Join us as we take a look at the top cybersecurity stories that caught our attention in April
1- Data Breach at the Ordre des Infirmières et Infirmiers du Québec
Hackers have stolen personal information of members of the Ordre des infirmières et infirmiers du Québec following a ransomware attack. The compromised data, found on the dark web, includes contact details, social insurance numbers, and dates of birth, as well as complete documents such as health insurance cards and driver's licenses. The Ordre confirmed a cyberattack and a ransom demand of $200,000 USD. The investigation is still ongoing according to La Presse.
2- Nouveau cadre pour les objets connectés au Royaume-Uni
In the United Kingdom, a new law has been enacted to regulate the Internet of Things. This law applies to any device that can connect to the Internet or a network, focusing primarily on consumer products. It mandates stronger password requirements, sets forth policies for disclosing vulnerabilities to consumers, and governs the reporting of security incidents. Will we soon see a similar compliance framework in Quebec? Learn more at: https://www.kereon.com/en/conformit%C3%A9.
3- Rolling Smishing Alert!
The FBI has issued a warning about a sophisticated SMS phishing (smishing) scam targeting motorists. Fraudsters send fake toll notifications to steal money and personal data. Active since March 2024 and already spotted in several states, this scam sends SMS messages to victims claiming they have unpaid toll debts and directs them to phishing sites posing as legitimate toll service websites. While this scam is particularly prevalent in the United States, it is also relevant globally, including in Canada, where provinces like Quebec have toll facilities such as highways 25 and 30. To protect yourself, always verify toll debts through official websites or customer service numbers. Forewarned is forearmed!
4- BatBadBut Batch !
Four vulnerability reports (CVE-2024-1874, CVE-2024-22423, CVE-2024-24576, CVE-2024-3566) have been assigned to the BatBadBut vulnerability, identified by researcher RyotaK. This flaw exploits the handling of batch files (.bat, .cmd) in the Windows PATHEXT environment variable, allowing the execution of unauthorized commands. Organizations should promptly review and update their security protocols, apply patches from language maintainers, and strengthen input validation to mitigate these risks. the articles from Security Affairs and Security Week, providing thorough insights and suggested security measures.
5- Un développeur Utils
It wasn't an April Fool's joke! (https://www.rapid7.com/blog/post/2024/04/01/etr-backdoored-xz-utils-cve-2024-3094/) A vulnerability was discovered by an exceedingly attentive Microsoft employee. Developer Andres Freund noticed a few microseconds' worth of debt on his processor time. Investigating this anomaly, he uncovered and reported a backdoor in the programming of the XZ Utils software. This application, found on the vast majority of systems, is designed for lossless data compression. A compromise of this application could enable a malicious actor to infiltrate all affected systems. This vulnerability echoes the log4j incident! A well-trained developer is a secure developer!
Follow us on LinkedIn for all the latest cyber news.
Comments