Heathrow And Other European Airports Pwned In Cyberattack

Posted in Commentary with tags on September 22, 2025 by itnerd

Over the weekend, Heathrow was among a number of airports hit by a cyber-attack. You can get details here:

https://www.msn.com/en-gb/travel/news/heathrow-and-major-european-airports-suffer-fourth-day-of-disruption-after-cyber-attack/ar-AA1N2MN7?ocid=BingNewsSerp

Dr. Martin J. Kraemer, Security Awareness Advocate at KnowBe4 had this to say:

“More information has come to light: Dublin airports have also been affected, and a ransomware demand was made. This does not mean the motivation could not also have been sabotage, but one motivation is now clear: extortion.

We still need more information to actually understand the true impact and ramification of the attack.

The EU is still investigating the attack while the impact is widespread. We should not expect the EU to determine the source as early. That is because there is still a lack of clarity since authorities and corporations have confusing messaging. The NCSC is investigating a cyber incident. Collins Aerospace is talking about a cyber-related disruption. We require more transparency before we can make meaningful conclusions as to who is behind this and what their benefits are.

Organizations must ready themselves, as the incident highlights the urgency of protecting organizations and enforcing supply chain security. NIS2 and other regulations are more important than ever.”

Javvad Malik, Lead Security Awareness Advocate at KnowBe4 follows with this: 

“Air travel depends on shared systems, so a failure in a common check‑in platform quickly cascades into missed connections, accessibility shortfalls, and staff forced into manual workarounds. 

It’s why it’s important to build in graceful failure by assuming the primary system will go down and rehearsing manual operations, offline boarding, and accessible contingencies, with cross‑trained staff and basic tools ready. 

Reduce single points of failure by diversifying providers where feasible, segmenting tenants, and ring‑fencing critical functions so one vendor outage doesn’t halt everyone. Above all, communicate clearly and often, prioritize vulnerable passengers, and empower frontline teams to make humane decisions.”

This is brutal for travellers. And unless governments and airport authorities do everything possible to beef up their defences from this sort of thing, the possibility exists that this scenario will repeat itself.

Deal Alert: Samsung Galaxy Tab S11 Is Now On Sale

Posted in Commentary with tags on September 22, 2025 by itnerd

Here’s a limited-time deal during Amazon’s sale: the Samsung Galaxy Tab S11 is now $949.99 (down from $1,200 – $150 off)

Perfect for students, professionals, or creators, the Galaxy Tab S11 combines portability with performance. 

On Amazon

On Samsung website

Stellantis Has Been Hit By A Cyberattack

Posted in Commentary with tags on September 22, 2025 by itnerd

Car maker Stellantis has disclosed that a third-party provider supporting its North American customer service operations suffered unauthorized access. The incident exposed basic contact details but not financial or highly sensitive personal data. Stellantis has activated incident response, notified authorities, and is warning customers of phishing risks. 

You can read their press release here: https://media.stellantisnorthamerica.com/newsrelease.do?id=27079&mid=1

Javvad Malik, Lead CISO Advisor at KnowBe4, commented:

“The common thread in most of these recent attacks across various industries is the fact that supply chains are often compromised to gain access to systems. Criminals often target a smaller partner with weaker defenses with social engineering being a common tactic. This includes convincing emails, messages, or calls, which can be powered by AI and deepfake technology to trick people into sharing access or approving actions they shouldn’t. 

The approach to be taken is full human risk management which includes the use of technology and clear training, simple processes, and easy ways for people to ask for help so they can make safer choices in the moment. Incident response must cover more than the technical fix. It includes the need to communicate quickly and clearly with customers and stakeholders about what happened, what it means for them, and exactly what steps they should take.”

