1. Cyber Attack Steals $400,000 from Diocese of Virginia Trust Fund
In a startling revelation, a cyber attack in late 2022 has resulted in the theft of a trust fund worth $400,000 associated with the Diocese of Virginia. The incident only came to light when two recipients, comprising Parishes and a Diocese, failed to receive the expected $400,000 payment in their accounts.
Initially scheduled for transfer by the end of the previous year, the funds remained undelivered well into the middle of this year. Concerned parties promptly contacted the fund’s trustees, responsible for overseeing more than 120 churches in Virginia and approximately 80 affiliated institutions. Although the breach was detected in February of this year, it wasn’t disclosed to the media until September 8, 2023.
2. Colombia Declares Emergency as Hackers Disrupt Judicial Websites
Colombia’s president was compelled to declare a state of emergency when hackers targeted and took down over 24 judicial websites. As a result, judges were unable to proceed with court hearings, leading to their postponement to the following week. Reports indicate that the Health and Culture Ministries’ website also fell victim to the cyber attack. In response, the National Police Cyber Intelligence unit PMU Ciber has been tasked with a comprehensive investigation into the incident.
3. Auckland Transport Authority Investigates Cyber Attack on HOP Services
Auckland Transport (AT) Authority in New Zealand has made headlines due to a cyber attack targeting its integrated ticketing and fare system, known as HOP Services. The organization, responsible for passenger transit via buses, trains, and ferries, is actively investigating the incident and has pledged to reveal further details as they become available. Authorities suspect the involvement of a notorious ransomware group in this attack.
4. Ransomware Variant 3AM Emerges as Replacement for LockBit
A noteworthy development in the realm of cyber threats has emerged as a ransomware variant, 3AM, replaces its predecessor, LockBit. Traditionally, threat actors deployed ransomware on corporate networks, but when some encountered difficulties using LockBit, they opted for the 3AM ransomware.
Security analysis teams at Symantec were the first to identify this shift and concluded that the deployment of 3AM represented a rare occurrence, possibly the first of its kind in development. 3AM operates as a “Killware” group, first exfiltrating data and then pressuring victims with a ransom demand. In cases where victims refuse to pay or fail to meet the demand, the attackers initiate data wiping on the infected machine, leaving no avenue for recovery. Simultaneously, they lock down backup systems, leaving victims with no choice but to comply with the ransom demand.
5. Data Breach Exposes 1.2 Million Customers of Purfoods
Purfoods, also known as Mom’s Meals, has reported a significant data breach affecting all of its 1.2 million customers. The breach included unauthorized access and theft of sensitive information, encompassing medical records, personal details such as card information and bank account numbers, and protected health history.
The organization has disclosed some details to the media, indicating that the breach occurred in January 2023 and involved the infiltration of a technology provider by a ransomware-spreading group. However, the specifics of the criminal group remain undisclosed at this time.
Ad