Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Showing posts with label USA. Show all posts

Governments sanction Russian “bulletproof” host for aiding ransomware networks

 



Authorities in the United States, the United Kingdom, and Australia have jointly imposed sanctions on a Russian bulletproof hosting provider accused of giving safe and long-term technical support to ransomware operators and other criminal groups. Officials say the newly sanctioned entities have played a central role in keeping several high-impact cybercrime operations online.

A bulletproof hosting service is a type of internet infrastructure provider that knowingly allows harmful activity on its servers. These companies rent out digital space and refuse to take down malicious websites, even when they receive complaints from victims or requests from law enforcement. Such services help threat actors conduct phishing campaigns, distribute malware, run command and control systems for their attacks, and host illegal content without fear of quick removal. This resistance to oversight makes it harder for investigators to disrupt cybercriminal networks.


Media Land and its linked companies named as key targets

The United States Treasury’s Office of Foreign Assets Control announced that Media Land, a Russia-based provider, has been added to the sanctions list along with three related firms: Media Land Technology, Data Center Kirishi, and ML Cloud. According to officials, Media Land’s infrastructure has been connected to well-known ransomware groups. It has also been tied to distributed denial-of-service attacks that targeted American companies, including systems categorized as critical infrastructure such as parts of the telecommunications sector.


Officials name individuals connected to the operation

Sanctions also extend to three people associated with Media Land. Aleksandr Volosovik has been identified as someone who promoted the company’s services on underground cybercriminal forums under the username Yalishanda. Another individual, Kirill Zatolokin, is accused of handling customer payments. A third person, Yulia Pankova, is said to have assisted with legal matters and financial management. The United Kingdom additionally stated that Volosovik has interacted with multiple cybercrime groups in the past.


Other companies involved in supporting the infrastructure

The sanctions package further includes Aeza Group LLC, another bulletproof hosting operator that had already been sanctioned earlier this year. Authorities say Aeza attempted to continue operating by using a UK-based company named Hypercore Ltd as a front. Additional entities in Serbia and Uzbekistan that provided technical assistance to the network have also been designated.


Government agencies issue defensive guidance

Along with the sanctions, cybersecurity agencies across the Five Eyes alliance released technical recommendations to help defenders identify and block activity linked to bulletproof hosting services. They suggest creating high-confidence lists of harmful internet resources based on verified threat intelligence, performing continuous monitoring of network traffic, and applying filtering rules at network boundaries while examining how those rules might affect legitimate users. The guidance also encourages service providers to maintain stronger onboarding checks for new customers since criminal operators often hide behind temporary email accounts or phone numbers.


Implications of the sanctions

All assets connected to the named individuals and companies within the United States, the United Kingdom, and Australia will now be frozen. Any organisation or person that continues to conduct transactions with them may face secondary sanctions or other enforcement actions. This step builds on earlier actions taken in February, when the three nations sanctioned ZServers, another Russian hosting operation, while Dutch authorities seized more than one hundred of its servers.

The coordinated announcement signals a growing international effort to dismantle the online infrastructure that ransomware groups depend on. It also reinforces the need for organisations to maintain strong cybersecurity practices, rely on reputable service providers, and monitor threat intelligence to reduce exposure to criminal activity.

Ahold Delhaize USA Faces Data Breach Exposing Sensitive Information

In an announcement published by Ahold Delhaize, a leading global food retailer, the company confirmed that a significant data breach has compromised the personal information of over 2.2 million people across several countries. 

With nearly 10,000 stores located across Europe, the United States, and Indonesia, the company serves more than 60 million customers every week from all over the world, employing approximately 400,000 people. The office of the Maine Attorney General received a formal disclosure from Ahold Delhaize USA on Thursday, which stated that 2,242,521 individuals had been affected by a cybersecurity incident but did not disclose the extent of the breach to date. 

According to preliminary indications, the breach may have affected a wide range of sensitive personal information aside from usernames and passwords. Information that is potentially compromised may include the full name, residential address, date of birth, identification numbers issued by the government, financial account information, and even protected health information. 

