Welcome to Ironshare’s Cyber Round-up, where we look back at the events of that last week to cover some of the news, posts, views, and highlights from the world of Security.
In this week’s round-up:
The FBI has recovered over 7,000 decryption keys from the LockBit ransomware group and is urging victims to contact them to recover encrypted data for free. This follows "Operation Cronos," an international effort that led to the seizure of 34 servers in February 2024, aiding in the creation of a free LockBit 3.0 decryptor. Despite these efforts, LockBit remains active, targeting victims and leaking data. The U.S. State Department offers significant rewards for information leading to the arrest of LockBit leaders and affiliates.
By bleepingcomputer.com
Several London hospitals, including those under King’s College and Guy’s and St Thomas’ hospital trusts, have had to cancel operations and appointments due to a ransomware attack on Synnovis, a pathology laboratory services provider. The cyberattack has disrupted all Synnovis IT systems, significantly impacting services like blood transfusions. NHS England's London region is working with the National Cyber Security Centre to assess and manage the situation. This incident underscores the ongoing vulnerability of healthcare systems to ransomware attacks.
For more details, you can read the full article here.
By securityweek.com
Russian hacker group NoName claimed responsibility for a cyberattack on Santa Barbara Systems, a General Dynamics subsidiary in Spain, which refurbishes Leopard tanks for Ukraine. The group executed a distributed denial-of-service (DDoS) attack, causing the company to temporarily disconnect its website. Despite the attack, General Dynamics reported no compromised systems and confirmed ongoing investigations. This incident aligns with NATO's assertion that Russia has intensified hybrid attacks on companies and infrastructure in member states. Spain recently pledged significant military support for Ukraine, including Leopard 2A4 tanks.
By reuters.com
A recent internal leak at Google has unveiled a significant number of privacy breaches over the past six years. The database, obtained by 404 Media, contains thousands of reports detailing privacy and security incidents involving various Google products, from Street View capturing license plate images to children's voices being recorded through Google's voice services. The incidents, reported by Google employees between 2013 and 2018, include both minor and severe breaches, such as the exposure of over a million email addresses on Socratic.org and unauthorized access to YouTube admin accounts to leak Nintendo game videos. Despite these breaches, the database also shows Google's internal efforts to investigate and address these concerns, although the lack of public disclosure raises questions about the company's transparency practices
By cybernews.com
Stay Safe, Secure and Healthy!
Edition #277 – 7th June 2024
Stuart Hare is a Technologist with a passion for helping people in all aspects of IT & Cyber Security. Stuart is the Founder of Ironshare, an Information and Cyber Security company providing consultancy and managed services.
Samuel is a Security Analyst with Ironshare, an Information and Cyber Security company providing Security consultancy and managed services.
Joshua is working as a Managed Service Lead with Ironshare, an Information and Cyber Security company providing Security consultancy and managed services.