Travelex, the foreign exchange company that was crippled by hackers on New Year's Eve, reportedly paid a $2.3 million ransom to get their systems back online, The Wall Street Journal reported.
Sodinokibi, the alleged perpetrators of the cyberattack, claimed responsibility for the breach. The cybercriminals demanded $6 million in ransom with a promise that they would not release the sensitive information of Travelex customers, including birthdates and credit card numbers.
Not to change the topic here:
These hackers have been quietly targeting Linux servers for years | ZDNet
"It's newly discovered, but it's nowhere near new. A lot of these toolsets go back to 2012 and 2013, which is a ridiculous amount of time for an adversary to be able to use the same set of tools," Eric Cornelius, chief product architect at Blackberry, told ZDNet.
Linux is not typically a user-facing technology, so security companies tend to focus on it less, he explained. As a result, these hacking groups have zeroed in on that gap in security and leveraged it for their strategic advantage to steal intellectual property from targeted sectors for years without anyone noticing, he said.
Hackers have hit every country with coronavirus scams, Microsoft says - Business Insider
Hackers have launched coronavirus-themed cyberattacks in 241 countries and territories, according to new research from Microsoft
Rob Lefferts, corporate vice president of Microsoft 365 Security and the blog's author, told Business Insider that the cyberattacks follow the pandemic around the world geographically.
"We're seeing a changing of lures, not a surge in attacks," Lefferts wrote. "Our intelligence shows that these attacks are settling into a rhythm that is the normal ebb and flow of the threat environment."
Hackers’ forum hacked, OGUsers database dumped (again) – Naked Security
A rival hacking forum has yet again hacked OGUsers – the second time in a year – and yet again doxxed its database for one and all to grab, fast on the heels of the attack.
OGUsers is a forum devoted to trading stolen Instagram, Twitter and other accounts, with a special place in its dark heart for hackers who like to trade SIM swappers’ stolen phone numbers and Bitcoin accounts.
An announcement of this second attack was first spotted by data breach monitoring service Under the Breach: the same service that recently noticed that data belonging to nearly every citizen of the country of Georgia had been posted on a hackers forum.
Quite a lot has been going on:
Cybersecurity officials say state-backed hackers taking advantage of pandemic | VentureBeat
( Reuters ) — U.S. and British cybersecurity officials are warning that state-backed hackers and online criminals are taking advantage of the coronavirus outbreak to further their operations, echoing concerns from digital safety experts.
"Bad actors are using these difficult times to exploit and take advantage of the public and business," Bryan Ware, CISA's assistant director for cybersecurity, said in a statement.
The agencies warned that hackers were also exploiting growing demand for work-from-home solutions by passing off their malicious tools as remote collaboration software produced by Zoom and Microsoft . Hackers are also targeting the virtual private networks that are allowing an increasing number of employees to connect to their offices, the agencies said.
Zoom bombing: How hackers crash your online meetings and ways to prevent it
We are now using different video conference services to stay in touch with others. Some of those services include Google Hangout and Skype, but there's been a disturbing trend circulating for people who use Zoom.
It's called Zoom bombing and it occurs when a hacker crashes an online meeting and posts profanity, graphic videos and other content not safe for work or school.
Reuters reported that Zoom's daily users ballooned to more than 200 million in March. That has given hackers several more chances to infiltrate classrooms and work meetings.
Email provider got hacked, data of 600,000 users now sold on the dark web | ZDNet
The hackers -- going by the name of NN (No Name) Hacking Group -- claim the actual intrusion took place more than two years ago, in January 2018. We cite from their website:
Following the failed extortion attempt, the hackers are now selling the company's data for an asking price that varies between 0.5 and 3 bitcoin ($3,500 and $22,000).
* * *
The company said it immediately patched the server and notified authorities, including the country's local data privacy regulator.
Hackers Use New Tactics During COVID-19 Crisis | WCBS Newsradio 880
"The most stimulating part of the stimulus is the fact that the hackers are out there in droves," Adam Levin, former director of consumer affairs in New Jersey, told WCBS 880's Neil A. Carousso.
Levin, co-founder of the cybersecurity firm CyberScout, said scammers are deploying new tactics to take advantage of people relying on the stimulus checks that could be direct deposited as soon as Thursday.
* * *
Another 6.6 million Americans filed for unemployment benefits last week , according to the U.S. Department of Labor. Nearly 17 million Americans have filed jobless claims since the coronavirus pandemic forced the shutdown of businesses nationwide.
Happening on Twitter
Travelex "responded by paying the hackers the equivalent of $2.3 million, according to a person familiar with the t… https://t.co/BnRVC4Xu0a zackwhittaker (from New York, NY) Thu Apr 09 14:28:07 +0000 2020
Travelex, known for its currency exchange kiosks at airports, paid about $2.3 million in bitcoin to hackers after b… https://t.co/f1YInCgoEf ceostroff (from Floridian in London) Thu Apr 09 14:11:54 +0000 2020
Report: Travelex paid hackers $2.3 million worth of Bitcoin after ransomware attack https://t.co/Edc3T5JwBX gcluley (from Oxford, UK) Thu Apr 09 16:35:02 +0000 2020
Wall Street Journal reports Travelex secretly paid ransomware group REvil $2.3m. REvil say they deleted data they… https://t.co/8JhWsIMl6s GossiTheDog (from Manchester, England) Thu Apr 09 14:48:33 +0000 2020
No comments:
Post a Comment