The Week in Ransomware - April 28th 2017 -
Was a good week as not a lot of news when it comes to ransomware. Some more in-dev crap and nothing really new this week. The biggest news is that Cerber is now being distributed via MALSPAM that utilizes CVE-2017-0199 in the attached DOC files. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-april-28th-2017-/
Was a good week as not a lot of news when it comes to ransomware. Some more in-dev crap and nothing really new this week. The biggest news is that Cerber is now being distributed via MALSPAM that utilizes CVE-2017-0199 in the attached DOC files. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-april-28th-2017-/
BleepingComputer
The Week in Ransomware - April 28th 2017 -
Was a good week as not a lot of news when it comes to ransomware. Some more in-dev crap and nothing really new this week. The biggest news is that Cerber is now being distributed via MALSPAM that utilizes CVE-2017-0199 in the attached DOC files.
My People comes to Windows 10 Insider Build 16184 For PC
Today Microsoft released Insider Preview Build 16184 for PC and Insider Preview Build 15208 for Mobile to insiders on the fast ring. With build 16184, Microsoft introduces My People to Windows 10, which allows users to pin people to the taskbar and communicate with them by installing apps such as Skype, Mail, and People. [...]
https://www.bleepingcomputer.com/news/microsoft/my-people-comes-to-windows-10-insider-build-16184-for-pc/
Today Microsoft released Insider Preview Build 16184 for PC and Insider Preview Build 15208 for Mobile to insiders on the fast ring. With build 16184, Microsoft introduces My People to Windows 10, which allows users to pin people to the taskbar and communicate with them by installing apps such as Skype, Mail, and People. [...]
https://www.bleepingcomputer.com/news/microsoft/my-people-comes-to-windows-10-insider-build-16184-for-pc/
BleepingComputer
My People comes to Windows 10 Insider Build 16184 For PC
Today Microsoft released Insider Preview Build 16184 for PC and Insider Preview Build 15208 for Mobile to insiders on the fast ring. With build 16184, Microsoft introduces My People to Windows 10, which allows users to pin people to the taskbar and communicateβ¦
Malware Blocks Virginia State Police From Updating Sex Offender Registry
A malware infection affecting servers belonging to the Virginia State Police (VSP) has shut down the department's email system, along with its ability to update the Virginia Sex Offender and Crimes Against Children Registry (SOR). [...]
https://www.bleepingcomputer.com/news/security/malware-blocks-virginia-state-police-from-updating-sex-offender-registry/
A malware infection affecting servers belonging to the Virginia State Police (VSP) has shut down the department's email system, along with its ability to update the Virginia Sex Offender and Crimes Against Children Registry (SOR). [...]
https://www.bleepingcomputer.com/news/security/malware-blocks-virginia-state-police-from-updating-sex-offender-registry/
BleepingComputer
Malware Blocks Virginia State Police From Updating Sex Offender Registry
A malware infection affecting servers belonging to the Virginia State Police (VSP) has shut down the department's email system, along with its ability to update the Virginia Sex Offender and Crimes Against Children Registry (SOR).
New Dok Mac Malware Uses Nag Screens, Intercepts Encrypted Web Traffic
Security researchers from Check Point have discovered a new Mac malware family that uses nag screens to obtain admin privileges, Tor to hide traffic diverted to a remote proxy, and a rogue certificate to intercept encrypted browser traffic. [...]
https://www.bleepingcomputer.com/news/security/new-dok-mac-malware-uses-nag-screens-intercepts-encrypted-web-traffic/
Security researchers from Check Point have discovered a new Mac malware family that uses nag screens to obtain admin privileges, Tor to hide traffic diverted to a remote proxy, and a rogue certificate to intercept encrypted browser traffic. [...]
https://www.bleepingcomputer.com/news/security/new-dok-mac-malware-uses-nag-screens-intercepts-encrypted-web-traffic/
BleepingComputer
New Dok Mac Malware Uses Nag Screens, Intercepts Encrypted Web Traffic
Security researchers from Check Point have discovered a new Mac malware family that uses nag screens to obtain admin privileges, Tor to hide traffic diverted to a remote proxy, and a rogue certificate to intercept encrypted browser traffic.
