The U.S. Cyber Command and Canadian Armed Forces have recently concluded their hunt forward operations with Latvia's CERT.LV aimed at strengthening the cybersecurity defenses of the country's critical infrastructure, as well as identifying potential cybersecurity threats, according to The Record, a news site by cybersecurity firm Recorded Future.
"With our trusted allies, the U.S. and Canada, we are able to deter cyber threat actors and strengthen our mutual resilience. This can only happen through real-life defensive cyber operations and collaboration. The defensive cyber operations conducted allowed us to ensure our state infrastructure is a harder target for malicious cyber actors," said CERT.LV General Manager Baiba Kaskina.
Such operations come after the Cyber Command disclosed sending cybersecurity teams to Ukraine and other countries in Eastern Europe, and more countries are expected by both Cyber Command and National Security Chief Paul Nakasone and Cyber National Mission Force Commander Army Maj. Gen. William Hartman to seek the U.S.'s digital expertise in dealing with cybersecurity threats amid the ongoing Russia-Ukraine war.
Malicious QR code messages have also been increasingly leveraged to compromise the sector, with Office 365 used to send over 15,000 of such messages to education entities, a Microsoft Threat Intelligence report showed.
While DumpForums claimed to have infiltrated the company's corporate GitLab server, mail server, and software management services, Dr. Web emphasized that the incident had not resulted in any customer data compromise.
Misconfigured Magento or OpenCart instances may have been targeted to facilitate the deployment of Mongolian Skimmer, which uses various event-handling methods to ensure extensive compatibility while hiding malicious activity with heavy Unicode character utilization.