---
title: "Cybersecurity Updates For The Week 22 of 2020 | Phish Protection"
description: "Cybersecurity Updates For The Week 22 of 2020: Ensuring protection against phishing becomes strenuous when over a billion phishing attacks get launched every."
image: "https://phishprotection.com/og/blog/cybersecurity-updates-for-the-week-22-of-2020.png"
canonical: "https://phishprotection.com/blog/cybersecurity-updates-for-the-week-22-of-2020/"
---

Quick Answer

In a recent hack, the \[British airline EasyJet\](https://www.theverge.com/2020/5/19/21263431/easyjet-hack-customer-details-email-addresses-credit-cards?&web\_view=true) had the email addresses and travel details of \*\*9 million customers\*\* compromised. \_2,208 customers among them had their credit card details stolen as well\_. While it's evident that the 9 million customers are on the radar of attackers, EasyJet is trying its best to adopt \[phishing prevention best practices\](/blog/phishing-prevention-ebook-announcement/).

Share 

[ ](https://www.linkedin.com/sharing/share-offsite/?url=https%3A%2F%2Fphishprotection.com%2Fblog%2Fcybersecurity-updates-for-the-week-22-of-2020%2F "Share on LinkedIn") [ ](https://twitter.com/intent/tweet?text=Cybersecurity%20Updates%20For%20The%20Week%2022%20of%202020&url=https%3A%2F%2Fphishprotection.com%2Fblog%2Fcybersecurity-updates-for-the-week-22-of-2020%2F "Share on X/Twitter") [ ](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fphishprotection.com%2Fblog%2Fcybersecurity-updates-for-the-week-22-of-2020%2F "Share on Facebook") [ ](https://reddit.com/submit?url=https%3A%2F%2Fphishprotection.com%2Fblog%2Fcybersecurity-updates-for-the-week-22-of-2020%2F&title=Cybersecurity%20Updates%20For%20The%20Week%2022%20of%202020 "Share on Reddit") [ ](mailto:?subject=Cybersecurity%20Updates%20For%20The%20Week%2022%20of%202020&body=Check out this article: https%3A%2F%2Fphishprotection.com%2Fblog%2Fcybersecurity-updates-for-the-week-22-of-2020%2F "Share via Email") 

![Phish Protection blog post image](https://media.mailhop.org/phishprotection/images/2020/05/stop-phishing-emails-1624.jpg) 

_Ensuring protection against phishing becomes strenuous when over a billion phishing attacks get launched every year_. The following headlines from cybersecurity indicate that preparedness alone can ensure [phishing protection](/) to a significant extent.

### Easyjet Customers To Stay On Guard

In a recent hack, the [British airline EasyJet](https://www.theverge.com/2020/5/19/21263431/easyjet-hack-customer-details-email-addresses-credit-cards?&web%5Fview=true) had the email addresses and travel details of **9 million customers** compromised. _2,208 customers among them had their credit card details stolen as well_. While it’s evident that the 9 million customers are on the radar of attackers, EasyJet is trying its best to adopt [phishing prevention best practices](/blog/phishing-prevention-ebook-announcement/).

_No personal information has been misused so far_. But EasyJet is determined to personally intimate and warn all 9 million customers before May 26th.

### Data Breach Hits European Parliament

The [European Parliament](https://cyware.com/news/european-parliament-hit-with-huge-security-breach-compromising-hundreds-of-meps-17b0f68d) underwent a significant data breach recently, which _compromised the details of hundreds of officials_. Several high-profile Members of the European Parliament (MEPs) were targeted in this attack. Data belonging to over 200 members of the European Parliament, European Council, European Commission, thousands of staff members, and **15000 users were stolen**.

Such attacks on government institutions aren’t uncommon, but [phishing attack prevention](/) measures can help reduce such cyber ambushes significantly.

![Stop phishing emails](https://media.mailhop.org/phishprotection/images/2020/05/stop-phishing-emails-1624.jpg) 

### Mikroceen Targets Asian Nations

_A state-sponsored Advanced Persistent Threat (APT) attempted to attack the government institutions in the Central Asian region_. They used a backdoor [RAT called Mikroceen](https://cyware.com/news/new-wave-of-mikroceen-rat-backdoors-target-asian-countries-40c48423) with individual backdoors like “sqllauncher.dll,” “logon.dll,” and “logsupport.dll.”

