The Week in Ransomware - July 14th 2017 - NemucodAES, LeakerLocker, and More
It has been a slow week in terms of new releases, which is always a good thing. Still lots of small crapware being released that will never have much wide distribution. We also have some good news, which is the release of a NemucodAES decryptor by Emsisoft. This allows victims of this ransomware to get their files back for free. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-july-14th-2017-nemucodaes-leakerlocker-and-more/
It has been a slow week in terms of new releases, which is always a good thing. Still lots of small crapware being released that will never have much wide distribution. We also have some good news, which is the release of a NemucodAES decryptor by Emsisoft. This allows victims of this ransomware to get their files back for free. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-july-14th-2017-nemucodaes-leakerlocker-and-more/
BleepingComputer
The Week in Ransomware - July 14th 2017 - NemucodAES, LeakerLocker, and More
It has been a slow week in terms of new releases, which is always a good thing. Still lots of small crapware being released that will never have much wide distribution. We also have some good news, which is the release of a NemucodAES decryptor by Emsisoft.β¦
DHS Ramps up Program to Scan People's Faces When They Leave the US
Air travelers taking international flights from US airports will soon have to submit to a face scan before boarding their plane. [...]
https://www.bleepingcomputer.com/news/government/dhs-ramps-up-program-to-scan-peoples-faces-when-they-leave-the-us/
Air travelers taking international flights from US airports will soon have to submit to a face scan before boarding their plane. [...]
https://www.bleepingcomputer.com/news/government/dhs-ramps-up-program-to-scan-peoples-faces-when-they-leave-the-us/
BleepingComputer
DHS Ramps up Program to Scan People's Faces When They Leave the US
Air travelers taking international flights from US airports will soon have to submit to a face scan before boarding their plane.
Experts Recover AES256 Encryption Key From a PC's Electromagnetic Emissions
A team of researchers from Fox-IT and Riscure has put together a device using off-the-shelve electronic parts that deduces encryption keys using only electromagnetic emissions coming from a nearby computer. [...]
https://www.bleepingcomputer.com/news/security/experts-recover-aes256-encryption-key-from-a-pcs-electromagnetic-emissions/
A team of researchers from Fox-IT and Riscure has put together a device using off-the-shelve electronic parts that deduces encryption keys using only electromagnetic emissions coming from a nearby computer. [...]
https://www.bleepingcomputer.com/news/security/experts-recover-aes256-encryption-key-from-a-pcs-electromagnetic-emissions/
BleepingComputer
Experts Recover AES256 Encryption Key From a PC's Electromagnetic Emissions
A team of researchers from Fox-IT and Riscure has put together a device using off-the-shelve electronic parts that deduces encryption keys using only electromagnetic emissions coming from a nearby computer.
Damages From a Well Executed Cyber Attack Could Reach $121.4 Billion
Lloyd's of London, one of the world's largest insurers, warns that a well executed cyber attack could cause damages around to world ranging from $53.1 billion to $121.4 billion, according to a report the company released today. [...]
https://www.bleepingcomputer.com/news/business/damages-from-a-well-executed-cyber-attack-could-reach-121-4-billion/
Lloyd's of London, one of the world's largest insurers, warns that a well executed cyber attack could cause damages around to world ranging from $53.1 billion to $121.4 billion, according to a report the company released today. [...]
https://www.bleepingcomputer.com/news/business/damages-from-a-well-executed-cyber-attack-could-reach-121-4-billion/
BleepingComputer
Damages From a Well Executed Cyber Attack Could Reach $121.4 Billion
Lloyd's of London, one of the world's largest insurers, warns that a well executed cyber attack could cause damages around to world ranging from $53.1 billion to $121.4 billion, according to a report the company released today.
GhostCtrl Is an Android RAT That Also Doubles as Ransomware
A new Android RAT (Remote Access Trojan) detected under the name of GhostCtrl can lock mobile device by resetting their PIN and display a ransom note to infected victims. [...]
https://www.bleepingcomputer.com/news/security/ghostctrl-is-an-android-rat-that-also-doubles-as-ransomware/
A new Android RAT (Remote Access Trojan) detected under the name of GhostCtrl can lock mobile device by resetting their PIN and display a ransom note to infected victims. [...]
https://www.bleepingcomputer.com/news/security/ghostctrl-is-an-android-rat-that-also-doubles-as-ransomware/
BleepingComputer
GhostCtrl Is an Android RAT That Also Doubles as Ransomware
A new Android RAT (Remote Access Trojan) detected under the name of GhostCtrl can lock mobile device by resetting their PIN and display a ransom note to infected victims.
