Project

Profile

Help

Task #154458

open

this week in security — january 12 edition

Added by Zack Whittaker (this@weekinsecurity.com) from Zack Whittaker 6 days ago.

Status:
Open
Priority:
Normal
Assignee:
-
Category:
-
Start date:
01/12/2025
Due date:
% Done:

0%

Estimated time:
Company:
Zack Whittaker
Contact person:
Zack Whittaker
Additional contact persons:
-

Description

Huge breach of location data, PowerSchool data breach, China hack of Treasury deepens, and more.

volume 8, issue 2
View this email in your browser (https://mailchi.mp/weekinsecurity/this-week-in-security-january-12-2025-edition?e=9d10de3b61) | RSS (https://us18.campaign-archive.com/feed?u=e1ad6038c994abec17dafb116&id=a2457dc8ad)

~ ~

Japan links Chinese hacker MirrorFace to dozens of cyberattacks (https://apnews.com/article/japan-police-cyberattack-china-government-68adcb293b2931da4c30ca0279720124)
Associated Press: Japan blamed a China-backed hacking group called MirrorFace for being behind dozens of cyberattacks targeting the Japanese government and tech companies across the country in a multi-year hacking spree since 2019. MirrorFace sent emails with malware and targeted VPNs to get access to internal networks. It's the latest warning about Japan's cybersecurity posture of late; in 2023, @ellenwapo (https://bsky.app/profile/ellenwapo.bsky.social) reported that China hacked (https://www.washingtonpost.com/national-security/2023/08/07/china-japan-hack-pentagon/) some of Japan's most sensitive networks — to a point where the U.S., a major ally of Japan, was getting reeeeally concerned with its own secrets.
More: NPA.go.jp (https://www.npa.go.jp/bureau/cyber/koho/caution/caution20250108.html) | Kyodo News (https://english.kyodonews.net/news/2025/01/3de655117007-210-hacks-made-on-jaxa-other-japan-targets-by-china-group-since-2019.html) | TechCrunch (https://techcrunch.com/2025/01/08/japan-says-chinese-hackers-targeted-its-government-and-tech-companies-for-years/)

China hackers targeted Treasury's CFIUS office in December breach (https://www.cnn.com/2025/01/10/politics/chinese-hackers-breach-committee-on-foreign-investment-in-the-us/index.html)
CNN: Speaking of China... looks like we have another member of the Typhoon family (https://techcrunch.com/2024/10/13/meet-the-chinese-typhoon-hackers-preparing-for-war/) to add to our bingo card. Silk Typhoon (previously Hafnium — yes — of that mass email hacking fame (https://techcrunch.com/2021/03/10/america-small-business-hafnium-exchange-hacks/) ) is back with a new campaign (https://www.bloomberg.com/news/articles/2025-01-08/white-house-rushes-to-finish-cyber-order-after-china-hacks) targeting the U.S. Treasury. It started with a December breach of a BeyondTrust private key that allowed remote access to Treasury employee workstations and unclassified documents. Then, the Treasury's OFAC office (https://www.washingtonpost.com/national-security/2025/01/01/treasury-hack-china/) for imposing financial sanctions was hacked; and now CNN reports that CFIUS — in more acronym salad — the committee that assesses foreign investments and transactions for national security risks, was also targeted
by the Chinese hackers. CISA also said (https://content.govdelivery.com/accounts/USDHSCISA/bulletins/3cafdc4) this week it doesn't think there's any other department, other than the Treasury, affected by this particular campaign... but didn't say how it came to that conclusion.
More: CISA (https://content.govdelivery.com/accounts/USDHSCISA/bulletins/3cafdc4) | Bloomberg ($) (https://www.bloomberg.com/news/articles/2025-01-08/white-house-rushes-to-finish-cyber-order-after-china-hacks) | The Register (https://www.theregister.com/2025/01/10/china_treasury_foreign_investment/)
~ ~

White House unveils Cyber Trust Mark labeling program (https://www.nextgov.com/cybersecurity/2025/01/white-house-unveils-cyber-trust-mark-program-consumer-devices/401991/)
Nextgov/FCW: The Biden administration unveiled — in its penultimate week — its long-awaited Cyber Trust Mark program, its cybersecurity labeling program for consumer internet-connected devices. This labeling system is designed to certify that smart devices are sold with certain security standards (as defined by NIST), such as no default passwords and the ability to patch security updates. "Have your IoT devices as part of a healthy, balanced security diet" — at least that's the goal. Certified devices will hit the shelves in 2025.

