EasyJet's disclosure of a "highly sophisticated cyber-attack", which occurred in January 2020, impacting 9 million of their customers was the biggest cybersecurity story of May 2020 in the UK. Although no details about this 'cyber-attack' were disclosed, other than 2,208 customers had their credit card details accessed.
Using terms like "highly sophisticated" without providing any actual details of the cyberattack makes one think back to when TalkTalk CEO Dido Harding described a cyber-attack as "significant and sustained cyber-attack" in 2015. In TalkTalk's case, that cyber attack turned out to be a bunch of teenage kids taking advantage of a then 10-year-old SQL injection vulnerability. City A.M. described Dido's responses as "naive", noting when asked if the affected customer data was encrypted or not, she replied: "The awful truth is that I don’t know". Today Dido is responsible for the UK governments Track, Test and Trace application, which no doubt will ring privacy alarms bells with some.
Back to the EasyJet breach, all we know is the ICO and the NCSC are supporting UK budget airline, EasyJet said "We take issues of security extremely seriously and continue to invest to further enhance our security environment. There is no evidence that any personal information of any nature has been misused, however, on the recommendation of the ICO, we are communicating with the approximately nine million customers whose travel details were accessed to advise them of protective steps to minimise any risk of potential phishing. We are advising customers to be cautious of any communications purporting to come from EasyJet or EasyJet Holidays."
It will be interesting to see the DPA enforcement line Information Commission's Office (ICO) adopts with EasyJet, especially considering the current COVID-19 impact on the UK aviation industry. Some security commentators have called ICO a "Toothless Tiger" in regards to their supportive response, an ICO label I've not heard since long before the GDPR came into force. But the GDPR still has a sting its tail beyond ICO enforcement action in the UK, in that individuals impacted by personal data breaches can undertake a class-action lawsuit. So then, it can be no real surprise to law firm PGMBM announce it has issued a class-action claim in the High Court of London, with a potential liability of an eye-watering £18 billion!. If successful, each customer impacted by the breach could receive a payout of £2,000.
The 2020 Verizon Data Breach Investigations Report (DBIR) was released, the most valuable annual report in the cybersecurity industry in my humble opinion. The 2020 DBIR used data compiled before COVID-19 pandemic. The report analyses 32,002 security incidents and 3,950 confirmed breaches from 81 global contributors from 81 countries.
- 86% of data breaches for financial gain - up from 71% in 2019
- 43% web application (cloud-based) - these attacks have doubled, reflecting the growth in the use of cloud-based services.
- 67% of data breaches resulted from credential theft, human error or social attacks.
- Clearly identified cyber-breach pathways enable a “Defender Advantage” in the fight against cyber-crime
- On-going patching successful - fewer than 1 in 20 breaches exploit vulnerabilities
- 70% with organised crime accounting for 55% of these.
- Credential theft and social attacks such as phishing and business email compromises cause the majority of breaches (over 67%), specifically:
- 37% of credential theft breaches used stolen or weak credentials,
- 25% involved phishing
- Human error accounted for 22%
REvil (aka Sodinokibi) hackers are said to have stolen celebrity data from a law firm 'Grubman Shire Meiselas & Sacks'. With 756 gigabytes of personal data, emails, and contract details were taken, including Lady Gaga, Madonna, Elton John, Barbara Streisand, Bruce Springsteen and Mariah Carey to name a few.
Pitney Bowes was hit with ransomware for the second time in 7 months. Pitney Bowes said attackers breached company systems and accessed “a limited set of corporate file shares” that “contained information used by our business teams and functional groups to conduct business-related activities.” News reports state the Maze ransomware group is behind the attack, threatening to post confidential if Pitney Bowes does not pay up.
Amazon's UK website was defaced with racist abuse, which appeared on multiple listings on its UK website. Amazon has not disclosed how long the racist language remained on the site, but it sparked outrage on Twitter, Amazon said: "We investigated, removed the images in question and took action against the bad actor".
- Passwords are and have always been an Achilles Heel in CyberSecurity
- Cyber Security Roundup for May 2020
- EasyJet admits Nine Million Customers Accounts have been Hacked
- Hackers Extort Law Firm of Lady Gaga, Drake and Madonna, stealing 756 Gig of Contracts & Emails
- Pitney Bowes hit with Second Ransomware Attack
- Amazon UK Website Defacedwith Racist Abuse
- Serco Apologises for SharingContact Tracers’ Email Addresses
- 26Million LiveJournal bloggers’ Credentials a hit on Dark Web Six Years Later
- Malicious Actor holds at least 31 Stolen SQL Databases for Ransom
- Fresh UK Review into HuaweiRole in 5G networks
- Dark Web Scammers ExploitCovid-19 Fear and Doubt
- Cybersecurityamong Six Sectors Booming during Covid-19, with Q1 Funding Exceeding £1 Billion
- £1Million UK Defence innovation funding for Cyber and Physical integration
- SixCisco Servers Compromised when Hackers Exploited SaltStack Salt Flaws
- Microsoft Patches 111 Vulnerabilities
- AdobeReader and Acrobat Patch Tuesday Releases
- VMware issues workarounds for Salt Vulnerabilities in vRealize Operations Manager
- MozillaPatches Three Critical Vulnerabilities in Firefox
- CiscoPushes out almost Three Dozen Security Updates
- Apple Release Security Patch for macOS Catalina
- GoogleRelease Security Patch for Chrome Browser
- StrandHogg 2.0 Flaw allows Hackers to Hijack almost any Android app
- FBI, CISA warn China Targeting organisations conducting COVID-19-related Vaccine, TreatmentResearch
- COVID-19Inspires Nigerian Scammers to Launch Waves of BEC Campaigns
- CISA Releases Analysis of ThreeHidden (North Korea) Cobra Malware Variants
- HackerGroup Announces Jailbreak for iOS 11 – 13.5
- Form-BasedPhishing Attacks Impersonate Branded File-Sharing and Productivity Sites
- Turla’sComRAT v4 uses Gmail Web UI to Receive Commands and Steal Data
- WolfRATMalware Targets WhatsApp, Messenger
- Crypto-jacking'Scorching-hot Hacked Computer Burned my Hand'