Cyber News Roundup for January 3, 2025 - RedSeal
RedSeal
  • Platform
    • RedSeal Platform
    • Capabilities
      • Hybrid Environment Modeling
      • Attack Path Analysis
      • Risk Prioritization
      • Continuous Compliance
    • Integrations
    • CTEM
  • Services
    • CTEM
    • Professional Services
    • Customer Support
    • RedSeal University
  • Solutions
    • Business Use Cases
      • Breach Impact Reduction
      • Mergers & Acquisitions
      • Cyber Insurance Optimization
    • Industries
    • CTEM
  • Partners
    • RedSeal Partners
    • Partner Portal
  • Company
    • About RedSeal
    • Leadership
    • Careers
  • Resources
    • Blog
    • Events
    • Resource Center
  • Contact Us
  • GET A DEMO
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

Cyber News Roundup for January 3, 2025

2025-01-3
/  byWayne Lloyd, Federal CTO, RedSeal

Happy New Year! We’re bringing you the first roundup of key cybersecurity developments of the year, highlighting significant breaches, evolving threats, and new regulatory updates. From state-sponsored hacks targeting critical U.S. government systems to the continued vulnerabilities in healthcare and telecom sectors, the cybersecurity landscape remains dynamic and fraught with challenges.

Let’s take a closer look at some of the major stories making headlines:

 

Beijing-linked hackers penetrated U.S. Treasury systems

According to a letter the agency sent from the U.S. Treasury to congressional lawmakers on Monday, a Chinese state-sponsored APT actor was responsible for what is being called “a major incident” that compromised U.S. Treasury Department workstations and classified documents at the Office of Foreign Assets Control (OFAC). The department had been notified on December 8 by BeyondTrust, that “a foreign actor had obtained a security key” that allowed it “to remotely gain access to employee workstations and the classified documents stored on them.” The letter “”did not specify the number of impacted workstations or the kind of documents accessed,” and the agency adds, the compromised service “has been taken offline and at this time there is no evidence indicating the threat actor has continued access to Treasury information.” (The Record)

 

Russian tanker suspected of undersea data cable sabotage 

On yesterday’s episode of Cyber Security Headlines, we mentioned briefly that Finnish authorities seized a Russian ship after it allegedly damaged several submarine cables in the Baltic Sea. The story continues to unfold. The ship seized was the Eagle S, an oil tanker that departed from a Russian port on December 25, and which is suspected of “intentionally dragging its anchor for several miles resulting in the complete severing of multiple cables, including the Estlink 2 power cable and four telecommunications cables.” Authorities from Finland boarded the ship by helicopter, having “identified but not arrested seven suspects.” The ship is being treated as a crime scene on suspicions that it is more than just an oil tanker. A report from the shipping journal Lloyd’s List, describes the Eagle S as “was loaded with spying equipment unusual for a merchant ship, and used to monitor NATO naval and aircraft radio communications, and to drop “sensors-type devices” in the English Channel.” (The Record and Lloyd’s List)

 

Lumen reports says it has locked the Salt Typhoon group out of its network 

More updates in the continuing Salt Typhoon story, following revelations last week that a ninth telecom company had been penetrated by the China-linked APT group Salt Typhoon, Lumen announced this week that the APT group had been ejected from and locked out of the Lumen network. Company spokesperson Mark Molzen told TechCrunch that “an independent forensic analysis confirmed the company ejected the Chinese actors from its network, adding that there is no evidence that customer data was accessed.” (Security Affairs)

 

