SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
A Review of Cybersecurity Landscape in
2023
As we wrap up 2023, it’s time to pause and reflect on the dynamic landscape of cybersecurity.
The cyber landscape has been far from calm, witnessing a series of impactful incidents that
demand our attention. To help make sense of it all, the Gramax Cybersec team has put together
a comprehensive blog to review the major cybersecurity attacks and breaches faced in 2023.
Let's explore key cyber incidents, lesson learned, and trends that shaped the year, aiming to
equip ourselves for more effective cyber risk management in the next year.
NOVEMBER
Tri-City Medical Centre Ransomware Attack
On November 9, Tri-City Medical Center fell victim to a ransomware attack, causing a
significant disruption to its emergency services. While the scale of the attack may not have
been massive in terms of the number of affected individuals, the impact was noteworthy. The
hospital, facing unauthorized activity on its computer network, had to shut down critical
equipment, leading to the inability to accept patients through the 911 system. This incident
reveals the heightened vulnerability of medical facilities, with potentially life-threatening
consequences due to cybercriminal activities targeting older software systems crucial for
patient care.
OCTOBER
Largest-Ever DDoS Attack
October witnessed the largest distributed denial of service (DDoS) attack, with internet giants
including Google and Amazon issuing warnings about the escalating sophistication of such
attacks. The DDoS attacks reached an unprecedented peak of 398 million requests per second,
exploiting a zero-day vulnerability and employing a novel HTTP/2 "Rapid Reset" technique.
These attacks pose a severe threat to internet-facing websites and services, aiming to
overwhelm them with fake data requests.
SEPTEMBER
DarkBeam Data Leak
On September 18, 2023, the CEO of cyber security news site SecurityDiscovery, Bob
Diachenko alerted DarkBeam, a digital protection company of a massive data leak. An
unprotected Elasticsearch and Kibana interface exposed a staggering 3.8 billion records.
Intriguingly, these records were compiled from previous data breaches, serving as a repository
for informing DarkBeam's customers about potential security incidents. Although originating
from previous breaches, the sheer volume of exposed data posed a substantial risk for potential
phishing campaigns and identity-related scams.
AUGUST
UK Electoral Commission Cyber-Attack
In a notable incident on August 8, 2023, the UK's Electoral Commission fell victim to a
"complex cyber-attack." Malicious actors gained unauthorized access to the electoral registers,
compromising personal information of approximately 40 million individuals. The breach
involved accessing Electoral Commission servers containing emails, control systems, and
copies of electoral registers from 2014 to 2022. The registers included voters' names, addresses,
and birthdates. Security researcher Kevin Beaumonton revealed that the Commission was
running an unpatched version of Microsoft Exchange Server, making it vulnerable to
ProxyNotShell attacks during the incident.
JULY
Tigo Video Chat Platform Data Leak
In July, the Chinese video chat platform Tigo experienced a significant data breach, impacting
over 700,000 users. The compromised data included names, genders, email addresses, IP
addresses, profile pictures, and private messages. The breach raised concerns about data
privacy practices and potential misuse of the exposed information.
JUNE
Oregon and Louisiana Department of Motor Vehicles Compromise
In June 2023, both the Oregon and Louisiana Departments of Motor Vehicles (DMVs) reported
cyber-attacks resulting from a MOVEit software vulnerability. Louisiana's OMV disclosed that
at least six million records, including driver's license information, were stolen. The breach,
attributed to a third-party software provider, left the full extent of the damage undetermined.
On the other hand, the Oregon DMV revealed that an estimated 3.5 million driver's licenses
and identity card details were compromised.
May
Luxottica Cyber-Attack
Luxottica, the world's largest eyewear company, fell victim to a major cyber-attack in May.
The breach exposed 74.4 million unique email addresses and 305 million records, including
customers' full names, email addresses, home addresses, and dates of birth.
APRIL
Shields Healthcare Group Cyber-Attack
In late April, Shields Health Care Group, a Massachusetts-based medical services provider,
reported a cyber-attack that compromised the personal data of 2.3 million people. The stolen
data included patients' social security numbers, dates of birth, home addresses, healthcare
provider information, and billing details.
MARCH
Latitude Financial Data Breach
In March 2023, Latitude Financial, a Melbourne-based financial services company, suffered
the largest confirmed data breach of the year. Over 14 million records were compromised,
including almost 8 million driver's licenses, 53,000 passport numbers, and numerous financial
statements. The company initially reported only 300,000 affected individuals, revealing a poor
understanding of the breach's scope.
FEBRUARY
PeopleConnect Data Breach
PeopleConnect, a background check services provider, along with TruthFinder and Checkmate,
confirmed a data breach affecting 20 million individuals. The leaked 2019 backup database
contained hashed passwords, email addresses, and full names. This incident exposed sensitive
personal information, heightening concerns about data security and the potential for identity
theft.
JANUARY
Twitter Data Breach
The year started with a notable cyber incident as the criminal hacker 'Ryushi' leaked over 400
million Twitter users' email addresses. While no other personal information was compromised,
the exposure of email addresses raised significant privacy risks, especially for high-profile
individuals susceptible to phishing or privacy invasions.
Beyond the Headlines!
While the comprehensive review of cybersecurity incidents in 2023 outlined major monthly
attacks, it is crucial to acknowledge that the landscape is even more extensive, with additional
incidents shaping the ever-evolving threat environment. Beyond the monthly highlights, the
cybersecurity landscape witnessed prominent cloud infrastructure exploits, compromising
databases and applications hosted by leading cloud service providers. Additionally, a surge in
healthcare ransomware attacks disrupted critical medical interventions, underscoring the
vulnerability of the healthcare sector to cyber threats. The year also saw the emergence of AI-
powered phishing campaigns, where malicious actors harnessed artificial intelligence to
orchestrate highly sophisticated attacks that outpaced conventional security measures. These
incidents, although not explicitly mentioned in the monthly breakdown, further emphasize the
diverse and pervasive nature of cyber threats that organizations across industries must confront
and fortify against for robust cybersecurity in the coming years.
What Needs to Be Done?
To navigate the complexities of the digital realm in the coming years, organizations must
prioritize a multi-faceted approach. Firstly, investing in cutting-edge cybersecurity
technologies, such as advanced threat detection systems and artificial intelligence-driven
security measures, is crucial to stay ahead of increasingly sophisticated attacks. Additionally,
fostering a culture of cybersecurity awareness and education among employees is paramount,
as human error remains a significant vulnerability. Regularly updating and patching software
vulnerabilities, as highlighted by incidents like the UK Electoral Commission breach, is a non-
negotiable aspect of cyber hygiene. Collaborative efforts between governments, industries, and
cybersecurity experts can further enhance information-sharing and collective defense
strategies. As we step into 2023, a commitment to staying agile, informed, and collaborative
will be key to navigating the ever-changing cybersecurity landscape successfully