Anders Askasen, Director of Product, Radiant Logic follows with this:

     “Cyber incidents tied to third-party providers is unfortunately one of the blind spots that could cause CISOs to be sleepless at night and it also highlights the importance that identity security doesn’t stop at the enterprise perimeter. Attackers can weaponize leaked and compromised identity data for phishing and social engineering attacks that open the door to larger breaches. The automotive industry has a norm of a sprawling ecosystem of suppliers and contractors and not having the unified visibility and control creates systemic exposure.

Global initiatives such as the EU’s NIS2 Directive puts a sharp focus on third-party and supply chain risk, making continuous monitoring of identity security posture a compliance requirement. Meeting this standard demands a data-centric approach that unifies identity intelligence across suppliers and contractors, giving enterprises the observability to detect, contain, and minimize risk. Organizations that apply the same rigor to third-party identities as they do internal ones will be far better prepared to withstand inevitable attacks.”

This is the second carmaker to get pwned as Jaguar/Land Rover has been down for weeks due to a cyberattack. Proving that cyberattacks have far reaching and expensive consequences.

Sumo Logic brings agentic AI into the enterprise security stack with the launch of Dojo AI on Amazon Web Services

Posted in Commentary with tags on September 22, 2025 by itnerd

Sumo Logic today announced the launch of its new Sumo Logic Dojo AI, powered by Amazon Web Services, Inc. (AWS), a breakthrough in intelligent, agent-powered security operations. Dojo AI was built leveraging Amazon Bedrock and the new Amazon Nova family of models to help enterprises address the growing volume and complexity of cyber threats. It introduces specialized agents that can help automate routine tasks, streamline investigations, and give security teams the freedom and ability to focus on analyzing the highest value security issues facing their organization.

By combining the powerful Amazon Nova foundation models of AWS with Sumo Logic’s cloud‑native Intelligent Operations Platform, the company will accelerate innovation for customers in highly regulated industries, helping them detect threats faster, meet compliance requirements, and optimize performance in real time.

Sumo Logic Intelligent SOC Agents

The initial agents available from the Dojo AI platform include:

  • Mobot (beta) – A unified conversational interface that enables seamless interaction with Dojo AI through natural language multi-turn conversations, empowering users to deploy agents and request insights without the need for complex queries. New and experienced Sumo Logic users can get to the root cause faster with natural language investigation.
  • Query Agent – Translates natural language questions into efficient Sumo Logic queries, streamlining data exploration. The new Query Agent leverages agentic architecture, improving accuracy and outcomes. It’s built on AWS and integrates seamlessly with the new Mobot interface to deliver a more robust experience.
  • Summary Agent – Automatically creates clear, AI-generated summaries of real-time threat insights from Sumo Logic’s market-leading SIEM, adding to Mobot for accelerated investigation context.

Sumo Logic continues to build on their more than decade‑long collaboration with AWS, uniting the secure, scalable cloud infrastructure of AWS with Sumo Logic’s AI‑powered, Intelligent Operations Platform. As an AWS Partner with 13 AWS Competencies — including the AWS Generative AI Competency — Sumo Logic delivers proven expertise across industries such as financial services, government, retail, and education, helping joint customers accelerate innovation, strengthen security, and achieve compliance at scale

Why Dojo AI?

Sumo Logic customers benefit from Dojo AI because they gain:

  • Proven data advantage – The Sumo Logic Platform ingests more than 4.5 exabytes of data every day, so Dojo AI agents ramp faster and act more effectively with a single source of truth for data.
  • Enterprise agentic architecture – Specialized agents collaborate to help drive higher accuracy and efficiency, all implemented on an enterprise-grade AWS foundation.
  • Designed for SOC teams – Dojo AI enhances analyst productivity rather than replacing human expertise, all while maintaining data privacy and security.

Dojo AI Availability

Query Agent and Mobotwill be available to all Sumo Logic customers, and Summary Agent will be included at no additional cost for all Cloud SIEM customers. Dojo AI is also available in AWS Marketplace.

