« Il s'agit d'un acte criminel » ( Robert Mardini, directeur général du Comité international de la Croix-Rouge ). Il y a un mois, des pirates informatiques ont pillés les données personnelles très sensibles du CICR qui, à fortiori, n'étaient pas sécurisées correctement.
KrebsOnSecurity has learned that the email address used by a cybercriminal actor who offered to sell the stolen ICRC data also was used to register multiple domain names the FBI says are tied to a sprawling media influence operation originating from Iran.
https://krebsonsecurity.com/2022/02/red-cross-hack-linked-to-iranian-influence-operation/
Intruders exploited CVE-2021-40539 and were able to maintain access to its servers for 70 days after the initial breach that took place on November 9, 2021. Attackers' use of « code designed purely for execution on the targeted ICRC servers » and using the targeted servers' MAC address.
https://www.bleepingcomputer.com/news/security/red-cross-state-hackers-breached-our-network-using-zoho-bug/