• About
    • About Us
    • Our Expertise
    • Meet The Team
    • Careers
  • Managed Services
    • Overview
    • Monitoring & Detection
    • Protection
    • Response
    • Training
  • Cyber Assessments
  • Consultancy
    • Consulting Services
    • Cyber Executives
  • News & Resources
    • In the News
    • Blog
    • Resources
  • Contact
Can We Help?
  • About
    • About Us
    • Our Expertise
    • Meet The Team
    • Careers
  • Managed Services
    • Overview
    • Monitoring & Detection
    • Protection
    • Response
    • Training
  • Cyber Assessments
  • Consultancy
    • Consultancy Service
    • Cyber Executives
  • News & Resources
    • In the News
    • Blogs
    • Resources
  • Contact
  • Can We Help?

Security Roundup: What Happened in December?

Happy New Year from CSA, where we’ve been keeping an eye on the most notable recent cyber security stories. We’re here to keep you informed on the cyber threats you need to know about, so here are some of the biggest headlines from the last month, from the rise of phishing robocalls to terabytes of research being lost.

Scam robocalls doubled in 2021

A report from T-Mobile, published on the 20th of December, shows that they received over 700 suspected scam calls per second in 2021. The carrier’s Scam Shield blocked over 21 billion calls as scams, which represents a 116% increase from 2020. With these calls doubling over the past year, it’s never been more important to know whether a call is a phishing attempt or if it’s genuine. (source)

Ransomware group weaponises Log4Shell

Earlier in December, the entire security community was swept off its feet and brought to its knees after the Log4j or Log4Shell vulnerability put hundreds of millions of devices at risk, with many people working long days and nights to protect themselves and their clients. In December, the Russia-based ransomware group Conti became the first to weaponise Log4Shell, with a fully-fledged attack chain. (source)

Microsoft urges customers to patch bugs

On the 20th of December, Microsoft requested that organisations immediately patch two Active Directory domain controller bugs - CVE-2021-42287 and CVE-2021-42278. Both of these vulnerabilities were fixed in the November 2021 patch. Since then, however, a proof-of-concept tool has been published that leverages these vulnerabilities and could allow easy Windows domain takeover. The vulnerabilities have been described as "Windows Active Directory domain services privilege-escalation" errors, and have been assigned a high severity level and a CVSS severity of 7.5 out of 10. (source)

Half a billion compromised passwords found

According to the National Crime Agency’s National Cyber Crime Unit in the UK, nearly 586 million sets of credentials have been collected from a compromised cloud storage facility. They’ve been added to Have I Been Pwned (HIBP), a database of compromised passwords. The new sets include over 226 million new credentials that are new to HIBP, which already contained over 600 million passwords - bringing the database’s total to more than 847 million, making it an invaluable resource. (source)

University loses nearly 80TB of data

Between the 14th and 16th of December, Japan’s Kyoto University fell victim to an incident in which 34 million files, adding up to 77TB of data, were lost. Data belonging to 14 research groups was wiped from the system and backup files, and after attempts were made to recover the data, the work of four of the groups proved to be irretrievable. The translation of the report from the university stated that the files were deleted when an error occurred in their Hewlett-Packard supercomputer, with files under the same directory as log files were unintentionally deleted along with the log files. (source)

Ransomware group releases free decryptor

On the 29th of December, it was reported that the group behind the AvosLocker ransomware strain accidentally encrypted a police department in the US. After they learned they’d stolen data from a government agency, a representative from the ransomware group apologised and provided a free decryptor, claiming that they try not to compromise government entities because “tax payer money’s generally hard to get.” (source)

LastPass users have passwords compromised

Users of LastPass, the credential management service created by LogMeIn, have been receiving email notifications warning them that their accounts have been logged into from suspicious locations. LastPass has said this is a result of credential stuffing attacks, with users using the same passwords for different accounts. When they’re compromised, malicious actors are able to use these passwords to gain access to accounts. LastPass users are advised to enable multi-factor authentication to protect their information, if they haven’t already. (source)