These Mikroceen backdoors were targeting organizations in the telecom and gas industries, and governmental sectors that were endpoints in corporate networks. They weren’t targeted as individuals.

Strict **anti-phishing measures** should be taken by organizations to prevent losses in case of such cyber attacks.

### WolfRAT Targets Thai Android Users

A malware called [WolfRAT](https://www.zdnet.com/article/wolfrat-targets-users-of-whatsapp-facebook-messenger-apps-on-android-devices/?&web%5Fview=true) is targeting Thai Android users by hacking their Whatsapp, Facebook Messenger, and Line messaging apps. _WolfRAT is believed to be a new variant of DenDroid, which had its source code leaked in 2015_.

WolfRAT infects a device by sending **fake update alerts** from Flash and Google Play. Anyone who falls for this trap enables WolfRAT to get installed in the device. _It then spies the victim’s device, collects their data, takes photos and videos, and steals and transfers files to a C2_.

Since the trojan targets messenger apps and WhatsApp in particular, people are advised to follow [phishing prevention](/) tips and update their devices from official sources only.

### Natura Leaves Server Unprotected Online

Security researcher Anurag Sen recently discovered [two unprotected Amazon-hosted servers](https://thehackernews.com/2020/05/natura-data-breach.html?&web%5Fview=true) of Brazilian Cosmetics Company Natura left unprotected online. These servers of **272GB and 1.3TB in size** contained the personal information of over 250,000 Natura customers, including their Moip payment account details.

_Amazon services eventually asked Natura to secure both the servers_. Still, it’s unclear whether adversaries accessed the servers before being brought down.

Natura customers are advised to take measures to [prevent phishing](/) attacks as the data leak has made them all vulnerable to cyber-attacks.

### SSU Overpowers Dangerous Hacker

The Security Service of Ukraine (SSU) has recently stopped a dangerous hacker called [Sanix from selling a database](https://finance.yahoo.com/news/ukraine-officials-arrest-hacker-sanix-stolen-emails-194657808.html?&web%5Fview=true) with **773 million email addresses and 21 million passwords**. The officials who raided Sanix’s house found a device with two terabytes of information stolen from the European Union and North American residents.

The stolen data includes their email passwords, bank card PIN codes, e-wallets of cryptocurrencies, PayPal accounts, etc. Sanix is also guilty of allegedly selling access to universities and the VPN account belonging to the government of San Bernardino, California. _This incident screams out to users to protect themselves from phishing attacks by threat actors like Sanix_.

### Russian Car Owners’ Data Leaked

An [anonymous hacker](https://www.bleepingcomputer.com/news/security/hacker-sells-129-million-sensitive-records-of-russian-car-owners/?&web%5Fview=true) is selling details of **129 million car owners** from Moscow in the dark market. _The hacker has also leaked some points as proof of quality for interested buyers_. The attacker has illegally accessed all the car details from the traffic police registry and is now selling them under different categories.

Anyone who wants access to the full database (containing details such as full names, addresses, passport numbers, dates of birth, and contact information) needs to pay BTC 0.5 or approx. $2,900\. _Those wanting exclusive access need to pay 1.5 bitcoins or approx. $14,500 for the same_.

### Attackers Target Railways

The adversaries have been [targeting the railways](https://cyware.com/news/cyber-incidents-affecting-railways-a-threat-to-customer-data-a8d25ccc) for a long time now. Since railways usually store customer databases, they are a lucrative target, and recent attacks on significant railways across the US, Europe, and Asia prove the same.

