company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

Encryption

Data Theft

loading..
loading..
loading..

Sensata Under Ransomware Attack Cripples Operations, Data Breach Confirmed

Ransomware attack plunges Sensata Technologies into chaos. Operations paralyzed, critical data stolen. Is the $4B giant downplaying the true impact? Read more.

11-Apr-2025
3 min read

No content available.

Related Articles

loading..

VPN

SSL

Fortinet alert: Patch FortiGate SSL-VPN exploits. Hackers used symlinks to retai...

A newly disclosed Fortinet advisory reveals that hackers have maintained stealthy, persistent access to compromised FortiGate devices even after organizations patched the initial vulnerabilities used in the attacks.** The campaign, active since early 2023, underscores growing concerns over advanced post-exploitation techniques targeting network infrastructure. ### **How the Attack Works** Threat actors exploited known flaws, including critical CVEs like CVE-2022-42475 (a remote code execution bug) and CVE-2023-27997 (a heap overflow vulnerability), to create a **symbolic link (symlink)** between FortiGate’s user file system and root file system. This symlink, hidden in folders hosting SSL-VPN language files, granted attackers read-only access to sensitive configurations and system data. Fortinet confirmed that the symlink persisted even after initial vulnerabilities were patched, enabling continued surveillance. Devices with SSL-VPN functionality enabled are exclusively at risk. ### **Fortinet’s Mitigation Measures** The company rolled out urgent FortiOS updates to eliminate the threat: - **Versions 7.6.2, 7.4.7, 7.2.11, 7.0.17, 6.4.16**: Remove malicious symlinks and block future SSL-VPN-based exploits. - **Antivirus enhancements**: Older FortiOS versions (7.4, 7.2, 7.0, 6.4) now detect and auto-delete the symlink. Fortinet advises all users to: 1. Immediately upgrade to the latest firmware. 2. Audit device configurations for tampering. 3. Assume credentials are compromised and reset them. ### **Global Cybersecurity Alerts** The **U.S. CISA** and France’s **CERT-FR** issued parallel advisories, urging organizations to: - Disable SSL-VPN until patches are applied. - Monitor for unauthorized access dating back to early 2023. ### **Expert Insights: “Attackers Are Outpacing Defenders”** Benjamin Harris, CEO of cybersecurity firm watchTowr, warned *The Hacker News* that adversaries are exploiting vulnerabilities faster than companies can patch. “Attackers deploy backdoors designed to survive patches, upgrades, and even factory resets,” Harris said, noting impacts on **critical infrastructure sectors**. ### **What’s Next?** Fortinet has notified affected customers directly, though the campaign’s global, non-targeted nature complicates attribution. Organizations must prioritize: - **Patch compliance**: Apply updates to break attacker persistence. - **SSL-VPN scrutiny**: Disable if unused or until secured. - **Configuration audits**: Treat all settings as potentially compromised.

loading..   12-Apr-2025
loading..   2 min read
loading..

PP

LSC

Planned Parenthood Data Breach: Lab Co-op’s HIPAA Violation Exposes Dark Web Lea...

Laboratory Services Cooperative (LSC), a non-profit provider of lab testing services to Planned Parenthood clinics, has admitted to a catastrophic cybersecurity failure that exposed highly sensitive patient and employee data. Critics are calling it one of the **worst healthcare data breaches of the decade**, with millions of individuals at risk of identity theft, financial fraud, and medical privacy violations. ### **A Timeline of Negligence** According to LSC’s belated press release, hackers infiltrated their systems on **October 27, 2024**, accessing troves of data including Social Security numbers, bank account details, medical diagnoses, and insurance records. Yet, the organization waited **four months** to notify the public—a delay experts condemn as reckless. _“This timeline reeks of negligence,”_ said cybersecurity analyst Dr. Elena Torres of SecureNet Insights. “Four months is more than enough time for stolen data to be weaponised on the dark web. LSC’s failure to act swiftly placed countless lives in jeopardy.” The breach impacted Planned Parenthood affiliates in **12 states**, though LSC has refused to disclose specifics, directing victims to a vague FAQ page. Critics argue this lack of transparency exacerbates risks for vulnerable patients, particularly in states with restrictive reproductive healthcare laws. ### **A Treasure Trove for Cybercriminals** The stolen data reads like a hacker’s wishlist: - **Full medical histories**, including lab results, diagnoses, and treatment locations. - **Financial data** such as bank account numbers, credit card details, and insurance IDs. - **Government identifiers** like Social Security numbers, driver’s licenses, and passport information. “This isn’t just a breach—it’s a **goldmine for black market sellers**,” warned dark web researcher Marcus Chen. “Medical records fetch top dollar, often used for insurance scams or blackmail.” ### **LSC’s Flawed Response: Too Little, Too Late** While LSC claims to have enlisted “third-party cybersecurity specialists” to monitor the dark web, experts dismiss these efforts as **security theater**. “Once data hits the dark web, the damage is done,” said Torres. “Monitoring is a Band-Aid on a bullet wound. LSC should’ve invested in robust encryption and multi-factor authentication long before this breach.” The organization’s offer of **free credit monitoring via CyEx Medical Shield Complete** has also drawn fire. Victims report enrollment hurdles, with many claiming the service fails to cover medical identity theft—a glaring omission given the nature of the exposed data. ### **Planned Parenthood Patients: Silent Victims** The breach’s timing raises alarming questions. LSC began partnering with Planned Parenthood centers “in recent years,” coinciding with rising cyberattacks targeting reproductive healthcare providers. Advocacy groups fear bad actors could exploit stolen data to harass or doxx abortion seekers. “This isn’t just about privacy—it’s about **safety**,” said Rachel Nguyen of the Digital Rights Collective. “In post-Roe America, a breach like this could have life-or-death consequences.” Attorneys nationwide are mobilizing. “LSC’s delayed disclosure violates HIPAA’s 60-day notification rule,” said consumer rights lawyer David Klein. “We’re exploring **multi-million-dollar class actions** for negligence and emotional distress.” State attorneys general in California, New York, and Texas have launched investigations, with potential fines under HIPAA exceeding **$1.5 million per violation**.

