Dateline Moscow, Kyiv, Berlin, Brussels, London, New York, and Washington: Fire, but not much maneuver, and disrupted Russian cyber attacks.
Ukraine at D+43: Intercepts, imagery, and evidence of atrocities. (The CyberWire) Russian retreat and attempts at reconstitution are confirmed, along with fresh and independently corroborated evidence of Russian atrocities. Microsoft disrupts a GRU operation and shares its findings with Kyiv.
Russia’s invasion of Ukraine: List of key events on day 44 (Al Jazeera) On the 44th day of the Russia-Ukraine war, here is a look at the main developments.
Putin’s ‘probably given up’ on Kyiv as Ukraine war enters new phase (Defense News) “I think Putin has probably given up on his effort to capture the capital city and is now focused on the south and east of the country,” says U.S. Defense Secretary Lloyd Austin.
Ukraine says 39 killed in rocket strike on rail evacuation hub (Reuters) Ukraine said dozens of people died and many more were wounded in a rocket strike at a railway station packed with civilians fleeing fighting and a threat of a major Russian offensive in the country’s east.
Missile kills dozens of evacuees at Ukrainian train station (AP NEWS) A missile hit a crowded train station in eastern Ukraine that was an evacuation point for civilians, killing dozens of people Friday, Ukrainian authorities said while warning they expected to find more evidence of possible war crimes in parts of the country previously held by Russian troops.
Russian rocket attack on Kramatorsk train station kills dozens—Ukraine (Newsweek) Civilians were using the railway station to evacuate the eastern Ukrainian city for safer parts of the country, Ukrainian authorities said. Live updates here.
‘Evil that has no limits’: Zelenskiy condemns Kramatorsk station attack (the Guardian) Dozens killed as Ukraine says two Russian rockets struck station being used to evacuate civilians to safety
Possible Evidence of Russian Atrocities: German Intelligence Intercepts Radio Traffic Discussing the Murder of Civilians in Bucha (Der Spiegel) The images of the murdered civilians in Bucha shocked the world. DER SPIEGEL has learned that German intelligence intercepted radio traffic from suspected perpetrators. It appears that such atrocities were part of the strategy of Putin’s army.
Germany intercepts Russian talk of indiscriminate killings in Ukraine (Washington Post) Germany’s foreign intelligence service claims to have intercepted radio communications in which Russian soldiers discuss carrying out indiscriminate killings in Ukraine.
Germany Tapped Russian Chatter on Bucha Killings, Spiegel Says (Bloomberg) Reports may help case against Russia over alleged atrocities. German officials see deliberate terror strategy, Spiegel says.
Intercepted radio messages ‘prove Russia planned Bucha atrocities’ (The Telegraph) Russian soldiers openly discussed killing civilians in radio messages obtained by German intelligence
In Bucha, the scope of Russian barbarity is coming into focus (Washington Post) The name of this city is already synonymous with the month-long carnage that Russian soldiers perpetrated here.
In Bucha, Ukraine, burned, piled bodies among latest horrors (AP NEWS) One blackened body had arms raised in supplication, the face contorted in a horrible scream. The skull of another had a bullet hole in the left temple. The small blackened foot of a child could be seen in the tangle of charred bodies piled together in Bucha, the town outside of Kyiv where graphic evidence of killings and torture has emerged following the withdrawal of Russian forces.
We are risking our lives to expose Russia’s atrocities. The world must do more than just watch | Katerina Sergatskova (the Guardian) One Ukraine journalist tells why she and her colleagues across the country are determined to bear witness to unfolding horrors
Two weeks that shook Kharkiv: A geographic tour of Russia’s attacks on civilian neighborhoods in Ukraine’s second-largest city (Atlantic Council) The Atlantic Council’s Digital Forensic Research Lab (DFRLab) documented and geolocated more than 140 videos from Kharkiv over a two-week period, recording dozens of incidents in which Russian firepower devastated the city’s neighborhoods.
What Makes Armies Commit Atrocities? (Foreign Policy) The crimes in Ukraine stem from Russian military brutalities.
Belarusian railway rebellion disrupts Vladimir Putin’s Ukraine War (Atlantic Council) Railway workers in Belarus are staging a quiet rebellion against the country’s supporting role in Vladimir Putin’s Ukraine War and are creating headaches for Belarusian dictator Alyaksandr Lukashenka.
