Cybercrime
,
Cyberwarfare / Nation-State Attacks
,
Fraud Management & Cybercrime
Also, Researchers Exploit Tesla Wall Connector Via Charging Cable

Every week, ISMG rounds up cybersecurity incidents and breaches around the world. This week: Chinese Salt Typhoon hackers hit Viasat, researchers exploited a Tesla wall connector, Sitecore CMS flaws puts organizations at risk. Krispy Kreme disclosed hacking damage, Archetyp Market was taken down. Episource disclosed a ransomware hack to U.S. regulators, and Spain ruled out cyberattack for the April Iberian blackout.
See Also: On Demand | Global Incident Response Report 2025
Viasat Breach Tied to China-Linked Cyberespionage Campaign
Add satellite firm Viasat to the list of U.S. telecoms breached during the 2024 U.S. presidential campaign by Chinese nation-state cyberespionage hackers tracked as Salt Typhoon, reported Bloomberg. The breach, discovered earlier this year, involved unauthorized access through a compromised device, Viasat told Bloomberg. The satellite communications provider said it found evidence of customer impact and believes the incident is now contained.
Salt Typhoon targeted major telecom firms like Verizon, AT&T and Lumen, intercepting telephone conversations for some high-level government and political figures including then-candidate President Donald Trump and his running mate, Vice President JD Vance. Hackers also observed broad swaths of metadata tied to voice and text messaging – comprising who, what, where and when – for a large group of individuals, primarily based in the metropolitan Washington, D.C. area (see: CISA First Spotted Salt Typhoon Hackers in Federal Networks).
Researchers Exploit Tesla Wall Connector Via Charging Cable
Security firm Synacktiv revealed a novel vulnerability in Tesla’s Wall Connector EV charger. Researchers exploited a logic bug by reverse-engineering an undocumented firmware update path through the vehicle’s charge port connector, allowing them to install malicious firmware.
The attack used non-standard Single-Wire CAN communication on the charger’s Control Pilot line, normally used for EV charge coordination. Synacktiv built a hardware “Tesla simulator” using a Raspberry Pi and modified CAN dongle to mimic Tesla car signals and trigger the firmware download process over the cable. Because the charger’s firmware lacked signature validation or anti-downgrade protection, the team downgraded to an older debug build that exposed a TCP shell and allowed Wi‑Fi credential extraction via UDS commands.
Sitecore CMS flaws Put 22,000 Organizations at Risk
Security experts are warning all organizations that use Sitecore’s Experience Platform content management system to ensure they’ve installed fixes for critical vulnerabilities.
The most serious flaw featured hardcoded credentials. “By default, recent versions of Sitecore shipped with a user that had a hardcoded password of ‘b,'” said Benjamin Harris, CEO and founder of watchTowr. “It’s 2025, and we can’t believe we still have to say this, but that’s very bad.”
Based in San Francisco, Sitecore is used by about 22,000 organizations. The company counts among its customers Blue Younder, CIMIC Group, Equifax, INEOS Automotive, QBE, RAI Amsterdam, Shure, United Airlines and Zurich Insurance Group.
The vendor distributed a patch to all users last month, watchTowr said, advising users to install it immediately if they hadn’t yet done so, since it’s discovered three vulnerabilities that can be chained together to take full control of vulnerable Sitecore software.
“This isn’t theoretical: we’ve run the full chain, end-to-end,” Harris said. “If you’re running Sitecore, it doesn’t get worse than this – rotate creds and patch immediately before attackers inevitably reverse-engineer the fix.”
Hackers Dunk on Krispy Kreme Donuts
American doughnut purveyor Krispy Kreme Doughnut Corporation is notifying 161,676 individuals – mostly current and former employees and family members – that their personal details were exposed after hackers breached its IT infrastructure.
The publicly traded company said Krispy Kreme said it first learned of the intrusion in November 2024, although didn’t say how (see: Krispy Kreme Discovers Cybersecurity Hole).
“We immediately began taking steps to investigate, contain and remediate the incident with the assistance of leading cybersecurity experts,” the company said in a breach notification filed Wednesday.
The company told breach victims that “on May 22, 2025, we determined that certain of your personal information was impacted by this incident,” adding that “this notification has not been delayed as the result of a law enforcement investigation.” It’s offering victims prepaid identity theft monitoring via Kroll.
The company says affected data includes Social Security number, date of birth, driver’s license and financial and payment accounts – including access credentials.
Archetyp Market Taken Down
Several European law enforcement agencies Monday took down Archetyp Market, a long-serving darkweb online marketplace with 3,200 vendors and 600,000 users.
Spanish police arrested a German national, a suspected creator and administrator of Archetyp Market. Europol estimates the platform facilitated drug sales worth at least 250 million euros.
Authorities in the Netherlands, Germany, Spain, Sweden and Romania took part in the operation, which resulted in the police seizing the platform servers from the Netherlands. Authorities also arrested one platform moderator and six top vendors from Germany, and confiscated 7.8 million euros from the suspects.
Ransomware Breach at Episource
California-based medical coding and risk adjustment services firm Episource LLC reported to U.S. federal regulators that a ransomware hack discovered in February affected the protected health information of nearly 5.42 million individuals.
Episource reported the incident to HHS on June 6, but HHS’ Office for Civil Rights only posted the entry to its public HIPAA Breach Reporting Tool website on Wednesday.
The company has also has been filing breach reports to various state regulators – including Texas and California – over the last two weeks (see: 2 Software Firms Report Major Health Data Theft Hacks).
Some of Episource’s healthcare sector clients that were affected by the hack have also issued their own breach notices about the incident, including healthcare delivery system Sharp HealthCare in California and health insurer Horizon Blue Cross Blue Shield of New Jersey.
Episource has not publicly revealed how many clients were affected by the hack. The company in its breach notice said its investigation into the incident found that a cybercriminal was able to access and take copies of some data in its computer systems between Jan. 27 and Feb. 6.
Episource said it is currently not aware of any misuse of the data and that the company notified law enforcement.
Spain Confirms Grid Failure, Not Cyberattack, Behind April Blackout
Spain’s government formally ruled out a cyberattack as the cause of an April 28 blackout that darkened the Iberian Peninsula for up to 24 hours. The cause, said Minister for Ecological Transition in a Tueday press conference, was a surge that wasn’t correctly dampened and propagated through the grid, reported El País.
An official report blames grid operator Red Eléctrica and several power companies. The report pointed to “multifactorial” causes for the prolonged outage including inadequate contingency planning and failures by at least nine power plants to regulate or absorb excess voltage.
Spanish Prime Minister Pedro Sánchez initially refused to dismiss the cyberattack theory despite Red Eléctrica quickly discarding it as a hypothesis. The Spanish government is preparing a royal decree to strengthen oversight and update operational protocols.
Other Stories From Last Week
With reporting from Information Security Media Group’s Mathew Shwartz in Scotland, Akshaya Asokan in southern England and Marianne Kolbasuk McGee in the Boston exurbs.