Contenu connexe

Similaire à Gramax Cybersec: A Review of Cybersecurity Landscape in 2023.pdf

Implementation of Cyber Security in Corporate Sector of Pakistan
Implementation of Cyber Security in Corporate Sector of PakistanImplementation of Cyber Security in Corporate Sector of Pakistan
Implementation of Cyber Security in Corporate Sector of PakistanIJAEMSJORNAL
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCognizant
 
CIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalCIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalMorgan Jones
 
Breach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoBreach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoJonas Mercier
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcMert Akın
 
The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023Bernard Marr
 
Cyber Security threats to watch out for in 2023 - Bahaa Abdul Hussein .pdf
Cyber Security threats to watch out for in 2023 - Bahaa Abdul Hussein .pdfCyber Security threats to watch out for in 2023 - Bahaa Abdul Hussein .pdf
Cyber Security threats to watch out for in 2023 - Bahaa Abdul Hussein .pdfBahaa Abdul Hussein
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022ndcmanagement
 
seqrite-prediction-report-2023.pdf
seqrite-prediction-report-2023.pdfseqrite-prediction-report-2023.pdf
seqrite-prediction-report-2023.pdfsatheesh kumar
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual ReportLabris Networks
 
The Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxThe Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxhelen23456789
 
2022 Cybersecurity Predictions
2022 Cybersecurity Predictions2022 Cybersecurity Predictions
2022 Cybersecurity PredictionsMatthew Rosenquist
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryCR Group
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignStephanie Holman
 
What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? Abraham Vergis
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shiftsmalvvv
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shiftsmalvvv
 
Cybersecurity Chronicles of 2023 - InfosecTrain
Cybersecurity Chronicles of 2023 - InfosecTrainCybersecurity Chronicles of 2023 - InfosecTrain
Cybersecurity Chronicles of 2023 - InfosecTraininfosecTrain
 

Similaire à Gramax Cybersec: A Review of Cybersecurity Landscape in 2023.pdf (20)

Threatsploit Adversary Report January 2019
Threatsploit Adversary Report January  2019Threatsploit Adversary Report January  2019
Threatsploit Adversary Report January 2019
 