Clearly, the scale and nature of this incident demonstrate that large multinational retailers are faced with a growing number of risks and that there is a need for improved cybersecurity measures to be taken in the retail industry. There was a cyber incident in late 2024 that was officially acknowledged by Ahold Delhaize USA last week. Ahold Delhaize USA has acknowledged this incident, revealing that the personal data of more than 2.2 million individuals may have been compromised as a result. 

According to an official FAQ, based on current findings, the company does not believe that the intrusion affected its payment processing systems or pharmacy infrastructure, which are critical areas often targeted by high-impact cyberattacks. As further support for the disclosure, documentation submitted to the Maine Attorney General's Office indicated that approximately 100,000 Maine residents were affected by the breach as a whole. 

As Ahold Delhaize USA operates multiple supermarket chains under the Hannaford brand in this region, this state-specific detail has particular significance, especially since the Hannaford brand is one of the most prominent supermarket brands in the region. It is not known yet how much or what type of data was exposed by the company, however, the widespread scope of the incident raises significant concerns about the potential misuse of personal information and the implications that could have on many individuals across multiple states. 

As far as cyberattacks targeting Ahold Delhaize USA are concerned, this incident can be attributed to a broader pattern of rising threats within the grocery distribution and food industry in general. On November 8, 2024, the parent company of the retailer publicly acknowledged the security breach, and later in April 2025, the company's parent company confirmed that the attackers had accessed sensitive data related to individuals in the Netherlands, where the company is headquartered. 

It was imperative that Ahold Delhaize USA temporarily disable portions of its internal systems during the initial stage of the incident as a precautionary measure. In addition to maintaining a significant global footprint, Ahold Delhaize operates more than 9,400 stores in Europe, the United States, and Indonesia. It is a leading multinational retailer and wholesale conglomerate with more than 9,000 stores worldwide. 

It serves approximately 60 million consumers every week both physically and digitally through its network of more than 393,000 employees. By the year 2024, the company will report annual net sales of more than $104 billion, driven by a diverse portfolio of well-known retail brands that are part of a broad range of well-known retail brands. As an example of these, in the United States, users will find Food Lion, Stop and Shop, Giant Food, and Hannaford, while in Europe, it is represented by Delhaize, Maxi, Mega Image, Albert, Bol, Alfa Beta, Gall & Gall, and Profi among a variety of banners. 

In November 2024, the company first announced its breach, stating that certain U.S.-based brands and operations, including pharmacy operations and segments of its e-commerce infrastructure, had been compromised as a result of the breach. According to a formal filing filed with the Maine Attorney General's Office on Thursday, cyberattackers gained unauthorized access to Ahold Delhaize USA’s internal business systems on November 6, 2024, and this resulted in sensitive data belonging to 2,242,521 individuals being compromised.

Although the company has not yet confirmed whether customer information was among the stolen data, it has confirmed that internal employment records were also stolen as part of the theft. Ahold Delhaize USA and its affiliated companies may have collected and stored personal information about current and former employees, raising concerns about the possibility of misuse of personal identifying information as well as employment information, among other things. 

It is evident from the scale of this breach that large, interconnected retail networks face increasingly dangerous vulnerabilities, which underscores the need to enforce robust cybersecurity practices at all levels of an organisation. It has been discovered through further investigation into the breach that the compromised files might have contained very sensitive personal information in a wide variety of forms. 

Ahold Delhaize USA Services has made it clear that the data could be potentially exposed includes the full names of individuals, their contact information (such as postal addresses, telephone numbers, and email addresses) along with their dates of birth and numerous forms of government-issued identification number, such as Social Security numbers, passport numbers, or driver’s license numbers. 

The company also reported that, besides information about financial accounts, such as bank account numbers and medical information, which can be contained within employment files, there was also potentially confidential information concerning workers' compensation records and medical records. An unauthorised party has been able to gain access to employment-related records related to current and former employees. 

After receiving a formal notification from the Attorneys General of California, Maine, and Montana regarding the breach on June 26, 2025, the company began sending notification emails to those affected by the breach. Ahold Delhaize USA Services has stated that those individuals who receive confirmation that their personal information has been compromised may be eligible for compensation under this policy. 

