In the latest episode of the Kaspersky podcast, we look into recent news about Donald Trump’s campaign website being hacked — briefly — to promote a cryptocurrency scam. It was only a single page, but the hack comes at a critical time in the US election cycle. From there, we move on to a story about a show more ...
psychotherapy clinic in Finland that was hacked. Patients are now finding their details on the dark web, and some have been contacted by an elusive individual called “The Ransom Guy.” To wrap up, we look at a case of fake news in the retail sector. Anyone familiar with the dearly departed Woolworths chain knows it went under in 2008 — but that didn’t stop somebody from creating a (now deleted) UK Woolworths Twitter account and claiming physical stores would be opening “to save 2020.” The story even reached the press, but it was all a hoax. If you liked the podcast, please consider subscribing and sharing with your friends. For more information on the stories we covered, please visit the links below: Trump campaign website briefly defaced in cyber attack Therapy patients blackmailed for cash after clinic data breach Fort Bragg says its Twitter account was “hacked” Woolworths High Street “relaunch” proves a hoax
In March 2020, KrebsOnSecurity alerted Swedish security giant Gunnebo Group that hackers had broken into its network and sold the access to a criminal group which specializes in deploying ransomware. In August, Gunnebo said it had successfully thwarted a ransomware attack, but this week it emerged that the intruders show more ...
stole and published online tens of thousands of sensitive documents — including schematics of client bank vaults and surveillance systems. The Gunnebo Group is a Swedish multinational company that provides physical security to a variety of customers globally, including banks, government agencies, airports, casinos, jewelry stores, tax agencies and even nuclear power plants. The company has operations in 25 countries, more than 4,000 employees, and billions in revenue annually. Acting on a tip from Milwaukee, Wis.-based cyber intelligence firm Hold Security, KrebsOnSecurity in March told Gunnebo about a financial transaction between a malicious hacker and a cybercriminal group which specializes in deploying ransomware. That transaction included credentials to a Remote Desktop Protocol (RDP) account apparently set up by a Gunnebo Group employee who wished to access the company’s internal network remotely. Five months later, Gunnebo disclosed it had suffered a cyber attack targeting its IT systems that forced the shutdown of internal servers. Nevertheless, the company said its quick reaction prevented the intruders from spreading the ransomware throughout its systems, and that the overall lasting impact from the incident was minimal. Earlier this week, Swedish news agency Dagens Nyheter confirmed that hackers recently published online at least 38,000 documents stolen from Gunnebo’s network. Linus Larsson, the journalist who broke the story, says the hacked material was uploaded to a public server during the second half of September, and it is not known how many people may have gained access to it. Larsson quotes Gunnebo CEO Stefan Syrén saying the company never considered paying the ransom the attackers demanded in exchange for not publishing its internal documents. What’s more, Syrén seemed to downplay the severity of the exposure. “I understand that you can see drawings as sensitive, but we do not consider them as sensitive automatically,” the CEO reportedly said. “When it comes to cameras in a public environment, for example, half the point is that they should be visible, therefore a drawing with camera placements in itself is not very sensitive.” It remains unclear whether the stolen RDP credentials were a factor in this incident. But the password to the Gunnebo RDP account — “password01” — suggests the security of its IT systems may have been lacking in other areas as well. After this author posted a request for contact from Gunnebo on Twitter, KrebsOnSecurity heard from Rasmus Jansson, an account manager at Gunnebo who specializes in protecting client systems from electromagnetic pulse (EMP) attacks or disruption, short bursts of energy that can damage electrical equipment. Jansson said he relayed the stolen credentials to the company’s IT specialists, but that he does not know what actions the company took in response. Reached by phone today, Jansson said he quit the company in August, right around the time Gunnebo disclosed the thwarted ransomware attack. He declined to comment on the particulars of the extortion incident. Ransomware attackers often spend weeks or months inside of a target’s network before attempting to deploy malware across the network that encrypts servers and desktop systems unless and until a ransom demand is met. That’s because gaining the initial foothold is rarely the difficult part of the attack. In fact, many ransomware groups now have such an embarrassment of riches in this regard that they’ve taken to hiring external penetration testers to carry out the grunt work of escalating that initial foothold into complete control over the victim’s network and any data backup systems — a process that can be hugely time consuming. But prior to launching their ransomware, it has become common practice for these extortionists to offload as much sensitive and proprietary data as possible. In some cases, this allows the intruders to profit even if their