The Week In Review 19/04-23/04

The Week In Review 19/04 – 23/04

It probably comes as no surprise to hear that 2020 broke all sorts of records for all of the wrong reasons when it came to cyber security. 514 new malware variants were deployed, with 81% of these being privately developed and deployed. Worryingly, there are 1,900 hacker groups in existence comprised of APT’s, financially motivated actors, and uncategorized groups, this significant rise in the number of threat actors correlates with the sharp rise in cyber incidents globally. Another staggering fact that came to light was that more than 1 in 2 Indian adults fell victim to a hack within the last 12 months. This news comes some months after the Indian Government announced their Cyber education initiative to better equip its citizens to be able to identify and avoid cyber threats online. The latest figures support the data suggesting that active cyber criminal groups are at an all time high and continue to grow.

In recent weeks Facebook, WhatsApp and Android have been covered in the media for their various product and platform security flaws, this week Apple makes the headlines. A research team has uncovered a concerning array of privacy weaknesses with the “AirDrop” file sharing service on Apple’s products, which Apple have yet to address. The vulnerability itself means that senders of these files are at risk of sharing their contact details in a way that they can be obtained in an unencrypted state. The chances of them occurring to a user is, admittedly, slim but pose a concerning vulnerability should Apple not look to appropriately remediate it as is being claimed. Similarly, Telegram, who has also featured in our round-ups for several vulnerabilities makes yet another appearance. This time around, the messenger app has been found to be used by cyber criminals as a “command-and-control” system, abusing the messenger app to facilitate their malicious activities. Security firm CheckPoint have detected no less than 130 remote access trojan attacks named “ToxicEye” being delivered in this method. Due to the nature of Telegram, the attackers are able to remain totally anonymous and deploy these attacks from infected devices across the globe.

How effectively would your organisation respond to a real life cyber attack? Find out with Dionach’s Red Team Engagement designed to simulate a real cyber attack from your most likely threat actors. 

Read about all of this and more below:

US takes steps to protect electric system from cyberattacks

Russian hacking group targets Ukranian officials

1 in 2 Indian adults fell victim to cyber crime in the last year

Cyber criminals use telegram to control ToxicEye malware

Apple AirDrop vulnerability uncovered

SolarWinds hack analysis reveals a 56% boost in command server footprint

Record number of cyber criminal groups active

Find out how we can help with your cyber challenge

Please enter your contact details using the form below for a free, no obligation, quote and we will get back to you as soon as possible. Alternatively, you can email us directly at [email protected]

Related Posts


Dionach Achieves JOSCAR Registration

A Milestone in Aerospace, Defence, and Security Compliance We are thrilled to announce that Dionach is now a registered supplier on the defence portal JOSCAR, managed by Hellios. This significant achievement underscores our commitment to excellence and compliance in the aerospace, defence, and security sectors. Being JOSCAR registered not only reflects our dedication to maintaining […]

Dionach Joins the ADS Group

A New Chapter in Aerospace, Defence, and Space Innovation We are thrilled to announce that Dionach has been officially approved as a member of ADS, the UK’s premier Aerospace, Defence, and Space industry trade association! This prestigious certification underscores our commitment to excellence and innovation within these critical sectors. As an ADS member, we look […]

Dynamic Cybersecurity: Latest Trends and Updates

In today’s interconnected digital world, the field of cybersecurity is constantly evolving to keep up with emerging threats and vulnerabilities. Staying updated with the latest developments is crucial for individuals and organisations alike to protect their sensitive information from malicious actors. In this blog post, we will explore some of the most significant updates and […]
Contact Us

Contact Us React out to one of our cyber experts and we will arrange a call