Whenever such a data breach occurs, the effects can be far-reaching, as sensitive personal data may be used for identity theft, financial fraud, or malicious activities. It is widely understood by security experts that companies that collect and store sensitive information are bound by legal and ethical obligations to protect that information from unauthorised access. There is a possibility that affected individuals may be able to sue for damages that result from the misuse or exposure of their personal information when proper safeguards are not observed. 

In light of the increasing frequency of these breaches, the importance of strengthening corporate data protection frameworks and swiftly addressing incidents is increasing. An organisation known as Inc Ransom, formerly linked with sophisticated ransomware campaigns, claimed responsibility for the cyberattack. It has been found that the group has participated in the cyberattack, raising further concerns about the methods used and the possibility that the stolen data may be exploited in the future. 

There has been another cyberattack which has recently struck United Natural Foods, Inc., which coincided with the timing of Ahold Delhaize USA's complete disclosure of the exposure of personal information. In the wake of this breach, UNFI, a major grocery distributor in the United States, was forced to temporarily shut down several online systems, disrupting the fulfilment process and causing delays in delivering groceries to retailers.

After containing the incident, UNFI has also restored its electronic ordering and invoicing capabilities. These back-to-back breaches highlight the growing cybersecurity vulnerabilities in the retail sector and the supply chain sector, making it increasingly important for companies to develop coordinated defensive strategies to protect sensitive consumer and business data, both of which are in urgent need.

U.S. Homeland Security Reportedly Buys Airline Passenger Data from Private Brokers

 



In the digital world where personal privacy is increasingly at risk, it has now come to light that the U.S. government has been quietly purchasing airline passenger information without public knowledge.

A recent report by Wired revealed that the U.S. Customs and Border Protection (CBP), which operates under the Department of Homeland Security (DHS), has been buying large amounts of flight data from the Airlines Reporting Corporation (ARC). This organization, which handles airline ticketing systems and works closely with travel agencies, reportedly provided CBP with sensitive passenger details such as names, full travel routes, and payment information.

ARC plays a critical role in managing airfare transactions worldwide, with about 240 airlines using its services. These include some of the biggest names in air travel, both in the U.S. and internationally.

Documents reviewed by Wired suggest that this agreement between CBP and ARC began in June 2024 and is still active. The data collection reportedly includes more than a billion flight records, covering trips already taken as well as future travel plans. Importantly, this data is not limited to U.S. citizens but includes travelers from around the globe.

What has raised serious concerns is that this information is being shared in bulk with U.S. government agencies, who can then use it to track individuals’ travel patterns and payment methods. According to Wired, the contract even required that the government agencies keep the source of the data hidden.

It’s important to note that the issue of airline passenger data being shared with the government was first highlighted in June 2024 by Frommer's, which referenced a related deal involving Immigration and Customs Enforcement (ICE). This earlier case was investigated by The Lever.

According to the privacy assessment reports reviewed, most of the data being purchased by CBP relates to tickets booked through third-party platforms like Expedia or other travel websites. There is no public confirmation yet on whether tickets bought directly from airline websites are also being shared through other means.

The U.S. government has reportedly justified this data collection as part of efforts to assist law enforcement in identifying individuals of interest based on their domestic air travel records.

When contacted by news organizations, including USA Today, both ARC and CBP did not provide any official responses regarding these reports.

The revelations have sparked public debate around digital privacy and the growing practice of companies selling consumer data to government bodies. The full scale of these practices, and whether more such agreements exist, remains unclear at this time.

US Embassy Cautions Visa Applicants After Bengaluru Man Falls Prey to Scam

 

The US Embassy in New Delhi has issued a cautionary alert to individuals applying for US visas, urging them to be wary of online scams that falsely promise to expedite visa interview appointments. This warning comes in the wake of a cyber fraud case reported from Bengaluru, where a 45-year-old engineer was duped by a scammer posing as a facilitator on the Telegram messaging app. 

According to reports, the engineer, a resident of RR Nagar, came across a Telegram channel on May 22 that appeared to offer assistance in advancing B-1/B-2 visa interview dates. His appointment was initially set for April 2026. Shortly after joining the channel, he was contacted by someone claiming to be Vanam Sravan Krishna. The individual promised to reschedule the appointment for a fee of ₹10,000. Trusting the offer, the victim shared his US visa portal login credentials and transferred the amount. 