What makes [phishing prevention](/) all the more difficult is that nowadays, railway networks rely on the internet to monitor and manage railway operations. The technological shift to computers isn’t matched with adequate [anti-phishing solutions](/products/advanced-threat-defense/) as a result of which _railway customers and employees remain vulnerable to cyber attacks._

Hence,\_ users are advised to refrain from accessing personal bank accounts or other sensitive personal data via public Wi-Fi.\_

![Stop phishing emails](https://media.mailhop.org/phishprotection/images/2020/05/stop-phishing-emails-1625.jpg) 

### Attackers Target LogMeIn

Cloud service provider [LogMeIn](http://www.scmagazine.com/home/security-news/phishing/email-phishing-scam-impersonates-logmein-to-trick-remote-workers/?web%5Fview=true) has been recently added to the long list of platforms that adversaries are exploiting in the pandemic stricken world. As more people are working from home and using services like LogMeIn, _they are facing an influx of attacks risking even their access to the password manager_.

The attacker sends a **phishing email** seemingly from LogMeIn, which notifies users of a patch to a **zero-day vulnerability**. _A link directs users to a phishing page replicating the actual LogMeIn page_. Anyone who falls for the trap enables the attackers to materialize their evil schemes. Incorporating email [phishing prevention](/) measures before interlinking one’s online accounts goes a long way against cyber attackers.

### New Ransomware Alert

When malicious hackers rule, a hacker group by the name of [CyberWare](https://www.bleepingcomputer.com/news/security/vigilante-hackers-target-scammers-with-ransomware-ddos-attacks/?&web%5Fview=true) has taken it upon themselves to punish scammers. They have introduced new ransomware called **MilkmanVictory**, which, ironically enough, _doesn’t demand a ransom from its not-so-innocent target_. The ransomware targets scam companies that promise fake loans to their customers.

CyberWare group sends **phishing emails** to these scammers with links to executables in the form of PDF files. The ransomware provides no way to connect to the attacker and shows a message notifying the scammer that all his nasty work has been destroyed. This becomes the ransom he needs to pay for his crimes. _Protection from phishing was never before ensured more intriguingly!_

### Protect Your Organization

- [Learn how phishing attacks work and how to spot them](/learn-what-is-phishing/)
- [See how Phish Protection blocks threats in real time](/anti-phishing-tools/)

## Topics

[ Announcements ](/tags/announcements/) 

![Brad Slavin](https://media.mailhop.org/phishprotection/images/authors/brad-slavin.jpg) 

[ Brad Slavin ](/authors/brad-slavin/) 

General Manager

Founder and General Manager of DuoCircle. Product strategy and commercial lead across DuoCircle's 2,000+ customer base.

[LinkedIn Profile →](https://www.linkedin.com/in/bradslavin) 

## Protect your inbox from phishing attacks

Real-time email security with 60-day free trial. No credit card required.

[Start Free Trial](https://portal.duocircle.com/cart.php?a=add&pid=101&brand=phishprotection) [View Pricing](/pricing/) 

