The Week in Ransomware - June 2nd 2017 - XData, Decryptors, and Junkware
This has been a week of pure junk ransomware releases and decryptors. As most of these smaller ransomware variants never make it into actual distribution, I call this a win for the good guys. The big news this week is the release of the master decryption key for XData and updated an updated decryptor for Amnesia2. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-june-2nd-2017-xdata-decryptors-and-junkware/
This has been a week of pure junk ransomware releases and decryptors. As most of these smaller ransomware variants never make it into actual distribution, I call this a win for the good guys. The big news this week is the release of the master decryption key for XData and updated an updated decryptor for Amnesia2. [...]
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-june-2nd-2017-xdata-decryptors-and-junkware/
BleepingComputer
The Week in Ransomware - June 2nd 2017 - XData, Decryptors, and Junkware
This has been a week of pure junk ransomware releases and decryptors. As most of these smaller ransomware variants never make it into actual distribution, I call this a win for the good guys. The big news this week is the release of the master decryptionβ¦
EternalBlue NSA Exploit Becomes Commodity Hacking Tool, Spreads to Other Malware
ETERNALBLUE, an alleged NSA exploit targeting the SMBv1 protocol leaked by the Shadow Brokers in mid-April, has become a commodity hacking tool among malware developers. [...]
https://www.bleepingcomputer.com/news/security/eternalblue-nsa-exploit-becomes-commodity-hacking-tool-spreads-to-other-malware/
ETERNALBLUE, an alleged NSA exploit targeting the SMBv1 protocol leaked by the Shadow Brokers in mid-April, has become a commodity hacking tool among malware developers. [...]
https://www.bleepingcomputer.com/news/security/eternalblue-nsa-exploit-becomes-commodity-hacking-tool-spreads-to-other-malware/
BleepingComputer
EternalBlue NSA Exploit Becomes Commodity Hacking Tool, Spreads to Other Malware
ETERNALBLUE, an alleged NSA exploit targeting the SMBv1 protocol leaked by the Shadow Brokers in mid-April, has become a commodity hacking tool among malware developers.
The Way You Walk Could Be the Best Biometrics Authentication Solution as of Yet
A person's gait, or the motions of his feet and body as he walks, could be used as a very reliable authentication method for offline security systems. [...]
https://www.bleepingcomputer.com/news/security/the-way-you-walk-could-be-the-best-biometrics-authentication-solution-as-of-yet/
A person's gait, or the motions of his feet and body as he walks, could be used as a very reliable authentication method for offline security systems. [...]
https://www.bleepingcomputer.com/news/security/the-way-you-walk-could-be-the-best-biometrics-authentication-solution-as-of-yet/
BleepingComputer
The Way You Walk Could Be the Best Biometrics Authentication Solution as of Yet
A person's gait, or the motions of his feet and body as he walks, could be used as a very reliable authentication method for offline security systems.
Ads in Google Search Results Redirect Users to Tech Support Scam
Malicious ads displayed in Google search results for Target β the US retailer β redirected users to a tech support scam. [...]
https://www.bleepingcomputer.com/news/security/ads-in-google-search-results-redirect-users-to-tech-support-scam/
Malicious ads displayed in Google search results for Target β the US retailer β redirected users to a tech support scam. [...]
https://www.bleepingcomputer.com/news/security/ads-in-google-search-results-redirect-users-to-tech-support-scam/
BleepingComputer
Ads in Google Search Results Redirect Users to Tech Support Scam
Malicious ads displayed in Google search results for Target β the US retailer β redirected users to a tech support scam.
Chrome Version with Built-In Ad Blocker to Launch in Early 2018
Google has just confirmed that a version of Chrome with built-in ad-blocking features is in the works, and the company hopes to release it in "early 2018." [...]
https://www.bleepingcomputer.com/news/google/chrome-version-with-built-in-ad-blocker-to-launch-in-early-2018/
Google has just confirmed that a version of Chrome with built-in ad-blocking features is in the works, and the company hopes to release it in "early 2018." [...]
https://www.bleepingcomputer.com/news/google/chrome-version-with-built-in-ad-blocker-to-launch-in-early-2018/
BleepingComputer
Chrome Version with Built-In Ad Blocker to Launch in Early 2018
Google has just confirmed that a version of Chrome with built-in ad-blocking features is in the works, and the company hopes to release it in "early 2018."
