Walt Disney Internal Slack Channels Compromised by Hacker Group NullBulge

Disney Slack hacked by hacker group NullBulge

In a stunning cyberattack, reminiscent of the 2014 Sony Pictures breach, Disney has been hit by a major hack. This attack, carried out by the well-known hacker group NullBulge, has exposed huge amounts of Disney’s internal communications and sensitive data. The breach specifically targeted Disney’s Slack channels, resulting in the unauthorized release of roughly 1.2 terabytes of data.

The infiltrated data encompasses nearly 10,000 channels, encompassing every message, file, and conversation possible. NullBulge declared on X, formerly Twitter, “1.2 TB of data, almost 10,000 channels, every message and file possible, dumped. Unreleased projects, raw images and code, some logins, links to internal api/web pages, and more! Have fun sifting through it, there is a lot there. We tried to hold off until we got deeper in, but our inside man got cold feet and kicked us out! I thought we had something special {name}! Consider the dropping of literally every bit of personal info you have, from logins to credit cards to SSN, as a warning for people in the future.”

NullBulge Group Disney Slack Hack

This attack highlights the vulnerability of corporate communication platforms such as Slack. The leaked data was comprised of many elements, ranging from unreleased projects to raw images and internal codes – all of which could be disruptive in relation to Disney’s future operations. It could be argued that the more costly element of the leak was the exposure of sensitive login details and internal APIs, further exposing Disney’s cybersecurity infrastructure.

Disney were quick to respond to the hack, announcing that they had quickly launched a thorough investigation to uncover the true cost of the breach. Disney themselves have admitted to the breach and announced that they are taking steps to prevent a repeat of this in the future.

It is worthwhile stepping back and assessing the wider picture when it comes to data breaches. It is often only when newsworthy corporations such as Disney are compromised that discussions around cybersecurity are truly brought to the fore. However, these attacks happen on a daily basis and businesses of all sizes are targeted. In 2023, the average cost of a data breach in the U.S. was an astonishing $9.48 million, while globally it was $4.45 million. It is not just the financial consequences of such breaches that are harmful to a business, but also the reputational damage that they cause. Numbers such as these serve to highlight the importance of a robust, all-encompassing cybersecurity strategy. At the forefront of this should be a comprehensive, business-wide antivirus software that is easily manageable through a single site license, such as SUPERAntiSpyware’s business antivirus software offering.

What is Malicious Code: A Guide to Understanding Cyber Security Threats

Malicious code has actually been around for 50 years already, having initially been created as an experiment in an education lab. Evidently this has now escalated into something far more malicious than those who created it could have imagined, wreaking havoc and costing both individuals and companies billions of dollars in damage in the past half a century.

This article aims to explain exactly what malicious code is, what the different types of malicious code are and how you can protect yourself against its myriad dangers.

What is Malicious code?

Malicious code can be defined as any code within a software system or script that is intended to cause damage to a device. This damage can manifest in a number of ways and cannot be completely controlled by antivirus software alone (although antivirus software should be a part of your armory when it comes to protecting against malicious code).

Ther are a wide number of diverse categorizations when it comes to defining malicious code. This includes viruses, trojan horses, rootkits and worms, all of which will be discussed in greater detail below.

Once your device is infected by malicious code, it is then able to gain all manner of access to various networks, servers and drives before deleting important documents, stealing sensitive data and sending phishing emails under your name.

What are the different types of malicious code?

Malicious software is something of an umbrella term encompassing a wide range of subcategories. The most common of which include viruses, trojans, worms, ransomware, spyware, adware and rootkits – all of which are explained below.

Computer Viruses

Computer viruses date back to the 1970s with the ARPANET’s Creeper virus, which was not initially designed to be malicious. They typically work by executing and replicating themselves once they are attached to legitimate programs and/or files.

Unlike worms, which spread autonomously, viruses require human intervention in order to activate and propagate, which usually involves malicious email attachments, or compromised USB connections.

Computer viruses occur in a range of forms, including compression, macro, boot sector, multipart, polymorphic and stealth viruses. Each of these carry distinct behaviors and methods of propagation. They can cause all manner of issues once a device becomes infected including the modification of settings, theft of data, deletion of files, encryption of data for ransomware attacks and even DDoS (Distributed Denial of Service) attacks.

Trojan Horses

Named after the deceptive wooden horse used by the Ancient Greeks to infiltrate the city of Troy, a trojan is a type of malicious software that disguises itself as legitimate software. Trojans rely on social engineering tactics which allow them to deceive their victims. This is because the user must execute the infected file, typically delivered through phishing emails or fake software updates, in order for it to execute its malicious payload.