Hacker Leaks "Orange Is the New Black" Season 5 Episodes After Netflix Extortion Attempt Fails
A hacker (or hacker group) known as The Dark Overlord (TDO) has leaked the first ten episodes of season 5 of the "Orange Is The New Black" show after two failed blackmail attempts, against Larson Studios and Netflix. [...]
https://www.bleepingcomputer.com/news/security/hacker-leaks-orange-is-the-new-black-season-5-episodes-after-netflix-extortion-attempt-fails/
A hacker (or hacker group) known as The Dark Overlord (TDO) has leaked the first ten episodes of season 5 of the "Orange Is The New Black" show after two failed blackmail attempts, against Larson Studios and Netflix. [...]
https://www.bleepingcomputer.com/news/security/hacker-leaks-orange-is-the-new-black-season-5-episodes-after-netflix-extortion-attempt-fails/
BleepingComputer
Hacker Leaks "Orange Is the New Black" Season 5 Episodes After Netflix Extortion Attempt Fails
A hacker (or hacker group) known as The Dark Overlord (TDO) has leaked the first ten episodes of season 5 of the "Orange Is The New Black" show after two failed blackmail attempts, against Larson Studios and Netflix.
Lawsuit Brewing Over Unfixed Bug in Intel Puma 6 CPUs
An unpatched bug in the firmware of Intel Puma 6 chipsets β used within several models of gigabit cable modems β is causing latency issues, and may also be used to knock devices offline via a gentle packet stream. [...]
https://www.bleepingcomputer.com/news/hardware/lawsuit-brewing-over-unfixed-bug-in-intel-puma-6-cpus/
An unpatched bug in the firmware of Intel Puma 6 chipsets β used within several models of gigabit cable modems β is causing latency issues, and may also be used to knock devices offline via a gentle packet stream. [...]
https://www.bleepingcomputer.com/news/hardware/lawsuit-brewing-over-unfixed-bug-in-intel-puma-6-cpus/
BleepingComputer
Lawsuit Brewing Over Unfixed Bug in Intel Puma 6 CPUs
An unpatched bug in the firmware of Intel Puma 6 chipsets β used within several models of gigabit cable modems β is causing latency issues, and may also be used to knock devices offline via a gentle packet stream.
Leaked Documents Reveal Facebook Targets Emotionally Insecure Teens
Facebook's marketing department is using algorithms to identify emotionally vulnerable and insecure youth as young as 14, The Australian reported today after reporters managed to get their hands on a 23-page report from Facebook's Australian office. [...]
https://www.bleepingcomputer.com/news/technology/leaked-documents-reveal-facebook-targets-emotionally-insecure-teens/
Facebook's marketing department is using algorithms to identify emotionally vulnerable and insecure youth as young as 14, The Australian reported today after reporters managed to get their hands on a 23-page report from Facebook's Australian office. [...]
https://www.bleepingcomputer.com/news/technology/leaked-documents-reveal-facebook-targets-emotionally-insecure-teens/
BleepingComputer
Leaked Documents Reveal Facebook Targets Emotionally Insecure Teens
Facebook's marketing department is using algorithms to identify emotionally vulnerable and insecure youth as young as 14, The Australian reported today after reporters managed to get their hands on a 23-page report from Facebook's Australian office.