The scammer later sent a forged appointment confirmation and demanded an additional ₹10,000, threatening to change the login credentials if the payment wasn’t made. After the second payment, the fraudster locked the victim out of his visa account by altering the credentials. A case was subsequently filed with the West CEN police on May 24, and investigations are ongoing. 

Following the incident, the US Embassy took to social media to warn applicants that any claim of fast-tracking visa appointments for money is fraudulent. The post emphasized that personal information and login details should never be shared with unverified sources. Embassy officials reiterated that only official platforms should be used for visa-related processes. 

A senior official from the Criminal Investigation Department noted that the applicant may not receive support from the embassy in this case, as he voluntarily shared his credentials and attempted to bypass the official process. According to the officer, the applicant may no longer be able to generate a fresh visa request. 

The incident comes amid evolving visa policies, including proposals reportedly under consideration by US authorities to introduce a $1,000 premium processing fee for faster interview appointments. This follows a broader move to tighten visa screening procedures, including the suspension of new student and visitor visa interviews in several countries. The embassy’s latest alert serves as a reminder to applicants to rely solely on official sources and to be vigilant against offers that appear too good to be true.

Two-Month Cyber Breach at Mizuno USA Under Investigation

 


Unauthorized access to Mizuno USA's network has resulted in a compromise of sensitive customer information, which has caused Mizuno USA to notify its customers about the breach. In a letter to affected individuals, the sports gear manufacturer shared information regarding the breach with the Maine Office of the Attorney General, including details about it. 

There was suspicious activity detected on the company's systems on November 6, 2024, which prompted an immediate investigation. The investigation concluded that an unknown threat actor gained access to certain network systems, as well as exfiltrating files without authorization, for an extended period from August 21 to October 29, 2024. 

As one of the leading sporting goods manufacturers worldwide, Mizuno USA, one of the subsidiary companies of Mizuno Corporation, has confirmed an instance of unauthorized access to sensitive files by unauthorized persons between August and October 2024, resulting in the theft of those sensitive files. Mizuno USA is a North American company with headquarters in Peachtree Corners, Georgia, specializing in the manufacture and distribution of sports equipment, apparel, and footwear across a wide range of sports disciplines, such as golf, baseball, volleyball, and tennis. 

The company announced in its filing to the Maine Office of the Attorney General on Thursday that they had noticed suspicious activity on the company's network as early as November 6, 2024, and that they had subsequently conducted an investigation into the matter in the following days. It was found that unknown attackers had taken advantage of certain systems and accessed data containing personal information about an undisclosed number of individuals by hacking into them. 

In response to the breach, Mizuno USA has taken steps to increase its cybersecurity defences and has notified individuals who have been impacted by the breach. Mizuno USA continues to work with security experts to address the impact and prevent further incidents from taking place. As a result of the breach, Mizuno USA has taken steps to minimize the risk to its customers. The company is in the process of improving its cybersecurity measures and is working with security professionals to minimize future incidents. 

All customers affected by the breach have been notified, and they have been advised how to take protective measures to ensure the privacy and security of their personal information will be maintained. There was a recent cyber-attack on Mizuno USA that resulted in sensitive personal and financial information being compromised, however, the company isn't sure exactly how many people have been affected as a result of this attack. 

There is a lot of information that has been stolen, including names, Social Security numbers, details of financial accounts, and information about driver's licenses and passports. According to Mizuno USA, as a result of the breach, all individuals who were affected will be able to enjoy free monitoring of their credit records as well as free identity theft protection services for one year. As well as this, the company has also advised affected individuals to continue paying attention to their financial accounts so that they are protected from potential fraud. 

There has been no official announcement by Mizuno USA as to who has been responsible for the attack, but cyber security reports indicate that the BianLian ransomware gang claimed responsibility in November 2024 for the attack. As outlined by cybersecurity researcher HackManac on the X blog, the threat group is alleged to have exfiltrated a wide array of sensitive customer and business information, including financial records, Human Resources documents, confidential contracts, vendor and partner information, trade secrets, patents, and internal email communications. 

