БЛОГ

Archive for the ‘cybercrime/malcode’ category: Page 155

Jan 1, 2020

5G, AI, data privacy and mass surveillance — 12 biggest tech policy challenges India will have to face in 2020

Posted by in categories: cybercrime/malcode, government, internet, nuclear energy, policy, robotics/AI, surveillance

As access to the internet grows, so do the risks associated with being online. Cybersecurity threats are on the rise as data hackers find new ways to breach through firewalls. Earlier this year bad actors were able to gain access to the administrative serves of India’s largest nuclear power plant with a simple phishing email.

The government want to increase its cyber might to ward off such hazards but experts feel some of its policies might do the exact opposite.


2020 will be a busy year for India with the 5G spectrum auction still pending, Personal Data Protection Bill under discussion, and the deadline for social.

Continue reading “5G, AI, data privacy and mass surveillance — 12 biggest tech policy challenges India will have to face in 2020” »

Dec 23, 2019

Chinese Hackers Bypass 2FA in Attacks Spanning 10 Countries

Posted by in categories: cybercrime/malcode, government

A Chinese hacking group believed to operate on behalf of the Beijing government has learned how to bypass two-factor authentication (2FA) in attacks on government and industry targets, ZDNet reported on Monday.

The group, known as APT20, has reportedly sought to compromise VPN credentials that would grant them heightened levels of access across their victims’ networks, according to ZDNet, citing a new report from Dutch cyber-security firm Fox-IT.

Dec 16, 2019

Ryuk Ransomware Likely Behind New Orleans Cyberattack

Posted by in category: cybercrime/malcode

Based on files uploaded to the VirusTotal scanning service, the ransomware attack on the City of New Orleans was likely done by the Ryuk Ransomware threat actors.

On December 14th, 2019, one day after the City of New Orleans ransomware attack, what appear to be memory dumps of suspicious executables were uploaded from an IP address from the USA to the VirusTotal scanning service.

One of these memory dumps, which contained numerous references to New Orleans and Ryuk, was later found by Colin Cowie of Red Flare Security and shared with BleepingComputer.com.

Dec 14, 2019

New Orleans Declares State Of Emergency Following Cyber Attack

Posted by in categories: cybercrime/malcode, internet

The City of New Orleans has suffered a cybersecurity attack serious enough for Mayor LaToya Cantrell to declare a state of emergency.

The attack started at 5 a.m. CST on Friday, December 13, according to the City of New Orleans’ emergency preparedness campaign, NOLA Ready, managed by the Office of Homeland Security and Emergency Preparedness. NOLA Ready tweeted that “suspicious activity was detected on the City’s network,” and as investigations progressed, “activity indicating a cybersecurity incident was detected around 11 am.” As a precautionary measure, the NOLA tweet confirmed, the City’s IT department gave the order for all employees to power down computers and disconnect from Wi-Fi. All City servers were also powered down, and employees told to unplug any of their devices.

Dec 14, 2019

New Jersey Hospital System Hit by Cyberattack

Posted by in categories: biotech/medical, cybercrime/malcode, health

One of New Jersey’s largest hospital systems said it was hit this month by a ransomware attack that disrupted care across its clinics and 17 hospitals.

Hackensack Meridian Health said Friday the attack began Dec. 2 and forced it to cancel some surgical and other procedures, though no patients were harmed and its emergency rooms kept seeing patients.

The Times

  • Unruly
  • Dec 12, 2019

    Maze Ransomware Demands $6 Million Ransom From Southwire

    Posted by in category: cybercrime/malcode

    Maze Ransomware operators claim responsibility for another cyber attack, this time against leading wire and cable manufacturer Southwire Company, LLC (Southwire) from Carrollton, Georgia.

    Southwire is one of North America’s leading wire and cable makers, “building wire and cable, utility products, metal-clad cable, portable and electronic cord products, OEM wire products and engineered products” per a press release published in January 2019.

    Maze Ransomware, a variant of Chacha Ransomware, was discovered by Malwarebytes security researcher Jérôme Segura in May. The malware strain has become increasingly more active starting with May 2019.

    Dec 11, 2019

    Ransomware Attack on IT Vendor Disrupts Care at 110 Nursing Homes

    Posted by in categories: biotech/medical, cybercrime/malcode

    A ransomware attack on IT service vendor Virtual Care Provider has disrupted care at about 110 nursing homes and acute care facilities, locking the providers out of their patient records.

    Dec 10, 2019

    Cyber attack costs City of Woodstock more than $660,000

    Posted by in category: cybercrime/malcode

    The numbers are in, and Woodstock’s September cyber attack is set to cost the city more than $667,000, even though the city didn’t pay, and never reached out, to the hackers behind the ransomware.

    It seems like a big number – roughly nine times what nearby Stratford paid as a ransom after a spring cyber attack – but experts say it’s a short-term hit for a long-term gain in cyber security.

    While difficult to compare the Woodstock and Stratford attacks – no two cities conduct cyber security the same way – Woodstock’s costs are in line with what residents should expect, one cyber-sector expert said.

    Dec 6, 2019

    FBI Issues ‘Drive-By’ Hacking Warning: This Is How To Secure Your Devices

    Posted by in categories: cybercrime/malcode, internet

    A new FBI warning provides advice on protecting home WiFi networks from attack.

    Dec 6, 2019

    Unpatched systems are still one of the significant attack vectors to launch cyberattacks

    Posted by in categories: cybercrime/malcode, futurism

    Leaving a vulnerable system unpatched can invite troubles for an organization. The issue can turn worse when the organization suffers a cyberattack that can result in, but not limited to, compromise of confidential data, DDoS attacks or stealing of customers’ details.

    According to a report released by Recorded Future, it has been found that the same vulnerabilities kept showing up year-after-year. An interesting aspect of the report was that most of these vulnerabilities were found to be exploited via phishing attacks and exploit kits that specifically target flaws in Microsoft products.