--- licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0) licence_link: https://creativecommons.org/licenses/by/4.0/ licence_restrictions: https://cert.europa.eu/legal-notice licence_author: CERT-EU, The Cybersecurity Service for the European Union institutions, bodies, offices and agencies --- June 1, 2022 - Version: 1.1

TLP:WHITE

# Europe and the European Union ## Cyber policy ||| |---|---| | The EU formally accused Russia of coordinating the cyber attack which targeted Viasat's KA-SAT satellite network on February 24. | _Attribution_ | | EU lawmakers reached a provisional agreement on a new network and information security directive dubbed NIS2 that seeks to strengthen cybersecurity resilience. The framework establishes new incident reporting rules, stricter enforcement requirements, and aims to improve information sharing at the national and EU levels.| _Regulation_ | ## Cyberespionage ||| |---|---| | The Russian Turla threat actor has been running a phishing and reconnaissance campaign against several European targets (Baltic Defence College, Austrian Economic Chamber, and a NATO eLearning platform). | _Defence_, _Russian threat actor_ | | The Russian Gamaredon threat actor targeted Eastern European governmental entities using foreign military help lures. | _Government_, _Russian threat actor_| | A years-long phishing campaign has targeted German companies in the automotive industry, attempting to infect their systems with password-stealing malware. The targets include both car manufacturers and car dealerships in Germany. | _Automotive_ | ## Cybercrime ||| |---|---| | ASST Fatebenefratelli Sacco — an Italian public healthcare entity in Milan that manages regional hospitals and healthcare facilities — was reportedly breached with ransomware. | _Ransomware_, _Healthcare_ | | The Vivalia Hospital in Belgium was targeted in a LockBit ransomware attack. According to the Belgian media, it is the second attack against a healthcare organisation in Belgium since the beginning of 2022. | _Ransomware_, _Healthcare_ | | Threat actors named Bulgariaʼs State Agency for Refugees under the Council of Ministers (SRA) as a victim on LockBit dedicated leak site (DLS). The SRA is responsible for granting asylum and humanitarian status to foreigners in the Republic of Bulgaria. | _Ransomware_, _Government_ | | The BlackCat ransomware gang, also known as ALPHV, hit the Austrian federal state Carinthia and demanded a $5 million to unlock the encrypted computer systems. The breach temporarily halted the issuance of passports and traffic fines and disrupted the state administrationʼs telephone system, email service, and website. | _Ransomware_, _Public administration_ | ## Hacktivism ||| |---|---| | The Romanian Ministry of Internal Affairs confirmed that a Romanian national had been arrested in the UK on May 2 for assisting the pro-Russia hacktivist group Killnet during a recent DDoS campaign targeting Romania. | _DDoS_, _Arrest_ | | In May, Killnet claimed a series of DDoS attacks against a number of entities (i.e. the ministry of defence, an email service provider, a cloud service provider, a mail service provider, an airport operator, a national parliament) in several European countries, including Italy, Latvia, Germany, Estonia, Poland, and Romania. | _DDoS_, _Defence_, _Email services_, _Cloud services_, _Mail services_, _Airport_, _Parliament_ | | A new pro-Russia hacktivist group called Legion Cyber Spetsnaz — a self-proclaimed “project of Killnet” — claimed DDoS attacks against the websites of various German companies. | _DDoS_, _Companies_ | ## Information operations ||| |---|---| | According to Google and the former head of the UK Secret Intelligence Service, the Russian threat actor Callisto carried out a successful hack-and-leak operation via a website titled "Very English Coop d'Etat", targeting several leading proponents of Britain's exit from the EU. | _Russian threat actor_, _Hack and leak_ | | According to cyber security firm Mandiant, an information operation promoted the narrative that a Polish criminal ring was harvesting organs from Ukrainian refugees and illegally selling them via social media. | _Fake narrative_, _Ukraine_ | | Still according to Mandiant, the Russian threat actor APT28 has been using a Telegram channel to disseminate content to weaken Ukrainians’ confidence in their government and undermine support for Ukraine from its Western partners. | _Russian threat actor_, _Social media_, _Ukraine_| ## Disruption ||| |---|---| | The Russian threat actor Sandworm is improving its tools used to load disruptive (wiper) payloads by making them more stealthy and capable of being activated at a specified time.