Dangerous hacks in September to November 2021

B2B Cyber ​​Security ShortNews

Share post

When it comes to IT security in a company, employees are considered to be the greatest risk. In November this was shown by the hacks on the United Nations and on Attila Hildmann's website and Telegram channels.

Unknown attackers have acquired the access data of a UN employee in the Darknet. This enabled them to log into the UN's own project management software Umoja and from there to penetrate further into the United Nations network. Two-factor authentication could have prevented this, but was not available. The attackers had access to the UN network for at least five months. The aim was to compromise additional user accounts in order to gain access to further information.

More successful hacks

Attila Hildmann's website and Telegram channels were taken over by hacktivists. This was made possible by a former Hildmann IT helper, who contacted the attackers and gave them a lot of data and access data. The hacktivists also had access to internal emails from the conspiracy ideologist and vegan chef.

Unknown hackers attacked the IT infrastructure of the SRH clinic network with malware. As a result, the computer systems at almost a dozen SRH clinics across Germany were taken offline to be on the safe side. Universities and other educational institutions of the SRH are also affected.

South Africa's Department of Justice ransomware

The entire network of South Africa's Ministry of Justice has been encrypted by ramsomware. All internal and external services were affected by this attack. Child benefit was no longer paid and the courts had to process recordings of negotiations manually, and documents could not be sent automatically. Many official letters were either not sent or sent late. However, the unknown attackers are said not to have captured any data.

In New Zealand, strangers attacked the websites of several financial institutions with DDoS attacks and forced them to go out of service for a short time. The New Zealand website of the Australia and New Zealand Banking Group (ANZ.AX) and the NZ Post were also affected.

More at QGroup.de

 


About QGroup

Founded in 1993 as a system house, QGroup GmbH has also established itself as a manufacturer of (high) security products since 2000. As a competence center for high availability and IT security, the Frankfurt company today offers multifactor authentication solutions with biometrics and multilevel security appliances, creation and implementation of holistic security concepts, security audits and penetration tests as well as multilevel security and trusted computing under the label QGroup Security. Concepts.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more