Cybercrime Market Shares Infrastructure With Jaff Ransomware Operation
The people who distribute the Jaff ransomware share server space with a cybercrime marketplace called PaySell. The server in question is located at 5.101.66.85, an IP assigned to a hosting provider in Saint Petersburgh, Russia, according to Heimdal Security, the company that discovered the connection. [...]
https://www.bleepingcomputer.com/news/security/cybercrime-market-shares-infrastructure-with-jaff-ransomware-operation/
The people who distribute the Jaff ransomware share server space with a cybercrime marketplace called PaySell. The server in question is located at 5.101.66.85, an IP assigned to a hosting provider in Saint Petersburgh, Russia, according to Heimdal Security, the company that discovered the connection. [...]
https://www.bleepingcomputer.com/news/security/cybercrime-market-shares-infrastructure-with-jaff-ransomware-operation/
BleepingComputer
Cybercrime Market Shares Infrastructure With Jaff Ransomware Operation
The people who distribute the Jaff ransomware share server space with a cybercrime marketplace called PaySell. The server in question is located at 5.101.66.85, an IP assigned to a hosting provider in Saint Petersburgh, Russia, according to Heimdal Securityβ¦
Hackers Ruin ABC TV Show Premiere, Leak First Eight Episodes on Torrent Site
The hacker group known as The Dark Overlord (TDO) leaked today the first eight episodes of an upcoming TV game show, set to premiere on ABC on Sunday, June 11. [...]
https://www.bleepingcomputer.com/news/security/hackers-ruin-abc-tv-show-premiere-leak-first-eight-episodes-on-torrent-site/
The hacker group known as The Dark Overlord (TDO) leaked today the first eight episodes of an upcoming TV game show, set to premiere on ABC on Sunday, June 11. [...]
https://www.bleepingcomputer.com/news/security/hackers-ruin-abc-tv-show-premiere-leak-first-eight-episodes-on-torrent-site/
BleepingComputer
Hackers Ruin ABC TV Show Premiere, Leak First Eight Episodes on Torrent Site
The hacker group known as The Dark Overlord (TDO) leaked today the first eight episodes of an upcoming TV game show, set to premiere on ABC on Sunday, June 11.
Woman Accused of Hacking Company and Redirecting Money to Her Bank Account
The Royal Canadian Mounted Police (RCMP) have arrested and charged a Canadian woman for hacking into the email of a local company's CEO and redirecting 52,000 Canadian dollars ($38,600) to her own bank account. [...]
https://www.bleepingcomputer.com/news/security/woman-accused-of-hacking-company-and-redirecting-money-to-her-bank-account/
The Royal Canadian Mounted Police (RCMP) have arrested and charged a Canadian woman for hacking into the email of a local company's CEO and redirecting 52,000 Canadian dollars ($38,600) to her own bank account. [...]
https://www.bleepingcomputer.com/news/security/woman-accused-of-hacking-company-and-redirecting-money-to-her-bank-account/
BleepingComputer
Woman Accused of Hacking Company and Redirecting Money to Her Bank Account
The Royal Canadian Mounted Police (RCMP) have arrested and charged a Canadian woman for hacking into the email of a local company's CEO and redirecting 52,000 Canadian dollars ($38,600) to her own bank account.
British PM Uses Terrorist Attacks to Push for Orwellian Internet Surveillance
Some people have no shame, and one of those is Theresa May, the Prime Minister of the United Kingdom, who used the terror attacks that took place in London, on Saturday, June 3, to push her party's agenda for laws that would push for encryption backdoors. [...]
https://www.bleepingcomputer.com/news/government/british-pm-uses-terrorist-attacks-to-push-for-orwellian-internet-surveillance/
Some people have no shame, and one of those is Theresa May, the Prime Minister of the United Kingdom, who used the terror attacks that took place in London, on Saturday, June 3, to push her party's agenda for laws that would push for encryption backdoors. [...]
https://www.bleepingcomputer.com/news/government/british-pm-uses-terrorist-attacks-to-push-for-orwellian-internet-surveillance/
BleepingComputer
British PM Uses Terrorist Attacks to Push for Orwellian Internet Surveillance
Some people have no shame, and one of those is Theresa May, the Prime Minister of the United Kingdom, who used the terror attacks that took place in London, on Saturday, June 3, to push her party's agenda for laws that would push for encryption backdoors.
