Archive for November 3, 2025

University of Pennsylvania hacker claims to have stolen 1.2 million donor records in data breach 

Posted in Commentary with tags on November 3, 2025 by itnerd

Cybercriminals have claimed responsibility for the recent cyberattack on the University of Pennsylvania and the stealing of data on approximately 1.2 million students, alumni, and donors. Here are the details:

Penn has reported last week’s mass cybersecurity breach to the Federal Bureau of Investigation following reports that the hack compromised data for millions of individuals. 

The breach resulted in mass scam emails sent on Oct. 31 from multiple University-affiliated email addresses that were addressed to the Penn community and contained criticisms of the University’s security practices and institutional purpose. A University spokesperson wrote to The Daily Pennsylvanian that the matter has been referred to law enforcement and the FBI as Penn investigates a “breach of data of select information systems.”

In the initial emails, the hacker appeared to threaten to release user data, writing that “all your data will be leaked.”

“We understand and share our community’s concerns and have reported this to the FBI. We are working with law enforcement as well as other third-party technical resources to address this as rapidly as possible,” the spokesperson added. 

And according to Bleeping Computer, this is how the threat actors got in:

However, the threat actor behind the attack contacted BleepingComputer, claiming the intrusion was far broader and that they had gained access to multiple university systems.

The hacker said their group “gained full access” to an employee’s PennKey SSO account, allowing access to Penn’s VPN, Salesforce data, Qlik analytics platform, SAP business intelligence system, and SharePoint files.

I have a lot of commentary on this. Staring with Darren James, a Senior Product Manager at Specops Software:

“This incident highlights the double-edged nature of single sign-on (SSO). It is an effective way to simplify access and strengthen security through centralized monitoring and MFA, but if compromised, it can act like a master key and provide access to multiple connected systems at once.

In this case, the access spanning Salesforce, Qlik, SAP, and SharePoint is unusual and raises questions about how role-based access controls were managed. Even if this level of access was legitimate for the user involved, it reinforces the importance of strict privilege management and continuous identity monitoring.

The attacker’s behavior, including sending offensive mass emails, does not appear to align with professional or highly organized cybercrime groups. However, the volume and sensitivity of the data reportedly accessed makes the breach significant.

PennKey authentication appears to rely on a username and password followed by a DUO push prompt. That raises several important questions: Was the password reused or previously compromised? Was MFA configured properly, including fatigue protections? Was the second factor bypassed through social engineering, or could a stolen session token be responsible?

Modern identity security needs to go beyond MFA alone. Controls like device pinning and posture checks, which ensure credentials can only be used from trusted and compliant devices, would significantly reduce the likelihood of this type of intrusion.”

Ensar Seker, CISO at SOCRadar follows with this:

“The claims that 1.2 million donor, alumni and student records may have been exfiltrated at Penn including access via a compromised SSO account, VPN, SharePoint, Salesforce, SAP and BI systems highlight the highly leveraged value of non‑financial, crowd‑sourced datasets. What’s alarming here is the attack vector: the hacker asserts that rather than immediately demanding ransom, the aim was pure information theft and monetization of donor insights. 

If this breach is genuine as claimed, the impact extends beyond identity theft. Data sets linking net worth, donation history and demographic details (race, religion, sexual orientation) are highly tailored and valuable to adversaries launching social engineering, targeted phishing or credential stuffing campaigns. The fact that the initial indicators emerged as a provocative “we got hacked” mass‑email adds urgency: it wasn’t just a stealthy breach, it was weaponized for reputation and donor confidence.

In terms of dark‑web indicators, our dark web team is monitoring underground forums for early exposure of “appetizer” leak data and dataset advertisements associated with the incident. While we have not yet seen full confirmation of a wide‑scale public dump, the presence of credential sets tied to the institution suggests the attack may already be staging towards commercialization.

For organizations in the education or non‑profit sectors, the message is clear: privileged access to major donor platforms, CRM systems, marketing cloud tools and analytics portals must be treated with the same level of monitoring and segmentation as financial systems. A compromised user session in an SSO environment has proven more than enough to cascade into high‑value data loss.”

Paul Bischoff, Consumer Privacy Advocate at Comparitech adds this: 

“None of the breached data poses a direct threat to victims or their finances. There are no passwords or Social Security numbers, for example. However, the info could be used to craft more convincing phishing messages that are tailored to the recipient. Be on the lookout for phishing messages from scammers posing as UPenn or a related organization. Never click on links or attachments in unsolicited emails.”

Finally, Chris Hauk, Consumer Privacy Champion at Pixel Privacy had this to say:

“Victims of the hack should keep an eye out for phishing emails, texts, and phone calls that may attempt to use the gleaned information to obtain additional data about the users. They should particularly be on the alert for emails appearing to come from the University of Pennsylvania.