malware somehow fails to do its job. In other instances, victims are asked to pay two extortion demands: One for a digital key to unlock encrypted systems, and another in exchange for a promise not to publish, auction or otherwise trade any stolen data. While it may seem ironic when a physical security firm ends up having all of its secrets published online, the reality is that some of the biggest targets of ransomware groups continue to be companies which may not consider cybersecurity or information systems as their primary concern or business — regardless of how much may be riding on that technology. Indeed, companies that persist in viewing cyber and physical security as somehow separate seem to be among the favorite targets of ransomware actors. Last week, a Russian journalist published a video on Youtube claiming to be an interview with the cybercriminals behind the REvil/Sodinokibi ransomware strain, which is the handiwork of a particularly aggressive criminal group that’s been behind some of the biggest and most costly ransom attacks in recent years. In the video, the REvil representative stated that the most desirable targets for the group were agriculture companies, manufacturers, insurance firms, and law firms. The REvil actor claimed that on average roughly one in three of its victims agrees to pay an extortion fee. Mark Arena, CEO of cybersecurity threat intelligence firm Intel 471, said while it might be tempting to believe that firms which specialize in information security typically have better cybersecurity practices than physical security firms, few organizations have a deep understanding of their adversaries. Arena said this is a particularly acute shortcoming with many managed service providers (MSPs), companies that provide outsourced security services to hundreds or thousands of clients who might not otherwise be able to afford to hire cybersecurity professionals. “The harsh and unfortunate reality is the security of a number of security companies is shit,” Arena said. “Most companies tend to have a lack of ongoing and up to date understanding of the threat actors they face.”
Election day is almost here. After years of warnings, are state and local governments ready for what Russia, Iran or any number of ransomware gangs have in store for them? The post Episode 192: It’s Showtime! Are Local Governments Ready To Turn Back Election Hacks? appeared first on The Security Ledger. Related show more ...
StoriesSpotlight Podcast: Taking a Risk-Based Approach to Election SecurityPublic Sector Mega-Vendor Tyler Technologies Says It Was HackedSpotlight Podcast: CTO Zulfikar Ramzan on RSA’s Next Act: Security Start-Up
Though DDoS attacks are not the most significant threat, a suspected 2018 DDoS attack in Knox County, Tennessee during its mayoral primary likewise turned out to be a red herring, NBC News reported.
A consultant at offensive security testing company Bishop Fox and an independent researcher discovered a total of 9 vulnerabilities in the device provided by Winston Privacy to customers.
Toka said the funds will be used to further its efforts to develop intelligence-gathering platforms and products and advise governments on building an integrated cyber defense.
Attacks on IoT devices continue to rise at an alarming rate due to poor security protections and cybercriminals use of automated tools to exploit these vulnerabilities, according to Nokia.
The cyberattack on October 18 encrypted about 200 computers operated by Chenango County and hackers demanded a ransom of $450 per computer to unlock the files, the county’s IT director said.
The FBI, DoD, and DHS issued a joint alert Tuesday warning the private sector about what they say is a global hacking operation run by North Korean state-sponsored hackers.
The 25 vulnerabilities most commonly scanned for and targeted by Chinese nation-state attackers were exploited seven times more often than other flaws in the past six months, researchers reported.
President Trump’s campaign website was briefly and partially hacked Tuesday afternoon as unknown adversaries took over parts of the page, replacing them with what appeared to be a cryptocurrency scam.
ForcePoint was created in 2015 and unveiled as a new brand in 2016 after Raytheon and Websense inked a $1.9 billion deal with Vista Equity Partners to combine Websense with Raytheon Cyber Products.
Netwalker ransomware gang is asking a $14 million ransom, while claiming to have stolen several terabytes from the company and threatens to leak them if the ransom will be not paid.
Two security vulnerabilities in a smart device controller made by Ruckus, which aids the integration of IoT devices, could be chained to achieve unauthenticated remote code execution.
Eagle Eye Networks has raised $40 million of Series E funding from venture capital firm Accel (Facebook, Spotify, DocuSign) to continue its growth and expand its technology leadership.
According to new findings shared by cybersecurity firm Netscout, TrickBot's authors have moved portions of their code to Linux in an attempt to widen the scope of victims that could be targeted.
Zoom has finally added the long-awaited end-to-end encryption to its video conferencing service at no additional cost for all users, whether they are paying subscribers or not.
A multibillion-dollar furniture maker has become the latest major firm hit by a major ransomware attack. Steelcase, the world’s largest maker of office furniture, revealed the attack in an SEC filing.