Currently, Mizuno USA is still assessing the full effect of the breach, and as a result, is taking steps to enhance its cybersecurity defences to prevent future breaches in the future. There have been further increases in the extortion tactics used by the BianLian ransomware gang as a result of the cyberattack that targeted Mizuno USA. Mizuno has recently been updated on the attackers' dark web leak site. There, they posted a screenshot of a spreadsheet allegedly detailing the company's expenses related to the ransomware attempt that occurred in 2022 and additional documents purportedly stolen from Mizuno's system in 2024. 

Known as BianLian, the company has been active since June 2022 and has mainly targeted international entities involved in critical infrastructure and private enterprises. In January 2023, the Avast ransomware team released the free decryptor to obtain back access to the ransomware, which prompted them to focus their attention on extortion attacks, relying on stolen information and pressure to get victims to pay for the ransomware. 

Even though reports have been circulating about widespread attacks undertaken by this cybercrime group, there has been no ceasefire in its expansion, with recent attacks occurring against major companies, such as Air Canada, Northern Minerals, and Boston Children's Health Physicians. To ensure that Mizuno USA does not repeat the mistakes, the company continues to assess the full impact of the breach as well as strengthen its

U.S. Officials Sound Alarm Over Salt Typhoon Hack as Cybersecurity Becomes Political Flashpoint


U.S. Officials Urge Encryption Adoption Amid "Salt Typhoon" Cyberattack In an unprecedented response to the "Salt Typhoon" cyber intrusion, top cybersecurity and law enforcement officials in the U.S. are urging citizens to adopt encrypted messaging platforms. The attack, attributed to Chinese government-linked hackers, has infiltrated critical U.S. telecom systems, enabling monitoring of metadata and communications in Washington, D.C. Scope of the Salt Typhoon Attack Described as "the worst hack in our nation’s history" by Sen. Mark Warner of Virginia, the Salt Typhoon cyberattack has compromised various U.S. systems. Key details include:
  • The breach targeted telecom infrastructure, including systems handling court-ordered wiretaps.
  • While access to classified data remains unconfirmed, the intrusion has caused widespread alarm.
  • Hackers accessed metadata such as call times and locations, though encrypted platforms like Signal and Apple’s iMessage reportedly remained secure.
Global Advisory from Five Eyes Alliance In response, the Five Eyes intelligence alliance—which includes the U.S., UK, Canada, Australia, and New Zealand—has issued a joint advisory. Recommendations include:
  • Strengthening system defenses to mitigate similar threats.
  • Encouraging widespread adoption of encrypted communication platforms.
Political Context Complicates Encryption Discussions Domestically, political developments are influencing the discourse on encryption:
  • Former President Donald Trump is set to return to office in January 2025.
  • Concerns have emerged over potential misuse of federal surveillance tools.
  • Trump's nomination of Kash Patel to head the FBI has amplified fears due to Patel’s controversial statements about targeting political adversaries.
These dynamics have heightened calls for encrypted communication as a safeguard against both foreign and domestic surveillance. 
 
Historically, the FBI has opposed widespread encryption, citing its impact on investigations. However:
  • The FBI now advocates for "responsibly managed encryption," signaling a shift in approach.
  • The Salt Typhoon breach has underscored the vulnerabilities of unencrypted systems.
  • Even intercepted encrypted data is rendered unusable, highlighting encryption’s critical role in security.
The Growing Need for Encryption Salt Typhoon’s success in breaching non-encrypted communication systems serves as a wake-up call:
  • Hackers struggled with encrypted platforms, showcasing their effectiveness in protecting data.
  • Experts warn of more frequent and sophisticated cyberattacks amid rising geopolitical tensions.
For individuals, adopting encryption for personal communications has become indispensable. 

The dual threats of foreign cyber espionage and potential domestic overreach have aligned cybersecurity officials and privacy advocates on the importance of encryption. As the U.S. navigates these challenges, securing digital communications is essential for both national security and personal privacy.