Victims should also change any passwords that they have used for accounts that are connected to the university. They should also use a password manager to create unique and secure passwords for not only possibly targeted accounts, but for all of their accounts. Most popular password managers will check login credentials for each account, warning of duplicated passwords. Users should also enable multi-factor authentication on all of their accounts, not just their affected accounts. This will help guard against wide exposure in future data breaches.”

This is one of these hacks that will have downstream effects for years. Which is why the best defense is going to be to do everything possible to make sure that a hack like this never happens.

Minister McGregor and Global Tech Leaders Unite to Advance Talent, AI, and Innovation in Canada’s Future

Posted in Commentary with tags on November 3, 2025 by itnerd

The Honourable Graham McGregor, Ontario’s Minister of Citizenship and Multiculturalism, will join Obsidi®, North America’s largest network and job platform for Black and allied tech professionals, at the 2025 BFUTR Global Tech Summit presented by TD.

Themed “The New World of Work,” this year’s summit highlights Ontario’s leadership in fostering inclusive innovation and advancing AI talent development as key drivers of economic growth. Hosted at the International Centre, BFUTR convenes more than 20,000 Black professionals, executives, and allies from across North America to connect, collaborate, and shape the future of technology.

Minister McGregor will deliver remarks from the Main Stage on November 6, emphasizing Ontario’s commitment to building a strong, diverse innovation economy where every community can thrive.

As part of the Summit, Obsidi® and the Ministry of Citizenship and Multiculturalism will host a CIO Roundtable Discussion with senior technology leaders to explore how public–private partnerships can accelerate AI workforce growth and expand access to high-demand careers. The session will feature insights from Obsidi® Academy, a workforce initiative equipping Canadians with the technical and professional skills needed to succeed in AI, data, and software development roles.

Early results point to strong employer engagement and promising participant outcomes, underscoring how partnerships between government and industry can create sustainable pathways into Ontario’s innovation economy. The model aligns with the province’s Black Youth Action Plan, which supports equitable access to technology careers and long-term workforce representation.

The BFUTR 2025 Summit will also feature the release of Reprogramming the Enterprise: AI’s Reinvention of Technology, Talent, and Leadership, a national white paper developed by Obsidi® and senior Canadian executives outlining strategies for scaling AI adoption and inclusive workforce design across industries.

Headliners at BFUTR 2025

  • Bozoma Saint John – Former CMO of Netflix and trailblazing brand executive redefining
    bold, authentic leadership across tech and culture.
  • Dan Schulman – CEO Verizon and globally recognized voice in digital transformation and
    purpose-driven business.

These global thought leaders will join Minister McGregor and top CIOs and CTOs to explore how innovation, equity, and talent are reshaping the future of work and economic opportunity in Canada.

The Threat Actors Behind The Questrade And Wealthsimple Phishing Campaign Are Now Going After TD Customers

Posted in Commentary with tags on November 3, 2025 by itnerd

I have been tracking a threat actor who has used first Questrade and then Wealthsimple as part of a large scale phishing campaign that is being carried out via email. Well, my honeypot, which is a computer that I have set up to capture emails and be a target for hackers so that I can gather intel on what the bad guys are up to, have caught a new twist in this campaign. This time the threat actors are using TD bank to perpetrate their scam. This popped up in my honeypot a few minutes ago:

Now I won’t go down the rabbit hole on how the campaign works as I have done this in the first part my research. But I will note that these threat actors are getting sloppy. The quality of this email is not as good as the other ones which makes me wonder how effective this will be. Having said that, the fact that these threat actors are still trying and are shifting tactics implies that they must be having some level of success. Your task is to make sure that you’re not part of whatever success they are having. Thus this is another email that you should instantly delete if you get it.

Invi Grid Completes Google’s ISV Startup Springboard Program

Posted in Commentary with tags on November 3, 2025 by itnerd

Invi Grid announces that its Invi Grid Intelligent Cloud platform is now available on Google Cloud Marketplace. This move follows Invi Grid’s completion of the Google Cloud ISV Startup Springboard program, deepening its collaboration with Google Cloud.

Built from the ground up for secure-by-design cloud, Invi Grid automates day-zero cloud and AI infrastructure provisioning, enabling developers and operations teams to innovate freely while governance, compliance, cost control, and security are handled automatically. The platform helps ensure that both cloud and AI workloads are deployed securely, efficiently, and in full compliance from the very start.

With Invi Grid now available on Google Cloud Marketplace, organizations can gain streamlined access to enterprise-grade cloud and AI infrastructure that keeps pace with digital transformation, mitigates risk and boosts agility.

With this development, businesses and teams can:

  • Accelerate Secure Cloud Provisioning: Quickly deploy secure, well-architected cloud environments, allowing teams to focus on innovation.
  • Automate Security and Compliance Policies: Enforce security and compliance automatically from day zero, reducing risks and manual effort.
  • Unify Cloud Management with a No-Code Platform: Manage cloud operations across teams in a single, streamlined platform.

Customers reported that Invi Grid accelerated their cloud development with day-zero security and saved months of a skilled DevOps engineer’s work. They valued Invi Grid as a partner, a differentiator that supports their innovation and growth while helping to ensure oversight and governance that is critical to building trust with customers.

Invi Grid was selected to participate in the Google Cloud ISV Startup Springboard program to help accelerate growth and innovation for Google Cloud customers. To highlight the collaboration, Google Cloud released a video showcasing how Invi Grid accelerates secure cloud and AI deployment on Google Cloud, making it easier for companies to go to market and win customer confidence.

For more information on how to use Invi Grid to help ensure you are compliant on day zero of your cloud journey and beyond, explore Invi Grid’s offering on Google Cloud Marketplace.

Bulwark: A Dark Web Tool that Bypasses Modern Antivirus and EDR Solutions

Posted in Commentary with tags on November 3, 2025 by itnerd

Bulwark is a new tool being marketed on the dark web as being capable of bypassing modern antivirus and EDR solutions, which constitute one of the main lines of defense for most organizations.

In a new in-depth whitepaper, SOCRadar researchers have dived into this tool, including how it came to be, what its capabilities are — such as advanced obfuscation, real-time evasion — and more. 

Bulwark began appearing in Telegram channels in July, showcasing its capabilities and promising an effective bypass for any EDR or antivirus solution. During continuous hunting activities, SOCRadar’s research team detected an announcement referencing a platform called Database.forum, where this tool was listed. At the time, that database was not indexed by mainstream search engines and formed part of the Deep Web, and has recently been added to the Dark Web as well; over the following days, its popularity grew, and it later became discoverable via traditional search engines.

To understand how Bulwark came to be, it is necessary to go through Database.forum which is a portal run by affiliates and developers where various tools of different kinds are advertised and indexed. Many of these tools are related to threat actors or capabilities that can be used by them.

For full details, the whitepaper can be downloaded at this landing page, or viewed in full at this link: https://socradar.io/wp-content/uploads/2025/10/Bulwark-Whitepaper.pdf

October was a record month for ransomware group Qilin – 200 attacks recorded 

Posted in Commentary with tags on November 3, 2025 by itnerd

According to Ransomlooker, a tool developed by Cybernews that tracks ransomware attacks, October was a record month for notorious ransomware gang Qilin – 200 attacks were recorded during the month. Attacks by Qilin have been steadily growing throughout all of 2025, but October’s spike is unprecedented. 

Key insights:

  • Qilin claimed 200 ransomware attacks in October, 2025, by far the most ever carried out by the group in one month.
  • Attacks more than doubled compared to September, when 84 attacks were recorded.
  • Qilin is already responsible for 723 attacks in 2025 (as of November 3rd, 2025).
  • Qilin’s October victims include Israel’s 4th largest hospital, Shamir Medical Center, a large pharmacy benefit manager MedImpact, and Texas electric cooperatives.
  • In 2024, Qilin claimed 181 attacks. In 2023, there were 45, and in 2022, the gang claimed just 5 attacks.

Notorious for targeting hospitals and the manufacturing sector, the Qilin gang – once known as Agenda – first appeared on the ransomware circuit in 2022. However, its dark leak site claims it began operating in 2021.

Qilin has moved into the number one position as the most active ransomware gang in the past 12 months, aggressively outperforming ransomware rivals Cl0p Play, INC Ransom, and Akira.

Known for using a ransomware-as-a-service (RaaS) business model, the cybercriminal outfit often uses double extortion tactics on its victims, demanding a ransom for decryption and then a second payout to guarantee it will not leak the stolen files on the dark web after the fact.

Here’s a screenshot from the Ransomlooker tool, showing just how active Qilin has become in October compared to previous months:

Obsidi to Launch Groundbreaking AI Leadership White Paper at BFUTR 2025 Executive Mainstage

Posted in Commentary with tags on November 3, 2025 by itnerd

Obsidi® will unveil its new executive white paper, Reprogramming the Enterprise: AI’s Reinvention of Technology, Talent and Leadership, at the BFUTR Executive Mainstage on November 6, 2025, in Toronto.

Built on private, closed-door interviews with more than 50 C-suite leaders from across North America, the white paper reveals the real strategies, challenges, and leadership moves shaping market winners in the AI-first decade.

Key findings include:

● The Six-Month Skills Cliff – the deadline leaders are quietly setting for employees to integrate AI into their work or risk role elimination.

● The Barbell Workforce – why the “average performer” tier is disappearing, replaced by senior architects and AI-augmented juniors.

● Two-Speed Organizations – the operational model allowing innovation and mission-critical systems to run in parallel.

● Owning the AI Moat – why proprietary data, prompts, and workflows are more defensible than AI models themselves.

● 72% of executives believe their AI transformation plans are at risk before they begin — with talent and culture gaps cited as the top barrier.

Event Details:

What: BFUTR 2025 – Executive Mainstage & White Paper Launch

When: November 6, 2025

Where: The International center

Website: https://bfutr.com