Belarusians, Russians Join Ukraine’s Military, Hoping for Freedom at Home (Wall Street Journal) Hundreds of volunteers from Belarus have joined a dedicated Belarusian battalion since the invasion of Ukraine, while a separate unit staffed by Russian citizens is also preparing to deploy to the front lines.
Video: ‘You Don’t Understand’: Ukraine Official on Possible Military Atrocities (New York Times) Dmytro Kuleba, Ukraine’s foreign minister, said his country would investigate “isolated incidents” of atrocities in response to a video, verified by The New York Times, that appears to show a group of Ukrainian soldiers killing captured Russian troops.
U.N. Kicks Russia Off Human Rights Council (Foreign Policy) In one way at least, so far, Vladimir Putin’s Russia has joined Muammar al-Qaddafi’s Libya.
Human rights vote at U.N. highlights stark divisions over Russia (Washington Post) The U.N. General Assembly’s Thursday vote suspending Russia from the body’s Human Rights Council drew a newly clear delineation of the global order in ways that seemed to go far beyond allegations of Russian war crimes in Ukraine.
EU leaders arrive in Ukraine to reassure Zelenskiy on membership (Reuters) The European Commission chief and the EU’s top diplomat arrived in Kyiv on Friday to offer Ukrainian President Volodymyr Zelenskiy support and reassurance over his bid for EU membership in a capital gradually reviving after Russia pulled back forces.
Why Putin Underestimated the West (Foreign Affairs) And how to sustain its newfound unity.
Ukraine: The Seeds of War (Al Jazeera) Putin’s plan or NATO’s neglect – A look at the causes of Russia’s war on Ukraine and whether it could’ve been prevented.
Romania Calls for Permanent US Presence, Air Policing to Deter Russia (Air Force Magazine) Romanian defense officials are calling for a permanent U.S. presence to prevent further Russian aggression.
Russia says it would have to ‘rebalance’ if Finland and Sweden join NATO (Reuters) Kremlin spokesperson Dmitry Peskov said on Thursday that if Finland and Sweden joined NATO then Russia would have to “rebalance the situation” with its own measures.
Expulsion of Russian ‘diplomats’ may strangle Moscow’s spying (Washington Post) In the international game of spy vs. spy, Europe has dealt Russia a potentially crippling blow.
Peace in Europe ‘will not exist’ as long as Putin is in power, says Mikhail Khodorkovsky (Atlantic Council) The exiled Russian businessman appeared at an Atlantic Council Front Page event, where he said the West can no longer bury its head in the sand when it comes to Putin’s goals.
U.S. and NATO allies pledge more arms to Ukraine (Reuters) The United States will send new weapon systems to Ukraine, Washington’s top diplomat said on Thursday after NATO foreign ministers agreed to accelerate arms deliveries in response to Russia’s invasion.
WHO Is Preparing for Possible Chemical Attacks in Ukraine War (Bloomberg) UN agency says it considers all scenarios, makes contingencies. WHO has been in contact with IAEA about nuclear risk.
Microsoft says it disrupted attempted hacks by Russian spies (Reuters) Microsoft Corp said on Thursday it had disrupted hacking attempts by Russian military spies aimed at breaking into Ukrainian, European Union, and American targets.
Microsoft disrupts Russia-linked Strontium domains (Computing) Microsoft has seized control of seven internet domains, which it says the Strontium hacking group used to launch cyberattacks against Ukrainian institutions, as well as government entities and think tanks in the US and Europe.
Microsoft takes down APT28 domains used in attacks against Ukraine (BleepingComputer) Microsoft has successfully disrupted attacks against Ukrainian targets coordinated by the Russian APT28 hacking group after taking down seven domains used as attack infrastructure.
Microsoft says it disrupted Russian cyberattacks targeting Ukraine, West (The Hill) Microsoft announced Thursday that it had disrupted Russian cyberattacks targeting Ukraine and organizations in the United States and European Union. A Russian hacking group was targeting Ukrainian …
Disrupting cyberattacks targeting Ukraine – Microsoft On the Issues (Microsoft On the Issues) We recently observed attacks targeting Ukrainian entities from Strontium, a Russian GRU-connected actor we have tracked for years, and this week we were able to disrupt some of Strontium’s attacks on targets in Ukraine.