751 Domains Hijacked to Redirect Traffic to Exploit Kits
On July 7, French domain registrar Gandi lost control over 751 customer domains, which had their DNS records altered to point incoming traffic to websites hosting exploits kits. [...]
https://www.bleepingcomputer.com/news/security/751-domains-hijacked-to-redirect-traffic-to-exploit-kits/
On July 7, French domain registrar Gandi lost control over 751 customer domains, which had their DNS records altered to point incoming traffic to websites hosting exploits kits. [...]
https://www.bleepingcomputer.com/news/security/751-domains-hijacked-to-redirect-traffic-to-exploit-kits/
BleepingComputer
751 Domains Hijacked to Redirect Traffic to Exploit Kits
On July 7, French domain registrar Gandi lost control over 751 customer domains, which had their DNS records altered to point incoming traffic to websites hosting exploits kits.
Exploit Derived From ETERNALSYNERGY Upgraded to Target Newer Windows Versions
Thai security researcher Worawit Wang has put together an exploit based on ETERNALENERGY that can also target newer versions of the Windows operating system. [...]
https://www.bleepingcomputer.com/news/security/exploit-derived-from-eternalsynergy-upgraded-to-target-newer-windows-versions/
Thai security researcher Worawit Wang has put together an exploit based on ETERNALENERGY that can also target newer versions of the Windows operating system. [...]
https://www.bleepingcomputer.com/news/security/exploit-derived-from-eternalsynergy-upgraded-to-target-newer-windows-versions/
BleepingComputer
Exploit Derived From ETERNALSYNERGY Upgraded to Target Newer Windows Versions
Thai security researcher Worawit Wang has put together an exploit based on ETERNALSYNERGY that can also target newer versions of the Windows operating system.
22,000 People Agree to Clean Toilets Because Nobody Reads Terms & Conditions
Over 22,000 users unwittingly agreed to clean public toilets when they connected to free WiFi hotspots at various UK establishments. [...]
https://www.bleepingcomputer.com/news/technology/22-000-people-agree-to-clean-toilets-because-nobody-reads-terms-and-conditions/
Over 22,000 users unwittingly agreed to clean public toilets when they connected to free WiFi hotspots at various UK establishments. [...]
https://www.bleepingcomputer.com/news/technology/22-000-people-agree-to-clean-toilets-because-nobody-reads-terms-and-conditions/
BleepingComputer
22,000 People Agree to Clean Toilets Because Nobody Reads Terms & Conditions
Over 22,000 users unwittingly agreed to clean public toilets when they connected to free WiFi hotspots at various UK establishments.
Reyptson Ransomware Spams Your Friends by Stealing Thunderbird Contacts
The Reyptson Ransomware contains the unique ability to distribute itself by trying to conduct a fake invoice spam campaign directly from the victim's computer. [...]
https://www.bleepingcomputer.com/news/security/reyptson-ransomware-spams-your-friends-by-stealing-thunderbird-contacts/
The Reyptson Ransomware contains the unique ability to distribute itself by trying to conduct a fake invoice spam campaign directly from the victim's computer. [...]
https://www.bleepingcomputer.com/news/security/reyptson-ransomware-spams-your-friends-by-stealing-thunderbird-contacts/
BleepingComputer
Reyptson Ransomware Spams Your Friends by Stealing Thunderbird Contacts
The Reyptson Ransomware contains the unique ability to distribute itself by trying to conduct a fake invoice spam campaign directly from the victim's computer.
Hacker Steals $7 Million Worth of Ethereum From CoinDash Platform
An unknown hacker has taken over the official website of the CoinDash platform and modified an Ethereum wallet address during the company's ICO (Initial Coin Offering). [...]
https://www.bleepingcomputer.com/news/security/hacker-steals-7-million-worth-of-ethereum-from-coindash-platform/
An unknown hacker has taken over the official website of the CoinDash platform and modified an Ethereum wallet address during the company's ICO (Initial Coin Offering). [...]
https://www.bleepingcomputer.com/news/security/hacker-steals-7-million-worth-of-ethereum-from-coindash-platform/
BleepingComputer
Hacker Steals $7 Million Worth of Ethereum From CoinDash Platform
An unknown hacker has taken over the official website of the CoinDash platform and modified an Ethereum wallet address during the company's ICO (Initial Coin Offering).
