Cybersecurity Patch Notes Vol. 4
From Maple Syrup Middlemen to Malware Miscreants—A Global Cybersecurity Circus Unfolds
I know you're just itching to get the hot cybersecurity goss! This is where it's at. Mix your coffee and hot cocoa together so you've got something to burn your mouth on while you're distracted by all the latest hacker shenanigans.
First up, we’ve got a financial firm in Canada—Canada?!, hear you yell, where they're all super polite and maple syrup-y—serving as a handy middleman for Russian crypto exchanges and cybercriminal operations. If the Russia angle feels familiar, it should—just like we saw in Cybersecurity Patch Notes Vol. 1 Mikhail Shefel’s escapades and Vol. 3’s look at Mikhail Matveev, Russia-linked cyber shenanigans keep cropping up. And I'm sure they'll keep popping their heads up, as is the norm now in cybersecurity. With this one, the action isn't just online—their supposed address in Vancouver is a hotspot housing a whole bunch of foreign currency dealers and crypto exchanges. Wild world, innit? Diversification isn't only for your legit investment portfolio.
Microsoft have been playing a never-ending game of whack-a-mole with about 70 security holes in their Windows OS (Operating System for the uninitiated). From Vol. 1’s hackers hammering tech giants like LastPass and Twilio to today’s onslaught of Windows vulnerabilities, the cybersecurity circus continues. One vulnerability in the Windows Common Log File System (CLFS) driver is already being exploited. I’m sure Bill Gates is thrilled with that day’s headlines
Speaking of exploits, say hello to Pumakit—no, it’s not a new IKEA shelf. This piece of malware uses stealth and advanced privilege escalation techniques that make even seasoned defenders wince. Back in Vol. 2, when we met ‘Rockstar 2FA’ and watched cyber-felons reel in their victims, we got a glimpse of how adaptive and cunning attackers can be. Pumakit is the next chapter, lurking in your system like a mouse waiting for you to go to bed so it can get into the cheese.
But wait, theeeere's more! Three individuals in the U.S. have been charged with fraud they committed over the past two years. They could face up to 20 years behind bars if found guilty. They’ll have plenty of time to contemplate their life choices—do you reckon they stumble across our back issues while they’re at it?
IOCONTROL, a software that sounds ripped from a dystopian sci-fi movie, has reportedly been linked to an Iranian hacking group known as CyberAv3ngers. With a name like that, you’d reckon it would be a Hollywood blockbuster. But nope, just more global cyber drama, adding to the epic cast of state-linked hackers we’ve seen rise to the "top" again and again.
Speaking of nation-state intrigue, the U.S. State Department is dangling a $5 million carrot for intel on North Korean front companies. These players allegedly made off with over $88 million through illegal IT work schemes in six short years. Just like we saw in [Vol. 1’s international arrests](#) and [Vol. 3, where Russian authorities cracked down on Wazawaka](#), cybercrime doesn't understand what borders are. I guess we'll see what other international tug-of-wars start appearing in cyberspace in the future—what we know for sure is they're continue continue being international-y and cyberspacey.
Cleo, a software company, which makes me think of fortune-tellers, has released security updates for a zero-day flaw in its LexiCom, VLTransfer, and Harmony software. Customers are urged to “upgrade immediately.” After Vol. 1’s Finastra breach, we know that zero-day flaws can haunt even industry giants. Writing this down?—vigilance never gets old.
Finally, in a move that sounds like the plot of a B-list action flick, Spanish police alongside their Peruvian brethren have busted a voice phishing (vishing) scam. Fifty people, three call centers, 10,000 victims, and a €3,000,000 payday. International law enforcement cooperation at its finest—remember, cybercriminals aren’t invincible, doesn't matter how global they are.
And that, my friends, is your weekly tour of the wild, wacky, and often gobsmacking world of cybersecurity.
As always,
Good luck,
Stay safe, and
Be well.
See ya!
We'll be seeing you you next time—hopefully with fewer moles and more solutions. Until then, check out those previous volumes for a deeper dive and a laugh or two along the way.