DEF CON's hacker-in-chief faces fortune in medical bills after paralyzing neck injury (https://www.theregister.com/2025/01/07/def_con_security_chief_injured/)
The Register: Marc Rogers, the head of security for the DEF CON hacker con, faces tens of thousands of dollars in medical bills after an accident left him with a broken neck. Speaking with the folks at The Register, Rogers says the prognosis is good and that he's doing better; but, of course, this is America and Rogers couldn't rely on his health insurance provider doing the right thing in time before the injury got worse. Rogers' GoFundMe is online (https://www.gofundme.com/f/support-marc-rogers-road-to-recovery) for anyone who can spare a few. All the best for a speedy and full recovery, Marc!
https://x.com/k8em0/status/1876671646968557875
Corellium founder's mystery pardon involved spam and fish (https://www.semafor.com/article/01/10/2025/citizen-wade-the-life-of-a-legendary-hacker-to-receive-a-rare-presidential-pardon)
Semafor: First of all, no, this doesn't involve some obscure British food (I would know). For years, reporters have been trying to figure out (https://daringfireball.net/linked/2020/12/29/wade-pardon) why Chistopher Wade, the co-founder of mobile security research firm Corellium, was granted a pardon (https://www.businessinsider.com/donald-trump-pardon-chris-wade-cybersecurity-secret-crime-unsealed-documents-2025-1) by President Trump on his way out of office the first time around. Was it to do with government contracts? Or was it to do with a spam operation he ran in the 2010s and was ultimately granted a legal lifeline through chance encounters over his personal fish obsession? Perhaps...

Voice phishing groups found abusing Apple 'account confirmation' prompts (https://krebsonsecurity.com/2025/01/a-day-in-the-life-of-a-prolific-voice-phishing-crew/)
Krebs on Security: Brian Krebs (https://infosec.exchange/@briankrebs/113789749211433022) is back with an important story revealing how voice phishing hackers are abusing Apple's own processes to trick unsuspecting victims into granting access to their Apple accounts. It's the same hack that targeted Mark Cuban not so long ago. Cuban spoke with Krebs and explained how the hackers obtained access to some of Cuban's crypto wallets.
~ ~
THANKS FOR READING!

this week in security is my free weekly cybersecurity newsletter supported entirely by donations from readers like you. As a working journalist (https://techcrunch.com/author/zack-whittaker/) , I don't run ads or accept sponsors for this newsletter. Donations help reduce the costs of sending this newsletter while keeping it free, weekly, and without tracking.

To support this newsletter, check out my Ko-fi (https://ko-fi.com/thisweekinsecurity) to drop a one-time donation, or sign up from $10/monthly to get cool swag (https://ko-fi.com/thisweekinsecurity/tiers) shipped worldwide.
~ ~

Nyet, nyet! Boom, pszzzt: That's the sound of a Russian internet provider in St. Petersburg having its digital systems obliterated in a destructive cyberattack, claimed by Ukrainian hacktivists. The ISP, Nodex, said in a post on Russian social networking site VK that its systems were "destroyed" in the breach, in which the hackers posted screenshots (https://t.me/UCAgroup/38) of the ISP's internal network and its backup systems. (via The Record (https://therecord.media/russian-internet-provider-says-network-destroyed-cyberattack) , TechCrunch (https://techcrunch.com/2025/01/08/ukrainian-hackers-take-credit-for-hacking-russian-isp-that-wiped-out-servers-and-caused-internet-outages/) )
https://techcrunch.com/2025/01/08/ukrainian-hackers-take-credit-for-hacking-russian-isp-that-wiped-out-servers-and-caused-internet-outages/
UN aviation agency confirms breach: The United Nations' civil aviation agency, ICAO, confirmed a breach this week affecting 42,000 recruitment-related records stolen from the agency, affecting some 12,000 people. In a brief update (https://www.icao.int/Newsroom/Pages/ICAO-statement-on-reported-security-incident.aspx) , ICAO said names, email addresses, dates of birth, and employment history were stolen (and later published on a known hacking forum) in the breach. (via ICAO (https://www.icao.int/Newsroom/Pages/ICAO-statement-on-reported-security-incident.aspx) , Reuters ($) (https://www.reuters.com/business/aerospace-defense/un-aviation-agency-says-almost-12000-people-affected-by-release-data-2025-01-10/) )

