Daily Cybersecurity Roundup, March 14, 2022
Top 10 hacking news
A sophisticated cybercrime operation left Dominican officials bewildered and at a loss of millions. Another incident today refers to one of the largest manufacturers of tires that may have just a day’s time to avoid embarrassment. We also have victims from the healthcare, automotive, and gaming industries. Let’s continue reading for the top ten cybersecurity stories from the weekend.

Cybercriminals swindled $2.7 million in welfare cards by cloning ID cards of at least 30,000 beneficiaries of the government aid social program of the Presidency of the Republic, Supérate.
Three healthcare services providers in Alabama and Colorado laid bare the confidential records of over half a million patients. South Denver Cardiology Associates remained the most hit with more than 287,000 people impacted.
LockBit ransomware group announced to release the data it allegedly stole after breaching the networks of tire giant Bridgestone Americas. As per the threat, March 15 is the due date.
Denso, a supplier of automotive components that caters to clients—Toyota, General Motors, Honda, and Ford—discovered a third-party intrusion into its network.
Ubisoft confirmed a cybersecurity incident that had a transitory impact on its games, systems, and services. The victim claimed to have found no instance of user data theft or exposure.
The ASEC team uncovered a YouTube-based malware campaign disguised as cheat lures for the Valorant game. Scammers use RedLine infostealer to harvest crypto wallet files and credentials, among other key data.
Russia’s state corporation and defense firm Rostec revealed that its website was hit by a cyberattack. It added that it is facing targeted cyberattacks almost daily since late February.
Cylera Labs—with medium-high confidence—linked the activities of Shamoon APT with those behind Kwapirs malware. It said both could be from the same group as they have been collaborating, sharing updates, techniques, and codes for years.
McAfee warned against malicious Chrome Extensions that redirect online users to fake landing pages, insert Affiliate IDs, and modify legitimate websites to exfiltrate PII.
According to Check Point Research, the top malware impacting the New Zealand cyber landscape last month were Sohanad, followed by SnakeKeylogger, Formbook, AgentTesla, and Trickbot.