Cybercrime
,
Cyberwarfare / Nation-State Attacks
,
Fraud Management & Cybercrime
Also, Alleged Gravy Analytics Breach Exposes Location Data
Every week, ISMG rounds up cybersecurity incidents and breaches around the world. This week, the Finnish transport agency detained a Russian tanker linked to cable sabotage, a claimed Gravy Analytics breach exposed location data, a Mirai-based botnet exploited zero-day flaws, Dell update framework flaw exposed systems and a court sentenced a Florida woman for laundering millions in romance scams.
See Also: Live Webinar | North Korea’s Secret IT Army and How to Combat It
Finnish Transport Agency Detains Russian “Shadow Fleet” Tanker Linked to Cable Sabotage
Finnish authorities prevented an oil tanker linked to a Russian “shadow fleet” of sanction-busting ships from deploying back to sea until its owners fix serious deficiencies in electrical safety, general maintenance and crew accommodation.
“Rectifying the deficiencies will require external assistance for repairs and will take time,” said Sanna Sonninen, director-general of the maritime sector of Finnish Transport and Communications Agency Traficom, in an English-language statement published Wednesday.
The inspection uncovered 32 critical deficiencies, including issues with fire safety, navigation equipment and pump room ventilation.
Finnish authorities allege the tanker, the Eagle S, dragged its anchor in December 2024, severing telecom and power submarine cables connecting Finland to Germany and Estonia, including the Estlink 2 electric transmission line. The Swedish military recovered the ship’s anchor from the Baltic seafloor and conveyed it to the Finnish National Bureau of Investigation, Finnish public broadcaster reported Tuesday.
The Eagle S, registered in the Cook Islands and operated by UAE-based Caravella LLC-FZ, departed on Dec. 25, 2024, from the Russian port of Ust-Luga. Authorities believe the ship deliberately slowed in the Baltic Sea to damage the cables. Finnish investigators have identified eight crew members as suspects and imposed travel bans on them (see: Finland Suspects Eight in Deep-Sea Cable Sabotage Incident).
Estonian officials have said the disruption will not delay Estonia’s planned synchronization with the European electricity grid this year.
Gravy Analytics Breach Exposes Sensitive Location Data
Hackers say they breached Gravy Analytics and its subsidiary Venntel, stealing 17 terabytes of sensitive data, including precise smartphone location details. The attackers, posting on the XSS cybercrime forum, shared 1.4 gigabytes of samples, revealing historical location data with coordinates, timestamps and personal details. The hackers claimed to have gained root server access and control over Gravy Analytics’ domains and Amazon S3 buckets.
Gravy Analytics, which collects anonymized mobile location signals for businesses, faced criticism for its data practices. Venntel, its subsidiary, sold location data to U.S. government agencies, including DHS and the FBI, for purposes like immigration enforcement.
In December 2024, the FTC accused both companies of violating privacy laws by selling sensitive data without user consent, including visits to healthcare, religious and political sites(see: US FTC Cracks Down Geolocation Data Brokers).
Gravy Analytics’ website remains unavailable at the time of reporting.
Mirai-Based Botnet Exploits Zero-Day Flaws to Target Global IoT Devices
Security researchers at Qi’anxin XLab uncovered a new Mirai-based botnet, offensively named by its creators as “gayfemboy,” using zero-day and n-day exploits to spread across industrial routers and smart home devices. Initially detected in February 2024, the botnet has evolved beyond basic Mirai variants to exploit more than 20 vulnerabilities, including a zero-day flaw in Four-Faith industrial routers and previously undocumented issues in Neterbit routers and Vimar smart devices.
The botnet compromised around 15,000 devices across China, Russia, the U.S., Iran and Turkey. Its operators launch frequent DDoS attacks, with peak activity recorded in October and November 2024, targeting entities in China, the U.S., Germany, the U.K. and Singapore.
Critical Dell Update Framework Vulnerability Exposes Systems to Attack
A high-severity vulnerability in Dell’s Update Package Framework, tracked CVE-2025-22395, allows local attackers to escalate privileges and execute denial-of-service attacks. With a CVSS score of 8.2, the flaw affects Dell Update Framework versions prior to 22.01.02.
The vulnerability stems from improper permission handling during updates, enabling attackers to execute arbitrary remote scripts and potentially compromise sensitive data.
Dell released DUP Framework version 22.01.02 to address the issue and urged immediate updates. For affected systems, Dell advised avoiding the “Extract” option in Windows and using the command prompt instead.
Temporary workarounds include disabling automatic updates, strengthening network segmentation and monitoring for suspicious activity.
Florida Woman Sentenced for Laundering Millions in Romance Scam
A judge in the U.S. District for the Southern District of Florida sentenced Cristine Petitfrere, 30, of Miramar, Florida, to 30 months in federal prison for laundering over $2.7 million from online romance scams. Petitfrere admitted to keeping a portion of the funds and sending the rest to overseas co-conspirators.
Romance scams involve fraudsters creating fake personas to exploit victims, often for money under false pretenses. In addition to her sentence, Petitfrere must forfeit $203,815.59.
Other Stories From Last Week
With reporting from Information Security Media Group’s Akshaya Asokan in southern England.