Last week cyber news
The computer systems of all public libraries in Seattle were shut down due to a ransomware attack (about 27 libraries), at this stage there is no prospect of a return to normal.
- The US government filed an indictment against an Initial Access Broker (IAB), Russian citizen Evgeniy Doroshenko known as Flanker. Flanker has been active since February 2019 selling access to US companies for thousands of dollars. No arrests have been made at this time.
- The computer equipment company Cooler Master suffers from an information leak after an attacker offered for sale information of about 500,000 of the company’s customers.
- CDEK, one of the largest shipping companies in Russia, is down for several days due to a cyber/ransom attack. The attacker posted about the attack on Twitter.
- The BBC reports that an attacker managed to access the pension database of about 20,000 company employees. No financial information was disclosed but personal information was disclosed.
- More than 90 malicious Android apps with 5.5 million installs were found on Google Play. Most of the malicious apps pretended to be tools, personalization apps, photography tools, productivity, and health and fitness apps.
- A student at the Klein Forest school in Texas is accused of carrying out a DDoS attack on the school’s testing system. Following the attack, widespread disruptions were caused during national tests. The student purchased the DDoS services from two different sources, and it is estimated that the attack cost him approximately $20.
Security updates
The Checkpoint company released an emergency update to patch the Zero-Day vulnerability that is actually exploited by attackers around the world.
The vulnerability CVE-2024-24919 allows attackers to read information that should not be disclosed and affects the following products (if they are exposed to the Internet and allow VPN access or mobile access):
CloudGuard Network, Quantum Maestro, Quantum Scalable Chassis, Quantum Security Gateways, and Quantum Spark Appliances.
In the following versions:
R80.20.x, R80.20SP (EOL), R80.40 (EOL), R81, R81.10, R81.10.x, and R81.20.
The company has released updates for all vulnerable versions, more details can be found here
The latest updates should be tested and installed as soon as possible.