Implementation of Cyber Security in Corporate Sector of Pakistan
Implementation of Cyber Security in Corporate Sector of PakistanImplementation of Cyber Security in Corporate Sector of Pakistan
Implementation of Cyber Security in Corporate Sector of Pakistan
 
5 main trends in cyber security for 2020
5 main trends in cyber security for 20205 main trends in cyber security for 2020
5 main trends in cyber security for 2020
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
 
CIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalCIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survival
 
Breach level index_report_2017_gemalto
Breach level index_report_2017_gemaltoBreach level index_report_2017_gemalto
Breach level index_report_2017_gemalto
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwc
 
The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023The Top Five Cybersecurity Trends In 2023
The Top Five Cybersecurity Trends In 2023
 
Cyber Security threats to watch out for in 2023 - Bahaa Abdul Hussein .pdf
Cyber Security threats to watch out for in 2023 - Bahaa Abdul Hussein .pdfCyber Security threats to watch out for in 2023 - Bahaa Abdul Hussein .pdf
Cyber Security threats to watch out for in 2023 - Bahaa Abdul Hussein .pdf
 
List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022List of data breaches and cyber attacks in january 2022
List of data breaches and cyber attacks in january 2022
 
seqrite-prediction-report-2023.pdf
seqrite-prediction-report-2023.pdfseqrite-prediction-report-2023.pdf
seqrite-prediction-report-2023.pdf
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual Report
 
The Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxThe Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docx
 
2022 Cybersecurity Predictions
2022 Cybersecurity Predictions2022 Cybersecurity Predictions
2022 Cybersecurity Predictions
 
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk AdvisoryWhat Are Cyber Attacks All About? | Cyberroot Risk Advisory
What Are Cyber Attacks All About? | Cyberroot Risk Advisory
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations Campaign
 
What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore? What's new with Cybersecurity in Singapore?
What's new with Cybersecurity in Singapore?
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Cybersecurity Chronicles of 2023 - InfosecTrain
Cybersecurity Chronicles of 2023 - InfosecTrainCybersecurity Chronicles of 2023 - InfosecTrain
Cybersecurity Chronicles of 2023 - InfosecTrain
 

Dernier

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Dernier (20)

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Gramax Cybersec: A Review of Cybersecurity Landscape in 2023.pdf