Vodka Maker Stoli Files for Bankruptcy in US Following Ransomware Assault

 


Stoli Group's U.S. Subsidiaries File for Bankruptcy Amid Ransomware Attack and Russian Asset Seizure The U.S. subsidiaries of Stoli Group have declared bankruptcy following an August ransomware attack and the confiscation of the company's last distilleries in Russia by authorities. Impact of the Cyberattack Chris Caldwell, President and Global Chief Executive Officer of Stoli USA and Kentucky Owl, stated that the August cyberattack severely disrupted the company's IT systems, including its enterprise resource planning (ERP) platform. Key details include:
  • The ransomware attack forced manual operations across the company.
  • Critical processes, such as accounting, were significantly affected.
  • Full recovery of IT systems is not expected until early 2025.
“In August 2024, the Stoli Group's IT infrastructure suffered severe disruption in the wake of a data breach and ransomware attack," Caldwell noted. "The attack caused substantial operational issues throughout all companies within the Stoli Group, including Stoli USA and Kentucky Owl.” 
 
The incident had far-reaching consequences:
  • Stoli's U.S. subsidiaries were unable to provide financial reports to lenders.
  • Lenders claimed the subsidiaries defaulted on a $78 million loan.
Seizure of Russian Assets In July 2024, just a month before the cyberattack, Russian authorities seized the group’s last two distilleries in the country, valued at $100 million. The seizures were linked to:
  • Yuri Shefler, the founder of Stoli Group, and the company being designated as "extremists."
  • Humanitarian relief efforts and marketing initiatives to support Ukrainian refugees amid the ongoing conflict in Ukraine.
Long-Running Legal Disputes Stoli Group has spent tens of millions of dollars battling a legal case with Russian state firm FKP Sojuzplodoimport over rights to the Stolichnaya and Moskovskaya vodka trademarks. This legal struggle has spanned 23 years and multiple jurisdictions, including the United States.
  • The dispute originated from a March 2000 executive order by President Vladimir Putin to "reinstate and protect the state's rights" in vodka trademarks.
  • The trademarks were acquired by private enterprises during the 1990s.
Political Repercussions Yuri Shefler faced political fallout for his criticism of the Putin regime:
  • In 2002, Shefler fled Russia due to politically motivated charges.
  • He later gained asylum in Switzerland and British citizenship after Russia's extradition demands were dismissed in the 2010s.
The Stoli Group's challenges highlight the intersection of cybersecurity vulnerabilities, geopolitical conflicts, and long-standing legal disputes. As the company navigates the aftermath of these events, its future remains uncertain amidst ongoing global and operational pressures.

Massive Data Breach Exposes Social Security Numbers of 2.9 Billion People

 


A significant data breach has reportedly compromised the personal information of 2.9 billion people, potentially affecting the majority of Americans. A hacking group known as USDoD claims to have stolen this data, which includes highly sensitive information such as Social Security numbers, full names, addresses, dates of birth, and phone numbers. This development has raised alarm due to the vast scope of the breach and the critical nature of the information involved. The breach was first reported by the Los Angeles Times, which revealed that the hacker group is offering the stolen data for sale. 

The breach allegedly stems from National Public Data, a company that collects and stores personal information to facilitate background checks. The company has not formally confirmed the breach but did acknowledge purging its entire database. According to National Public Data, they have deleted all non-public information, although they stopped short of admitting that the data had been compromised. In April, the hacking group USDoD claimed responsibility for the breach, stating that it had obtained the personal information of billions of people. This led to a class-action lawsuit against National Public Data, as victims sought redress for the potential misuse of their sensitive information. 

The lawsuit has intensified scrutiny on the company’s data security practices, particularly given the critical nature of the information it manages. The potential consequences of this breach are severe. The stolen data, which includes Social Security numbers, could be used for a variety of malicious activities, including identity theft, fraud, and other forms of cybercrime. The scale of the breach also highlights the ongoing challenges in safeguarding personal information, particularly when it is collected and stored by third-party companies. As investigations continue, the breach underscores the urgent need for stronger data protection measures. 

Companies that handle sensitive information must ensure that they have robust security protocols in place to prevent such incidents. The breach also raises questions about the transparency and responsibility of organizations when dealing with personal data. In the meantime, consumers and businesses are on high alert, awaiting further developments and the potential fallout from one of the largest data breaches in history. The incident serves as a stark reminder of the risks associated with data storage and the critical importance of cybersecurity.