The Red Cross Data Breach made the headlines last month, after the hack on its network and accused state sponsored hackers of the take down. In this update to the breach, the Red Cross mentioned that the attack happened on November 09, 2021 and it was identified only on Jan 18.
The attackers were able to breach the network by exploiting the CVE-2021-40539 vulnerability on Zoho ManageEngine ADSelfService Plus version 6113 and its prior versions that was vulnerable to the REST API authentication bypass allowing remote code execution.
ADSelfService Plus is a password management and Single Sign-On (SSO) software from a Indian SaaS firm. The vulnerability in this tool allowed hackers to bypass authentication, drop web shells on the servers and then make a lateral distribution across their network while compromising admin credentials. Furthermore, the hackers compromised Restoring Family Links, a Red Cross Program used by volunteers to reunite family members separated due to disaster, conflict or migration.
After the breach last month, Robert Mardini, Director General of the International Committee of the Red Cross begged hackers not to leak the personal information of those subjects as it belongs to highly vulnerable people who have already gone through so much in their life time. The breached information starting with names, addresses, reason for separation, location, contact details and other details belongs to 515,000 separated individuals.
As per the Red Cross, the entity behind the data breach is found to be a Advanced Persistent Treat (APT) Group based on the hacking tools involved in the incident. APT is usually a state-sponsored hacking group that operates for social or political reasons.
Furthermore, the Red Cross had the following beak-down to accuse APT group,
It was found that the attackers were inside the organization’s network for more than two months until the EDR detected the same last month. However, as per Palo Alto Networks Report that was published on November 2021 has connected a similar Zoho Vulnerability to a Chinese State-Sponsored Hacker as APT27.
Following the Red Cross Data Breach news, the German Government published a security warning for state and private companies about the APT27 attack that is leveraging Zoho vulnerability. These cases bring us closer to the entity behind the Red Cross Data Breach mapping it to APT27.
The US State Department made the following statement on Red Cross Data Breach last month, “Targeting the Red Cross and Red Crescent Movement’s sensitive and confidential data is a dangerous development. It has real consequences: this cyber incident has harmed the global humanitarian network’s ability to locate missing people and reconnect families. This is why it is so vital that humanitarian data be respected and only used for intended purposes. To ensure states and vulnerable people can continue to trust and rely on the Red Cross and Red Crescent Movement for the help they need, states should join the ICRC in raising the alarm about this breach”.
When hackers have started targeting organizations like the ICRC then this becomes a major concern, as they are not after monetary benefits but even more nefarious thought of disrupting the society, political stability and humanity as a whole.
Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.
You can reach out to us via Twitter or Facebook, for any advertising requests.
Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…
Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…
Discover the top 11 log management tools for efficient system management and monitoring. Learn about…
Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…
Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…
Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…