Malware Author Inflates Backdoor Trojan With Junk Data Hoping to Avoid Detection
A malware coder is injecting megabytes of junk data inside his malicious payloads, hoping to avoid detection by some antivirus solutions or delay investigations of infosec professionals. [...]
https://www.bleepingcomputer.com/news/security/malware-author-inflates-backdoor-trojan-with-junk-data-hoping-to-avoid-detection/
A malware coder is injecting megabytes of junk data inside his malicious payloads, hoping to avoid detection by some antivirus solutions or delay investigations of infosec professionals. [...]
https://www.bleepingcomputer.com/news/security/malware-author-inflates-backdoor-trojan-with-junk-data-hoping-to-avoid-detection/
BleepingComputer
Malware Author Inflates Backdoor Trojan With Junk Data Hoping to Avoid Detection
A malware coder is injecting megabytes of junk data inside his malicious payloads, hoping to avoid detection by some antivirus solutions or delay investigations of infosec professionals.
Security Researcher and Alleged Spam Operator to Square Off in Court in Ugly Lawsuit
River City Media, an email marketing company that was exposed last month as one of the world's largest spam operators, has filed a lawsuit against the security researcher who made the revelations. [...]
https://www.bleepingcomputer.com/news/legal/security-researcher-and-alleged-spam-operator-to-square-off-in-court-in-ugly-lawsuit/
River City Media, an email marketing company that was exposed last month as one of the world's largest spam operators, has filed a lawsuit against the security researcher who made the revelations. [...]
https://www.bleepingcomputer.com/news/legal/security-researcher-and-alleged-spam-operator-to-square-off-in-court-in-ugly-lawsuit/
BleepingComputer
Security Researcher and Alleged Spam Operator to Square Off in Court in Ugly Lawsuit
River City Media, an email marketing company that was reported last month as allegedly one of the world's largest spam operators, has filed a lawsuit against the security researcher who made the revelations.
Hyundai Patches Mobile App Flaws That Allow Hackers to Steal Cars
Hyundai has patched a security flaw in the Blue Link mobile application that exposed sensitive information, which hackers could have used to track down, unlock, and start Hyundai cars. [...]
https://www.bleepingcomputer.com/news/security/hyundai-patches-mobile-app-flaws-that-allow-hackers-to-steal-cars/
Hyundai has patched a security flaw in the Blue Link mobile application that exposed sensitive information, which hackers could have used to track down, unlock, and start Hyundai cars. [...]
https://www.bleepingcomputer.com/news/security/hyundai-patches-mobile-app-flaws-that-allow-hackers-to-steal-cars/
BleepingComputer
Hyundai Patches Mobile App Flaws That Allow Hackers to Steal Cars
Hyundai has patched a security flaw in the Blue Link mobile application that exposed sensitive information, which hackers could have used to track down, unlock, and start Hyundai cars.
New version of the CryptoMix Ransomware Using the Wallet Extension
A new variant of the CryptoMix ransomware was discovered that appends the email addresses shield0@usa.com & admin@hoist.desi along with the .Wallet extension. This makes it the third ransomware using .wallet, with the first being Dharma and then Sanctions. Unfortunately, the reuse of an extension is only going to confuse victims. [...]
https://www.bleepingcomputer.com/news/security/new-version-of-the-cryptomix-ransomware-using-the-wallet-extension/
A new variant of the CryptoMix ransomware was discovered that appends the email addresses shield0@usa.com & admin@hoist.desi along with the .Wallet extension. This makes it the third ransomware using .wallet, with the first being Dharma and then Sanctions. Unfortunately, the reuse of an extension is only going to confuse victims. [...]
https://www.bleepingcomputer.com/news/security/new-version-of-the-cryptomix-ransomware-using-the-wallet-extension/
BleepingComputer
New version of the CryptoMix Ransomware Using the Wallet Extension
A new variant of the CryptoMix ransomware was discovered that appends the email addresses shield0@usa.com & admin@hoist.desi along with the .Wallet extension. This makes it the third ransomware using .wallet, with the first being Dharma and then Sanctions.β¦
Hacked South Korean Bitcoin Exchange Loses $5.5 Million
Yapizon, a South Korean Bitcoin exchange, announced last week it lost 3816.2028 Bitcoin (over $5.5 million) after an unknown hacker breached its system and stole funds from its server. [...]
