The Breach News

PrivatBank, Ukraine’s Largest Bank, Attacked by SmokeLoader Malware

Financially Motivated Threat Actor Targets PrivatBank Customers with Sophisticated Phishing Scheme A recent investigation by cybersecurity researchers at CloudSEK has uncovered a sophisticated phishing campaign orchestrated by the financially motivated group UAC-0006, aimed specifically at clients of PrivatBank, the largest state-owned bank in Ukraine. This alarming activity highlights the persistent…

Read MorePrivatBank, Ukraine’s Largest Bank, Attacked by SmokeLoader Malware

Hackers Target Chinese LLMs to Create Malware and Other Scams

Recent developments in the cybersecurity landscape highlight a concerning trend: Chinese hacking groups and threat actors are increasingly targeting Western entities through a range of cyberattacks. These intrusions, often driven by political or economic motives, frequently exhibit signs of backing from governmental or military entities in China. However, a new…

Read MoreHackers Target Chinese LLMs to Create Malware and Other Scams

Ransomware Profits Take a 35% Dive Last Year, Yet Remain Profitable

This report covers topics such as Data Breach Notification, Data Security, and Fraud Management & Cybercrime. LockBit and BlackCat/ALPHV Decline Linked with Diminishing Big-Game Hunting Mathew J. Schwartz (euroinfosec) • February 6, 2025 While ransomware remains a lucrative avenue for operators, 2024 has seen a significant downturn in the financial…

Read MoreRansomware Profits Take a 35% Dive Last Year, Yet Remain Profitable

Ransomware Payments Decrease in 2024 Despite High-Profile Cyber Attacks

In a significant development in the landscape of ransomware incidents, the second half of 2024 marked the largest decline in ransomware payments recorded by Chainalysis. This decline comes after a period of notable fluctuations in both the frequency of ransomware attacks and the volumes of ransom payments demanded. Notably, 2022…

Read MoreRansomware Payments Decrease in 2024 Despite High-Profile Cyber Attacks

Five Eyes Issues Guidance for Securing Edge Devices

Network Firewalls, Network Access Control, Security Operations Guidance Aimed at Enhancing Rapid Compromise Detection for Enterprises Akshaya Asokan (asokan_akshaya) • February 5, 2025 Image: Shutterstock In a significant move to bolster cybersecurity, the Five Eyes intelligence coalition has released a set of minimum security requirements aimed at edge device vendors.…

Read MoreFive Eyes Issues Guidance for Securing Edge Devices

UK Legal Sector Experiences 39% Increase in Data Breach Incidents

A recent study conducted by NetDocuments has revealed alarming statistics regarding data breaches in the UK’s legal sector, with a staggering approximately 8 million personal records compromised. This report highlights a growing vulnerability in an industry that handles sensitive client information on a daily basis. Data from the Information Commissioner’s…

Read MoreUK Legal Sector Experiences 39% Increase in Data Breach Incidents

The Breakdown of USAID is Already Contributing to Human Trafficking and Slavery in Scammer Camps

Crisis Deepens as Funding Cuts Hamper Efforts Against Human Trafficking in Scam Centers Recent reports highlight a dire situation faced by survivors of human trafficking linked to scam operations, as funding reductions severely hinder support organizations. According to Macher, an advocate working with various networks, survivors attempting to escape these…

Read MoreThe Breakdown of USAID is Already Contributing to Human Trafficking and Slavery in Scammer Camps

Unauthorized Disclosure of PHI by State for Research Purposes

Data Governance, Data Privacy, Data Security Lawsuit Alleges Retaliation Against Whistleblower in Rhode Island Health Information Exchange Case Marianne Kolbasuk McGee (HealthInfoSec) • February 5, 2025 A federal lawsuit filed against Rhode Island Quality Institute claims the Health Information Exchange (HIE) unlawfully shared patient data with researchers. RIQI denies these…

Read MoreUnauthorized Disclosure of PHI by State for Research Purposes