Guest Post: Raven Stealer, a new password-stealing malware, targets Google Chrome

Posted in Commentary with tags on September 19, 2025 by itnerd

A new malware called Raven Stealer has emerged and started targeting users of Chromium-based browsers, such as Google Chrome and Microsoft Edge. This malware is designed to harvest credentials and other sensitive information, cybersecurity researchers warn.

According to a blog post published by a team that discovered the infostealer, it spreads through underground forums and cracked software (phishing emails) and has a unique exfiltration method through the Telegram chat app.

Once installed, Raven Stealer accesses local storage paths and credential vaults on browsers to locate encryption keys. It leverages native Windows API calls to decrypt and extract saved data. The stealer’s primary target is browser-based authentication data, including saved passwords and session cookies, but it also gathers autofill entries, payment data, browsing history, and other data types. After the job is done, text files are stored in the .zip folder and sent to the attacker’s Telegram channel. 

Karolis Arbaciausias, head of product at NordPass, comments:

“The emergence of Raven Stealer is a significant concern. This malware is particularly insidious because it silently targets the data people believe is encrypted and safe within their browsers. Raven Stealer is specifically engineered to search for stored credentials and encryption keys, making the browser’s vault a primary target and a weakness. Raven Stealer’s unique Telegram exfiltration makes detection challenging. Sending information through encrypted messaging channels lets it bypass many conventional security filters. Moreover, this malware is also capable of bypassing many corporate network filters.

“For individuals, probably the simplest and fastest way of dealing with this new threat is a dedicated password manager, which acts as an isolated, encrypted box for credentials and other data. It ensures that even if your browser is compromised, your actual passwords and session cookies remain secure and out of reach.”

To protect against Raven Stealer and other similar threats, Arbaciauskas also advises to:

  • Enable multi-factor Authentication (MFA) everywhere because it acts as a vital second line of defense, preventing unauthorized access.
  • Avoid using cracked software because it’s dangerous. Only download software from official, trusted sources.
  • Carefully scrutinize all emails, especially those with links or attachments. Malware like Raven Stealer often spreads through phishing. Never click on suspicious links or open unexpected attachments, even if they appear to come from a known sender. Remember – if a deal seems too good to be true, it likely is.
  • Keep software updated because updates often include critical security patches that protect against known vulnerabilities and exploits.

For companies, centralized password and access rights management is essential. Besides that, Arbaciauskas recommends that you:

  • Apply application whitelisting and software restriction policies to ensure that employees only have access to trusted download sources and that only approved applications can run on corporate endpoints.
  • Make MFA mandatory for all corporate applications, VPNs, cloud services, and employee accounts. 
  • Conduct regular cybersecurity training.
  • Maintain an expedited patch management program for all operating systems, browsers, and critical applications.
  • Segment your network and implement the principle of least privilege for user accounts and applications, restricting their ability to access or modify sensitive data.
  • Deploy Data Loss Prevention (DLP) solutions to monitor and prevent unauthorized exfiltration of sensitive company data.
  • Regularly back up your data and ensure that backups are stored securely offline.
  • Have an incident response plan ready.

Canada’s own Jonathan David previews Juventus vs. Inter clash with Fubo 

Posted in Commentary with tags on September 19, 2025 by itnerd

Ahead of Saturday’s Derby d’Italia between Juventus and Inter, Ottawa-raised striker Jonathan David sat down for an exclusive interview with Footy Culture (a digital platform covering global football culture), in partnership with Fubo, the leading sports-first live tv streaming platform and exclusive home of Serie A in Canada. He shared candid thoughts on the rivalry, his journey, and what it takes to win on the biggest stage.

