cybersecurity news

US Cyber Weakened, China Implements Reporting, Volvo Hit Ransomware

US Cyber Weakened, China Implements Reporting, Volvo Hit Ransomware
US Cyber Weakened, China Implements Reporting, Volvo Hit Ransomware
/

Hello cyber fam! It feels like 2025 started just a couple of months back, and now it’s already October. The cybercriminals are pulling up their socks to prepare for the upcoming festive rush. That’s exactly why we are here to “cyber” educate you so that you can enjoy Halloween, Thanksgiving, Christmas, and the New Year without any cyber mishap. 

This week, we will talk about the ongoing US shutdown situation that’s affecting the USA’s cyber defense system. Next, we will focus on China’s one-hour reporting rule for cyber incidents. Lastly, we will discuss the supply ransomware attack on Volvo’s employees.

Want to know the details? Stay with us!

cyber defense mechanism

The USA’s cyber defense mechanism has weakened because of the ongoing government shutdown!

The USA is going through a tough time as the US government shut down at 12:01 AM on Wednesday, October 1. The two major parties, Republicans and Democrats, have locked horns over issues like healthcare subsidies. They haven’t been able to agree on how much money to spend on different programs. 

If the shutdown continues for a long time, the cybersecurity landscape will be worst hit. From disrupted critical cyber intelligence sharing to the mass termination of contractors and cybersecurity experts, the future of US cybersecurity appears bleak at present. The future of U.S. cybersecurity looks strong with increasing adoption of authentication protocols like DMARC, DKIM, and SPF to combat phishing and email spoofing.

legal protection

What makes things worse is the timing of the shutdown. The CISA 2015 Act has lapsed as the shutdown started. The key responsibility of CISA 2015 was to provide legal protection to organizations that shared critical threat intelligence for enhanced cyber protection. To renew the law, the shutdown must end. Additionally, US infrastructure and critical entities are currently vulnerable to cyberattacks. Cybersecurity experts, such as Crystal Morin, believe that CISA 2015 is non-negotiable when it comes to U.S. national security. 

Mass layoffs at CISA will also bring down the agency’s productivity. From threat analysis and active support for private sector partners to incident response, everything will slow down in the absence of a skilled workforce. 

Cybersecurity

One-hour reporting rule implemented in China for cyber mishaps!

China is taking its cybersecurity ecosystem quite seriously. Recently, it has imposed a one-hour reporting rule for all infrastructure providers across China. The rule will take effect on November 1, 2025. The Cyberspace Administration of China has published a notice that clearly explains all the reporting prerequisites. For a regular cyber incident, the affected network operators are required to report the incident within 60 minutes to the relevant ministry. But if it is a “major” cyber mishap, the victims are required to report the same in the next 30 minutes.

Things will become more complicated if the affected network operator is subject to specific industrial regulations. In that case, it should report the cyber mishap within the specified timeframe while complying with existing industrial regulations

network operator

This newly imposed 60-minute reporting rule has made things difficult for the Chinese network operators. Any operator who fails to report within the given timeline will be punished. Additionally, those who attempt to conceal or manipulate the actual details will face severe consequences.

Volvo employees targeted by a supply ransomware attack!

A ransomware group has targeted Volvo Group North America. The data breach occurred due to a third-party human resources software, Miljodata. Cybercriminals managed to breach the data of this Swedish SaaS company back in August. The cyber mishap affected multiple customers of Mijodata. Volvo NA was one of them.

data breach

The ransomware gang didn’t interfere with Volvo NA’s systems. Yet they managed to gain access to highly sensitive data, including the names and Social Security Numbers of employees. It is highly likely that the stolen data has already been leaked on the Dark Web. 

Miljodata has been working with 80% of Sweden’s municipal governments. One of its services includes Adato, a trademark platform that helps with easy tracking of employee sick leaves and rehabilitations.

The DataCarry ransomware group successfully breached the network of Miljodata on August 20. Miljodata became aware of the cyber incident 3 days after the attack. The group of cybercrooks demanded a ransom of $165,000 or 1.5 Bitcoins. While Miljodata was still considering its next steps, DataCarry threatened the SaaS company that it would publish all the stolen data on the Dark Web. When they did not get the preferred response from Miljodata, they leaked the data online.

ransomware attack

According to experts, the ransomware attack on Miljodata and its customers is “among the most disruptive to strike Sweden’s public sector in years.” 

A similar incident occurred with two other major vehicle manufacturing companies, weeks after the Volvo NA cyberattack. The ShinyHunters group successfully targeted Stellantis, the parent company of various consumer vehicle brands, including Jeep, Chrysler, Dodge, and Maserati. The group of threat actors claims to have stolen sensitive information, including customer contact details and names. Jaguar Land Rover also got attacked on August 31 by Scattered Lapsus$ Hunters.

Similar Posts