| _Ukraine_, _Wiper_ | | New disruption attacks were observed targeting Ukrainian internet and telecom services providers. | _Ukraine_ | # World ## Cyber policy ||| |---|---| | The US President J. Biden signed a national security memorandum (NSM) asking government agencies to implement a set of measures that would mitigate risks posed by quantum computers to US national cyber security. The NSM outlines the risks of cryptanalytically relevant quantum computers (CRQC), such as their likely ability to break current public-key cryptography. | _US_, _Cryptography_, _Quantum computers_ | | The US Department of Justice (DOJ) announced a revision of its policy on how prosecutors should charge violations of the Computer Fraud and Abuse Act (CFAA), exempting security research conducted in "good faith" from prosecution. | _US_, _Regulation_ | | The Government of Canada announced its intention to ban the use of Huawei and ZTE telecommunications equipment and services across the country's 5G and 4G networks. | _Canada_, _Foreign technology ban_ | | The Russian President V. Putin signed a decree instructing heads of departments in administrations and regions, state funds, state corporations, strategic and systemic enterprises "to authorise deputy head of the body to ensure information security, including on revealing, preventing and liquidating the consequences of computer attacks and responding to computer incidents." | _Russia_, _Regulation_ | ## Cyberespionage ||| |---|---| | Researchers at Sentinel Labs have identified a new China-aligned cluster of malicious cyber activity tracked as Moshen Dragon, targeting telecommunication service providers in Central Asia.| _Chinese threat actor_ | | According to the cyber security firm Cybereason, the China-linked Winnti threat actor has been running a sophisticated and elusive cyberespionage operation, dubbed CuckooBees, that has remained undetected since at least 2019. The goal of the campaign is stealing sensitive proprietary information from technology and manufacturing companies mainly in East Asia, Western Europe, and North America. | _Chinese threat actor_ | | Researchers reported about a highly-evasive Chinese surveillance tool, dubbed BPFDoor, present on “thousands” of Linux systems for at least five years. The threat actor targeted the telecommunications, government, education and logistic sectors accross the Middle, Asia, and Europe. | _Chinese threat actor_ | | A previously unknown Chinese threat actor known as 'Space Pirates' is targeting enterprises in the aerospace industry with phishing emails. Victims include government agencies and enterprises involved in IT services, aerospace, and electric power industries located in Russia, Georgia, and Mongolia. | _Chinese threat actor_ | | A newly discovered malware campaign, dubbed SilentMarten, stores malicious shellcode in Windows event logs, using this technique to conceal malware from the filesystem. The campaign also uses custom tools alongside commercially available penetration testing suites, such as Cobalt Strike and NetSPI (formerly known as SilentBreak). | _Fileless malware_ | | Google's Threat Analysis Group (TAG) released a report on zero-day vulnerabilities in the Android OS and the Chrome browser, which are being exploited by the private sector offensive actor (PSOA) Cytrox for surveillance on mobile devices. The bundling of the exploits by Cytrox is sold to government-backed actors. | _PSOA_ | ## Cybercrime ||| |---|---| | After a year-long investigation that involved Interpol and several cybersecurity companies, the Nigeria Police Force has arrested an individual believed to be in the top ranks of a prominent business email compromise (BEC) group known as SilverTerrier or TMT. | _Business email compromise_, _Arrest_ | | Popular libraries used by Python and PHP developers were compromised in supply chain attacks. The goal of the attackers was to steal developers' secrets such as Amazon AWS keys and credentials. | _Supply chain attack_, _IT_ | | The cloud platform service Heroku confirmed unauthorised access to an internal customer database resulting from the theft of GitHub-integration OAuth tokens. Upon investigation, Heroku learned the actor also exfiltrated hashed and salted passwords associated with customer accounts. Heroku forced a password reset for all customers. | _Cloud services_ | | Compromised YouTube accounts started to post deepfake videos featuring interviews with multiple well-known business personalities — including SpaceX CEO Elon Musk — promoting a fraudulent cryptocurrency platform called BitVex. | _Deepfake_, _Scam_ | | Several ransomware strains have been linked to APT38, a North Korean-sponsored hacking group known for targeting and stealing funds from financial