A survey by Mimecast found 73% of respondents "extensively use" corporate devices for personal tasks such as personal email (47%), financial transactions (38%), and online shopping (35%).
Strider, which claims it has seen rapid growth in demand for its platform, plans to invest the new funds in product research and development, looking to add new modules to its Intelligence Platform.
Link previews in popular chat apps such as Facebook Messenger, LINE, Slack, Twitter DMs, Zoom, and others on iOS and Android are a firehose of security and privacy issues, researchers have found.
The pre-emptive, oversubscribed round was led by Sapphire Ventures and included return seed backers Foundry Group, Costanoa Ventures, Flybridge Capital, and Matchstick Ventures.
Phosphorous, the Iranian hacker group, has disguised as conference organizers and sent fake invitations containing PDF documents with malicious links to over 100 possible invitees of the conferences.
1 in 3 employees are likely to click the links in phishing emails, and 1 in 8 employees are likely to share information requested in a phishing email, a recent study by Keepnet Labs has shown.
Botnets will recruit new types of connected devices, especially consumer IoT products, such as mobile or wearable devices and other classes of IoT belonging to the industrial device category.
The results of 13 million medical examinations relating to around 3.5 million U.S. patients are unprotected and available to anyone on the internet, SecurityWeek has learned.
The new socially distanced reality is colliding with the crush of an upcoming holiday shopping season, creating an unprecedented opportunity for cybercriminals to capitalize.
The percentage of devices running Windows unsupported operating systems fell from 71% in 2019 to 32% in 2020 and there have been improvements when it comes to timely patching and network segmentation.
According to a new Sophos survey, Indian IT managers spent 42 percent of their time focusing on threat prevention and confessed that 27 percent of their time is focused on responding to cyber threats.
The FBI issued a flash alert warning of hackers stealing data from U.S. government agencies and enterprise organizations via internet-exposed and insecure SonarQube instances.
Akamai says the acquisition is part of its strategy to advance 5G security, and it hopes to expand its ability to secure mobile and other cellular devices in distributed enterprise environments.
The campaign, which is hosted on Russian domain infrastructure but does not target Russian users, is globally harvesting credentials from a variety of organizations in the public and private sectors.
According to FTC data, the exact number of received "Do Not Call" complaints since the start of 2020 is 2,814,851, with 1,988,489 of them being related to robocalls and only 624,634 to live callers.
Buer was first advertised in a forum post on August 20, 2019, under the title “Modular Buer Loader”, described as a new modular bot written in pure C with C&C server code in .NET Core MVC.
Ignoring copyright complaints is not really an option, given that social media sites may decide to remove the offending material unilaterally, or even to lock you out of your account temporarily.
The Turla APT is targeting government organizations using custom malware, including an updated trio of implants that give the group persistence through overlapping backdoor access.
Malicious actors, often state-backed, continue to harass people and organizations sensing an opportunity in the COVID-19 situation. The global healthcare system has borne the brunt of increased cyberattacks.
The KashmirBlack botnet has already successfully infected thousands of websites running popular CMS frameworks, including Joomla, WordPress, Drupal, and Magneto.
The funding round was led by Macquarie Capital Principal Finance, a division of Macquarie Group Limited. Bluefin’s current investors are Napier Park Global Capital and Camden Partners.
Germany’s Robert Koch Institute for infectious disease control was hit by a cyberattack days before its headquarters was the target of an arson attempt, Der Spiegel reported on Wednesday.
The most newsworthy incidents in Q3 were extortion attacks allegedly carried out by actors known for hiding behind variously named APT groups: FancyBear, Armada Collective, Lazarus, and others.
With one or two attempts per day, which fall within normal login patterns, such attacks typically go undetected and traditional protections such as password lockout and IP blocking are bypassed too.
Red Hat Security Advisory 2020-4390-01 - Django is a high-level Python Web framework that encourages rapid development and a clean, pragmatic design. It focuses on automating as much as possible and adhering to the DRY principle. Issues addressed include denial of service, memory exhaustion, and remote SQL injection vulnerabilities.
Red Hat Security Advisory 2020-4391-01 - OpenStack Block Storage manages block storage mounting and the presentation of such mounted block storage to instances. The backend physical storage can consist of local disks, or Fiber Channel, iSCSI, and NFS mounts attached to Compute nodes.
