Tuesday, April 28, 2020

Hackers publish ExecuPharm internal data after ransomware attack – TechCrunch

ExecuPharm said in a letter to the Vermont attorney general’s office that it was hit by a ransomware attack on March 13, and warned that Social Security numbers, financial information, driver licenses, passport numbers and other sensitive data may have been accessed.

But TechCrunch has now learned that the ransomware group behind the attack has published the data stolen from the company’s servers.

* * *

“ExecuPharm immediately launched an investigation, alerted federal and local law enforcement authorities, retained leading cybersecurity firms to investigate the nature and scope of the incident, and notified all potentially impacted parties,” said ExecuPharm operations chief David Granese.

logo
Publisher: TechCrunch
Date: 2020-04-27 13:58:29
Twitter: @techcrunch
Reference: (Read more) Visit Source



Were you following this:

160,000 Nintendo accounts hacked

Bad news for those who have been using their Nintendo game systems to pass the time while stuck at home.

* * *

Hackers were able to get into Nintendo Network IDs without permission with many buying Fortnite's virtual currency known as V-Bucks, CNN reported .

You can help secure your Nintendo Account by enabling 2-Step Verification.

For more details, visit: https://t.co/kqxbp8TobD pic.twitter.com/hZ1PnFWZQw

Publisher: KIRO
Date: 2020-04-27T13:44:15.258Z
Author: Natalie Dreier Cox Media Group National Content Desk
Twitter: @KIRO7Seattle
Reference: (Read more) Visit Source



How to Tell if Your Webcam Has Been Hacked | Digital Trends

There's a good reason so many people put tape over their computer webcams or use a dedicated webcam cover to shut them off: Webcams can be hacked, which means hackers can turn them on and record you when they want, usually with a “RAT” or remote administration tool that’s been secretly uploaded.

This type of attack may target anyone. Ransomware attempts generally try to take control of anything that can be used to make cash. As a result, a lot of malware tries to infect webcams so hackers can (potentially) get content suitable for extortion. To keep your webcam privacy, it's important to have good anti-malware software — but you should also know the signs if someone has gained control of your cam. Here's what to watch for.

logo
Publisher: Digital Trends
Date: 2020-04-28T14:00:30 00:00
Author: https www facebook com tyler lacoma
Twitter: @digitaltrends
Reference: (Read more) Visit Source



Zoom Gets Stuffed: Here's How Hackers Got Hold Of 500,000 Passwords

Researchers at threat intelligence provider IntSights obtained multiple databases containing Zoom credentials and got to work analyzing exactly how the hackers got hold of them in the first place.

* * *

So, how did the hackers get hold of these Zoom account credentials in the first place? To understand that, you must get to grips with credential stuffing.

The second step then involves writing a configuration file for an application stress testing tool, of which many are readily available for legitimate purposes. That configuration file points the stress tool at Zoom. Then comes step three, the credential stuffing attack that employs multiple bots to avoid the same IP address being spotted checking multiple Zoom accounts.

Publisher: Forbes
Date: 2020-04-28
Author: Davey Winder
Twitter: @forbes
Reference: (Read more) Visit Source



This may worth something:

Hackers spoof Small Business Administration to try to compromise companies' computers

With the U.S. Small Business Administration continuing to play a high-profile role in getting cash to companies that are struggling because of the coronavirus pandemic, cybercriminals are stepping up their efforts to steal money from those very firms.

The hackers are "exploiting the reliance of … small businesses on digital updates to obtain guidance on how to receive federal aid," the researchers wrote in a blog .

Over the last two years, the Remcos RAT , which is promoted for sale by a software company known as BreakingSecurity, has been used in hacking campaigns against international news organizations and Turkish defense contractors, among other sectors.

logo
Publisher: CyberScoop
Date: 2020-04-27T13:32:07-04:00
Reference: (Read more) Visit Source



Chinese 'Frontline' COVID-19 Research Firm Reported Hacked: Data Now On Dark Web

Cyber researchers at Cyble now report that a threat actor they describe as "credible," has gained access to the medical company's "COVID-19 detection technology source code and COVID-19 experimental data." Huiying Medical has not yet responded to a request for comment from the day before publishing.

According to Cyble, the threat actor "THE0TIME" is selling the data for 4 BTC, around $30,000. That data is said to include user information, technology source code, and reports on experiments.

Publisher: Forbes
Date: 2020-04-26
Author: Zak Doffman
Twitter: @forbes
Reference: (Read more) Visit Source



Apple iPhone at risk of hacking through email app - BBC News

A flaw in Apple's mobile operating system may have left millions of iPhone and iPad users vulnerable to hackers.

* * *

In a statement, Apple said: "We have thoroughly investigated the researcher's report and, based on the information provided, have concluded these issues do not pose an immediate risk to our users. The researcher identified three issues in Mail, but alone they are insufficient to bypass iPhone and iPad security protections, and we have found no evidence they were used against customers."

logo
Publisher: BBC News
Author: https www facebook com bbcnews
Twitter: @BBCWorld
Reference: (Read more) Visit Source



You're working from home and hackers know it.

SAN ANTONIO – More people working and schooling from home provides an extra opportunity for hackers looking for ways to access your personal or company information.

* * *

"One of the most important things you can do is keep its firmware up to date," said Bree Fowler, tech editor of Consumer Reports.

When a manufacturer rolls out an update, it often includes a security fix specifically designed to keep hackers out. Instructions to update vary by brand, but most are done through a website or app.

Publisher: KSAT
Date: 2020-04-28T00:31:32.324Z
Author: Marilyn Moritz
Twitter: @KSAT
Reference: (Read more) Visit Source



No comments:

Post a Comment