Proposed updates to HIPAA Security Rule mandate to restore the loss of certain relevant electronic information systems and data within 72 hours
The U.S. Department of Health and Human Services (HHS) has proposed updates to the Health Insurance Portability and Accountability Act (HIPAA) Security Rule to enhance cybersecurity measures within the healthcare sector. These updates aim to strengthen protections for electronic protected health information (ePHI) against increasing cyber threats. Key proposed changes include:
  • Mandatory Implementation Specifications: Eliminating the distinction between “required” and “addressable” specifications, making all implementation specifications mandatory with limited exceptions.
  • Data Restoration Requirements: Mandating the restoration of certain electronic information systems and data within 72 hours following a loss.
  • Enhanced Documentation and Analysis: Requiring comprehensive written documentation of aes, procedures, plans, and analyses, along with regular reviews and updates.
  • Asset Inventory and Network Mapping: Obligating the development and maintenance of a technology asset inventory and a network map that tracks the movement of ePHI, to be updated at least annually or in response to significant changes.
These proposed modifications are part of a broader effort to align HIPAA regulations with current technological advancements and to address the evolving cybersecurity landscape in healthcare. The Notice of Proposed Rulemaking (NPRM) was issued on December 27, 2024, and stakeholders are encouraged to submit comments during the 60-day public comment period following its publication in the Federal Register. (Security Affairs)
Exposed Cloud Server Tracks 800,000 Volkswagen, Audi, and Skoda EVs
A recent investigation revealed that an unsecured cloud server exposed sensitive location data for 800,000 Volkswagen Group electric vehicles, including models from Volkswagen, Audi, SEAT, and Skoda. Discovered by an anonymous whistle-blower and reported to the Chaos Computer Club (CCC), the data included GPS coordinates and vehicle statuses, enabling the tracking of owners’ movements and routines. Notably, the breach affected various individuals, including German politicians, police officers, and intelligence service employees, with most vehicles located in Europe. The root cause was identified as a misconfiguration within Cariad, Volkswagen’s software division, which has since been addressed to prevent further unauthorized access. (Hack Read)
New details about hijacked Chrome extensions

In another update to a story we brought to you Monday on Cyber Security Headlines, new details have emerged about a phishing campaign targeting Chrome browser extension developers. Although initial reports focused on an extension from security firm, Cyberhavens, subsequent investigations revealed the campaign affected at least 35 extensions collectively used by roughly 2,600,000 people. The attack leverages a phishing email appearing to come from Google and claiming the dev’s extension is in violation of Chrome Web Store policies. Victims are then redirected to an attacker-hosted OAuth application (named “Privacy Policy Extension”) where they are asked to grant permission to manage their Chrome extensions. The attackers then inject data-stealing code into the extension and publish it as a “new” version. The malicious extensions aim to steal user Facebook credentials and have the ability to bypass multi-factor authentication and CAPTCHA mechanisms. Whiler recent reports indicate the campaign started around December 5, 2024, but BleepingComputer identified that related command and control subdomains existed as far back as March 2024. (Bleeping Computer)

 

NATO plans to build satellite links as backups to undersea cables 

Ninety-five percent of global data traffic is carried through undersea fiber optic cables. Because roughly 100 undersea cables get severed each year, NATO is working to improve resilience of this critical infrastructure. Project HEIST (which stands for Hybrid Space-Submarine Architecture Ensuring Infosec of Telecommunications), will enlist engineers to develop smart systems to quickly locate cable breaks and develop protocols to automatically reroute the affected data to satellites. While satellites are the primary backups to undersea cables, their bandwidth is far behind physical connections. Work is underway to upgrade satellites from radio transmissions to lasers, increasing the speed by about 40 times to 200 Gbps. While Starlink satellites already use laser technology, other tech companies, including Amazon, continue to develop their own satellite technology.

Coincidentally, this week, Finnish authorities seized a Russian ship after it allegedly damaged several submarine cables in the Baltic Sea. (Tom’s Hardware and The Record)

 

Air Fryer espionage raises data security concerns

While risks related to smart device hijacking are nothing new, since November, privacy concerns related to use of air fryers has been gaining momentum on tech forums. Modern smart air fryers leverage AI, increasing their ability to collect, and potentially expose personal information. The UK’s Information Commissioner’s Office (ICO), recently released findings showing that certain air fryer models sold in the UK and the U.S. possess the ability to eavesdrop on users through their mobile apps. In response, the ICO plans to introduce new guidelines for manufacturers of AI-powered gadgets. In the meantime users should keep connected device software up to date, secure home Wi-Fi networks with strong passwords and monitor permissions granted to related apps. (Cyber Security Insiders)

 

2024 security lessons

According to an article by Dark Reading there are some key lessons to takeaway as we head into the new year. The threat landscape in 2024 underscored the rise of zero-day exploits, nation-state alliances with cybercriminals, and increasing attacks on critical infrastructure, exposing systemic vulnerabilities in both IT and OT systems. High-profile incidents, including ransomware disruptions to supply chains and espionage targeting telecom networks, highlighted the need for stronger defenses, proactive patch management, and cross-sector collaboration. (Dark Reading)