RIG Exploit Kit Suffers Major Blow Following Coordinated Takedown Action
A joint operation between various industry actors has led to tens of thousands of shadow domains being shut down and removed from the infrastructure of the RIG Exploit Kit (RIG EK). [...]
https://www.bleepingcomputer.com/news/security/rig-exploit-kit-suffers-major-blow-following-coordinated-takedown-action/
A joint operation between various industry actors has led to tens of thousands of shadow domains being shut down and removed from the infrastructure of the RIG Exploit Kit (RIG EK). [...]
https://www.bleepingcomputer.com/news/security/rig-exploit-kit-suffers-major-blow-following-coordinated-takedown-action/
BleepingComputer
RIG Exploit Kit Suffers Major Blow Following Coordinated Takedown Action
A joint operation between various industry actors has led to tens of thousands of shadow domains being shut down and removed from the infrastructure of the RIG Exploit Kit (RIG EK).
Google Chrome 69 Released With a Material Design UI in the Settings Section
Google released today Google Chrome 59, a new version of the Chrome browser, which this month comes with a complete revamp of the Settings section. [...]
https://www.bleepingcomputer.com/news/google/google-chrome-69-released-with-a-material-design-ui-in-the-settings-section/
Google released today Google Chrome 59, a new version of the Chrome browser, which this month comes with a complete revamp of the Settings section. [...]
https://www.bleepingcomputer.com/news/google/google-chrome-69-released-with-a-material-design-ui-in-the-settings-section/
BleepingComputer
Google Chrome 69 Released With a Material Design UI in the Settings Section
Google released today Google Chrome 59, a new version of the Chrome browser, which this month comes with a complete revamp of the Settings section.
Japanese Police Arrest Their First-Ever Ransomware Author
Japanese police have arrested a 14-year-old teen on accusations of creating ransomware and uploading the code online. [...]
https://www.bleepingcomputer.com/news/security/japanese-police-arrest-their-first-ever-ransomware-author/
Japanese police have arrested a 14-year-old teen on accusations of creating ransomware and uploading the code online. [...]
https://www.bleepingcomputer.com/news/security/japanese-police-arrest-their-first-ever-ransomware-author/
BleepingComputer
Japanese Police Arrest Their First-Ever Ransomware Author
Japanese police have arrested a 14-year-old teen on accusations of creating ransomware and uploading the code online.
Car Thieves Everywhere Rejoice as Unsecured Database Exposes 10 Million Car VINs
For 137 days now, a yet to be identified company has left a database containing over 10 million Vehicle Identification Numbers (VINs) exposed online with no authentication. [...]
https://www.bleepingcomputer.com/news/security/car-thieves-everywhere-rejoice-as-unsecured-database-exposes-10-million-car-vins/
For 137 days now, a yet to be identified company has left a database containing over 10 million Vehicle Identification Numbers (VINs) exposed online with no authentication. [...]
https://www.bleepingcomputer.com/news/security/car-thieves-everywhere-rejoice-as-unsecured-database-exposes-10-million-car-vins/
BleepingComputer
Car Thieves Everywhere Rejoice as Unsecured Database Exposes 10 Million Car VINs
For 137 days now, a yet to be identified company has left a database containing over 10 million Vehicle Identification Numbers (VINs) exposed online with no authentication.
US Charges NSA Contractor Over Leak of Russia Hacking Report
The US Department of Justice (DOJ) has filed official charges against a 25-year-old woman, Reality Leigh Winner, of Augusta, Georgia, for leaking classified material to the press. [...]
https://www.bleepingcomputer.com/news/government/us-charges-nsa-contractor-over-leak-of-russia-hacking-report/
The US Department of Justice (DOJ) has filed official charges against a 25-year-old woman, Reality Leigh Winner, of Augusta, Georgia, for leaking classified material to the press. [...]
https://www.bleepingcomputer.com/news/government/us-charges-nsa-contractor-over-leak-of-russia-hacking-report/
BleepingComputer
US Charges NSA Contractor Over Leak of Russia Hacking Report
The US Department of Justice (DOJ) has filed official charges against a 25-year-old woman, Reality Leigh Winner, of Augusta, Georgia, for leaking classified material to the press.
Malware Uses Router LEDs to Steal Data From Secure Networks
Specially-designed malware installed on a router or a switch can take control over the device's LEDs and use them to transmit data in a binary format to a nearby attacker, who can capture it using simple video recording equipment. [...]
https://www.bleepingcomputer.com/news/security/malware-uses-router-leds-to-steal-data-from-secure-networks/
Specially-designed malware installed on a router or a switch can take control over the device's LEDs and use them to transmit data in a binary format to a nearby attacker, who can capture it using simple video recording equipment. [...]
https://www.bleepingcomputer.com/news/security/malware-uses-router-leds-to-steal-data-from-secure-networks/
BleepingComputer
Malware Uses Router LEDs to Steal Data From Secure Networks
Specially-designed malware installed on a router or a switch can take control over the device's LEDs and use them to transmit data in a binary format to a nearby attacker, who can capture it using simple video recording equipment.