FBI Issues Warning and Recommendations on Internet-Connected Toys
The Internet Crime Complaint Center (IC3), a division of the Federal Bureau of Investigation (FBI), has issued a public service announcement about the improper security and privacy protections provided by manufacturers of Internet-connected smart toys, also known as IoT toys. [...]
https://www.bleepingcomputer.com/news/government/fbi-issues-warning-and-recommendations-on-internet-connected-toys/
The Internet Crime Complaint Center (IC3), a division of the Federal Bureau of Investigation (FBI), has issued a public service announcement about the improper security and privacy protections provided by manufacturers of Internet-connected smart toys, also known as IoT toys. [...]
https://www.bleepingcomputer.com/news/government/fbi-issues-warning-and-recommendations-on-internet-connected-toys/
BleepingComputer
FBI Issues Warning and Recommendations on Internet-Connected Toys
The Internet Crime Complaint Center (IC3), a division of the Federal Bureau of Investigation (FBI), has issued a public service announcement about the improper security and privacy protections provided by manufacturers of Internet-connected smart toys, alsoβ¦
FedEx Says Some Damage From NotPetya Ransomware May Be Permanent
US-based and international courier delivery service FedEx admitted on Monday that some of its systems were significantly affected by the NotPetya ransomware, and some of the damage may be permanent. [...]
https://www.bleepingcomputer.com/news/security/fedex-says-some-damage-from-notpetya-ransomware-may-be-permanent/
US-based and international courier delivery service FedEx admitted on Monday that some of its systems were significantly affected by the NotPetya ransomware, and some of the damage may be permanent. [...]
https://www.bleepingcomputer.com/news/security/fedex-says-some-damage-from-notpetya-ransomware-may-be-permanent/
BleepingComputer
FedEx Says Some Damage From NotPetya Ransomware May Be Permanent
US-based and international courier delivery service FedEx admitted on Monday that some of its systems were significantly affected by the NotPetya ransomware, and some of the damage may be permanent.
Home Security System Fails at Being Secure, Opens Homes to Hacking & Burglaries
The maker of a smart home security system has failed to patch five security issues in the firmware of his product. These flaws allow an attacker to bypass authentication, take over devices, and disable alarm systems, leaving homes exposed to burglaries. [...]
https://www.bleepingcomputer.com/news/security/home-security-system-fails-at-being-secure-opens-homes-to-hacking-and-burglaries/
The maker of a smart home security system has failed to patch five security issues in the firmware of his product. These flaws allow an attacker to bypass authentication, take over devices, and disable alarm systems, leaving homes exposed to burglaries. [...]
https://www.bleepingcomputer.com/news/security/home-security-system-fails-at-being-secure-opens-homes-to-hacking-and-burglaries/
BleepingComputer
Home Security System Fails at Being Secure, Opens Homes to Hacking & Burglaries
The maker of a smart home security system has failed to patch five security issues in the firmware of his product. These flaws allow an attacker to bypass authentication, take over devices, and disable alarm systems, leaving homes exposed to burglaries.
Coding Library Vulnerability May Trickle Down to Thousands of IoT Devices
A vulnerability codenamed Devil's Ivy is putting thousands of Internet-connected devices at risk of hacking. [...]
https://www.bleepingcomputer.com/news/security/coding-library-vulnerability-may-trickle-down-to-thousands-of-iot-devices/
A vulnerability codenamed Devil's Ivy is putting thousands of Internet-connected devices at risk of hacking. [...]
https://www.bleepingcomputer.com/news/security/coding-library-vulnerability-may-trickle-down-to-thousands-of-iot-devices/
BleepingComputer
Coding Library Vulnerability May Trickle Down to Thousands of IoT Devices
A vulnerability codenamed Devil's Ivy is putting thousands of Internet-connected devices at risk of hacking.
SambaCry Vulnerability Used to Deploy Backdoors on NAS Devices
wSomeone is using the SambaCry vulnerability to install a backdoor trojan on Linux devices running older versions of the Samba file-sharing server. [...]
https://www.bleepingcomputer.com/news/security/sambacry-vulnerability-used-to-deploy-backdoors-on-nas-devices/
wSomeone is using the SambaCry vulnerability to install a backdoor trojan on Linux devices running older versions of the Samba file-sharing server. [...]
https://www.bleepingcomputer.com/news/security/sambacry-vulnerability-used-to-deploy-backdoors-on-nas-devices/
BleepingComputer
SambaCry Vulnerability Used to Deploy Backdoors on NAS Devices
wSomeone is using the SambaCry vulnerability to install a backdoor trojan on Linux devices running older versions of the Samba file-sharing server.
Two Iranians Charged With Hacking US Defense Contractor
The US Department of Justice (DOJ) unsealed an indictment on Monday against two Iranian nationals accused of hacking a US company and stealing software used in ammunition design. [...]
https://www.bleepingcomputer.com/news/security/two-iranians-charged-with-hacking-us-defense-contractor/
The US Department of Justice (DOJ) unsealed an indictment on Monday against two Iranian nationals accused of hacking a US company and stealing software used in ammunition design. [...]
https://www.bleepingcomputer.com/news/security/two-iranians-charged-with-hacking-us-defense-contractor/
BleepingComputer
Two Iranians Charged With Hacking US Defense Contractor
The US Department of Justice (DOJ) unsealed an indictment on Monday against two Iranian nationals accused of hacking a US company and stealing software used in ammunition design.
