We're back with your go-to source for the freshest and most crucial updates from the world of cyber security. 

 

1. LockBit Ransomware gang claims cyber attack against Querétaro Intercontinental Airport in Mexico City and begins leaking Boeing data

On October 30th, the Querétaro Intercontinental Airport near Mexico City experienced a cyber security breach. An intensive investigation was launched to gauge the impact and details of the incident. The LockBit ransomware group has taken credit for this cyber-attack, listing the airport on its data leak site and issuing a ransom demand with a deadline of November 27th, threatening to publish the stolen data if their demands are not met. This event comes on the heels of a similar assault on Boeing, where the group started to leak sensitive information this week. 

The leaked Boeing data, revealed on LockBit's dark web platform, contains sensitive details, including specifics on engine part suppliers, technical operators, and Boeing's confidential financial and marketing data. LockBit's disclosure also suggested that Boeing may have ignored warnings from the group, indicating a refusal to pay the ransom. 

Active since late 2019, LockBit has gained notoriety for its advanced ransomware attacks. The latest, known as LockBit 3.0, is deemed the most sophisticated to date. The group is responsible for more than 1,400 attacks worldwide and is reported to have collected substantial ransoms in Bitcoin. 

2. Transnational cybercrime gang crippled by joint intelligence operation 

This week the Royal Malaysia Police announced the dismantling of an international cybercrime syndicate, active since 2015, offering phishing-as-a-service. The major operation was successful due to collaboration with Australian and American law enforcement.  

Eight individuals were arrested, including seven Malaysian men and one Thai woman, following the sharing of critical intelligence by the Australia Federal Police and the FBI. The Sabah-based syndicate sold phishing kits and services under the name BulletProftLink. The group compromised various websites, including financial, educational, and government entities, mainly in Australia. 

The syndicate's operations involved selling stolen credentials from phishing scams. The Malaysian police's Commercial Crimes Investigation Department uncovered a significant money trail and linked the syndicate to two investment scams, with losses totaling over RM1.2 million based on 37 lodged reports. 

During raids across multiple locations, including Technology Park Malaysia, the authorities seized servers, a cryptocurrency wallet worth approximately RM965,808.80 ($2,06215.25), electronics, jewelry, and vehicles. Investigations have led to the opening of 17 investigation papers under the Computer Crimes Act and the Penal Code. A software developer from Sabah, was revealed to be responsible for creating the phishing templates and had full access to the phishing website.  

“We believe the credentials stolen through their phishing services are then sold on the dark web,” Malaysian Police said. 

3. 665,000 customer details impacted in Marina Bay Sands data breach 

The Marina Bay Sands (MBS) resort in Singapore has reported a data breach affecting the personal details of 665,000 customers. The breach, which was identified on October 20, resulted from unauthorized access to the MBS loyalty program database on October 19 and 20. 

The compromised data includes customers' names, email addresses, mobile and phone numbers, countries of residence, and loyalty membership numbers and tiers. This breach could potentially expose MBS customers to targeted scams, phishing, and social engineering tactics. 

The breach announcement assured that there is no evidence suggesting that the Sands Rewards Club casino members have been affected by this security incident. 

MBS said it has notified all affected customers of the breach and the subsequent risks. Following the breach, MBS promptly informed the necessary authorities in Singapore and internationally. 

The exact scale and nature of the breach remain unclear, but the pattern of the attack suggests it could be linked to a ransomware incident, where perpetrators often seize data and demand a ransom. As of the latest reports, no ransomware group has taken responsibility for the breach at Marina Bay Sands. 

“These kind of breaches occur due to threat actors using social engineering to bait the users into giving their credentials or one-time codes to bypass multi-factor authentication. Others is security and configuration negligence; resorts like these have guest and internet facing networks, that can allow the threat actors to gain access if they are not configured correctly or the latest vendor software updates have not been installed which tackle vulnerabilities,” says Integrity360 IR analyst Durali Cingit.  

4. US, South Korea, and Japan forge high-level cyber security group to thwart North Korean digital threats 

The United States, South Korea, and Japan are forming a high-level consultative group to counter North Korean cyber threats, which are believed to finance its weapons programs. Announced by South Korea's presidential office, this tripartite group aims to strengthen joint response capabilities against global cyber threats and to devise strategies to block North Korea's cyber-aided funding of its nuclear and WMD development. Meetings will occur quarterly. 

The formation of this group comes in the wake of the FBI linking North Korea to significant cryptocurrency hacks, including thefts from Harmony’s Horizon bridge and Sky Mavis’ Ronin Bridge, part of a larger trend identified with $3.8 billion stolen in 2022 alone. 

Moreover, a bilateral working group involving South Korea and Australia is being established to coordinate against common threats. This initiative aligns with increased cyber cooperation in the Pacific, such as the Quad Cybersecurity Partnership between the U.S., India, Japan, and Australia, which focuses on securing software, supply chains, and data, amidst concerns about Chinese cyber activities and geopolitical tensions.

If you're concerned about any of the threats mentioned in this bulletin or need guidance on the necessary steps to safeguard your organization from significant risks, please don't hesitate to reach out. We're here to help you understand your options and protect your organization effectively.

Get in touch with us today to explore the best ways to secure your business.

Column Header Text Column Header Text Column Header Text

Their work should have not stopped there because achieving compliance is an occasional result that doesn't ensure a continual protection.

Their work should have not stopped there because achieving compliance is an occasional result that doesn't ensure a continual protection.

  • Their work should have not stopped there because achieving
  • Their work should have not stopped there because achieving
  • Their work should have not stopped there because achieving
  • Their work should have not stopped there because achieving

Their work should have not stopped there because achieving compliance is an occasional result that doesn't ensure a continual protection.

Their work should have not stopped there because achieving compliance is an occasional result that doesn't ensure a continual protection.

Their work should have not stopped there because achieving compliance is an occasional result that doesn't ensure a continual protection.

Performing a review of the media inventories at least annually

Performing a review of the media inventories at least annually

Performing a review of the media inventories at least annually

Row Header Text

Lorem ipsum dolor sit

Lorem ipsum dolor sit

23

Row Header Text

Lorem ipsum dolor sit

Lorem ipsum dolor sit

23

Row Header Text

Lorem ipsum dolor sit

Lorem ipsum dolor sit

23

Row Header Text

Lorem ipsum dolor sit

Lorem ipsum dolor sit

23

Row Header Text

Lorem ipsum dolor sit

Lorem ipsum dolor sit

23

Row Header Text

Lorem ipsum dolor sit

Lorem ipsum dolor sit

23

Row Header Text

Lorem ipsum dolor sit

Lorem ipsum dolor sit

23

Row Header Text

Lorem ipsum dolor sit

Lorem ipsum dolor sit

23

Discover More

Advantio_Blog_DNS_Diagram_V1 Image caption goes here. This is HTML text.

Matthew Olney

Written by

Matthew is Integrity360’s Content Marketing Specialist and has worked in cyber security for over 6 years being nominated for a national cyber writing award in 2019. He turns complicated cyber security into simpler language designed to help everyone get to grips with this vitally important topic.

Schedule a call with an expert

WHAT OUR EXPERTS HAVE TO SAY