Russian State Hackers Use Britney Spears Instagram Posts to Control Malware
A cyber-espionage group known as Turla β believed to be the cyber-arm of Russian intelligence β has been playing around with a backdoor trojan disguised as a Firefox extension that uses comments on Britney Spears Instagram photos to store the location of its command and control (C&C) server. [...]
https://www.bleepingcomputer.com/news/security/russian-state-hackers-use-britney-spears-instagram-posts-to-control-malware/
A cyber-espionage group known as Turla β believed to be the cyber-arm of Russian intelligence β has been playing around with a backdoor trojan disguised as a Firefox extension that uses comments on Britney Spears Instagram photos to store the location of its command and control (C&C) server. [...]
https://www.bleepingcomputer.com/news/security/russian-state-hackers-use-britney-spears-instagram-posts-to-control-malware/
BleepingComputer
Russian State Hackers Use Britney Spears Instagram Posts to Control Malware
A cyber-espionage group known as Turla β believed to be the cyber-arm of Russian intelligence β has been playing around with a backdoor trojan disguised as a Firefox extension that uses comments on Britney Spears Instagram photos to store the location ofβ¦
Researchers Port NSA EternalBlue Exploit to Windows 10
Experts at RiskSense have ported the leaked NSA exploit named ETERNALBLUE for the Windows 10 platform. This is the same exploit that was used by the WannaCry ransomware as part of its SMB self-spreading worm in the mid-May WannaCry outbreak that affected over millions of computers across the world. [...]
https://www.bleepingcomputer.com/news/security/researchers-port-nsa-eternalblue-exploit-to-windows-10/
Experts at RiskSense have ported the leaked NSA exploit named ETERNALBLUE for the Windows 10 platform. This is the same exploit that was used by the WannaCry ransomware as part of its SMB self-spreading worm in the mid-May WannaCry outbreak that affected over millions of computers across the world. [...]
https://www.bleepingcomputer.com/news/security/researchers-port-nsa-eternalblue-exploit-to-windows-10/
BleepingComputer
Researchers Port NSA EternalBlue Exploit to Windows 10
Experts at RiskSense have ported the leaked NSA exploit named ETERNALBLUE for the Windows 10 platform. This is the same exploit that was used by the WannaCry ransomware as part of its SMB self-spreading worm in the mid-May WannaCry outbreak that affectedβ¦
Self-Downloading Android Malware Target Users in the US, UK, and France
A malvertising campaign detected on a popular forum is forcibly downloading an Android app on users' devices, which later installs a second app with more intrusive features and which is almost impossible to remove without flashing the user's phone. [...]
https://www.bleepingcomputer.com/news/security/self-downloading-android-malware-target-users-in-the-us-uk-and-france/
A malvertising campaign detected on a popular forum is forcibly downloading an Android app on users' devices, which later installs a second app with more intrusive features and which is almost impossible to remove without flashing the user's phone. [...]
https://www.bleepingcomputer.com/news/security/self-downloading-android-malware-target-users-in-the-us-uk-and-france/
BleepingComputer
Self-Downloading Android Malware Target Users in the US, UK, and France
A malvertising campaign detected on a popular forum is forcibly downloading an Android app on users' devices, which later installs a second app with more intrusive features and which is almost impossible to remove without flashing the user's phone.
Technical Glitch Triggers Nightmare Scenario for Filipino Bank
Chaos reigned in the Philippines yesterday as one of the country's main banks had to shut down ATM withdrawals and online transactions amid rumors of getting hacked. [...]
https://www.bleepingcomputer.com/news/technology/technical-glitch-triggers-nightmare-scenario-for-filipino-bank/
Chaos reigned in the Philippines yesterday as one of the country's main banks had to shut down ATM withdrawals and online transactions amid rumors of getting hacked. [...]
https://www.bleepingcomputer.com/news/technology/technical-glitch-triggers-nightmare-scenario-for-filipino-bank/
BleepingComputer
Technical Glitch Triggers Nightmare Scenario for Filipino Bank
Chaos reigned in the Philippines yesterday as one of the country's main banks had to shut down ATM withdrawals and online transactions amid rumors of getting hacked.