Back

Blogs

Cyberattack targets a public Wi-Fi network. Are you secure?

View All

Case Studies

Securing Cyber-Physical Systems for a Defence Manufacturer

View All

Upcoming Events

Utility Week Awards 2024

View All

Webinars

The Future of Security: Convergence of Physical and Cyber Domain 1/3

View All

Earth view from space.

Thoughts

Digital Disruption Can Come From Anywhere

15th May, 2024

In today’s Cyber landscape digital disruption can literally come from anywhere, be it a cosmic storm or an unsuspecting conduit used for a cunning malware distribution campaign.

This week, our experts discuss how the recent Geomagnetic storm had the potential to wreak havoc to global communications, the fallout from a platform used to distribute malware; and how a dark web user claimed to have gained access to Europol’s secure data.

“Chasing Cosmic Storms: NOAA Issued the First G4 Watch in Nearly Two Decades”

In a ground-breaking alert, the NOAA Space Weather Prediction Centre announced a Severe (G4) Geomagnetic Storm Watch, marking the first occurrence since 2005. This alert came in the wake of several earth-directed coronal mass ejections, impacting Earth between May 10 and May 12, 2024. These cosmic events have only manifested three times in the current solar cycle, which began in December 2019.

A G4 geomagnetic storm, a severe classification, holds the potential to wreak havoc globally. Such storms can lead to significant outages, notably affecting critical infrastructure like power grids and satellite operations. Disruptions in satellite services could impede communications and global navigation, which are pivotal to everyday activities.

Over the weekend, the forecasted storms escalated to G5 conditions, exceeding expectations, and causing notable disturbances. These disruptions included power grid fluctuations and compromised high-frequency communications and GPS services. A U.S.-based agricultural equipment firm reported significant GPS inaccuracies, advising users to deactivate devices to avert mishaps.

Additionally, a weather satellite experienced a notable service interruption on May 13, lasting nearly two hours, while SpaceX’s Starlink reported degraded service due to the storm’s impact on its satellites.

Despite these disruptions, there are no immediate reports of widespread damage to major telecommunications networks or critical infrastructures at this stage.
On the brighter side, these geomagnetic conditions also provided an extraordinary display of auroras, visible from lower latitudes than usual, providing a rare spectacle for enthusiasts in dark sky locales.

This episode serves as a potent reminder of our planet’s susceptibility to the vast forces of space weather, highlighting the need for heightened awareness and preparedness in the face of such unpredictable events.

“Hidden Dangers: The Stealthy Deployment of Malware via Python Package Index”

The Python Package Index (PyPI) recently became the unsuspecting conduit for a cunning malware distribution campaign. A package innocuously named requests-darwin-lite masqueraded as a benign variant of the popular requests library but harboured a sinister secret, a malicious Go binary embedded within a sidebar PNG logo.

Upon installation, this rogue package activated the hidden binary, which immediately set about collecting the system’s Universally Unique Identifier (UUID). This identifier was then compared against a pre-determined UUID, and the malicious activities were triggered only if a match was found, indicating a highly targeted attack.

The binary in question is believed to be Sliver, a Command and Control (C2) framework that serves as an alternative to the more widely known Cobalt Strike. Sliver’s inclusion suggests an advanced level of threat, typically indicative of sophisticated cyber espionage or a similarly high-stakes cyber-attack.

The discovery of this malicious package prompted an immediate response. It was reported to PyPI and swiftly removed, mitigating any further spread through this trusted software distribution service. Despite this prompt action, the incident highlights a persistent vulnerability within package management ecosystems, which are often exploited by threat actors due to the trust developers place in them.

In a strategic response to ongoing threats, PyPI had already taken preventative measures by temporarily suspending user registration in March 2024. This was a bid to curb the tide of malware submissions that have plagued the platform.

The specific mention of “darwin” in the package name indicates that the target was the Darwin operating system, which is the core Unix system underpinning macOS and iOS. This focus suggests that the malware was designed to compromise Apple OS devices specifically.

The use of a specific UUID for the binary’s activation hints at a highly focused campaign, possibly testing the malware on a specific system or targeting a particular entity. Such precision suggests that the architects behind this campaign were not only testing their capabilities but perhaps also laying the groundwork for larger, more disruptive attacks.

The identities and motives of the threat actors behind this campaign remain shrouded in mystery, underscoring the complex and opaque nature of cybersecurity threats in today’s digital age. This incident serves as a stark reminder of the ongoing arms race in cyber security and the continuous need for vigilance in the face of evolving digital threats.

“Cyber Shadows: Alleged Europol Data Breach Claims Emerge on Dark Web”

In a disturbing revelation on a notorious cybercrime forum, a user known as @IntelBroker, who is recognised as a database and initial access broker (IAB), has claimed a significant breach of Europol’s secure data. According to the post made in May 2024, the breach allegedly compromised a wealth of sensitive and classified information, including details about Alliance employees and documents marked For Official Use Only (FOUO).

The specific entities within Europol listed as compromised include the CCSE, Cryptocurrencies – EC3, Space – EC3, the Europol platform for Experts, Law Enforcement Forum, and SIRIUS. A sample of the data, purportedly from the Space-EC3 division, was also shared to substantiate the claims, further intensifying the seriousness of the allegation.

@IntelBroker has not disclosed a fixed price for the data but is inviting private offers from other forum members. This suggests an intent to engage with multiple potential buyers, thereby increasing the risk of the information being disseminated widely across the criminal underworld. The seller also specified that transactions would be conducted using the Monero (XMR) cryptocurrency, known for its high level of anonymity, and demanded proof of funds before proceeding with any sale.

As of the latest update on May 13, 2024, the forum thread title was edited to include ‘[SOLD]’, indicating that @IntelBroker claims to have found at least one buyer for the data. The thread further notes that the sale is restricted to ‘reputable members’ of the cybercrime community, hinting at the possibility of multiple sales or ongoing negotiations with other high-profile criminals.

Comments within the thread from users such as @XVRoux and @AAAA, who both possess substantial reputation scores, have shown interest in acquiring the data. This interaction underscores the demand for such compromised information within these clandestine networks.

While the authenticity of the breach and the subsequent sale of Europol data cannot be independently verified, the implications of such an incident are profound. If true, the exposure of such critical information could undermine the operational integrity of Europol and pose significant risks to ongoing law enforcement activities across Europe.

This incident highlights the persistent threats posed by cybercriminals who are increasingly targeting high-profile organisations across technology, healthcare, military, financial, and manufacturing sectors. It also serves as a stark reminder of the critical need for robust cybersecurity measures and constant vigilance in the digital age.

Authors

Ian Hirst

Partner, Cyber Threat Services

Read Bio