Mozilla Launches the First Open-Source Voice Recognition Engine
The Mozilla Foundation, makers of the Firefox browser, have launched a new project called Common Voice, which the organization hopes to become the first open-source voice recognition engine on the market. [...]
https://www.bleepingcomputer.com/news/technology/mozilla-launches-the-first-open-source-voice-recognition-engine/
The Mozilla Foundation, makers of the Firefox browser, have launched a new project called Common Voice, which the organization hopes to become the first open-source voice recognition engine on the market. [...]
https://www.bleepingcomputer.com/news/technology/mozilla-launches-the-first-open-source-voice-recognition-engine/
BleepingComputer
Mozilla Launches the First Open-Source Voice Recognition Engine
The Mozilla Foundation, makers of the Firefox browser, have launched a new project called Common Voice, which the organization hopes to become the first open-source voice recognition engine on the market.
"Bad Taste" Vulnerability Affects Linux Systems via Malicious Windows MSI Files
Because Windows executables haven't wreaked enough damage on Windows computers, now you can use malformed MSI files to run malicious code on Linux systems. [...]
https://www.bleepingcomputer.com/news/security/-bad-taste-vulnerability-affects-linux-systems-via-malicious-windows-msi-files/
Because Windows executables haven't wreaked enough damage on Windows computers, now you can use malformed MSI files to run malicious code on Linux systems. [...]
https://www.bleepingcomputer.com/news/security/-bad-taste-vulnerability-affects-linux-systems-via-malicious-windows-msi-files/
BleepingComputer
"Bad Taste" Vulnerability Affects Linux Systems via Malicious Windows MSI Files
Because Windows executables haven't wreaked enough damage on Windows computers, now you can use malformed MSI files to run malicious code on Linux systems.
Radio and TV Station Still Recovering From Ransomware Infection One Month Later
A month after it suffered a mysterious cyber attack, details emerged that San Francisco's public TV and radio station, KQED, was the victim of a ransomware incident from which it has yet to fully recover. [...]
https://www.bleepingcomputer.com/news/security/radio-and-tv-station-still-recovering-from-ransomware-infection-one-month-later/
A month after it suffered a mysterious cyber attack, details emerged that San Francisco's public TV and radio station, KQED, was the victim of a ransomware incident from which it has yet to fully recover. [...]
https://www.bleepingcomputer.com/news/security/radio-and-tv-station-still-recovering-from-ransomware-infection-one-month-later/
BleepingComputer
Radio and TV Station Still Recovering From Ransomware Infection One Month Later
A month after it suffered a mysterious cyber attack, details emerged that San Francisco's public TV and radio station, KQED, was the victim of a ransomware incident from which it has yet to fully recover.
Avast Buys Piriform, the Company Behind CCleaner and Recuva
Avast, today's largest vendor of security software, has acquired Piriform, a UK-based company that is behind many successful desktop and mobile apps, such as CCleaner, Recuva, Speccy, and Defraggler. [...]
https://www.bleepingcomputer.com/news/business/avast-buys-piriform-the-company-behind-ccleaner-and-recuva/
Avast, today's largest vendor of security software, has acquired Piriform, a UK-based company that is behind many successful desktop and mobile apps, such as CCleaner, Recuva, Speccy, and Defraggler. [...]
https://www.bleepingcomputer.com/news/business/avast-buys-piriform-the-company-behind-ccleaner-and-recuva/
BleepingComputer
Avast Buys Piriform, the Company Behind CCleaner and Recuva
Avast, today's largest vendor of security software, has acquired Piriform, a UK-based company that is behind many successful desktop and mobile apps, such as CCleaner, Recuva, Speccy, and Defraggler.
Hacker Uses Parity Wallet Vulnerability to Steal $30 Million Worth of Ethereum
An unknown hacker has used a vulnerability in an Ethereum wallet client to steal over 153,000 Ether, worth over $30 million dollars. [...]
https://www.bleepingcomputer.com/news/security/hacker-uses-parity-wallet-vulnerability-to-steal-30-million-worth-of-ethereum/
An unknown hacker has used a vulnerability in an Ethereum wallet client to steal over 153,000 Ether, worth over $30 million dollars. [...]
https://www.bleepingcomputer.com/news/security/hacker-uses-parity-wallet-vulnerability-to-steal-30-million-worth-of-ethereum/
BleepingComputer
Hacker Uses Parity Wallet Vulnerability to Steal $30 Million Worth of Ethereum
An unknown hacker has used a vulnerability in an Ethereum wallet client to steal over 153,000 Ether, worth over $30 million dollars.