Europe News

thumbnail

French data protection authority says Google Analytics is in violation with GDPR

The French national data protection authority, CNIL, issued a formal notice to managers of an unnamed local website today arguing that its use of Google Analytics is in violation of the European Union’s General Data Protection Regulation, following a similar decision by Austria last month. The root of the issue stems from the website’s use of Google Analytics, which functions as a tool for managers to track content performance and page visits. CNIL said the tool’s use and transfer of personal data to the U.S. fails to abide by landmark European regulations because the U.S. was deemed to not have equivalent privacy protections.   Read more about it here. 

thumbnail

CISA and FBI warn of potential data wiping attacks spillover

The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) warned US organizations that data wiping attacks targeting Ukraine could spill over to targets from other countries. The two federal agencies issued this warning in the form of a joint cybersecurity advisory published over the weekend following the Although the two malware strains have only been deployed against Ukrainian networks so far, the threat actors deploying them could also accidentally hit other targets, and US organizations should be ready to prevent such devastating attacks. * Read more about it here.

thumbnail

Spanish Police arrests 8 over SIM swapping fraud

Spain's National Police Department, the Policía Nacional, says it has arrested eight members of an unnamed cybercriminal gang over SIM swapping fraud. The suspects posed as trustworthy representatives of banks and other organizations and used traditional phishing and smishing techniques to obtain personal information and bank details of victims before siphoning off money from their bank accounts, the police say. One of the detainees is from Seville and the rest are from Barcelona, the police say, adding that they have been operating from these cities since March, targeting bank customers across the country. The timeline of their activities is based on two complaints of fraud the police received.   Read more about it here.

thumbnail

TrickBot backend source code leaked

TrickBot appears to have become a casualty of the ongoing war in the Ukraine. Yesterday, a member of the Conti cybergang decided to go against the rest of the group by leaking all of the group’s IoCs (Indicator of Compromise), source codes, and chats. The @ContiLeaks Twitter handle leaked Trickbot’s source code, taken from its servers and data collection servers, as well as chat messages between the Conti and the TrickBot groups. This leak shows a strong link between the two gangs and malware operators. These leaks will give researchers all around the globe a deep understanding of both groups’ operations, and the superpowers to end one of the most annoying botnets in the world. Read more about it here.

thumbnail

Vofdafone Portugal struggles to restore service following cyberattack

Vodafone Portugal is slowly working to recover following a "deliberate and malicious cyberattack" that brought down services used by millions of people and businesses in that country, including those for ambulances and other emergency services. Vodafone Portugal—a subsidiary of UKbased Vodafone Group with 4.3 million cellphone subscribers and 3.4 million fiber subscribers—said in a statement that the attack began last Monday. The attack quickly took down the subsidiary's 4G and 5G networks and halted fixed voice, television, SMS, and voice and digital answering services.   Read more about it here.

thumbnail

Ukraine calls on hacker underground to defend gainst Russia

Feb 24 - The government of Ukraine is asking for volunteers from the country's hacker underground to help protect critical infrastructure and conduct cyber spying missions against Russian troops, according two people involved in the project. As Russian forces attacked cities across Ukraine, requests for volunteers began to appear on hacker forums on Thursday morning, as many residents fled the capital Kyiv.   Read more about it here.

thumbnail

Swissport ransomware attack delayed flights

Airport services giant Swissport is restoring its IT systems after a ransomware attack struck late last week, delaying flights. The Zurich-headquartered firm operates everything from check-in gates and airport security to baggage handling, aircraft fuelling and de-icing and lounge hospitality. It claims to have provided ground services to 97 million passengers last year and handled over five million tons of air freight. Swissport took to Twitter on Friday to warn its IT infrastructure had been hit by ransomware and apologize for any impact on service delivery.   Read more about it here.

thumbnail

Destructive Malware Discovered Targeting Ukrainian System

The defacement of multiple Ukrainian government websites last week may have been intended as cover for a destructive malware attack that failed to execute or has yet to be unleashed, some security experts warn. The defacements occurred Thursday night and Friday morning - local time in Ukraine - as approximately 100,000 Russian troops remained massed on the country's border. On Saturday, Microsoft reported that it had found multiple attempts to infect Ukrainian government sites with a type of destructive malware it had never seen before, and that the first attack attempts appear to have begun Thursday.   Read more about it here.

thumbnail

Cyberattack against Thales: publication of data

Alerting the Thales group in early January, the Lockbit ransomware group released stolen data to the French group. The French group said the stolen files were copied from a code repository server hosting low-sensitivity data. In early January, the group behind the Lockbit ransomware claimed responsibility for an attack on the Thales group. It gave the French company until 13 January to pay a ransom or else the gang promised to publish stolen data.   Read more about it here.

thumbnail

German governement warns of APT27 activity targeting local companies

The German government said on Tuesday that a Chinese cyberespionage group known as APT27 has repeatedly attacked German companies over the past few months using vulnerabilities in software like Microsoft Exchange and Zoho SelfService. The attacks, which have been taking place since at least March 2021, have aimed to install a version of the HyperBro malware inside corporate networks for the purpose of intelligence collection from infected hosts, the Federal Office for the Protection of the Constitution (BfV) said in a press release.