Date: 1.24.25
Summary: If China attacked Taiwan, how could Taiwan defend its critical communications infrastructure from cyberattack? Last year, Dr. Nina A. Kollars and Jason Vogt — both associate professors at the US Naval War College (USNWC) Cyber and Innovation Policy Institute (CIPI) — designed a war game to inspire some novel strategies. They enlisted government and private sector cybersecurity experts at Black Hat and DEF CON to participate, and presented the results at ShmooCon earlier this month.
Source: Dark Reading
Summary: On January 16, 2025, President Biden issued Executive Order 14144 on Strengthening and Promoting Innovation in the Nation’s Cybersecurity (the “EO”). Building on prior initiatives such as Executive Order 14028 and the National Cybersecurity Strategy, this latest EO addresses persistent threats posed by malicious countries and criminals who target the United States Government, corporations, and individual Americans with cyber-attacks.
Source: JD Supra
Summary: Grocery store shoppers at many chains recently ran into an unwelcome surprise: empty shelves and delayed prescriptions. In early November, Ahold Delhaize USA was the victim of a cyberattack that significantly disrupted operations at more than 2,000 stores, including Hannaford, Food Lion and Stop and Shop. Specific details of the nature of the attack have not yet been publicly released.
Source: Security Intelligence
Summary: There are hundreds of fake Reddit and WeTransfer websites out there, all designed to trick people into downloading and running the Lumma Stealer malware, experts have warned.
Cybersecurity researchers from Sekoia have shared a complete list of the pages on GitHub, which includes 59 fake Reddit pages, and 407 fake WeTransfer pages.
Source: TechRadar
Summary: December 2024 saw an unprecedented surge in ransomware attacks, registering 574 incidents—the highest monthly total recorded since 2021. This spike came as shocking news, particularly as December typically experiences a decline in cyber activity due to the holiday season. According to the latest Threat Pulse report from the cybersecurity firm NCC Group, this trend underscores the evolving and increasingly aggressive nature of ransomware threats.
Source: Ghacks
Summary: CyberScoop reports that intrusions involving magic packet-listening malware have been deployed against enterprise Juniper Networks routers for a year beginning mid-2023 as part of the J-Magic attack campaign, which has been aimed at organizations in the manufacturing, semiconductor, IT, and energy sectors, primarily in Europe and South America.
Source: SC World
Summary: A new survey from Omdia reveals that phishing scams are the leading security threat for smartphone users, with 24% of respondents reporting they have fallen victim to these attacks. Phishing, which includes fraudulent texts, emails, or calls designed to trick individuals into revealing sensitive personal information, remains a significant concern as cybercriminals continue to exploit unsuspecting consumers.
Source: Dark Reading
Summary: FRISCO, Texas, January 21, 2025 – Netwrix, a vendor specializing in cybersecurity solutions focused on data and identity threats, surveyed 1,309 IT and security professionals globally and today released findings for the healthcare sector based on the data collected.
It reveals that 84% of organizations in the healthcare sector spotted a cyberattack on their infrastructure within the last 12 months. Phishing was the most common type of incident experienced on premises, similar to other industries. Account compromise topped the list for cloud attacks: 74% of healthcare organizations that spotted a cyberattack reported user or admin account compromise.
Source: Dark Reading
Summary: 2025 heralds a new era for cybersecurity with fresh challenges for enterprises, according to the experts we spoke with. Following the Russia-Ukraine war, Israel-Hamas conflict, and a year of elections in over 70 countries, geopolitics and cybersecurity have become tightly intertwined.
Source: Tech Informed
Summary: A little-known hacking group has been mimicking the tactics of a prominent Kremlin-linked threat actor to target Russian-speaking victims, according to new research.
In its latest campaign, the group being dubbed GamaCopy used phishing documents disguised as official reports about the location of Russian armed forces’ facilities in Ukraine. It also deployed an open-source software called UltraVNC to remotely access victims’ systems.
Source: The Record
The Analysis and Identifying affected systems sections have been updated to include confirmation of exploitation from SonicWall and how to identify assets using Tenable Attack Surface Management.
Source: Security Boulevard
Summary: CVE-2020-11023 was disclosed in April 2020. The vulnerability has been described as a medium-severity XSS issue that can be exploited for arbitrary code execution.
jQuery, a library designed to make it easier to use JavaScript, is widely used. After the vulnerability was disclosed, several major organizations published advisories to inform customers about its impact on their products, including Linux distributions, F5, IBM, and Atlassian.
Source: Security Week
Prepared by: Krypt3ia
For inquiries, contact: [email protected]
Disclaimer: This digest is for informational purposes only. Use provided intelligence responsibly and validate all IOCs before implementing network or system changes.