## Related Articles

[  Intermediate 5m  Cybersecurity Updates For The Week 33 of 2022  Aug 22, 2022 ](/blog/cyber-security-news-update-week-33-2022/)[  Intermediate 6m  Cybersecurity Updates For The Week 41 of 2022  Oct 21, 2022 ](/blog/cybersecurity-news-21-oct-2022/)[  Intermediate 5m  Cybersecurity Updates For The Week 1 of 2021  Jan 1, 2021 ](/blog/cybersecurity-updates-for-the-week-1-of-2021/)[  Intermediate 6m  Cybersecurity Updates For The Week 1 of 2022  Jan 7, 2022 ](/blog/cybersecurity-updates-for-the-week-1-of-2022/)

```json
{"@context":"https://schema.org","@type":"Organization","name":"Phish Protection","url":"https://phishprotection.com","logo":{"@type":"ImageObject","url":"https://phishprotection.com/images/phishprotection-logo.png"},"description":"Advanced phishing protection and email security for businesses. Real-time threat defense, time-of-click protection, and seamless Office 365 integration.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]},"sameAs":["https://www.linkedin.com/company/duocircle","https://x.com/duocirclellc","https://www.facebook.com/duocirclellc","https://github.com/duocircle"],"contactPoint":{"@type":"ContactPoint","contactType":"customer support","url":"https://phishprotection.com/contact/"},"knowsAbout":["Phishing Protection","Email Security","Anti-Phishing","Business Email Compromise","Ransomware Protection","Time of Click Protection","Office 365 Email Security","Advanced Threat Defense"]}
```

```json
{"@context":"https://schema.org","@type":"WebSite","name":"Phish Protection","url":"https://phishprotection.com","description":"Advanced phishing protection and email security for businesses. Real-time threat defense, time-of-click protection, and seamless Office 365 integration.","publisher":{"@type":"Organization","name":"Phish Protection","url":"https://phishprotection.com","logo":{"@type":"ImageObject","url":"https://phishprotection.com/images/phishprotection-logo.png"},"description":"Advanced phishing protection and email security for businesses. Real-time threat defense, time-of-click protection, and seamless Office 365 integration.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]}}}
```

```json
{"@context":"https://schema.org","@type":"BlogPosting","headline":"Cybersecurity Updates For The Week 22 of 2020","description":"Cybersecurity Updates For The Week 22 of 2020: Ensuring protection against phishing becomes strenuous when over a billion phishing attacks get launched every.","url":"https://phishprotection.com/blog/cybersecurity-updates-for-the-week-22-of-2020/","datePublished":"2020-05-28T13:31:22.000Z","dateModified":"2026-04-17T15:43:10.000Z","dateCreated":"2020-05-28T13:31:22.000Z","author":{"@type":"Person","@id":"https://phishprotection.com/authors/brad-slavin/#person","name":"Brad Slavin","url":"https://phishprotection.com/authors/brad-slavin/","jobTitle":"General Manager","description":"Brad Slavin is the founder and General Manager of DuoCircle, the company behind DMARC Report, AutoSPF, Phish Protection, and Mailhop. He founded DuoCircle in 2014 and has led the company's growth to 2,000+ customers across its email security product family. Brad's focus is product strategy, customer relationships, and the commercial and compliance side of email authentication (DPAs, SLAs, enterprise procurement).","image":"https://media.mailhop.org/phishprotection/images/authors/brad-slavin.jpg","knowsAbout":["Email Security Strategy","SaaS Product Management","Enterprise Compliance","Customer Success","Email Deliverability Business"],"worksFor":{"@type":"Organization","name":"Phish Protection","url":"https://phishprotection.com"},"sameAs":["https://www.linkedin.com/in/bradslavin"]},"publisher":{"@type":"Organization","name":"Phish Protection","url":"https://phishprotection.com","logo":{"@type":"ImageObject","url":"https://phishprotection.com/images/phishprotection-logo.png"},"description":"Advanced phishing protection and email security for businesses. Real-time threat defense, time-of-click protection, and seamless Office 365 integration.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]},"sameAs":["https://www.linkedin.com/company/duocircle","https://x.com/duocirclellc","https://www.facebook.com/duocirclellc","https://github.com/duocircle"],"contactPoint":{"@type":"ContactPoint","contactType":"customer support","url":"https://phishprotection.com/contact/"},"knowsAbout":["Phishing Protection","Email Security","Anti-Phishing","Business Email Compromise","Ransomware Protection","Time of Click Protection","Office 365 Email Security","Advanced Threat Defense"]},"mainEntityOfPage":{"@type":"WebPage","@id":"https://phishprotection.com/blog/cybersecurity-updates-for-the-week-22-of-2020/"},"articleSection":"intermediate","keywords":"Announcements","wordCount":1058,"image":{"@type":"ImageObject","url":"https://media.mailhop.org/phishprotection/images/2020/05/stop-phishing-emails-1624.jpg","caption":"Phish Protection blog post image","width":1200,"height":630},"speakable":{"@type":"SpeakableSpecification","cssSelector":[".answer-block","h1"]}}
```

```json
{"@context":"https://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://phishprotection.com/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https://phishprotection.com/blog/"},{"@type":"ListItem","position":3,"name":"Intermediate","item":"https://phishprotection.com/intermediate/"},{"@type":"ListItem","position":4,"name":"Cybersecurity Updates For The Week 22 of 2020","item":"https://phishprotection.com/blog/cybersecurity-updates-for-the-week-22-of-2020/"}]}
```
