and maintaining security.

Thank you for joining us on The Cybersecurity Express. Your commitment to staying informed helps fortify our collective digital defenses. We look forward to welcoming you back for more insightful content on the latest in cybersecurity. Stay safe and vigilant.

Share

We Also Recommend to See:

EtherLast™
The versatile platform that allows you to promptly detect complex threats, analyse and respond to them from a single pane of glass.
Dreamlab
CyBourn's DreamLab pushes the boundaries of innovation in the cyberspace.

Tell us about your Cybersecurity needs

We are strategists, engineers, analysts, and governance experts embedded in the world’s biggest cyber missions and trusted to advance them. Let us help you today.