A few highlights from the interview are:

  • On being the first Canadian at Juventus: “Growing up I never thought about playing for the biggest clubs — the dream was just to turn pro. After one good season, you start to believe maybe something bigger can happen.”
  • Derby d’Italia mindset (match hook): “In a game like this, it’s about finding that little bit more — more aggression, more running. The team that wants it more, that’s what makes the difference.”
  • Canadian pride / earning respect: “South Americans and Europeans are ‘known’ for football… as a Canadian you have to work more and show more.”
  • On Drake & ‘Iceman’ nickname: “Obviously I’m a fan of Drake — he’s still one of the best artists in the world. But I think I was the first Iceman.”
  • On Canada as home: “Canada for me is home. Whenever I can, I go back to spend time with family and friends. It’s always close to my heart.” 

Goshen Medical Center Notifying 450k+ people of data breach

Posted in Commentary with tags on September 18, 2025 by itnerd

Comparitech reported today that Goshen Medical Center, Inc. has started notifying 456,385 people of a data breach following a cyber attack that started in February 2025. Ransomware gang BianLian claimed the attack in late March.

Commenting on this is Rebecca Moody, Head of Data Research at Comparitech

“This week has seen three of the six largest data breaches (via ransomware) on US healthcare companies this year. This attack on Goshen Medical Center becomes the third largest, while Medical Associates of Brevard, LLC takes fourth place (notifying nearly 247,000 of a January 2025 breach via BianLian) and New York Blood Center Enterprises takes sixth place (nearly 194,000 affected in a January 2025 attack via unknown hackers).”

“All three of these attacks highlight two key things. First, they demonstrate how the healthcare sector remains a dominant target for ransomware gangs because of the amount of sensitive data up for grabs. Second, they serve as a reminder that it’s often months before we find out about the extent of these attacks.”

“So, while ransomware attacks on the US healthcare sector may seem lower than last year (we’ve noted 61 confirmed attacks and 6.1 million breached records so far this year, compared to 174 attacks and 28.6 million breached records in total last year), we shouldn’t focus too much on these as of yet. It’s highly likely we’ll see a number of other major breaches coming through in the coming months. For example, we still don’t know how many were impacted in the attack on Kettering Health and out of 

Two things jump out at me. First BianLian is quite busy with a growing list of victims. Second health care is yet again a victim of a cyberattack. Clearly there’s no end to the madness which is bad news for all of us.

CloudSEK Exposes China-Linked Counterfeit ID Operation Flooding North America with Fake Licenses

Posted in Commentary with tags on September 18, 2025 by itnerd

CloudSEK, a leading cybersecurity firm, has exposed a sophisticated China-based operation selling high-quality counterfeit U.S. and Canadian driver’s licenses and Social Security Number (SSN) cards, posing a severe threat to national security, financial systems, and public trust.

The investigation, conducted by CloudSEK’s STRIKE team, uncovered a sprawling network of 83+ interconnected domains supported by 24/7 WeChat customer support, custom order flows, and multiple payment channels. Analysis of the exfiltrated database revealed over 6,500 counterfeit licenses sold to 4,500+ buyers, generating more than $785,000 in revenue. 

A Hidden Threat Undermining Trust

Counterfeit IDs aren’t just tools for underage drinking—they enable serious crimes, including illegal firearm purchases, SIM-swap fraud, large-scale logistics misuse, and even election interference. CloudSEK researchers confirmed that the IDs, priced as low as $65 in bulk, are fully scannable and replicate advanced security features such as holograms, UV markings, laser engraving, and relief printing, making them nearly indistinguishable from genuine documents.

“This isn’t just about fake IDs – this is about a systematic attack on the foundation of trust that underpins our financial, legal, and civic systems,” said Sourajeet Majumder, security researcher at CloudSEK STRIKE. “When a single counterfeit license can enable unauthorized drivers, bypass compliance checks, or facilitate smuggling, we’re looking at a genuine national security threat.”

