Welcome to 2023! wishes you a sparkling New Year :)
A doppelganger of a PyTorch dependency was discovered in the wild, which could have resulted in system compromise by actors using the dependency confusion attack vector. Meanwhile, a Linux malware variant poses a risk to users by exploiting vulnerabilities in over two dozen WordPress plugins and themes. It is recommended that website users keep their web app components up to date.
The CISA then listed a couple of actively exploited bugs in TIBCO JasperReports products. The first is a server component information disclosure bug, and the second is a directory traversal flaw in its library.
Top Threat Intelligence Cybersecurity Breaches Reported in the Last 24 Hours
Bristol Community College's computer systems hacked in ransomware attack
Bristol Community College was the victim of a ransomware attack, which disrupted its internet-related communication systems, including email and Teams, and rendered shared documents inaccessible to students and employees. Students and faculty were asked to think about changing their credentials.
Medical information was leaked
Since 2016, Jama Network has discovered the medical information of approximately 42 million Americans being sold on underground marketplaces. The study looked at trends in ransomware attacks on healthcare institutions in the United States between 2016 and 2021. According to experts, the number of attacks during that time period has also more than doubled.
Top Threat Intelligence Cybersecurity Malware Reported in the Last 24 Hours
Malicious dependency chain compromise over holidays
The PyTorch team discovered a malicious dependency in its framework library. The package was named after the torchtriton dependency. A hacker could use it to successfully launch dependency confusion attacks, compromising multiple systems. The fake framework should be uninstalled, according to PyTorch administrators.
BlackCat’s new tactic
The ALPHV/BlackCat ransomware group tried out a new extortion method. It set up a duplicate site for one of its victims and published the stolen data there. The victim firm, which is in the financial services industry, appears to have refused to comply with the threat actor's demands.
Top Threat Intelligence Cybersecurity Vulnerabilities Reported in the Last 24 Hours
CISA Warns of Active exploitation of JasperReports Vulnerabilities
The CISA catalogue of most exploited vulnerabilities now includes two-year-old security flaws affecting TIBCO Software's JasperReports products. CVE-2018-5430 and CVE-2018-18809 are flaws related to information disclosure and directory traversal, respectively.