Holiday Skills Carnival:
 Buy 1 Get 1 FREE
Days
Hours
Minutes
Seconds

CyberWatch Weekly: Top 3 Cybersecurity News from July 1st Week

Cybersecurity threats are evolving rapidly, and recent global incidents show just how vulnerable even the most secure institutions can be. From targeted attacks on international legal bodies to data breaches affecting millions of airline customers, cybercriminals are leveraging political unrest and technological gaps to cause widespread disruption. In France, state-linked actors are reportedly exploiting software vulnerabilities for espionage. As geopolitical tensions rise, so does the complexity of these threats. This week’s major cyber events reveal troubling patterns of sabotage, espionage, and data exposure. Let’s take a closer look at this week’s top headlines.

CyberWatch Weekly

International Criminal Court Hit by Cyberattack During NATO Summit

The International Criminal Court (ICC) faced a targeted cyberattack last week during the NATO summit in The Hague. The timing and sophistication suggest it may be linked to recent political tensions, particularly the ICC’s issuance of arrest warrants against Israeli leaders. While the exact motive is unclear, the attack coincided with pro-Russian hacktivist-led DDoS assaults on Dutch institutions and a major power outage disrupting train services, raising concerns of coordinated cyber sabotage. The ICC confirmed it detected and contained the breach and is conducting a system-wide impact assessment. This follows a 2023 cyber espionage attempt, reinforcing the ICC’s vulnerability as a high-profile international entity. 

Experts believe attacks like this are meant to intimidate and disrupt justice processes. Moving forward, the ICC must invest in stronger cybersecurity infrastructure, minimize dependence on foreign tech vendors, and adopt secure, sovereign digital communication systems to protect sensitive data and uphold its operational independence.

Source: Politico

Massive Data Breach Hits Qantas: Up to 6 Million Customers Affected

A cyberattack targeting a third-party call centre platform used by Qantas has compromised the personal data of around six million customers. Hackers exploited the external system to access names, emails, phone numbers, birth dates, and frequent flyer numbers. The breach was discovered after unusual activity was detected earlier this week. Although no financial, passport, or login information was accessed, the scale of exposed personal data raises concerns over identity theft and phishing risks. This incident highlights vulnerabilities in outsourcing customer services to third-party vendors. Cybercriminals often exploit weaker links in external systems to bypass core corporate cybersecurity. While Qantas has contained the breach, ongoing investigations are assessing its full impact. To prevent future breaches, companies must enforce strict cybersecurity standards on third-party providers, conduct regular audits, and adopt zero-trust policies across their digital infrastructure. Transparency with affected users and swift remedial action are crucial for restoring customer trust.

Source: Tech Radar 

France Hit by Chinese Cyber Campaign Exploiting Ivanti Zero-Day Vulnerabilities

A cyber-espionage campaign dubbed Houken, likely linked to China’s Ministry of State Security, has targeted French organizations across critical sectors using zero-day vulnerabilities in Ivanti software. Detected by France’s ANSSI, the attacks exploited three high-severity flaws, CVE-2024-8190, -8963, and -9380, to execute code, deploy rootkits, and gain long-term access to networks. Attackers used webshells, open-source tools, and commercial VPNs to mask their activity. The motive appears to be initial access brokering for intelligence operations. This breach highlights gaps in patch management and third-party software reliance. While Ivanti patched the flaws in September and October 2024, the attackers had already gained deep access. ANSSI responded with forensics and mitigation support, emphasizing the need for robust vulnerability monitoring, immediate patching, and advanced detection tools. 

Strengthening network segmentation, endpoint protection, and supply chain risk management can help defend against such state-sponsored campaigns targeting sensitive national infrastructure.

Source: Infosecurity Magazine

Conclusion

This week’s cyberattacks expose a dangerous mix of political motives, technical loopholes, and operational oversights. As institutions and companies assess the damage, one message is clear: cybersecurity must be proactive, not reactive. Vigilance, preparedness, and collaboration are key to defending against increasingly sophisticated digital threats.

Stay vigilant and informed, tune in next week for more updates in InfosecTrain’s CyberWatch Weekly! 

TOP