https://www.bleepingcomputer.com/news/security/hacked-south-korean-bitcoin-exchange-loses-5-5-million/
Yapizon, a South Korean Bitcoin exchange, announced last week it lost 3816.2028 Bitcoin (over $5.5 million) after an unknown hacker breached its system and stole funds from its server. [...]
https://www.bleepingcomputer.com/news/security/hacked-south-korean-bitcoin-exchange-loses-5-5-million/
BleepingComputer
Hacked South Korean Bitcoin Exchange Loses $5.5 Million
Yapizon, a South Korean Bitcoin exchange, announced last week it lost 3816.2028 Bitcoin (over $5.5 million) after an unknown hacker breached its system and stole funds from its server.
Intel Fixes 9-Year-Old CPU Flaw That Allows Remote Code Execution
Intel's security team released a series of patches yesterday that fix a remote code execution (RCE) bug found in the Intel Management Engine (ME). [...]
https://www.bleepingcomputer.com/news/hardware/intel-fixes-9-year-old-cpu-flaw-that-allows-remote-code-execution/
Intel's security team released a series of patches yesterday that fix a remote code execution (RCE) bug found in the Intel Management Engine (ME). [...]
https://www.bleepingcomputer.com/news/hardware/intel-fixes-9-year-old-cpu-flaw-that-allows-remote-code-execution/
BleepingComputer
Intel Fixes 9-Year-Old CPU Flaw That Allows Remote Code Execution
Intel's security team released a series of patches yesterday that fix a remote code execution (RCE) bug found in the Intel Management Engine (ME).
IBM Warns Customers That Some of Its USB Flash Drives May Contain Malware
IBM has issued a security alert last week, warning customers that some USB flash drives shipped with IBM Storwize products may contain malicious code. [...]
https://www.bleepingcomputer.com/news/security/ibm-warns-customers-that-some-of-its-usb-flash-drives-may-contain-malware/
IBM has issued a security alert last week, warning customers that some USB flash drives shipped with IBM Storwize products may contain malicious code. [...]
https://www.bleepingcomputer.com/news/security/ibm-warns-customers-that-some-of-its-usb-flash-drives-may-contain-malware/
BleepingComputer
IBM Warns Customers That Some of Its USB Flash Drives May Contain Malware
IBM has issued a security alert last week, warning customers that some USB flash drives shipped with IBM Storwize products may contain malicious code.
New Shodan Tool Can Find Malware Command and Control (C&C) Servers
Shodan and Recorded Future have launched today a search engine for discovering malware command-and-control (C&C) servers. Named Malware Hunter, this new tool is integrated into Shodan, a search engine for discovering Internet-connected devices. [...]
https://www.bleepingcomputer.com/news/security/new-shodan-tool-can-find-malware-command-and-control-candc-servers/
Shodan and Recorded Future have launched today a search engine for discovering malware command-and-control (C&C) servers. Named Malware Hunter, this new tool is integrated into Shodan, a search engine for discovering Internet-connected devices. [...]
https://www.bleepingcomputer.com/news/security/new-shodan-tool-can-find-malware-command-and-control-candc-servers/
BleepingComputer
New Shodan Tool Can Find Malware Command and Control (C&C) Servers
Shodan and Recorded Future have launched today a search engine for discovering malware command-and-control (C&C) servers. Named Malware Hunter, this new tool is integrated into Shodan, a search engine for discovering Internet-connected devices.
Microsoft Unveils Windows 10 S, a Competitor for Google's Chrome OS
At the MicrosoftEDU Event held today in New York, Microsoft announced Windows 10 S, a version of the Windows 10 operating system that is restricted to running only Windows Store apps. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-unveils-windows-10-s-a-competitor-for-googles-chrome-os/
At the MicrosoftEDU Event held today in New York, Microsoft announced Windows 10 S, a version of the Windows 10 operating system that is restricted to running only Windows Store apps. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-unveils-windows-10-s-a-competitor-for-googles-chrome-os/
BleepingComputer
Microsoft Unveils Windows 10 S, a Competitor for Google's Chrome OS
At the MicrosoftEDU Event held today in New York, Microsoft announced Windows 10 S, a version of the Windows 10 operating system that is restricted to running only Windows Store apps.
