|
04 November 2022
Cyber Threat Roundup
A collection of recent open-source items of interest to the Defense Industrial Base
|
|
Cyber Incident at Boeing Subsidiary Causes Flight Planning Disruptions
Jeppesen, a wholly-owned Boeing subsidiary that provides navigation and flight planning tools, confirmed on Thursday that it is dealing with a cybersecurity incident that has caused some flight disruptions. A red banner was added to the company’s website on Wednesday, warning that the Colorado-based firm was experiencing “technical issues with some of our products, services and communication channels”.
https://therecord.media/cyber-incident-at-boeing-subsidiary-causes-flight-planning-disruptions/
|
|
Supply Chain Attack Pushes Out Malware to More than 250 Media Websites
The cyber-threat threat actor known as “TA569”, or “SocGholish”, has compromised JavaScript code used by a media content provider in order to spread the FakeUpdates malware to major media outlets across the United States. The supply chain attack is being used to spread TA569’s custom malware, which is typically employed to establish an initial access network for follow-on attacks and ransomware delivery.
https://www.darkreading.com/application-security/supply-chain-attack-pushes-out-malware-to-more-than-250-media-websites
|
|
U.S. Treasury Thwarts DDOS Attack from Russian Killnet Group
The U.S. Treasury Department has thwarted a distributed denial of service (DDoS) attack that officials attributed to Russian hacktivist group Killnet. These are the same pro-Kremlin miscreants that claimed responsibility for knocking more than a dozen U.S. airports’ websites offline on October 10 in similar network-traffic flooding incidents. The large-scale DDoS attack didn’t disrupt air travel or cause any operational harm to the airports.
https://www.theregister.com/2022/11/02/killnet_us_treasury_ddos/?&web_view=true
|
|
|
|