Telesoft | The Essential Weekly Cyber Security & Threat Intelligence Report: Ransomware Attacks, Data Breaches & Remote Access Exploitation Trends
Telesoft | The Essential Weekly Cyber Security & Threat Intelligence Report: Ransomware Attacks, Data Breaches & Remote Access Exploitation Trends
10.11.2025

Ransomware Attack on Miljödata Exposes Personal Data of 1.5 Million Swedish Citizens

Category: Data Breach | Public Sector | Ransomware & Data Extortion

Miljödata, an IT systems provider supporting nearly 80% of Sweden’s municipalities, has confirmed a ransomware-driven data breach impacting an estimated 1.5 million individuals. The attackers gained access to Miljödata’s infrastructure, exfiltrated sensitive records, and demanded 1.5 Bitcoin to prevent disclosure. The data—later leaked by the threat actor known as Datacarry—reportedly includes personal information tied to municipal services across multiple regions, including Halland, Gotland, Skellefteå, Kalmar, Karlstad, and Mönsterås.

The Swedish Authority for Privacy Protection (IMY) has launched a formal investigation to determine whether insufficient cyber security controls, weak access governance, or delays in breach reporting contributed to the scale and impact of the incident. The case highlights the continued vulnerability of public sector digital ecosystems, where centralised service providers create concentrated attack surfaces and supply chain dependencies amplify risk.

datacarry logo

Network Security Takeaway:
Centralized municipal software environments represent high-value supply chain targets. Public service providers should enforce network segmentation, access control monitoring, and AI-powered detection of abnormal data access behaviors to contain compromise before exfiltration occurs.


€600 Million Cryptocurrency Fraud Network Dismantled by Eurojust

Category: Financial Crime | Cryptocurrency Fraud | Cross-Border Coordination

A multinational operation led by Eurojust resulted in the arrest of nine individuals associated with fraudulent cryptocurrency investment platforms responsible for stealing roughly €600 million.
The group used:

  • Fake trading platforms
  • Social media endorsements
  • Cold calls with fabricated investment advisors
  • Fake celebrity-backed news articles

Authorities seized over €1.5 million in linked assets across Cyprus, Spain, and Germany.

Full-scale action against EUR 2 billion money laundering network via Lithuanian financial institution | Eurojust | European Union Agency for Criminal Justice Cooperation

Threat Intelligence Note:
This case highlights the increasing industrialization of fraud operations, with coordinated marketing pipelines, multilingual outreach, and laundering infrastructure. Financial institutions and digital platforms must strengthen fraud heuristics, behavioral monitoring, and identity validation.


Cybercriminals Hijacking Freight Shipments with Legitimate Remote Tools

Category: Supply Chain Attack | Logistics | Remote Access Tool Exploitation

Cybercriminals globally are redirecting and stealing physical cargo by compromising logistics systems using legitimate Remote Monitoring & Management (RMM) tools like ScreenConnect and SimpleHelp.

Attackers impersonate logistics brokers to convince dispatchers to install RMM agents, granting full system access. Once inside, they reroute shipments, alter delivery documentation, and delete system logs to obfuscate theft across multiple continents.

Maersk Containership Sets Cargo Handling World Record at Port of Los

Network Defence Takeaway:
Because attackers are using legitimate tools, traditional malware detection is insufficient. Organizations must rely on AI-powered Network Detection and Response (NDR) to identify abnormal remote access behaviour, off-hours session creation, and unexpected endpoint control events.


University of Pennsylvania Breach Claims Impact 1.2 Million Donors

Category: Data Breach | Credential Compromise | Education Sector

A hacker has claimed responsibility for breaching the University of Pennsylvania, compromising donor information tied to 1.2 million individuals and leaking internal documents. Compromised email accounts were also used to send mass messages acknowledging the breach.

The University has notified law enforcement and external incident response teams and is working to assess the full scope of impacted data.

University of Pennsylvania - Unigo.com

SOC Monitoring Takeaway:
Higher-education institutions remain prime targets due to large donor databases and research records. Continuous monitoring, identity access auditing, and MFA hardening are essential to reduce lateral movement and credential abuse.


Analyst Insight

This week’s activity reinforces how cybercriminals are expanding beyond traditional ransomware, exploiting:

  • Supply chain centralization
  • Trust-based business workflows
  • Legitimate remote access software
  • Institutional and donor data ecosystems

Meanwhile, large-scale cryptocurrency fraud operations continue to demonstrate the global coordination and financial sophistication of cybercrime networks.

If the developments in this week’s report raise questions about your organisation’s exposure, we’re here to help. Our team works directly with security, risk and IT leaders to evaluate current controls, identify gaps, and strengthen detection and response maturity.

We offer consultative sessions tailored to your environment, along with a bespoke live demonstration of our network security and threat intelligence platform—focused on your use cases, data flows and operational requirements.

Book a consultation and live demo:
Let’s discuss what this means for your organisation and how to improve resilience against evolving threats.

Go Back