Once the user has taken this action and the payload is executed, the trojan is able to open backdoors, steal data and log all keystrokes made by the user.

The most famous example of a trojan horse virus is Emotet. First discovered in 2014, it was primarily designed to steal sensitive financial information but has evolved to deliver all manner of malware and is still thriving today. The deceptive nature of trojans makes them particularly problematic.

Spyware

Spyware is just as deceptive and problematic as trojan viruses. Once a device has been infiltrated, with the owner none the wiser, it is able to acquire sensitive information such as usernames, passwords, card details and browsing behavior.

Once acquired, this data is often sold on to third parties for malicious purposes such as identity and financial fraud.

Spyware is able to infect any device in a variety of ways, including malicious apps, deceptive email attachments and fraudulent websites. Once it is up and running, it lurks stealthily in the background collating sensitive data. With the proliferation of mobile devices, spyware can often be more valuable for the hacker when installed upon a mobile device as this provides camera and microphone access as well as constant location data.

Pegasus is perhaps the most well known example of mobile spyware. Targeting iOS and Android devices for surveillance, it was discovered in 2016 and linked to the Israeli technology company NSO group against whom Apple filed a lawsuit in November 2021.

Computer Worms

Computer worms are slightly different to many other types of malicious code in that they are able to replicate and spread across multiple devices autonomously. No human intervention is required to facilitate this.

Worms are able to exploit security vulnerabilities in networks in order to self-replicate and propagate. This means that they often fly under the radar and go undetected for long periods of time, often causing major damage by consuming significant amounts of bandwidth which may ultimately lead to a denial of service.

The most notorious example of a worm that caused huge damage is WannaCry, which spread rapidly and infected over 230,000 computers in over 150 countries in just 24 hours. It achieved this by exploiting the EternalBlue vulnerability in Windows’ Server Message Block protocol. WannaCry has since caused billions of dollars’ worth of damage across the globe.

Rootkits

A rootkit is a type of malicious code that is designed to provide unauthorized access and control over the system of any device, all while remaining undetected. Not only can rootkits infect software, but also hardware.

The term “rootkit” comes from the words “root”, which refers to the highest level of access in Unix and Linux operating systems and “kit”, referring to the tools required.

Once they are installed on the target device, hackers are able to carry out a range of activities such as the theft of sensitive data, the sending of spam and the conducting of DDoS (Distributed Denial of Service) attacks.

They typically avoid detection by disabling any security software residing on the target device. This allows them to remain undetected for long periods of time, wreaking havoc as they go.

Adware

Adware is a broad term that refers to both legitimate and illegitimate software. For example, legitimate adware is often used by software developers to offset costs with user consent. Malicious adware on the other hand, displays and downloads unwanted advertisements on the target’s device. It will often collect web browsing and cookie data to target users with specific ads.

The most common method of infiltration for adware, is when it is downloaded unwittingly by a user, often bundled with legitimate applications. That said, the exploitation of security vulnerabilities is not unusual either.

Once infected, the adware will track the user’s browsing behavior, displaying personalized ads and often redirecting users to other malicious websites.

Ransomware

Ransomware is a type of malicious code that encrypts the target’s sensitive and important files once it has infected their device. With the victim then unable to access their files, the hacker will demand a ransom to be paid, usually in cryptocurrency, in order to decrypt them. Ransomware spreads through a range of methods, including phishing emails, the exploitation of security vulnerabilities and deceptive downloads.

Broadly speaking, there are six different types of ransomware:

  • Locker ransomware: completely locks users out of their devices, rendering them unusable.
  • Crypto ransomware: encrypts specific files, demanding cryptocurrency payment for the decryption.
  • Extortionware: steals sensitive data and files and demands a ransom payment to avoid their publication.
  • Double extortion ransomware: combines both encryption and data theft, pressuring targets to pay in order to prevent their data leaking in to the public domain. 
  • Triple extortion ransomware: adds additional threats to the above, such as DDoS attacks, to further pressure the victim into payment.
  • Ransomware-as-a-Service (RaaS): becoming increasingly common, this allows less technically proficient attackers to essentially rent ransomware tools.

