Skip Navigation

Critical Infrastructure News

The United States and international partners are blaming China with “high confidence” for the cyber campaign exploiting zero-day vulnerabilities in Microsoft Exchange reported by the company in March and announced new joint measures to “strengthen our collective cyber resilience and security cooperation,” a senior administration official told reporters late Sunday.

“We’ve raised our concerns about both the Microsoft incident and the PRC’s broader malicious cyber activity with senior PRC government officials, making clear that the PRC’s actions threaten security, confidence, and stability in cyberspace,” the official said. “The U.S. and our allies and partners are not ruling out further actions to hold the PRC accountable.”

The official said that the investigation behind the attribution “really gave us new insights on the MSS’s work and on the kind of aggressive behavior that we’re seeing coming out of China.” The “breadth of compromises, tens of thousands of systems around the world” also delayed attribution for the Microsoft Exchange hack until now.

Read more: HS Today

Beebe Healthcare, a healthcare system serving southern Delaware, partnered with a number of agencies, including Delaware National Guard, Delaware Division of Public Health’s Emergency Medical Services & Preparedness team, City of Lewes Ambulance, and University of Delaware to host emergency preparedness drills.

During the drills, two scenarios were simulated: a bus carrying special-needs children crashed, sending many to the hospital; and a hurricane approaching the city of Lewes required evacuation of the hospital.

The healthcare system's Incident Command was headquartered at the hospital while an on-site landing team was at the University of Delaware’s Lewes Campus.

The teams communicated via walkie-talkie and cell phones to send "patients" from the hospital to the landing zone where they were met by teams of nurses and National Guard to be transported in two Black Hawk helicopters to Nemours Children’s Health and Christiana Care in Wilmington.

Read More: Security Mag

BALTIMORE (AP) — Federal authorities in Maryland have seized the domain name of a website accused of fraudulently offering to sell COVID-19 vaccines.

The U.S. Attorney’s office for the District of Maryland says “COVIDReliefSociety.org” is the 10th virus fraud-related domain name that it has seized since the pandemic began.

In a news release on Thursday, prosecutors say the website promised same-day delivery of COVID-19 vaccines anywhere in the world but actually collected visitors’ personal information to launch phishing attacks and deploy malware.

The site now bears a message that the federal government has seized it.

Read more at AP News

You wouldn't think it possible that a single hack could unlock access to live feeds from surveillance cameras installed in hospitals, prisons, schools, and police departments. That is, until you realize they all rely on the same cloud-connected system offered by one company.

As Bloomberg reports, an international hacker collective targeted and successfully breached Verkada, a Silicon Valley startup focused on enterprise security camera systems. The company markets itself as offering a new approach and standard for enterprise security that's software-first and cloud-focused. It seems this approach has been its undoing, though.

The hackers claim to have accessed Verkada's full video archive, including footage from all their customers. They also tapped into over 150,000 live surveillance feeds installed in hospitals, prisons, police departments, and schools, but also high-profile companies including Tesla and Cloudflare. Footage from a camera installed inside Florida hospital Halifax Health, another at a Tesla warehouse in Shanghai, and a third at a police station in Stoughton, Massachusetts, were shown to Bloomberg, as were images from the Madison County Jail in Huntsville, Alabama.

Read more: PC Mag

The international vaccine supply chain has been targeted by cyber-espionage, according to IBM. The company says it tracked a campaign aimed at the delivery "cold chain" used to keep vaccines at the right temperature during transportation. The attackers' identity is unclear - but IBM said the sophistication of their methods indicated a nation state. It follows warnings from governments - including the UK's - of countries targeting aspects of vaccine research. IBM says it believes the campaign started in September 2020. It says phishing emails were sent out across six countries, which targeted organisations linked to the Cold Chain Equipment Optimisation Platform (CCEOP) of Gavi, the international vaccine alliance. Gavi's partners include the World Health Organization, Unicef, the World Bank and the Bill & Melinda Gates Foundation. They help distribute vaccines around the world to some of the poorest regions. This sometimes requires a "cold chain".

Read more at BBC News