Related articles

Posted on December 16, 2021

CSA Awards of the Year 2021

As we near the end of year, an incredibly busy year for our teams in terms of growth and innovation, we wanted to take a moment to…

Posted on December 14, 2021

Cyber Essentials Changes: Here's Everything You Need To Know

Rapid digital transformation, mass adoption of cloud-based services and migration to home-working were necessary changes for businesses…

Posted on December 8, 2021

CSA 12 Days of Cyber Christmas

As the end of the year fast approaches, we wanted to share a little refresher on ways to ensure your technology and data remains…

Posted on December 1, 2021

Planning To Shop Online This Holiday Season? Here Are The Cybercrimes You Need To Be Aware Of

Black Friday and Christmas are considered a blessing and a curse within the retail industry. It’s a time where retailers…

Posted on October 20, 2021

This Apple “AirTag” Vulnerability could be harvesting your credentials

During late September, the headlines were hit with the news of a vulnerability within Apple’s AirTag…

Posted on October 13, 2021

September Security Roundup

Currently, the world faces not one pandemic but two: Coronavirus and the rise of ransomware attacks…

Posted on October 10, 2021

Is Data More Valuable Than Jewels? The A-List Cyber Heist That’s Putting Ransomware Attacks On The Map

Cybercriminals don’t discriminate. It doesn’t matter how famous you are, if your information is vulnerable…

Posted on October 6, 2021

CSA adds Lookout Mobile Endpoint Security to growing solutions portfolio

Following the global pandemic, the mass migration to remote working was a necessary move…

Posted on September 15, 2021

​​The Rising Popularity of NFTs and The Rising Security Threat

The art world is known for being ahead of the curve, adopting new and interesting technologies to…

Posted on September 7, 2021

TG1021 (Praying Mantis): The new threat actor group that could be targeting your IIS servers!

Recently, an infamous threat actor group going by the name of TG1021 or Praying Mantis…

Posted on August 19, 2021

Is Cyber Training and Education working?

The report from the ICO on the ‘surprising’ decline in personal data breaches…

Posted on August 13, 2021

How did an unknown hacker steal over $600M in cryptocurrencies in the biggest ever crypto based cyber-attack?

On 10th August 2021, Poly Network announced in a tweet that it had been attacked…

Posted on May 12, 2021

How to Prevent a Ransomware Attack

According to a 2020 survey by Sophos, 51% of organisations were hit by Ransomware in the last year…

Posted on March 23, 2021

Is your Microsoft M365 service secure from attackers? Are you sure?

The mass migration to remote working as a result of the coronavirus pandemic has…

Posted on January 10, 2021

Covid-19: How to prepare your staff
for remote working

Since the initial Covid-19 outbreak, the nation’s workforce had to learn to quickly…

Posted on December 13, 2020

Covid-19: Cyber Criminals Launch
Their Own ‘Virus’

Whilst the world is currently preoccupied with public health, cyber attackers have taken…

Posted on November 20, 2020

The rise of Covid-19 phishing scams

Whilst the rollout of the Covid-19 vaccine across the UK brings with it the good news…

About

  • About Us
  • Our Expertise
  • Meet The Team
  • Careers

Managed Services

  • Overview
  • Monitoring & Detection
  • Protection
  • Response
  • Training

Consultancy

  • Consulting Services
  • Cyber Executives

News & Resources

  • In the News
  • Blog
  • Resources

Cyber Assessments

Can We Help?

Partner Portal

Contact

Head Office Unit 11, Wheatstone Court, Waterwells Business Park, GL2 2AQ
©2022 Cyber Security Associates. All Rights Reserved.
Terms of Use Privacy Policy
Powered by P1C
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media. To find out more about the cookies we use, see our Privacy Policy.
Cookie settingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT

Can We Help?