DNC may have had phone snooping tech: Newly analyzed radio wave data collected by Wired reporters walking around the Democratic National Convention found that there is in fact evidence that the DNC had a cell-site simulator in its presence, potentially capable of spying on devices that were within its geographical range. These so-called "stingray" devices can intercept sensitive data from most devices in its range. The new data analysis — carried out by the EFF — wasn't conclusive but all signs point to a stingray in use. (via Wired ($) (https://www.wired.com/story/2024-dnc-cell-site-simulator-phone-surveillance/) , @dmehro (https://x.com/dmehro/status/1877739997391949956) )
~ ~

And on that note... I am consumed with FOMO, as I can't be at ShmooCon this year (it's final year, no less). For those there, have an amazing time. There's plenty to do and see (https://x.com/dakacki/status/1878080347663134958) , hijinks (https://bsky.app/profile/rgblights.bsky.social/post/3lfitgzxmac26) and happy memories (https://bsky.app/profile/k8em0.bsky.social/post/3lfhwlc6tas2q) going round!
If you have good news you want to share, get in touch at: (mailto:?subject=Good%20news%20for%20your%20newsletter) .
~ ~

  • CYBER CATS & FRIENDS
    ------------------------------------------------------------
    Ssssshhhhhh.... Zzzz.. zzz... Zzz.... this week's cyber cat.... is... Sweetpea... Zzzzz... clearly fast asleep ... thanks so much to Eden K... Zzzzz.... for sending in! .... Zzzzzz
    Sweetpea is a very cute, very fluffy grey Russian blue kitty curled up on an office chair on top of a copy of The New York Times.
    Keep sending in your cyber cats! (mailto:?Subject=Cyber%20Cat%20%28%26%20Friends%29%20submission&Body=Please%20include%20a%20JPG%20of%20your%20cyber%20cat%20%28or%20other%20non-feline%20friend%29%2C%20their%20name%2C%20and%20also%20your%20name%20and/or%20Twitter%20handle%20if%20you%20want%20credit.) (or a non-feline friend). Drop me an email at any time with their name and a photo, and they'll be featured in an upcoming newsletter!
    ~ ~
  • SUGGESTION BOX
    ------------------------------------------------------------
    I won't keep you any longer — this has already been the longest newsletter of the year — go and enjoy your weekend and have a great rest of your week.

As always, please do drop me an email with any feedback (mailto:) or anything for the happy corner. And if you have a cyber-cat update, I'd love to hear from you!

Catch you next,
@zackwhittaker (http://mastodon.social/@zackwhittaker)

============================================================
You are receiving this email because you opted in.

this week in security doesn't track email opens or clicks.
($) indicate sites with paywalls or logins. Please support journalism!

Our mailing address is: this week in security
Zack Whittaker
PO Box 415
Jersey City, NJ 07303-0415
USA
You can * update your preferences (https://social.us18.list-manage.com/profile?u=e1ad6038c994abec17dafb116&id=a2457dc8ad&e=9d10de3b61&c=383b87a85b)
or *
unsubscribe from this list (https://social.us18.list-manage.com/unsubscribe?u=e1ad6038c994abec17dafb116&id=a2457dc8ad&t=b&e=9d10de3b61&c=383b87a85b)
.

No data to display

Also available in: Atom PDF Tracking page