Tips for protecting yourself from malicious code

As identified in the previous section, the vast majority of malicious code requires some degree of human error in order to spread and infect your device. This means that both individuals and organizations must take cybersecurity seriously and adopt a multi-layered approach. Here are a selection of tips handpicked by the experts at SUPERAntiSpyware and designed to help you prevent becoming a victim of malicious code:

Install and regularly update antivirus software

This is undoubtedly the most important tip from this list. Although there is no antivirus software in the world that can protect you against every form of malicious code, there are suitably robust options that can significantly improve your protection. One such option is SUPERAntiSpyware’s Professional X Edition. Not only is it easy to use, but it also detects and removes over 1 billion different malicious threats including spyware, trojans, worms, rootkits and many more.

One of the most important aspects of using antivirus software is to ensure that you regularly update it to improve protection against the latest threats in a rapidly moving digital world. Thankfully SUPERAntiSpyware updates automatically, so this is not something that you need to worry about.

Keep operating systems and software up to date

Unpatched security vulnerabilities within out-of-date software is one of the most common entry points for malicious code. Regularly installing updates and ensuring that any security vulnerabilities are kept to a minimum is imperative to maintaining your online safety.

Use strong, unique passwords

It can be tempting to use the same password for every account that you use. In an increasingly digital world, there is certainly plenty to keep track of! That said, it is vital to use unique passwords for each account that exceeds 16 characters in length and use a combination of letters, numbers and special characters. A password management tool can help to both generate and store your array of passwords, keeping them secure and organized.

Be cautious with email attachments and links

If you are ever in doubt about the validity of an attachment or link, ensure that you always contact the sender prior to opening. It is recommended to do this in a secondary communication channel. Phishing emails are one of the most common methods of propagation for malicious code, so it is always best to err on the side of caution.

Educate yourself or your team about cybersecurity

It is imperative to keep on top of the latest trends in cybersecurity. The digital world is constantly in flux and keeping abreast of the latest developments is critical to effective protection.

This applies to individuals but perhaps more importantly to organizations, who can stand to lose far more financially and reputationally. Why not brush up with our list of cybersecurity tips for employees?

Regularly back up important data

This goes without saying! Ensure that you have implemented a regular backup schedule and ensure that these backups are stored securely – either in a separate physical location, or in the cloud.

Regular back ups means that you are more likely to recover the majority of data in the event of a malicious attack.

User firewalls and other security measures

All suitable and relevant security measures should be taken in order to protect your devices and network. This includes the implementation of firewalls, which monitor incoming and outgoing network traffic, intrusion prevention and intrusion detection systems.

Conclusion

In summary, understanding malicious code and how it works is a crucial first step in securing yourself as an individual, as well as on an organizational level. The myriad types of malicious code can be overwhelming, but education is an important element when it comes to staying safe online.

There are a number of useful and actionable tips provided throughout this article that will tighten up your digital defense in no time at all.  That said, the most important first step is always to cover yourself with robust antivirus software. You can always try SUPERAntiSpyware for free!

FAQs

What is malicious code?

Malicious code is defined as software or scripts that have been built to exploit computer systems. This is an umbrella term encompassing a broad range of types, including viruses, worms, trojans, ransomware, spyware, adware and rootkits.

How does malicious code spread?

Malicious code spreads in a variety of ways, ranging from email attachments to vulnerable network connections. It often uses social engineering tactics, urging haste in the target to trick them into executing the malicious software.

What are the signs of a malware infection?

The most common signs of a malware infection are:

  • Slow performance
  • Unexpected applications
  • Unexplained settings changes
  • Unauthorized access to accounts
  • Frequent crashes

How can I remove malicious code from my computer?

The easiest way to remove malicious code from your computer is to use reputable antivirus software such as SUPERAntiSpyware. However, if this does not apply to you, the best manual steps to take are as follows:

  1. Disconnect your device from the internet
  2. Reboot your computer in safe mode
  3. Delete temporary files
  4. Conduct a malware scan
  5. Manually delete any suspicious files

Can malicious code infect mobile devices?

Of course! Phones can actually be more troublesome once infected as hackers can access your camera, microphone and real-time location data.

20 Cyber Security Tips and Best Practices to Safeguard your Organization’s Data

Two employees participating in a Cyber Security Training pointing at a computer screen.


According to the 2024 Verizon Data Breach Investigations report, 68% of data breaches involved human error. Hackers are increasingly targeting employees in a variety of ways, including phishing campaigns, malware and ransomware attacks. It has never been more critical to safeguard your business and educate your workforce on the importance of cyber security best practices. This article will outline not only why this is such an important exercise, but also provide a host of actionable and useful tips for educating your employees and protecting your business.

Why is it important to educate your employees about cybersecurity?

