<  All Posts

02.12.24 Threat Report

Author:
Craig Pepper
Bing XSS Vulnerability Highlights Risks of Web Service Integration

A recently discovered cross-site scripting (XSS) vulnerability on Bing has raised significant security concerns. The flaw could allow attackers to execute malicious JavaScript and send crafted requests targeting Microsoft’s interconnected applications, such as Outlook, Copilot, and OneDrive.

This vulnerability, identified on Bing’s primary domain (www.bing.com), underscores the risks associated with complex integrations in web services and the potential for large-scale exploitation.

Key Findings

Security Implications

  1. Trusted Domain Exploitation
    This vulnerability is particularly critical because it originates from a trusted domain, Bing.com. Exploiting such a domain undermines user trust and elevates the likelihood of successful attacks.
  2. Interconnected Ecosystem Risks
    Microsoft’s tightly integrated ecosystem means a breach in one application, such as Bing, could lead to widespread unauthorised data access and manipulation across other services.
  3. Wormable Potential
    The vulnerability’s potential to become “wormable”—spreading without user interaction—poses a heightened risk of widespread exploitation.

Recommendations for Mitigation

Blue Yonder Ransomware Attack Causes Widespread Supply Chain Disruptions


A ransomware attack targeting Arizona-based supply chain software provider Blue Yonder has caused significant disruptions for major U.K. and U.S. retailers. The incident, which occurred on 21 November 2024, compromised Blue Yonder's private managed services hosted environment while leaving its public cloud services on Azure unaffected.

Blue Yonder, acquired by Panasonic in 2021, supports over 3,000 corporate clients, including Fortune 500 companies and leading supermarket chains. The attack underscores the vulnerabilities in global supply chain systems, with widespread implications for logistics and operations.

Key Impacts

Response and Current Status

Security Implications

  1. Supply Chain Vulnerabilities
    Blue Yonder’s role in managing logistics and warehouse systems for major corporations demonstrates the cascading risks of supply chain disruptions.
  2. Reliance on Third-Party Systems
    The attack highlights the dangers of dependency on external service providers for critical operations. Organisations must ensure robust third-party risk management.
  3. Operational Contingencies
    Impacted companies, including Morrisons and Starbucks, implemented contingency measures to minimise operational fallout, showcasing the importance of having resilient business continuity plans.

Recommendations for Organisations

Cybersecurity Incident Forces NHS Hospitals to Revert to Manual Operations


A significant cybersecurity incident has disrupted operations at the Wirral University Teaching Hospital NHS Trust in North West England, forcing hospitals to temporarily abandon digital systems in favour of pen-and-paper processes.

The Trust, which oversees Arrowe Park Hospital, Clatterbridge Hospital, Wirral Women and Children's Hospital, and services at other health centres, detected suspicious activity and proactively isolated its systems to prevent the issue from spreading. This precautionary measure has led to system outages and operational challenges, including the cancellation of some scheduled procedures.

Key Details


While the Trust has not confirmed the specifics of the incident, language used in its statement—such as isolating systems and reverting to manual processes—is often associated with ransomware attacks. However, this remains unverified.

Implications for Healthcare Operations

  1. Disruption to Critical Services
    • Cyber incidents in healthcare settings risk patient safety and delay treatment for time-sensitive conditions. Manual processes, though effective as a contingency, can reduce efficiency and increase human error risks.
  2. Broader Systemic Risks
    • As seen in other NHS incidents, healthcare networks are lucrative targets for attackers due to their reliance on continuous access to digital systems and sensitive data.
  3. Impact on Patient Trust
    • Frequent cybersecurity incidents erode public confidence in healthcare IT systems, potentially leading to reluctance in using digital health services.

Recommendations for Healthcare Organisations

  1. Proactive Cybersecurity Measures:
    • Regularly audit IT systems for vulnerabilities.
    • Strengthen incident detection and response capabilities.
  2. Contingency Planning:
    • Ensure robust business continuity protocols are in place to minimise operational disruptions.
    • Train staff to operate effectively during manual fallback scenarios.
  3. Patient Communication:
    • Provide clear and timely updates on service availability.
    • Maintain transparency about the nature of disruptions and their impact on care.

Protecting Digital Health Solutions

Contact Periculo for expert cyber security solutions tailored to the digital health industry.

Subscribe
Stay updated with our newsletter for the latest features and releases.
By subscribing, you agree to our Privacy Policy and consent to receive updates from us.
Thank you! Subscription received.
Oops! Something went wrong. Please try again.