Cyber Security Today, March 21, 2022 – Poor password hygiene was behind huge TransUnion hack, cyber retaliation against Russia backfires and more

Poor password hygiene was behind huge TransUnion hack, cyber retaliation against Russia backfires and more.

Welcome to Cyber Security Today. It’s Monday, March 21st, 2022. I’m Howard Solomon, contributing reporter on cybersecurity for

Cyb er Security Today on Amazon Alexa Cyber Security Today on Google Podcasts Subscribe to Cyber Security Today on Apple Podcasts

 A hacking group from Brazil claims to have stolen data on 54 million people held by the South African division of the TransUnion credit rating agency. The group told the Bleeping Computer news agency that it cracked a file server whose password allegedly was the word ‘password.’ TransUnion has acknowledged the hack but says the hackers used an authorized client’s credentials. That conflicts with what hackers told Bleeping Computer – that they didn’t steal a user’s password. Either way, it isn’t good. No company should allow an easily cracked password to be used. IT systems should be set up to prevent that from happening, including the use of multifactor authentication.

Researchers at the Talos threat intelligence service of Cisco Systems have concluded that at least one affiliate of the BlackMatter ransomware gang was an early distributor of the BlackCat or ALPHV strain of ransomware. Affiliates of ransomware gangs do the actual hacking of a victim organization. After that they insert the ransomware they’ve signed up to use – Conti, Ryuk, BlackMatter et cetera. The report is further evidence of a link between the BlackMatter and BlackCat groups. It also has useful information about how an intrusion develops But what I found most interesting in the report was a little piece of information tacked on to the end: The two attacks analyzed each took only 15 days from start to data encryption. That means IT defenders must closely monitor their network environments for suspicious activity. If they find something odd they have to act fast.

Computer-savvy individuals around the world are trying in several ways to react to Russia’s invasion of Ukraine. For example, a group in Poland is behind an effort that lets people randomly email and tweet Russian citizens with links to anti-war news sites. But an application developer’s use of the open-source NPM library to infect computers in Russia and Belarus went too far. Programmers complained it was an abuse of the open-source system. According to a security researcher, the developer of the package recently added code to detect downloads of his package from Russia and Belarus. If the package went to those two countries a destructive data wiper activated on those computers. The developer’s application package is used by many other open-source packages, so its spread could have been multiplied. A news article notes the disk-wiping function was removed after loud protests from the open-source community.

Attention network administrators: If you use the BIND domain server software in your environment update to the latest version. This comes after the discovery of four vulnerabilities.  A remote attacker could exploit these vulnerabilities to cause a denial-of-service condition.

Finally, home and small business users of Western Digital’s EdgeRover data management app must update it to the latest version quickly. That’s because a critical vulnerability has been found. The hole could allow an attacker to access your data. This applies to both the Windows and Mac versions of the application.

Remember links to details about podcast stories are in the text version at

You can follow Cyber Security Today on Apple Podcasts, Google Podcasts or add us to your Flash Briefing on your smart speaker.

Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada
Howard Solomon
Howard Solomon
Currently a freelance writer, I'm the former editor of and Computing Canada. An IT journalist since 1997, I've written for several of ITWC's sister publications including and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times. I can be reached at hsolomon [@]

Sponsored By:

Cyber Security Today Podcast