Effective cybersecurity training and education is crucial in order to reduce the risk of data breaches, ransomware attacks, phishing attempts and any other type of malicious act.

With employees more commonly working from home in a post-COVID world, the risk has increased as people are working from all sorts of different locations and countries. It is important that they have been trained on cybersecurity best practices. There are a number of reasons why this is so important:

  • Mitigation of human error: As previously mentioned, more often than not a data breach will involve a degree of human error. Cybersecurity training helps to reduce this somewhat.
  • Prevention of financial losses: Malicious attacks can cause huge financial damage to an organization that can have lasting ramifications.
  • Potential reputational damage: With an increasingly tech-savvy population, people have never been more cautious about their data, how it is stored and how it is used.
  • Regulatory compliance: Depending on your industry, there may well be increased risks associated with a lack compliance in terms of data protection.

20 Cybersecurity Tips for Employees

Without further ado, here are 20 cyber security tips for employees that should serve as the cornerstone for any training or education plan that is designed to safeguard the business.

  1. Use strong passwords: The important of a strong password is well known, but many fall int the trap of using the same password across multiple accounts. While it makes sense to do so, as it can be difficult to remember all of your different passwords, there are a number of password management tools that can support. This allows you to store all of your strong, unique passwords in one place without having to remember them. These passwords should:
    • Exceed 16 characters
    • Contain a mix of letters, symbols and numbers
    • Avoid sing recognizable words or proper nouns
    • Never include Personally Identifiable Information (PII)
  2. Enable two-factor authentication (2FA): 2FA provides the user with an additional layer of security as it requires verification from multiple devices to successfully log in. This means that even if your password becomes compromised, unauthorized access to your account should still not be possible. It is always recommended to use 2FA for email, banking and pretty much any service that offers this. You can use trusted mobile phones, authenticator apps or secure tokens as the second “factor”. This significantly enhances overall cybersecurity.
  3. Recognize phishing attempts: Phishing attacks are commonplace in a regular work day now. Many of us have become experts at spotting anything fishy about deceptive inbound emails. However, for those less well versed, the SLAM method can be a useful way to double check the legitimacy of communication. This acronym works as follows:
    • Sender: Verify the sender’s email address.
    • Links: Hover over links to check the destination link before clicking on it.
    • Attachments: Do not open any attachments that you were not already expecting to receive, or those from an unknown sender.
    • Message: Always ensure that you analyze the message for bad grammar or misspellings, which are often a giveaway.
  4. Secure personal devices: Every device that is used for work purposes should be installed with appropriate security software, using firewalls and strong passwords to ensure that the device is secure. This goes for any device that an employee may conduct work-related activities on.
  5. Regularly update software: Ensure all devices, including phones, tablets, smart TVs and IoT (Internet of Things) devices are updated with the latest software that will ensure optimal protection against any digital threats. It is important to note that any device with an internet connection has the potential to be hacked. This is why is crucial to enable automatic software updates where possible. It helps to close security gaps, which makes it harder for would-be attackers to compromise your devices.
  6. Backup data regularly: Regularly back up data to an external device, or a third party cloud service to protect yourself against potential cyber-attacks, particularly those posed by ransomware. While synchronization services such as OneDrive and Dropbox are solutions, they are not optimal. This is because modern ransomware has the capability to target synchronized copies of files as well as the originals. It is always recommended that IT support staff advise employees on a robust back up plan to minimize the impact of potential ransomware attacks.
  7. Use secure Wi-Fi connections: It is always important to use secure Wi-Fi connections that will help protect your data. When at home, a strong and unique password (advice shared above under Tip #1) should be used that it different to the default passwords provided with your router and other smart devices.

    When working outside of your abode, it is always strongly recommended to use a virtual private network (VPN) or your cellular network in order to ensure secure internet access.
  8. Be careful with email attachments: Exercising caution is always the best approach when it doubt over the validity of an email attachment. This is one of the most common methods of propagation when it comes to malware. It is recommended to contact the sender via an alternative communication channel if your are in doubt. Furthermore, using the “junk” and “block” options help to train your email inbox and it should become  more robust at filtering out malicious emails in future.
  9. Always report suspicious activity: While this may seem fairly obvious, it is often something that is an afterthought when it comes to cybersecurity amongst employees. It is always best to exercise cation here and report anything suspicious to your IT department immediately. This can help to prevent potential cyber threats from escalating into catastrophic security breaches. You will be keeping your business secure and your IT department will be sure to thank you!
  10. Lock devices when not in use: Another tip that may seem straightforward but is not always adhered to. Whenever you are not using your device, be that desktop or mobile, they must be kept locked to prevent unauthorized access. Effective passwords, biometric locking and automatic locking functionality are all imperative.
  11. Be aware of social engineering: Cyber criminals often use social engineering tactics in order to trick people into handing over sensitive and compromising information. The most common methods include posing as either IT support or trusted contacts. They will often emphasize the need for urgency too, which is a typical giveaway. Once again, we urge the responsible use of the “junk” and “block” buttons on your email inbox.
  12. Avoid using unauthorized software: Employees downloading unauthorized software opens the door to PUPs (Potentially Unwanted Program) and keystroke attacks.  Unauthorized software typically lacks the proper security measures, representing a dream avenue for exploitation by hackers. Ensure that all software and applications are first vetted by your IT department to assess whether they comply with required security standards.
  13. Secure your workstations: With the rise of hot desking and co-working spaces, it is now increasingly important to secure your workstation from a physical perspective as well as a digital one. Cable locks can allow you to secure your devices to your desk and sensitive documents/mobiles should be kept in locked drawers when not in use. Although it may not always be possible, it is recommended to position your workstation in a way that minimizes unauthorized viewing of your screen – particularly if you work in an industry that works with sensitive data.
  14. Use encryption: Encrypting sensitive data is a must in today’s digitally advanced world. This process converts data in a secure format that can only be accessed by those in possession of a decryption key. Encryption should be a standard across businesses of all sizes in 2024 and beyond. This means that even if your data is compromised, hackers would still be unable to access this.
  15. Implement access controls: The implementation of access controls is a vital step in digitally securing you organization. User access should be kept as minimal and restrictive as possible. Role-based access controls (RBAC) can help to assign permissions that depend on job roles. These should be regularly reviewed and updated to minimize the risk of any data breach.
  16. Be wary of USB devices: Never use an unknown USB device. This poses major cybersecurity risks as hackers will often load malware on to USB drives which then infect your system once inserted. Ensure that you only ever use USB devices from trusted sources. If they are not necessary, it may even be worth disabling USB ports to protect your business further.
  17. Educate yourself continuously: The stark pitfalls of failing to secure your organization from a cybersecurity perspective have been discussed already in this article. As a result, it is in everyone’s best interest to ensure that regular education on cybersecurity best practices for employees is conducted. This ensures that everyone in the business is kept informed of the latest trends and potential risks in cybersecurity.
  18. Secure communication channels: A designated and secure communication channel should be decided upon within your organization. No sensitive information should be shared outside of this channel and unsecured platforms such as personal email or public messaging apps should be avoided. All communication channels should be initially assessed by the IT department in order to ensure that they are suitably secure and will uphold the confidentiality of relevant information.
  19. Understand and follow company policy: Ensuring that you both have cybersecurity policies in place and rigorously implement them is crucial for maintaining a digitally secure organization. Your policies should be designed to protect both your employees and the business itself. All employees, new and existing, should be made aware of these and frequently reminded of their importance. Regular reviews of company policy and the implementation of recurring cybersecurity training should allow you to stay ahead of the curve.
  20. Regular security audits: In similar fashion, the regular conducting of security audits are crucial to identifying and addressing any potential vulnerabilities within your organization. Cybersecurity develops at a fair rate of knots, so it is vital to regularly assess your current setup. You do not want to fall behind in terms of software, hardware and network security – doing so could have severe ramifications. Regular security audits allow you to stay on top of your digital defenses.

Conclusion

With today’s rapidly changing digital landscape bringing with it a great deal of threat and risk, cybersecurity and awareness is more important than ever. By adhering to the hand-picked selection of tips throughout this article, you will substantially reduce the risk of cyber threats to your organization.

For those seeking a robust, easy-to-use solution, look no further than SUPERAntiSypware’s corporate offering, offering ease of deployment and management through a single Site License or a Central Management System (CMS).

FAQs

Why is cybersecurity important for employees?

Cybersecurity is important as they are typically the first line of defense against most forms of cyber-attack. Regular education and security audits help to reinforce this defense, protecting both employees and the organization itself.

What are the most common cybersecurity threats?

The most common cybersecurity threats are: phishing attacks, malware, ransomware, spyware, adware and trojan viruses.

How can I create a strong password?

Passwords should always exceed 16 characters, using a combination of letters, numbers and special characters while avoiding any personal information. A password management tool can be used to store all of your unique passwords in one convenient and secure place.