  • 1. A Review of Cybersecurity Landscape in 2023 As we wrap up 2023, it’s time to pause and reflect on the dynamic landscape of cybersecurity. The cyber landscape has been far from calm, witnessing a series of impactful incidents that demand our attention. To help make sense of it all, the Gramax Cybersec team has put together a comprehensive blog to review the major cybersecurity attacks and breaches faced in 2023. Let's explore key cyber incidents, lesson learned, and trends that shaped the year, aiming to equip ourselves for more effective cyber risk management in the next year. NOVEMBER Tri-City Medical Centre Ransomware Attack On November 9, Tri-City Medical Center fell victim to a ransomware attack, causing a significant disruption to its emergency services. While the scale of the attack may not have been massive in terms of the number of affected individuals, the impact was noteworthy. The hospital, facing unauthorized activity on its computer network, had to shut down critical equipment, leading to the inability to accept patients through the 911 system. This incident reveals the heightened vulnerability of medical facilities, with potentially life-threatening consequences due to cybercriminal activities targeting older software systems crucial for patient care. OCTOBER
  • 2. Largest-Ever DDoS Attack October witnessed the largest distributed denial of service (DDoS) attack, with internet giants including Google and Amazon issuing warnings about the escalating sophistication of such attacks. The DDoS attacks reached an unprecedented peak of 398 million requests per second, exploiting a zero-day vulnerability and employing a novel HTTP/2 "Rapid Reset" technique. These attacks pose a severe threat to internet-facing websites and services, aiming to overwhelm them with fake data requests. SEPTEMBER DarkBeam Data Leak On September 18, 2023, the CEO of cyber security news site SecurityDiscovery, Bob Diachenko alerted DarkBeam, a digital protection company of a massive data leak. An unprotected Elasticsearch and Kibana interface exposed a staggering 3.8 billion records. Intriguingly, these records were compiled from previous data breaches, serving as a repository for informing DarkBeam's customers about potential security incidents. Although originating from previous breaches, the sheer volume of exposed data posed a substantial risk for potential phishing campaigns and identity-related scams. AUGUST UK Electoral Commission Cyber-Attack In a notable incident on August 8, 2023, the UK's Electoral Commission fell victim to a "complex cyber-attack." Malicious actors gained unauthorized access to the electoral registers, compromising personal information of approximately 40 million individuals. The breach involved accessing Electoral Commission servers containing emails, control systems, and copies of electoral registers from 2014 to 2022. The registers included voters' names, addresses, and birthdates. Security researcher Kevin Beaumonton revealed that the Commission was running an unpatched version of Microsoft Exchange Server, making it vulnerable to ProxyNotShell attacks during the incident. JULY Tigo Video Chat Platform Data Leak In July, the Chinese video chat platform Tigo experienced a significant data breach, impacting over 700,000 users. The compromised data included names, genders, email addresses, IP addresses, profile pictures, and private messages. The breach raised concerns about data privacy practices and potential misuse of the exposed information. JUNE Oregon and Louisiana Department of Motor Vehicles Compromise In June 2023, both the Oregon and Louisiana Departments of Motor Vehicles (DMVs) reported cyber-attacks resulting from a MOVEit software vulnerability. Louisiana's OMV disclosed that at least six million records, including driver's license information, were stolen. The breach, attributed to a third-party software provider, left the full extent of the damage undetermined.
  • 3. On the other hand, the Oregon DMV revealed that an estimated 3.5 million driver's licenses and identity card details were compromised. May Luxottica Cyber-Attack Luxottica, the world's largest eyewear company, fell victim to a major cyber-attack in May. The breach exposed 74.4 million unique email addresses and 305 million records, including customers' full names, email addresses, home addresses, and dates of birth. APRIL Shields Healthcare Group Cyber-Attack In late April, Shields Health Care Group, a Massachusetts-based medical services provider, reported a cyber-attack that compromised the personal data of 2.3 million people. The stolen data included patients' social security numbers, dates of birth, home addresses, healthcare provider information, and billing details. MARCH Latitude Financial Data Breach In March 2023, Latitude Financial, a Melbourne-based financial services company, suffered the largest confirmed data breach of the year. Over 14 million records were compromised, including almost 8 million driver's licenses, 53,000 passport numbers, and numerous financial statements. The company initially reported only 300,000 affected individuals, revealing a poor understanding of the breach's scope. FEBRUARY PeopleConnect Data Breach PeopleConnect, a background check services provider, along with TruthFinder and Checkmate, confirmed a data breach affecting 20 million individuals. The leaked 2019 backup database contained hashed passwords, email addresses, and full names. This incident exposed sensitive personal information, heightening concerns about data security and the potential for identity theft. JANUARY Twitter Data Breach The year started with a notable cyber incident as the criminal hacker 'Ryushi' leaked over 400 million Twitter users' email addresses. While no other personal information was compromised, the exposure of email addresses raised significant privacy risks, especially for high-profile individuals susceptible to phishing or privacy invasions. Beyond the Headlines! While the comprehensive review of cybersecurity incidents in 2023 outlined major monthly attacks, it is crucial to acknowledge that the landscape is even more extensive, with additional incidents shaping the ever-evolving threat environment. Beyond the monthly highlights, the
  • 4. cybersecurity landscape witnessed prominent cloud infrastructure exploits, compromising databases and applications hosted by leading cloud service providers. Additionally, a surge in healthcare ransomware attacks disrupted critical medical interventions, underscoring the vulnerability of the healthcare sector to cyber threats. The year also saw the emergence of AI- powered phishing campaigns, where malicious actors harnessed artificial intelligence to orchestrate highly sophisticated attacks that outpaced conventional security measures. These incidents, although not explicitly mentioned in the monthly breakdown, further emphasize the diverse and pervasive nature of cyber threats that organizations across industries must confront and fortify against for robust cybersecurity in the coming years. What Needs to Be Done? To navigate the complexities of the digital realm in the coming years, organizations must prioritize a multi-faceted approach. Firstly, investing in cutting-edge cybersecurity technologies, such as advanced threat detection systems and artificial intelligence-driven security measures, is crucial to stay ahead of increasingly sophisticated attacks. Additionally, fostering a culture of cybersecurity awareness and education among employees is paramount, as human error remains a significant vulnerability. Regularly updating and patching software vulnerabilities, as highlighted by incidents like the UK Electoral Commission breach, is a non- negotiable aspect of cyber hygiene. Collaborative efforts between governments, industries, and cybersecurity experts can further enhance information-sharing and collective defense strategies. As we step into 2023, a commitment to staying agile, informed, and collaborative will be key to navigating the ever-changing cybersecurity landscape successfully