Weekly Cyber Briefing 11.08.2025

Cyber Intelligence Briefing: 11 Aug 2025. Canadian insurer denies claim due to MFA implementation failure

Taxpayers of the Canadian city of Hamilton, Ontario, are responsible for covering the entire costs of an CAD 18.3 million (GBP 10 million) ransomware attack after the city’s insurance provider denied its claim.

Cyber Intelligence Briefing: 11 August 2025

Powered by S-RM, the Cyber Threat Intelligence Briefing is a weekly round-up of the latest cybersecurity news, trends, and indicators, curated by intelligence specialists.


Canadian insurer denies claim due to MFA implementation failure

Taxpayers of the Canadian city of Hamilton, Ontario, are responsible for covering the entire costs of an CAD 18.3 million (GBP 10 million) ransomware attack after the city’s insurance provider denied its claim. The insurer refused to reimburse CAD 5 million (GBP 2.7 million) of the costs on the grounds that multi-factor authentication had not been fully implemented at the time of the attack.

[Researcher: Lester Lim, S-RM]

Assured’s CISO reacts:

Why do we think the insurer didn’t pay out? There are two possible reasons:

The attack began with an exploited internet-facing server and missing MFA, impacting 80% of the network. Containment was achieved within two days, with critical services maintained throughout. Attempts to destroy backups failed, and most systems were restored directly from available backups.

Authorities have not linked the incident to any criminal group or malware variant, nor disclosed details of remote access use or lateral movement. These details are likely withheld due to the ongoing investigation. Key lessons from the known facts include:

And finally, the transparency of the incident is wholly refreshing and undoubtably helped the public perception of Hamilton City. Their thorough PR: updates, include costs, enhancements with more details really dwell on customer-focus and improvements, not cyber. By turning the messaging of the incident away from cyber tooling and technical speak, into an issue of service, they’ve made it more relatable and engaging for the people they serve.


Google, Pandora, KLM, and Air France latest to confirm third party data breaches

Google, Pandora, KLM, and Air France have all confirmed data breaches resulting from a series of attacks on third party customer databases. At present, only Google has confirmed Salesforce as the source of its breach. The cyber criminal group ShinyHunter is suspected to be responsible for these attacks.

[Researcher: Lena Krummeich S-RM]

Assured’s CISO reacts:

The attack appears to impersonate IT to trick internal staff into installing a fake version of Data Loader (a legitimate SalesForce) app, with which they gain the ability to access, query, and systematically exfiltrate sensitive information. Other common tactics include using Mullvad VPN services for accessing victim networks and the deployment of Okta phishing panels.

If this comes up, we recommend:

  • Block:
    • The installation and use of Data Loader
    • Download and block Mullvad IPs at the firewall or ZTNA level.
  • EDR Detection:
    • mullvad.exe or OpenVPN/WireGuard clients running

    • TUN/TAP interfaces being created

    • Large .csv/.json/.xml file uploads to cloud shares (OneDrive, Dropbox).

    • Non-standard versions of Data Loader (or similar exfiltration tools like DBeaver, Jitterbit, Boomi).

  • Monitoring:
    • Watch for DNS requests to api.mullvad.netmullvad.net, or WireGuard config endpoints.
    • API calls to BulkQueryAll, or Retrieve with more than typical volume or frequency.

    • Unusual outbound traffic from hosts using domains like login.salesforce.com but not matching known user behavior.
    • Regularly check executable hashes against known-good versions from Salesforce.
  • Salesforce-Specific Controls:

     

    • Restrict API Access by IP: Configure Salesforce API access restrictions to allow only sanctioned IPs/subnets.
    • Permission Set Hardening:
      • Remove View All DataModify All DataAPI Enabled from unnecessary users.
      • Enable Transaction Security Policies to detect bulk extract behavior.

Latest articles

Be an insider. Sign up now!