Introducing Episode 7 of our expertly crafted series on data breaches, cyber-attacks, and more. Breach Breakdown is your go-to source for recapping incidents and staying up-to-date on the latest solutions. September saw its fair share of reported cases, with breaches affecting:
OpenAI says Iranian Hackers Used ChatGPT to Plan ICS Attacks
OpenAI has reported that Iranian hackers have used ChatGPT to aid attacks on industrial control systems (ICS), enhancing their planning and technical abilities. This highlights the growing risk of AI tools being exploited in cyber warfare. As AI becomes more integrated into industries, stronger cyber security measures are essential to protect critical infrastructure from emerging threats.
Read More:Fidelity Notifies 77K Customers of Data Breach
Fidelity Investments has notified over 77,000 customers that their personal information was compromised in a breach involving a third party between August 17-19, 2024. Although no accounts were accessed, concerns about identity theft have arisen, marking the second breach for Fidelity this year
Read More:Comcast Data Breach: 237,000+ Customers’ Personal Data Exposed
Over 237,000 Comcast customers have had their personal information, including names, addresses, Social Security numbers, and account details, exposed due to a breach at Financial Business and Consumer Solutions (FBCS) between February 14-26, 2024. Comcast is providing 12 months of free identity theft protection and advises customers to monitor their accounts for any unauthorised activity.
Read More:87,000 Fortinet FortiOS RCE Attacks Reported
A recent report reveals that attackers exploited a vulnerability in FortiOS SSL-VPN, leading to remote code execution (RCE) attacks on 87,000 Fortinet devices. This flaw allowed unauthorised access, putting critical data at risk. Fortinet users are urged to update and secure their systems immediately.
Read More:Mamba 2FA hashtag#Cybercrime Kit Targets Microsoft 365 Users
The Mamba 2FA phishing-as-a-service kit is exploiting Microsoft 365 users by mimicking OneDrive, SharePoint, and Microsoft sign-in pages. Using adversary-in-the-middle (AitM) tactics, it bypasses two-factor authentication (2FA) to steal credentials and cookies, sending data to attackers via Telegram.
Read More: