Page 178 - Cyber Defense eMagazine August 2024
P. 178

In January  2024,  the  US Department  of Health  and  Human  Services  received  reports  of 24
             healthcare data breaches, affecting 10,000+ records each. Perry Johnson & Associates, Inc.
             (PJ&A),  a transcription  service provider,  reported  two of the breaches.  In November  2023,  a
             cyberattack  affected  almost  9  million  individuals.  Concentra  Health  Services  and  North
             Kansas City Hospital added to the total of over 13.45 million affected individuals. Source


             In April 2023, Shopify suffered a data breach that affected over 100,000 merchants who used
             their online  store services.  The breach occurred  due  to a malicious  code  injection in a third-
             party app called Mailchimp. Attackers accessed customers' names, email addresses, payment
             information,  and order details. Shopify faced lawsuits, regulatory scrutiny, and potential fines.
             Source


             In Jan. 2023, Peloton announced that Strava's third-party software caused a security flaw that
             exposed personal and health data of 3 million users. Names, emails, workout stats, and heart
             rate data were compromised. Peloton faced legal action and reputational  damage as a result.
             Source


             In 2021, T-Mobile disclosed a data breach that compromised the personal information of over
             50 million customers. The breach was due to a compromised  server rented from a third-party
             cloud provider, resulting in lawsuits, regulatory scrutiny, and potential fines. Source


             In 2021, a ransomware  attack on Colonial Pipeline caused operational  disruption for several
             days. The cybercriminals exploited a leaked password from a third-party vendor, leading to gas
             shortages  and  price  increases  in  the  US.  Despite  paying  $4.4  million  as  ransom,  Colonial
             Pipeline suffered significant losses from the attack and recovery efforts. Source







            It is  common  for companies  to  do CTI  analysis  to protect  themselves.  Some  companies  use  internal
            resources, and others use external resources to determine the supplier’s cybersecurity posture, including
            a perimeter scan of the supplier’s network, scans of low-end cybercrime data (TOR), and a review of the
            company’s  source  code.  CTI can enhance  this  vetting by  focusing  on threats  based on access  to the
            Surface Web, Dark Web (TOR) / Deep Web, and Vetted / invite-only cybercrime communities. This
            allows for the following questions to be answered with high confidence:

            Is the supplier breached, and if so, by whom? What is their motivation? What data has been leaked?

            Are there precursors of a breach that a threat actor could use to breach the supplier if they elected to do
            so?






            Cyber Defense eMagazine – August 2024 Edition                                                                                                                                                                                                          178
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   173   174   175   176   177   178   179   180   181   182   183