 

Volkswagen software company Cariad suffers Amazon cloud breach

The breach, discovered by Europe’s largest ethical hacker association, CCC, revealed that sensitive information for 800,000 electric vehicles from brands such as Audi, VW, and Skoda were left exposed on “a poorly secured and misconfigured Amazon cloud storage system.” The data stolen includes GPS coordinates, battery charge levels, and other vehicle status details, but experts warn that such data can be easily “connected to owners’ personal credentials, thanks to additional data accessible through VW Group’s online services.” The data had been vulnerable for months, however, a Cariad representative said that “the exposed data affected only vehicles connected to the internet and had been registered for online services,” and that the data “could only be accessed after bypassing several security mechanisms that required significant time and technical expertise.” An investigation by the German magazine Spiegel shows that the list of affected customers includes German politicians, entrepreneurs, the entire fleet of the Hamburg police force, and even suspected intelligence service employees. (BleepingComputer, Carscoops, Spiegel)

 

HIPAA to be updated with cybersecurity regulations

Further news from Anne Neuberger’s Friday press conference reveals that new cybersecurity rules covering how healthcare institutions protect user data will be proposed under the Health Insurance Portability and Accountability Act. Neuberger described this as the first update to HIPAA’s security rule in over a decade, and will require entities who maintain healthcare data encrypt it. “Healthcare entities also will have to monitor their networks for threats and do compliance checks to see whether they are abiding by the new HIPAA rules.” (The Record)

 

Palo Alto Networks fixes high-severity PAN-OS flaw

This flaw, located in PAN-OS software, and which has a CVE number and a CVSS score of 8.7, could trigger denial-of-service (DoS) on vulnerable devices, allowing an unauthenticated attacker to reboot the firewall by sending a malicious packet through its data plane, forcing the firewall into maintenance mode. The vulnerability affects PAN-OS versions 10.X and 11.X, but can be exploited only if DNS Security logging is enabled. (Security Affairs)

 

Have questions? Reach out to RedSeal today to chat with one of our cybersecurity experts or schedule a demo today.

Share this entry

Recent Posts

  • From Reactive to Resilient: How 2025’s Cybersecurity Evolution Redefines Defense for 2026

    2026-01-05
  • Exposure Management in 2025: Meeting the Moment

    2025-12-31
  • The Auto Industry’s Invisible Crisis: Why Exposure Management Can’t Wait

    2025-12-21
  • Drowning in Vulnerabilities? Here’s How to Finally Know What to Fix First

    2025-12-09
  • RedSeal recognized in the 2025 Gartner® Magic Quadrant™ for Exposure Assessment Platforms: A Strong Position in a Rapidly Expanding Market

    2025-12-01

Blog Archive

Get the latest news, invites to events, and threat alerts

Platform

  • RedSeal Platform
  • Capabilities
  • Integrations
  • CTEM

Services

  • CTEM
  • Professional Services
  • Customer Support
  • RedSeal University

Solutions

  • Business Use Cases
  • Industries
  • CTEM

Partners

  • RedSeal Partners
  • Partner Portal

Company

  • About RedSeal
  • Leadership
  • Careers

Resources

  • Blog
  • Events
  • Resource Center
CONTACT US
Distinguished Vendor badge 2025

© Copyright by RedSeal, Inc. All Rights Reserved.
  • Link to X
  • Link to LinkedIn
  • Link to Youtube
  • Link to Rss this site
  • Standard Agreements
  • Terms of Use
  • Privacy Policy
  • Section 508 Policy
Link to: Cyber News Roundup for December 20, 2024 Link to: Cyber News Roundup for December 20, 2024 Cyber News Roundup for December 20, 2024 Link to: Cyber News Roundup for January 10, 2025 Link to: Cyber News Roundup for January 10, 2025 Cyber News Roundup for January 10, 2025
Scroll to top Scroll to top Scroll to top

In order to provide you with the best experience possible we might sometimes track information about you. Sometimes this may involve writing a cookie. We use this information for things like experience enrichment, analytics and targeting advertising. We recommend allowing these functions to get the most out of your experience.

OK

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Accept settingsHide notification only
Footer
Connect on LinkedIn