ExecuPharm said in a letter to the Vermont attorney general’s office that it was hit by a ransomware attack on March 13, and warned that Social Security numbers, financial information, driver licenses, passport numbers and other sensitive data may have been accessed.
But TechCrunch has now learned that the ransomware group behind the attack has published the data stolen from the company’s servers.
* * *
“ExecuPharm immediately launched an investigation, alerted federal and local law enforcement authorities, retained leading cybersecurity firms to investigate the nature and scope of the incident, and notified all potentially impacted parties,” said ExecuPharm operations chief David Granese.
Were you following this:
160,000 Nintendo accounts hacked
Bad news for those who have been using their Nintendo game systems to pass the time while stuck at home.
* * *
Hackers were able to get into Nintendo Network IDs without permission with many buying Fortnite's virtual currency known as V-Bucks, CNN reported .
You can help secure your Nintendo Account by enabling 2-Step Verification.
For more details, visit: https://t.co/kqxbp8TobD pic.twitter.com/hZ1PnFWZQw
How to Tell if Your Webcam Has Been Hacked | Digital Trends
There's a good reason so many people put tape over their computer webcams or use a dedicated webcam cover to shut them off: Webcams can be hacked, which means hackers can turn them on and record you when they want, usually with a “RAT” or remote administration tool that’s been secretly uploaded.
This type of attack may target anyone. Ransomware attempts generally try to take control of anything that can be used to make cash. As a result, a lot of malware tries to infect webcams so hackers can (potentially) get content suitable for extortion. To keep your webcam privacy, it's important to have good anti-malware software — but you should also know the signs if someone has gained control of your cam. Here's what to watch for.
Zoom Gets Stuffed: Here's How Hackers Got Hold Of 500,000 Passwords
Researchers at threat intelligence provider IntSights obtained multiple databases containing Zoom credentials and got to work analyzing exactly how the hackers got hold of them in the first place.
* * *
So, how did the hackers get hold of these Zoom account credentials in the first place? To understand that, you must get to grips with credential stuffing.
The second step then involves writing a configuration file for an application stress testing tool, of which many are readily available for legitimate purposes. That configuration file points the stress tool at Zoom. Then comes step three, the credential stuffing attack that employs multiple bots to avoid the same IP address being spotted checking multiple Zoom accounts.
This may worth something:
Hackers spoof Small Business Administration to try to compromise companies' computers
With the U.S. Small Business Administration continuing to play a high-profile role in getting cash to companies that are struggling because of the coronavirus pandemic, cybercriminals are stepping up their efforts to steal money from those very firms.
The hackers are "exploiting the reliance of … small businesses on digital updates to obtain guidance on how to receive federal aid," the researchers wrote in a blog .
Over the last two years, the Remcos RAT , which is promoted for sale by a software company known as BreakingSecurity, has been used in hacking campaigns against international news organizations and Turkish defense contractors, among other sectors.
Chinese 'Frontline' COVID-19 Research Firm Reported Hacked: Data Now On Dark Web
Cyber researchers at Cyble now report that a threat actor they describe as "credible," has gained access to the medical company's "COVID-19 detection technology source code and COVID-19 experimental data." Huiying Medical has not yet responded to a request for comment from the day before publishing.
According to Cyble, the threat actor "THE0TIME" is selling the data for 4 BTC, around $30,000. That data is said to include user information, technology source code, and reports on experiments.
Apple iPhone at risk of hacking through email app - BBC News
A flaw in Apple's mobile operating system may have left millions of iPhone and iPad users vulnerable to hackers.
* * *
In a statement, Apple said: "We have thoroughly investigated the researcher's report and, based on the information provided, have concluded these issues do not pose an immediate risk to our users. The researcher identified three issues in Mail, but alone they are insufficient to bypass iPhone and iPad security protections, and we have found no evidence they were used against customers."
You're working from home and hackers know it.
SAN ANTONIO – More people working and schooling from home provides an extra opportunity for hackers looking for ways to access your personal or company information.
* * *
"One of the most important things you can do is keep its firmware up to date," said Bree Fowler, tech editor of Consumer Reports.
When a manufacturer rolls out an update, it often includes a security fix specifically designed to keep hackers out. Instructions to update vary by brand, but most are done through a website or app.
No comments:
Post a Comment