Yazılar

Iran-Linked Hackers Restore Website After US Domain Seizure

A website linked to an Iranian government-associated hacking group has resurfaced just one day after U.S. authorities seized several of its domains, highlighting ongoing challenges in disrupting cyber threat actors.

The U.S. Department of Justice said it had seized four domains connected to the “Handala Hack Team,” which it linked to Iran’s Ministry of Intelligence and Security. The group had previously claimed responsibility for a cyberattack on a U.S. medical device company earlier in March.

Despite the takedown, the group quickly restored its online presence, stating that the action was an attempt by U.S. authorities to silence it. Analysts say such rapid recovery is common, as state-linked cyber units frequently re-establish operations using new domains or platforms.

The incident underscores the resilience of cyber threat actors and the limitations of domain seizures as a long-term deterrent. Experts note that these groups often maintain multiple backup channels, allowing them to resume activities with minimal disruption.

The case also highlights growing tensions in cyber operations, where government-linked hacking groups continue to play a role in both digital espionage and psychological operations.

Stryker Cyberattack Delays Patient Surgeries

A cyberattack on medical device manufacturer Stryker has led to delays in certain patient surgeries, according to a report.

The disruption affected the company’s ability to deliver personalized medical inventory, forcing some procedures to be rescheduled. The issue stemmed from a broader system outage that impacted operations including order processing, manufacturing and logistics.

An Iran-linked hacking group claimed responsibility for the attack, which caused widespread business disruption. Stryker later stated that the incident had been contained and emphasized that no patient-care systems or connected medical devices were directly affected.

However, the delays highlight how cyber incidents can indirectly impact healthcare delivery, even when core medical systems remain operational.

Tata Motors Said to Fix E-Dukaan and FleetEdge Vulnerabilities Following AWS Key Exposure

Tata Motors reportedly addressed several critical security flaws in two of its digital platforms — E-Dukaan and FleetEdge — following a disclosure from an independent cybersecurity researcher. According to the report, the vulnerabilities were identified in 2023 and were serious enough to potentially expose sensitive company data. The flaws were said to have revealed Amazon Web Services (AWS) access keys, which, if exploited, could have allowed attackers to download confidential information or upload malicious files to Tata Motors’ cloud servers.

Researcher Flags Data Exposure Risks

Cybersecurity researcher Eaton Zveare, who has previously reported vulnerabilities in major tech platforms, detailed his findings in a blog post published earlier this week. He claimed that Tata Motors’ E-Dukaan platform, the company’s e-commerce portal for vehicle parts, contained misconfigured access that exposed AWS credentials. These credentials, he explained, could have granted full access to the company’s cloud storage, including internal files and sensitive operational data.

FleetEdge Platform Also Found Vulnerable

In addition to E-Dukaan, Zveare also discovered flaws in FleetEdge, Tata Motors’ fleet tracking and management solution. The researcher identified four key vulnerabilities that could have allowed unauthorised users to access restricted data and system resources. He noted that the flaws could be exploited remotely, making them particularly dangerous if discovered by malicious actors.

Tata Motors’ Response and Remediation

Tata Motors was reportedly notified about the security lapses in 2023, and the company acted promptly to patch the exposed endpoints and revoke compromised AWS keys. Following internal investigations, both E-Dukaan and FleetEdge were updated with enhanced authentication and access control mechanisms. The automaker has not disclosed whether any data breaches occurred as a result of the vulnerabilities, but cybersecurity experts have praised the company for its swift response and transparency. The incident underscores the growing cybersecurity challenges facing large automotive companies as they continue expanding into connected and cloud-based services.