TLDR:
– Hackers stole millions of dollars in grant money from the Department of Health and Human Services (HHS)
– SatoshiLabs is warning of phishing attempts after a threat actor gained unauthorized access to a third-party support ticketing portal
– A threat actor announced on a hacking forum that they were selling a database containing the email addresses, names, and usernames of 15 million Trello users
– CISA director Jen Easterly was the target of a swatting attempt on December 30
– Menlo Security has published a report focusing on browser-based phishing attacks, reporting a 198% increase in attacks
– Several reports focusing on ransomware were published this week by Symantec, GuidePoint, and Dragos
– The Kasseika ransomware is the latest to join the bring-your-own-vulnerable-driver (BYOVD) trend
– A dozen government agencies from around the world have published joint guidance on the secure use of AI systems
Hackers have stolen millions of dollars in grant money from the Department of Health and Human Services (HHS). The attackers gained access to an HHS system that processes civilian grant payments and withdrew roughly $7.5 million that was set aside for five accounts. SatoshiLabs is warning of phishing attempts after a threat actor gained unauthorized access to a third-party support ticketing portal on January 17, likely accessing the contact information of 66,000 users who have interacted with Trezor Support since December 2021. The threat actor has already sent phishing emails to at least 41 customers, requesting sensitive information. A threat actor announced on a hacking forum that they were selling a database containing the email addresses, names, and usernames of 15 million Trello users. The information has been added to the breach notification service Have I Been Pwned. Atlassian, which owns Trello, told SecurityWeek that the data was not obtained via unauthorized access, but that the threat actor had been ‘testing a pre-existing list of email addresses against publicly available Trello user profiles’. The threat actor had been abusing a Trello REST API to query publicly available account information based on email addresses, BleepingComputer says.