Ubuntu Security Notice 4552-3 - USN-4552-1 and USN-4552-2 fixed a vulnerability in Pam-python. The update introduced a regression which prevented PAM modules written in Python from importing python modules from site-specific directories. Malte Kraus discovered that Pam-python mishandled certain environment variables. show more ...
A local attacker could potentially use this vulnerability to execute programs as root. Various other issues were also addressed.
Red Hat Security Advisory 2020-4384-01 - This release adds the new Apache HTTP Server 2.4.37 Service Pack 5 packages that are part of the JBoss Core Services offering. This release serves as a replacement for Red Hat JBoss Core Services Pack Apache Server 2.4.37 Service Pack 3 and includes bug fixes and enhancements. Issues addressed include buffer overflow and integer overflow vulnerabilities.
Red Hat Security Advisory 2020-4383-01 - Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution show more ...
of updates, and for a more consistent update experience. This release adds the new Apache HTTP Server 2.4.37 Service Pack 5 packages that are part of the JBoss Core Services offering. This release serves as a replacement for Red Hat JBoss Core Services Pack Apache Server 2.4.37 Service Pack 4 and includes bug fixes and enhancements. Issues addressed include buffer overflow and integer overflow vulnerabilities.
Red Hat Security Advisory 2020-4283-01 - OpenStack Block Storage manages block storage mounting and the presentation of such mounted block storage to instances. The backend physical storage can consist of local disks, or Fiber Channel, iSCSI, and NFS mounts attached to Compute nodes.
Red Hat Security Advisory 2020-4381-01 - The openstack-selinux package is a collection of SELinux policies for running OpenStack on Red Hat Enterprise Linux.
Ubuntu Security Notice 4608-1 - The ca-certificates package contained outdated CA certificates. This update refreshes the included certificates to those contained in the 2.44 version of the Mozilla certificate authority bundle.
Oracle Business Intelligence Enterprise Edition versions 5.5.0.0.0, 12.2.1.3.0, and 12.2.1.4.0 suffer from local file inclusion and directory traversal vulnerabilities.
Gentoo Linux Security Advisory 202010-8 - Multiple vulnerabilities have been found in Mozilla Firefox and Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code. Versions less than 82.0 are affected.
Ubuntu Security Notice 4607-1 - It was discovered that OpenJDK incorrectly handled deserializing Proxy class objects with many interfaces. A remote attacker could possibly use this issue to cause a denial of service via a specially crafted input. Sergey Ostanin discovered that OpenJDK incorrectly restricted show more ...
authentication mechanisms. A remote attacker could possibly use this issue to obtain sensitive information over an unencrypted connection. Various other issues were also addressed.
Ubuntu Security Notice 4603-1 - It was discovered that MariaDB didn't properly validate the content of a packet received from a server. A remote attacker could use this vulnerability to sent a specialy crafted file to cause a denial of service. It was discovered that MariaDB has other security issues. An attacker show more ...
can cause a hang or frequently repeatable crash. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Various other issues were also addressed.
Ubuntu Security Notice 4600-2 - USN-4600-1 fixed multiple vunerabilities in Netty 3.9. This update provides the corresponding fixes for CVE-2019-20444, CVE-2019-20445 for Netty. Also it was discovered that Netty allow for unbounded memory allocation. A remote attacker could send a large stream to the Netty server causing it to crash. Various other issues were also addressed.
Ubuntu Security Notice 3081-2 - Dawid Golunski discovered that the Tomcat init script incorrectly handled creating log files. A remote attacker could possibly use this issue to obtain root privileges.
Many companies rely on Endpoint Detection and Response (EDR) solutions as their primary security tool to protect their organizations against cyber threats. EDR was introduced around eight years ago, and analysts now peg the EDR market size as $1.5 to $2.0 billion in annual revenue globally, expecting it to quadruple over the next five years. The recent introduction of Extended Detection and
Efforts to disrupt TrickBot may have shut down most of its critical infrastructure, but the operators behind the notorious malware aren't sitting idle. According to new findings shared by cybersecurity firm Netscout, TrickBot's authors have moved portions of their code to Linux in an attempt to widen the scope of victims that could be targeted. TrickBot, a financial Trojan first detected in 2016
Donald Trump's official presidential re-election campaign website was briefly defaced by hackers last night. Visitors to the website donaldjtrump.com were not greeted with the normal calls for campaign contributions or offers of Trump-related merchandise, but instead a message which parodied the look of those typically used when the FBI seizes control of servers operated by cybercriminals.