loading..   12-Apr-2025
loading..   3 min read
loading..

Defacement

Dark Web

Everest ransomware gang's leak site hacked, defaced with 'Crime is bad' taunt. C...

Over the weekend, the notorious Everest ransomware gang faced an unexpected humiliation when their dark web leak site was hacked and replaced with a sarcastic message: _“Don’t do crime CRIME IS BAD xoxo from Prague.”_ The site, critical to Everest’s double-extortion campaigns, now displays an _“Onion site not found”_ error, leaving cybersecurity experts and threat actors alike questioning how a criminal group fell victim to the very tactics it employs. ### **A Mocking Blow to Cybercriminals** The defacement of Everest’s leak site marks a rare instance of cybercriminals being targeted by an unknown adversary. The mocking message, signed _“from Prague,” has been widely interpreted as a deliberate attempt to undermine Everest’s credibility. Security researchers, including Flare Senior Threat Intelligence Analyst Tammy Harper, noted the irony: “For a group that prides itself on breaching organizations, this is a significant blow to their reputation.” The attack disrupted Everest’s operations, temporarily halting their ability to pressure victims by threatening data leaks—a cornerstone of their double-extortion strategy. While the gang quickly took the site offline, the incident has sparked debates about vulnerabilities even within criminal ecosystems. ### **WordPress Vulnerability Suspected** Experts speculate that the breach may have stemmed from a WordPress vulnerability. Everest’s leak site reportedly used a WordPress template, which Harper highlighted as a potential weak point: “WordPress is a common target. If they failed to patch plugins or themes, it would’ve been an easy entry for attackers.” WordPress, powering over 40% of websites globally, is frequently exploited due to outdated plugins or weak configurations. The incident underscores a paradoxical truth: even cybercriminals neglect basic cybersecurity hygiene. “This is a reminder that no one is immune to poor security practices,” Harper added. ### **From Data Theft to Ransomware Kingpin** Since emerging in 2020, Everest has evolved from a data theft-focused group to a full-fledged ransomware operation. Their tactics now include encrypting victims’ systems and selling network access to other cybercriminals, positioning them as both ransomware deployers and initial access brokers. **Key Milestones:** - **2020:** Launched as a data extortion group. - **2023:** Shifted to ransomware deployment, expanding their profit streams. - **2024:** Claimed over 230 victims, including high-profile targets like STIIIZY, a California-based cannabis brand, and U.S. healthcare organizations. In November 2024, Everest allegedly breached STIIIZY’s point-of-sale vendor, stealing customer data, including government IDs. The company confirmed the breach in January 2025, linking it to a third-party vendor compromise. ### **Healthcare Sector Under Fire** The U.S. Department of Health and Human Services (HHS) issued a warning in August 2024 about Everest’s escalating attacks on healthcare providers. These organizations, already vulnerable due to sensitive data and critical services, face heightened risks of operational disruption and financial losses from ransom demands. ### **A Temporary Setback?** While the leak site takedown disrupts Everest’s operations, experts believe the group will likely regroup. “Ransomware gangs are resilient. They’ll migrate to new infrastructure, but this incident might make victims think twice about paying ransoms,” said Harper. However, the breach could embolden vigilantes or rival groups to target other cybercriminal platforms, complicating the dark web’s already volatile landscape. ### **Who Hacked Everest? Theories Abound** The attacker’s identity remains shrouded in mystery. Possible scenarios include: 1. **Hacktivists:** Motivated by ideology, possibly targeting Everest’s healthcare attacks. 2. **Rival Groups:** Competing gangs seeking to destabilize Everest’s dominance. 3. **Law Enforcement:** Unlikely, as agencies typically seize infrastructure rather than deface it. The “Prague” reference could be a red herring, but it has fueled speculation about Eastern European cybercrime rivalries.

loading..   09-Apr-2025
loading..   3 min read