Russian-backed hackers broke into Facebook accounts of Ukrainian military officials (CBS News) Facebook’s parent company, Meta, says they posted videos urging the Ukrainian army to surrender and filed as many as thousands of false reports against users, mainly in Ukraine and Russia, for policy violations.
US Cyber Command reinforces Ukraine and allies amid Russian onslaught (C4ISRNet) “In conjunction with interagency, private sector and allied partners, we are collaborating to mitigate threats to domestic and overseas systems,” Gen. Paul Nakasone, the U.S. Cyber Command boss, told the Senate Armed Services Committee.
FBI Cybersecurity Strike Against Russian Botnet Is ‘Awesome Moment’ For MSPs (CRN) Here’s a look at why the FBI’s successful preemptive strike to take down a Russian-government-backed botnet is a landmark moment in the MSP battle to protect Main Street from cybersecurity attacks.
Facial Recognition Goes to War (New York Times) Services that put a name to a face, including Clearview AI, are being used to identify Russian soldiers, living or dead, and to verify that travelers in Ukraine are who they claim.
It’s also important to win the information war with Putin’s Russia (The Hill) The Russian ambassador to the United Nations, Vassily Nebenzia, accuses the West of plotting “an information war on Russia.” If only he were right. As Russia’s war in Ukraine continues, V…
China is Russia’s most powerful weapon for information warfare (Washington Post) Tech giants and governments have crippled Russian state media, but Chinese outlets push the same talking points.
What Lessons Does China Take From Putin’s War? (Foreign Policy) A month into the invasion, Beijing is still backing Russia.
How will Russia’s war in Ukraine reshape the European political scene? Look to France. (Atlantic Council) France’s presidential elections this month represent an important barometer of the strength of European populism. Here’s how the war has already shaken the campaign.
Rebuilding Ukraine: EU must prepare to lead the post-war recovery (Atlantic Council) The European Union is expected to play a key role in efforts to rebuild Ukraine following the end of the current war with Putin’s Russia but at present the EU is unprepared for this major institutional challenge.
Russia is set to default on its dollar debts by paying bondholders in rubles, global banking body says (Markets Insider) The Institute of International Finance said Russia is moving closer to a default, after the sanction-hit country insisted it would pay its dollar debts in rubles.
Russian Tech Spending Declines as Sanctions Take Toll (Wall Street Journal) Information-technology spending in Russia is expected to drop 39% this year as global business sanctions triggered by the invasion of Ukraine weigh on companies.
Congress Sends Biden a Bill Banning Russian Oil Imports (Bloomberg) The House passed and sent to President Joe Biden for his signature legislation that would bar U.S. imports of Russian oil, gas and coal.
UK joins US in imposing sanctions on Putin’s daughters (the Guardian) Maria Vorontsova and Katerina Tikhonova will be subject to asset freeze and travel ban
U.S. Takes First Enforcement Actions Against Alleged Violators of Russia Export Controls (Wall Street Journal) The U.S. on Thursday took its first actions to enforce the sweeping bans on the export of technology and industrial goods to Russia in response to the country’s invasion of Ukraine.
Protesters set fire to Lake Como villa of Kremlin propagandist and pour red paint in pool (The Telegraph) Vandals target luxury holiday properties of Vladimir Solovyev, a Russian TV presenter and ally of Vladimir Putin
Attacks, Threats, and Vulnerabilities
Meta Disrupts Two Iranian Threat Groups (Decipher) Meta has disrupted the operations of two Iranian threat actors, including UNC788 and a previously unidentified group, that were using the company’s platforms to target a wide range of victims.
How do China’s cyber-spies snoop on big targets? Like this (Register) Cicada’s months-long global espionage campaign marks an expansion of team’s capabilities
Suspected China-backed hackers target 7 Indian electricity grid centers (The Record by Recorded Future) China on Thursday denied any connection to cyberattacks targeting seven facilities managing the electricity grid in Northern India after a new report from Recorded Future implicated a group potentially connected to the country’s military.
Indian Power Grid Targeted Again by Chinese State-Backed Hackers: US Intel Firm (The Wire) The targeting was “geographically concentrated” in North India, in proximity to the India-China border in Ladakh, Recorded Future said.
India Claims It Foiled Chinese Cyberattack on Disputed Border (SecurityWeek) India says it foiled an cyberattack by Chinese hackers targeting its power distribution system near a disputed frontier where the two countries are engaged in a military stand-off.