Tor Browser Flaws Allow User Profiling
Dr. Neal Krawetz, a computer forensics expert, revealed on Monday several problems with the amount of details the Tor Browser discloses about users, which may allow a determined actor to identify users employing the Tor Browser to surf the Internet. [...]
https://www.bleepingcomputer.com/news/software/tor-browser-flaws-allow-user-profiling/
Dr. Neal Krawetz, a computer forensics expert, revealed on Monday several problems with the amount of details the Tor Browser discloses about users, which may allow a determined actor to identify users employing the Tor Browser to surf the Internet. [...]
https://www.bleepingcomputer.com/news/software/tor-browser-flaws-allow-user-profiling/
BleepingComputer
Tor Browser Flaws Allow User Profiling
Dr. Neal Krawetz, a computer forensics expert, revealed on Monday several problems with the amount of details the Tor Browser discloses about users, which may allow a determined actor to identify users employing the Tor Browser to surf the Internet.
Google Will Quietly Auto-Migrate Some Users to 64-Bit Chrome
Google will release Chrome 58.0.3029.96 in the coming days and weeks, and as part of this update, the company plans to move some of its 32-bit users to Chrome's 64-bit version. [...]
https://www.bleepingcomputer.com/news/software/google-will-quietly-auto-migrate-some-users-to-64-bit-chrome/
Google will release Chrome 58.0.3029.96 in the coming days and weeks, and as part of this update, the company plans to move some of its 32-bit users to Chrome's 64-bit version. [...]
https://www.bleepingcomputer.com/news/software/google-will-quietly-auto-migrate-some-users-to-64-bit-chrome/
BleepingComputer
Google Will Quietly Auto-Migrate Some Users to 64-Bit Chrome
Google will release Chrome 58.0.3029.96 in the coming days and weeks, and as part of this update, the company plans to move some of its 32-bit users to Chrome's 64-bit version.
India's Aadhaar Biometrics Database Is About to Become a Security Nightmare
A report released on Monday by The Centre for Internet and Society reveals that over 135 million records from India's Aadhaar national ID systems have already leaked online. [...]
https://www.bleepingcomputer.com/news/security/indias-aadhaar-biometrics-database-is-about-to-become-a-security-nightmare/
A report released on Monday by The Centre for Internet and Society reveals that over 135 million records from India's Aadhaar national ID systems have already leaked online. [...]
https://www.bleepingcomputer.com/news/security/indias-aadhaar-biometrics-database-is-about-to-become-a-security-nightmare/
BleepingComputer
India's Aadhaar Biometrics Database Is About to Become a Security Nightmare
A report released on Monday by The Centre for Internet and Society reveals that over 135 million records from India's Aadhaar national ID systems have already leaked online.
Watch Researchers Hack an Industrial Robot and Sabotage Production
There is an insane amount of industrial robots connected to the Internet, and even worse, thousands are left with no form of user authentication whatsoever, open to attack from anyone skilled enough to know how to sabotage their mode of operation. [...]
https://www.bleepingcomputer.com/news/security/watch-researchers-hack-an-industrial-robot-and-sabotage-production/
There is an insane amount of industrial robots connected to the Internet, and even worse, thousands are left with no form of user authentication whatsoever, open to attack from anyone skilled enough to know how to sabotage their mode of operation. [...]
https://www.bleepingcomputer.com/news/security/watch-researchers-hack-an-industrial-robot-and-sabotage-production/
BleepingComputer
Watch Researchers Hack an Industrial Robot and Sabotage Production
There is an insane amount of industrial robots connected to the Internet, and even worse, thousands are left with no form of user authentication whatsoever, open to attack from anyone skilled enough to know how to sabotage their mode of operation.