Sophisticated Operations

The threat actor demonstrated remarkable sophistication:

  • Shell E-commerce Sites: Transactions were routed through fake online stores (clothing, shoes, accessories) to mask payments via PayPal, LianLian Pay, and cryptocurrencies.
  • Covert Packaging: IDs were shipped globally via FedEx, USPS, DHL, and Canada Post, hidden inside toys, purses, or layered cardboard with camouflage stickers to evade detection. Tutorial videos guided buyers on retrieving concealed IDs.
  • Systemic Misuse: One buyer linked to two trucking companies with revoked U.S. operating authorities purchased 42 counterfeit commercial driver’s licenses—highlighting risks to transportation safety and regulatory integrity.
  • High-Confidence Attribution: Through HUMINT and OSINT, CloudSEK pinpointed the actor’s exact geolocation in Xiamen, Fujian, China and obtained a facial image via webcam capture
     

Key Findings

  • Massive Scale: Over 6,500 fake IDs sold, with dense clusters of buyers in New York, Pennsylvania, Florida, Georgia, Ontario, and British Columbia.
  • Financial Footprint: $785,000+ generated through PayPal, LianLian Pay, Bitcoin, Ethereum, and Western Union.
  • Age Analysis: Nearly 60% of buyers were above 25 years old, signaling intentions beyond casual misuse.
  • Marketing Tactics: The network promoted IDs via Meta Ads, TikTok, Telegram, and YouTube, openly advertising uses like passing police checks, renting cars, or accessing benefits.
     

Real-World Consequences

The implications are far-reaching:

  • National Security: Fake IDs can bypass airport, border, and law enforcement checks.
  • Financial Fraud: Scannable IDs enable SIM swaps and account takeovers.
  • Election Integrity: IDs can be exploited for mail-in ballot and voter registration fraud.
  • Logistics & Trafficking Risks: Fake commercial driver’s licenses allow unlicensed operators to bypass U.S. Department of Transportation checks.
     

A Call to Action

CloudSEK urges urgent global action:

  • Law Enforcement: Seize the 83+ domains and pursue legal action using attribution evidence.
  • Courier Vigilance: Alert FedEx, USPS, and DHL to the covert packaging tactics.
  • Payment Processors: Trace and freeze illicit accounts across PayPal, Western Union, and crypto platforms.
  • Continuous Monitoring: Deploy threat intelligence platforms like CloudSEK’s XVigil for proactive detection.
     

For More Information, Read The Full Report

Fortra Uncovers New, AI-Powered Phishing Campaign Exploiting ActiveCampaign

Posted in Commentary with tags on September 18, 2025 by itnerd

Fortra Intelligence and Research Experts (FIRE) have discovered a large-scale phishing campaign exploiting ActiveCampaign to mass-produce AI-generated impersonation sites promoting Small Business Administration loans.

These attacks are harvesting detailed business and financial data presumed to fuel future spear-phishing campaigns. 

You can read more here: https://www.fortra.com/blog/attackers-exploit-activecampaign-deliver-thousands-ai-generated-sba-phish

New York Blood Center notifies 194,000 people of data breach

Posted in Commentary with tags on September 17, 2025 by itnerd

Comparitech reported today that New York Blood Center Enterprises this week confirmed it notified 193,822 people of a January 2025 data breach that leaked names, SSNs, ID numbers, bank account info, health info, and test results. The attack was first reported back in January.

Commenting on this is Rebecca Moody, Head of Data Research at Comparitech

“This attack becomes the 89th confirmed attack on a healthcare company (worldwide) this year so far. Across these attacks, nearly 6.7 million records are known to have been breached with this attack on NYBCe becoming the sixth largest based on records affected.”

“To date, no gangs have claimed the attack on NYBCe, and, with the attack happening back in January 2025, it’s unlikely we’ll see a claim from a gang now. This could mean that ransom negotiations were successful but NYBCe hasn’t confirmed this. Across the 89 confirmed attacks we’ve noted for this year, the average ransom demand has been just under $627,000.”

Once again the healthcare sector is ground zero for getting attacked by threat actors. I don’t know how much clearer it will have to become before something is done to put this sector on better footing.