Centre claims it foiled Chinese cyber-attack on disputed border (Deccan Herald) India on Thursday claimed it foiled an attempted cyber-attack by Chinese hackers targeting its power distribution system near a disputed frontier where the two countries are engaged in a military stand-off. Ties between the world’s two most populous nations are at a low ebb after a deadly skirmish in the Himalayan region of Ladakh that left at least 20 Indian and four Chinese soldiers dead in 2020.
SPM55: Ascending the Ranks of Indonesian Phishing As A Service Offerings (DomainTools) In light of the recent international law enforcement activity against the 16Shop principal “DevilScreaM”, we review a competing service known as SPM55, attempting to fill
Salt Security releases new API vulnerability research (Salt Security) Salt Security releases new API vulnerability research from Salt Labs that details a Server-Side Request Forgery (SSRF) flaw
Looking Inside Pandora’s Box (Fortinet Blog) FortiGuard Labs analyzes the emerging state-of-the-art Pandora ransomware targeting corporate networks for financial gain. Read our blog to see how it evades detection, anti-analysis, and more. Rea…
The Latest Remcos RAT Driven By Phishing Campaign | FortiGuard Labs (Fortinet Blog) FortiGuard Labs analyzes how a phishing campaign delivers the Remcos RAT onto a victim’s device, how it executes on the device, the sensitive information it steals from the victim, as well as the c…
Google is on guard: sharks shall not pass! (Check Point Research) Research by: Alex Shamshur, Raman Ladutska Introduction When you search for Anti-Virus (AV) solutions to protect your mobile devices, you don’t expect these solutions to do the opposite i.e. make devices vulnerable to malware. This what the Check Point Research (CPR) team encountered while analyzing suspicious applications found in Google Play. These applications pretended to… Click to Read More
Android apps with 45 million installs used data harvesting SDK (BleepingComputer) Mobile malware analysts warn about a set of applications available on the Google Play Store, which collected sensitive user data from over 45 million devices.
BlackCat Ransomware Targets Industrial Companies (SecurityWeek) A data theft tool used by the BlackCat (ALPHV) ransomware group shows the cybercriminals are increasingly interested in industrial organizations.
North Carolina A&T hit with ransomware after ALPHV attack (The Record by Recorded Future) North Carolina A&T University has become the latest school hit with ransomware in 2022.
More than 8 million Cash App Investing customers potentially impacted by data breach linked to former employee (CNN) More than 8 million Cash App Investing customers may have had personal data compromised after a former employee downloaded internal reports without permission, parent company Block Inc revealed in a regulatory filing earlier this week.
WonderHero game disabled after hackers steal $320,000 in cryptocurrency (The Record by Recorded Future) The operators of cryptocurrency play-to-earn game WonderHero have disabled the service after hackers stole about $320,000 worth of Binance Coin (BNB).
First Financial begins to notify members of data breach (Albuquerque Business Journal) First Financial Credit Union doesn’t believe that personal identifying information has been misused, or that unauthorized users gained access to authorization credentials or to the credit union’s financial system.
Report: FOX NEWS Exposed Nearly 13 Million Content Management Records Online (Website Planet) Security researcher Jeremiah Fowler together with the Website Planet research team discovered an open and non-password protected database that contain
Security Patches, Mitigations, and Software Updates
VMware Releases Security Updates (CISA) VMware has released security updates to address vulnerabilities in multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected system. CISA encourages users and administrators to review VMware Security Advisory Advisories VMSA-2022-0011 and VMSA-2022-0012 and apply the necessary updates.
Microsoft: Windows Autopatch is coming soon. Here’s what you need to know (ZDNet) A new service could make the rush to update after ‘Patch Tuesday’ a thing of the past.
Pepperl+Fuchs WirelessHART-Gateway (CISA) 1. EXECUTIVE SUMMARY
CVSS v3 9.8
ATTENTION: Exploitable remotely/low attack complexity
Vulnerabilities: Use of Hard-coded Credentials, Uncontrolled Resource Consumption, Reliance on Reverse DNS Resolution for a Security-critical Action, Path Traversal, Cross-site Scripting, Exposure of Sensitive Information to an Unauthorized Actor, Cleartext Storage of Sensitive Information in a Cookie, HTTP Request Smuggling, Sensitive Cookie Without ‘HttpOnly’ Flag, Cryptographic Issues
ABB SPIET800 and PNI800 (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: ABB Equipment: Symphony Plus SPIET800 and PNI800 Vulnerabilities: Incomplete Internal State Distinction, Improper Handling of Unexpected Data Type, Uncontrolled Resource Consumption 2.
