Secret CISO 3/18: Fujitsu's Malware Mayhem, Connecticut's Cybersecurity Bill, Tesla's Wi-Fi Woes, and the Importance of AI Security

Secret CISO 3/18: Fujitsu's Malware Mayhem, Connecticut's Cybersecurity Bill, Tesla's Wi-Fi Woes, and the Importance of AI Security

Welcome to today's edition of Secret CISO, your daily source for the most impactful cybersecurity news. Today, we're diving into the recent data breach at Fujitsu, the Japanese multinational ICT conglomerate. The company has discovered malware on its work computers, warning of a potential data leak that could impact personal and customer information. Meanwhile, lawmakers in Connecticut are taking action to help hospitals fight future cyberattacks, following a data breach across three state hospitals last year. The proposed bill would require the state to provide additional support to these institutions. In other news, healthcare data breaches continue to pile up, with 63% of known exploited vulnerabilities found on healthcare networks. This comes as providers sue Change Healthcare over a data breach that has caused a significant financial burden. On a global scale, the National Identity Management Commission (NIMC) in Nigeria has dismissed reports of a data breach, assuring citizens that their data is safe and secure. Lastly, we'll touch on the latest research in cybersecurity, including a recent study on the importance of security in AI development and the potential risks of supply-chain attacks. Stay tuned for more details on these stories and other cybersecurity updates. Stay safe, stay informed with Secret CISO.

Data Breaches

  1. Fujitsu Data Breach: Fujitsu, a Japanese multinational ICT conglomerate, confirmed a data breach after discovering malware on its work computers. The breach impacted both personal and customer information, raising concerns about the potential misuse of the stolen data. The company has isolated the compromised systems and is investigating the incident. Source: Cybernews, SecurityWeek, Bleeping Computer.
  2. Connecticut Hospitals Data Breach: A data breach occurred across three Connecticut hospitals owned by Prospect Medical Holdings last year. In response, lawmakers are pushing a bill that would require the state to provide support to hospitals to prevent future cyberattacks. The specifics of the breach and its impact are not detailed. Source: CT Mirror.
  3. Change Healthcare Data Breach: Change Healthcare, a healthcare technology company, is facing lawsuits from providers over a data breach. The breach has caused significant financial burden to the affected providers, with some having to dip into retirement funds to cover costs. The extent of the breach and the number of affected individuals are not specified. Source: BenefitsPro.
  4. ChatGPT Data Breach: OpenAI confirmed a data breach involving its language model, ChatGPT. The breach was confirmed after a security firm warned of a vulnerable component that could be exploited. The extent of the breach and its impact are not detailed. Source: SecurityWeek.
  5. MediaWorks Data Breach: New Zealand-based company MediaWorks is investigating a security incident after a hacker claimed to have stolen data. The company has warned that the hackers are directly targeting individuals following the alleged data breach. The extent of the breach and the number of affected individuals are not specified. Source: The Record.

Security Research

  1. Hacking and Stealing Teslas: Security researchers from Mysk, Inc. demonstrated how a false public Wi-Fi network could be used to steal Tesla cars. The attack showcases the vulnerability of connected vehicles to cyber threats. Source: MarketWatch
  2. APT28 Hacker Group's Widespread Phishing Scheme: Security researchers Joe Fasulo, Claire Zaboeva, and Golo Mühr revealed an elaborate phishing scheme by APT28 targeting Europe, Americas, and Asia. The scheme ends with the execution of MASEPIE, indicating the group's sophisticated tactics. Source: The Hacker News
  3. China's Control in Kinmen Waters: Taiwanese security researchers warn about China's assertive control in Kinmen waters. The research highlights the geopolitical tensions and potential security risks in the region. Source: Times of India
  4. Security in AI Development: Tom Bonner, VP of research at HiddenLayer, emphasizes the importance of security in AI development. He points out that many AI projects lack proper security measures, making them vulnerable to supply-chain attacks. Source: Elblog
  5. USENIX Security '23: Researchers Tanusree Sharma, Zhixuan Zhou, Andrew Miller, and Yang Wang presented a mixed-methods study of security practices of smart contract developers at USENIX Security '23. The study provides insights into the security challenges and best practices in the field of smart contract development. Source: Security Boulevard

Top CVEs

  1. CVE-2024-20767: ColdFusion versions 2023.6, 2021.12 and earlier are affected by an Improper Access Control vulnerability that could lead to arbitrary file system read. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access to sensitive files and perform arbitrary file system write. Source: CVE-2024-20767
  2. CVE-2024-24867: Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Osamaesh WP Visitor Statistics (Real Time Traffic). This issue affects WP Visitor Statistics (Real Time Traffic). Source: CVE-2024-24867
  3. CVE-2024-27961: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Codekraft AntiSpam for Contact Form 7 allows Reflected XSS. This issue affects AntiSpam for Contact Form 7. Source: CVE-2024-27961
  4. CVE-2024-25903: Exposure of Sensitive Information to an Unauthorized Actor vulnerability in N-Media Frontend File Manager. This issue affects Frontend File Manager. Source: CVE-2024-25903
  5. CVE-2024-25933: Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Pepro Dev. Group PeproDev Ultimate Invoice. This issue affects PeproDev Ultimate Invoice. Source: CVE-2024-25933

Final Words

And that's a wrap for today's edition of the Secret CISO newsletter. As we've seen, the cyber landscape is ever-evolving, with new threats and vulnerabilities emerging every day. From the Fujitsu data breach to the ongoing efforts to bolster hospital cybersecurity, it's clear that no sector is immune to these challenges. Remember, knowledge is power. By staying informed, we can all play a part in strengthening our defenses and making the digital world a safer place. So, don't keep this valuable information to yourself. Share this newsletter with your friends, colleagues, and anyone else who could benefit from a daily dose of cybersecurity insights. Stay safe, stay informed, and keep an eye out for tomorrow's edition of Secret CISO. Until then, remember - the secret to cybersecurity is continuous learning.

Read more