institutions worldwide. | _Ransomware_, _North Korean threat actor_ | | The REvil ransomware operation has returned amidst rising tensions between Russia and the US, with new infrastructure and a modified encryptor allowing for more targeted attacks. The operation had been shut down in October 2021 by law enforcement authorities but has now returned. | _Ransomware_ | | The Conti ransomware gang claims to have hacked the Peru Ministry of Economy and Finance – Dirección General de Inteligencia and stolen 9.41 GB. | _Ransomware_, _Finance_, _Intelligence services_ | | The Costa Rican President Rodrigo Chaves has declared a national emergency following cyber attacks from the Conti ransomware group on multiple government bodies. | _Ransomware_, _Government_ | | The US Department of State offered up to $15 million for information that helps identify and locate leadership and co-conspirators of the Conti ransomware gang. | _Ransomware_ | | A threat actor named Stormous Group continues to claim victims - inluding the Coca-Cola Company - and threaten to leak their data on the Stormous Group DLS. The actor — best known for hacktivist operations — is now likely also involved in cybercrime. The group is also know for its large number of unverified hacking claims. | _Ransomware_ | | The Conti ransomware operation decided to shut down and split into smaller units in order to gain mobility and better evasion of law enforcement. | _Ransomware_ | | According to researchers at NCC Group, the Clop ransomware is now back after effectively shutting down their entire operation between November 2021 and February 2022. The ransomware group added 21 new victims to their data leak site in April. | _Ransomware_ | | GitHub disclosed that an attacker stole the login details of roughly 100,000 npm package manager accounts during a mid-April security breach, commited with the help of stolen OAuth app tokens issued to Heroku and Travis-CI. The threat actor successfully breached and exfiltrated data from private repositories belonging to dozens of organisations. | _Breach_, _IT_ | ## Information operations ||| |---|---| | According to the cyber intelligence firm Nisos, a subcontractor to the FSB, the Federal Security Service of the Russian Federation has been developing a botnet code named Fronton which aimed to creating and deploying trending social media events en masse to support coordinated inauthentic behaviour on a great scale. | _Russian threat actor_, _Social media botnet_ | ## Hacktivism ||| |---|---| | Anonymous affiliates began calling for a revival of #OperationJane in response to the leaked draft of a US Supreme Court opinion that would overturn Roe vs. Wade — a landmark case that legalised abortion nationally in 1973. Anonymous affiliates first launched #OperationJane in early September 2021 to protest the Heartbeat Act banning abortion in the US state of Texas following the detection of embryonic “cardiac activity”. | _US_, _Government_ | | The pro-Russia hacktivist group called Legion, an affiliate of Killnet (see above in chapter "Europe"), claimed DDoS attacks against at least several US entities: a business-to-business database provider, the CIA, a defence and aerospace corporation, and a defence contractor whose weapons systems had been sent to Ukraine. | _US_, _Defence_, _Aerospace_, _Intelligence_ | ## Vulnerability exploitation ||| |---|---| | Several cyber security agencies, including CERT-EU, warned of the active exploitation of critical F5 BIG-IP network security vulnerability (CVE-2022-1388). See also CERT-EU SA 2022-032.| _F5 BIG-IP_ | | The Department of Homeland Security's cybersecurity unit ordered Federal Civilian Executive Branch (FCEB) agencies to urgently update or remove VMware products from their networks due to an increased risk of attacks. See also CERT-EU SA 2022-036. | _VMware_ | | Splunk released a security advisory for a critical path traversal vulnerability (CVE-2022-26889) in a search parameter that can potentially allow external content injection. An attacker can cause the application to load data from incorrect endpoint URLs, leading to outcomes such as running arbitrary SPL queries. See CERT-EU SA 2022-037. | _Splunk_ | | Microsoft warned of brute-forcing attacks targeting internet-exposed and poorly secured Microsoft SQL Server (MSSQL) database servers using weak passwords. See also CERT-EU TA 22-060. | _SQL Servers_ | | Independant security researchers have discovered a new Microsoft Office zero-day vulnerability, dubbed Follina and tracked as CVE-2022-30190, that is being used in attacks to execute malicious PowerShell commands via Microsoft Diagnostic Tool (MSDT) simply by opening a Word document. See CERT-EU SA 2022-039. | _Microsoft Office_ |