Mitsubishi Electric GOT and Tension Controller (Update A) (CISA) 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Mitsubishi Electric Equipment: GOT and Tension Controller Vulnerabilities: Improper Handling of Exceptional Conditions, Improper Input Validation ——— Begin Update A Part 1 of 2 ———
Cowbell Cyber Report Finds 79% of Policyholders Believe Cyber Insurance is Worth the Cost (PR Newswire) Cowbell Cyber, the leading provider of cyber insurance for small and medium-sized enterprises (SMEs), today announced the findings from its…
Report: 60% of IT Decision Makers Say Cloud Capabilities Have Helped Their Organization Achieve Sustainable Growth (Yahoo Finance) Foundry’s new study also found data privacy and security as top challenges when implementing a cloud strategyBoston, MA, April 07, 2022 (GLOBE NEWSWIRE) — Foundry (formerly IDG Communications), the global leader in media, martech and data for the tech community, today released its 2022 Cloud Computing Survey. In its 9th year, the research was conducted to measure cloud computing trends among technology decision makers, including usage and top growth areas, investments, business drivers and shif
The Blurring Line, and Growing Risk, Between Physical and Digital Supply Chains (Dark Reading) Risk increases as the lines between physical and digital supply chains blur and the computing footprint expands.
Paying ransom doesn’t guarantee data recovery (Help Net Security) A staggering 79% of respondent organizations have been targeted by ransomware within the past 12 months, OwnBackup and ESG reveal.
Apple leaves privacy trade group citing ‘weak privacy laws’ (AppleInsider) Apple has dropped out of the State Privacy and Security Coalition (SPSC) after expressing concerns that the trade group pushed legislation that would not adequately protect user data.
Akamai Poised to Grow, Post-Partnership (TipRanks Financial) Cybersecurity and cloud service company Akamai Technologies, Inc. (NASDAQ: AKAM) recently revealed that it has partnered with fellow cloud compu…
Will more collaboration between Mandiant and CrowdStrike make us safer?￼ (SC Magazine) Security analysts see great opportunities for Mandiant and CrowdStrike to work together on important security breaches. But how will Google’s acquisition of Mandiant and any future moves by other Big Tech companies influence the industry’s ability to solve security issues for customers?
Identity Access Management Leader Authomize Appoints Customer Success, Strategic Channels, and Business Operations Leaders to Continue its Global Expansion (PR Newswire) Authomize, the first Cloud Identity Access Management (IAM) Security Platform, announced today the appointment of executives over the past…
SentinelOne Promotes Nicholas Warner to President, Vats Srivatsan Joins as COO (Business Wire) SentinelOne (NYSE: S), an autonomous cybersecurity platform company, today announced that Chief Operating Officer Nicholas Warner has been promoted to
Products, Services, and Solutions
New infosec products of the week: April 8, 2022 (Help Net Security) The featured infosec products this week are from: ColorTokens, Forescout, Fortinet, IBM, Imperva, Keysight Technologies, and Orca Security.
Absolute Software Unveils Advances in Resilient Zero Trust Security (Yahoo Finance) Absolute Software™ (NASDAQ: ABST) (TSX: ABST), a leader in self-healing endpoint and secure access solutions, today announced enhancements to its Secure Access product portfolio (formerly NetMotion by Absolute), enabling customers to minimize risk exposure and further optimize the user experience in today’s borderless, work-from-anywhere environments. With this release, Absolute is delivering a broad range of new product innovations
Radware Introduces Game Changing New Way to Deploy and Consistently Protect Applications Across Any Cloud (GlobeNewswire News Room) Innovative SecurePath™ architecture offers API-based, out-of-path deployment that reduces latency, simplifies deployment, and improves security…
Mandiant to Use CrowdStrike Technology in Its Incident Response Services (Dark Reading) Collaboration between the two firms will help organizations better identify and protect against complexity cyberthreats, chief executives from both companies said.
Tanium Tackles Extended Attack Surface With Converged Endpoint Management (Forbes) Tanium has introduced a new category, Converged Endpoint Management (XEM), to help customers discover, monitor, and protect their complete attack surfaces.
