The Week In Review 19/04-23/04

The Week In Review 19/04 – 23/04

It probably comes as no surprise to hear that 2020 broke all sorts of records for all of the wrong reasons when it came to cyber security. 514 new malware variants were deployed, with 81% of these being privately developed and deployed. Worryingly, there are 1,900 hacker groups in existence comprised of APT’s, financially motivated actors, and uncategorized groups, this significant rise in the number of threat actors correlates with the sharp rise in cyber incidents globally. Another staggering fact that came to light was that more than 1 in 2 Indian adults fell victim to a hack within the last 12 months. This news comes some months after the Indian Government announced their Cyber education initiative to better equip its citizens to be able to identify and avoid cyber threats online. The latest figures support the data suggesting that active cyber criminal groups are at an all time high and continue to grow.

In recent weeks Facebook, WhatsApp and Android have been covered in the media for their various product and platform security flaws, this week Apple makes the headlines. A research team has uncovered a concerning array of privacy weaknesses with the “AirDrop” file sharing service on Apple’s products, which Apple have yet to address. The vulnerability itself means that senders of these files are at risk of sharing their contact details in a way that they can be obtained in an unencrypted state. The chances of them occurring to a user is, admittedly, slim but pose a concerning vulnerability should Apple not look to appropriately remediate it as is being claimed. Similarly, Telegram, who has also featured in our round-ups for several vulnerabilities makes yet another appearance. This time around, the messenger app has been found to be used by cyber criminals as a “command-and-control” system, abusing the messenger app to facilitate their malicious activities. Security firm CheckPoint have detected no less than 130 remote access trojan attacks named “ToxicEye” being delivered in this method. Due to the nature of Telegram, the attackers are able to remain totally anonymous and deploy these attacks from infected devices across the globe.

How effectively would your organisation respond to a real life cyber attack? Find out with Dionach’s Red Team Engagement designed to simulate a real cyber attack from your most likely threat actors. 

Read about all of this and more below:

US takes steps to protect electric system from cyberattacks
(securityweek.com)

Russian hacking group targets Ukranian officials
(cyberscoop.com)

1 in 2 Indian adults fell victim to cyber crime in the last year
(indiatimes.com)

Cyber criminals use telegram to control ToxicEye malware
(thehackernews.com)

Apple AirDrop vulnerability uncovered
(theregister.com)

SolarWinds hack analysis reveals a 56% boost in command server footprint
(zdnet.com)

Record number of cyber criminal groups active
(cyware.com)

Find out how we can help with your cyber challenge

Please enter your contact details using the form below for a free, no obligation, quote and we will get back to you as soon as possible. Alternatively, you can email us directly at [email protected]

Related Posts

AdobeStock_476014459

Dionach Partnership with the UK Space Agency Enhances Cyber Security of Space SMEs

Cyber security consultancy Dionach have signed a contract extension with the UK Space Agency to accelerate cyber security within UK Space companies. Dionach, a leading cybersecurity consultancy, has signed a contract extension with the UK space agency to help SMEs within the Space Sector improve their cyber security practices and achieve Cyber Essentials Plus certification. […]
AdobeStock_186430869

Dionach Achieves JOSCAR Registration

A Milestone in Aerospace, Defence, and Security Compliance We are thrilled to announce that Dionach is now a registered supplier on the defence portal JOSCAR, managed by Hellios. This significant achievement underscores our commitment to excellence and compliance in the aerospace, defence, and security sectors. Being JOSCAR registered not only reflects our dedication to maintaining […]
Contact Us

Contact Us React out to one of our cyber experts and we will arrange a call