Cyber Security Enhanced: NTT Data Business Solutions and Security Bridge Extend their Partnership (PR Newswire) NTT DATA Business Solutions AG and SecurityBridge are expanding their strategic partnership. In the course of the collaboration, NTT DATA…
NewNet Secure Transactions Selects Oracle Cloud Infrastructure Providing Customers with Secure and Scalable Cloud Payments (PR Newswire) NewNet Secure Transactions, a global provider of secure payment transport systems and a member of Oracle PartnerNetwork (OPN), today announced…
Technologies, Techniques, and Standards
Power Grid Stress Test Finds Low-Tech Needs for High-Tech Problems (Wall Street Journal) The GridEx war game tested nation-state cyber and physical attacks on energy infrastructure.
Dire grid hacking scenario sparked “shields up” approach to Russian threat (Medium) Every two years, the electricity industry runs a stress test designed to find and fix gaps in the North American grid’s cyber and physical…
Resilience in the face of ransomware: considerations for executives. (The CyberWire) At the 8th Annual Cybersecurity Conference for Executives, hosted by Ankura and the Johns Hopkins University Information Security Institute (JHU ISI) on March 16th, industry experts discussed cybersecurity trends, regulations, and threats.
Guidance on Sharing Cyber Incident Information (CISA) CISA’s Sharing Cyber Event Information Fact Sheet provides our stakeholders with clear guidance and information about what to share, who should share, and how to share information about unusual cyber incidents or activity.
NCCoE Releases Final Guidance on Effective Enterprise Patch Management (HIPAA Journal) The National Cybersecurity Center of Excellence (NCCoE) has released the final versions of two Special Publications that provide guidance on enterprise NCCoE has released the final versions of its Special Publications – Guide to Enterprise Patch Management Planning and Improving Enterprise Patching for General IT Systems.
Cumberlands competes in NSA Codebreaker Challenge (Lane Report) The University of the Cumberlands School of Computer and Information Sciences fielded its inaugural student-faculty team to take…
Legislation, Policy, and Regulation
Outrage after EU signs mega-deal with UK firm to handle confidential data (POLITICO) Critics say Commission can’t achieve strategic autonomy while awarding multibillion-euro contracts to non-EU companies.
US brings foreign banks into intelligence-sharing fold (Financial Times) Agencies take unusual step of disseminating assessments with overseas lenders to bolster cyber defences
Private Sector Player Urges DOD to Screen 5G Technology for Cybersecurity (Nextgov.com) The Pentagon is offering cash prizes for hardware or software ideas to make various components of fifth-generation networking technology interoperable across various manufacturers.
Call out Chinese Spying for the Threat it Is (The Cipher Brief) Former CIA Deputy Director for Counterintelligence Mark Kelton writes in a Cipher Brief that the U.S. should call out Chinese spying
Biden nominates critic of surveillance software to FTC, further bolstering agency as check on Big Tech (Washington Post) Alvaro Bedoya has spearheaded pivotal research into how the government’s use of facial recognition software hurts America’s most marginalized
Litigation, Investigation, and Law Enforcement
How Bitcoin Tracers Took Down the Web’s Biggest Child Abuse Site (Wired) Welcome to Video’s customers thought their payments were untraceable. They couldn’t have been more wrong. The untold story of the case that shredded the myth of Bitcoin’s anonymity.
US: Man impersonated agent, claimed ties to Pakistani intel (Washington Post) One of two men accused of impersonating federal agents and giving actual Secret Service agents gifts and free apartments in Washington has claimed to have ties to Pakistani intelligence and had visas showing travel to Pakistan and Iran, federal prosecutors said Thursday.
2 Men Posing as Federal Agents Duped Secret Service, U.S. Says (New York Times) Members of the Secret Service were placed on leave after receiving gifts, including rent-free apartments, from the men, an affidavit said. One claimed ties to Pakistani intelligence, prosecutors said.
FIN7 hacking group ‘pen tester’ sentenced to 5 years in prison (BleepingComputer) Denys Iarmak, a Ukrainian member and a “pen tester for the FIN7 financially-motivated hacking group, was sentenced on Thursday to 5 years in prison for breaching victims’ networks and stealing credit card information for roughly two years, between November 2016 and November 2018.
Lakeview Loan Servicing Faces Another Suit Over 2021 Data Breach (Bloomberg Law) Lakeview Loan Servicing was hit with a proposed class action on Thursday over a data breach in December that allegedly exposed the personal information of over 2.5 million customers.