Are AnonGhostTeam hacktivists using malware to infect end users?

 

Pierluigi Paganini

http://securityaffairs.co/wordpress/30633/hacking/anonghostteam-hacktivists-using-malware.html

Excerpt:

“Experts at Zscaler security firm discovered several websites defaced by AnonGhostTeam hacktivists leading to Dokta Chef Exploit Kit and CVE-2014-6332”

 


Ireland’s dumbest criminal? Thief uploads photos to victim’s iCloud

 

Colin Gleeson

http://www.irishtimes.com/news/crime-and-law/ireland-s-dumbest-criminal-thief-uploads-photos-to-victim-s-icloud-1.2015917

Excerpt:

“It may be a little harsh to put him on the shortlist for Ireland’s dumbest criminal – but one not-so-tech-savvy thief who snatched an iPad has been left red-faced after pictures he took with it were uploaded to his victim’s iCloud.”

 


Regin spy malware was used in Belgacom, EU government hacks

 

Zeljka Zorz

http://www.net-security.org/malware_news.php?id=2923

Excerpt:

“Which nation state is behind the sophisticated Regin espionage malware? According to The Intercept, it's likely wielded by the UK spy agency GCHQ and/or the US NSA.”

 


The Largest Cyber Attack In History Has Been Hitting Hong Kong Sites

 

Parmy Olson

http://www.forbes.com/sites/parmyolson/2014/11/20/the-largest-cyber-attack-in-history-has-been-hitting-hong-kong-sites/

Excerpt:

“The intense skirmishes inside Hong Kong’s Occupy Central protests haven’t just taken place on the streets, but online too. The largest cyber attack in history has been carried out against independent media sites in Hong Kong over the past few months, according to the company protecting them, increasing in their intensity each time pro-democracy activists announced new activities or developments.”

 


FBI offers $1 million reward for anybody who can help catch online car scam fugitive

 

Lisa Vaas

https://nakedsecurity.sophos.com/2014/11/21/fbi-offers-1-million-reward-for-anybody-who-can-help-catch-online-car-scam-fugitive/

Excerpt:

“The alleged kingpin behind a multimillion-dollar online car selling scam, Romanian fugitive Nicolae Popescu, just made it onto the FBI's 10 Most-Wanted Cyber Fugitives list.”

 


The Ten Most Wanted Hackers By The FBI– No. 2

 

David Bisson

http://www.tripwire.com/state-of-security/government/the-ten-most-wanted-hackers-by-the-fbi-2/

Excerpt:

“The second most wanted hacker by the FBI is Evgeniy Mikhailovich Bogachev, the leader of a cybercrime ring responsible for writing and promulgating Gameover Zeus.”

 


Massive cyber-attacks on human rights website

 

Peter Westmore

http://newsweekly.com.au/article.php?id=56764

Excerpt:

“One of the world’s leading human rights groups, Human Rights Without Frontiers (HRWF), has reported that it has been subject to “repeated and sophisticated” cyber-attacks on its web site. The group has traced the attacks back to Russia and China, which have been the subject of repeated criticism over human rights violations.”

 


Carder.su fraudster jailed for 9 years and ordered to pay $50.8m

 

Lee Munson

https://nakedsecurity.sophos.com/2014/11/14/carder-su-fraudster-jailed-for-9-years-and-ordered-to-pay-50-8m/

Excerpt:

“Cameron Harrison, a 28-year-old from the US State of Georgia, has been sentenced to 115 months in jail for buying stolen debit and credit cards from the now defunct Carder.su underground marketplace.”

 


Dark Net hackers steal seized site back from the FBI

 

Patrick Howell O'Neill

http://www.dailydot.com/politics/doxbin-dark-net/

Excerpt:

“Last week, American and European law enforcement triumphantly took control of 27 Dark Net websites in the highly publicized Operation Onymous, a campaign against a wide variety of Tor hidden services and their operators, including so-called Silk Road 2.0 and its alleged boss, 26-year-old Blake Benthall.”

 


The US Postal Service Hit by Cyber Attack, Employee and Customer Data Exposed

 

Ionut Ilascu

http://news.softpedia.com/news/The-US-Postal-Service-Hit-By-Cyber-Attack-Employee-and-Customer-Data-Exposed-464627.shtml

Excerpt:

“Unknown attackers have breached the computer systems of the US Postal Service (USPS) and accessed without authorization sensitive details about employees and customers.”

 


Users of Remote Access Trojans arrested in Europe

 

http://www.net-security.org/secworld.php?id=17674

Excerpt:

“Europol and several law enforcement and judicial authorities carried out an action against EU citizens, mainly teenagers and young adults, who are suspected of using remote access trojans (RATs) to commit cybercrime. The action and house searches resulted in the arrest of 15 individuals in several European countries."

 


6 tips for protecting your Internet-connected devices

 

http://www.net-security.org/secworld.php?id=17670

Excerpt:

“While Internet-connected devices are our window on the world, we don’t realize that for cybercriminals it could be their window into ours if we don’t secure our devices. It only takes a minute to change a password, and the longer it is left unchanged, the greater the chance that a device will be compromised.”

 


Malware Domain Generating Algorithms are becoming more sophisticated

 

Zeljka Zorz

http://www.net-security.org/malware_news.php?id=2918

Excerpt:

“Malware cut off from its C&C servers is effectively useless to its masters, so they are continually trying to find new ways of maintaining that connection at all times.”

 


Top 5 fraud risk areas in the workplace

 

http://www.net-security.org/secworld.php?id=17650

Excerpt:

“Limited knowledge and awareness about what constitutes confidential information is putting UK businesses at risk of falling victim to fraud if these materials are not securely destroyed.”

 


One-in-four have been victims of identity theft

 

http://www.net-security.org/secworld.php?id=17651

Excerpt:

“Identity theft has ranked as the top concern amongst consumers questioned about their digital lifestyles, according to Centrify. The survey of 1,000 UK consumers, reveals that 81% of respondents cited that they were concerned, or very concerned about the prospect of having their identity stolen.”

 


Critical factors in preventing data breaches

 

http://www.net-security.org/secworld.php?id=17653

Excerpt:

“McAfee issued a new report that assesses organizations’ abilities to detect and deflect targeted attacks, reveals the top eight most critical indicators of attack, and examines best practices for proactive incident response.”

 


Brazil builds direct Internet cable to Europe to avoid US spying

 

Joseph Fitsanakis

http://intelnews.org/2014/11/03/01-1587/

Excerpt:

“The government of Brazil is to construct a transatlantic cable across the Atlantic Ocean in order to avoid having its Internet traffic to and from Europe intercepted by American intelligence agencies. According to reports, the fiber-optic cable will stretch for 3,500 miles from the northeastern Brazilian city of Fortaleza to the Portuguese capital Lisbon.”

 


 

2015 Predictions: The Invisible Becomes Visible

Trend Micro

http://blog.trendmicro.com/trendlabs-security-intelligence/2015-predictions-the-invisible-becomes-visible/

Excerpt:

“2014 brought with it many significant additions to the technology landscape. These put new capabilities into the hands of users and companies that allowed them to do things that they would not have thought possible before. However, these same changes also aid threat actors: threats can now come from unexpected vectors, and augment the existing capabilities that attackers already possess.”

 


Default ATM passcodes still exploited by crooks

 

Zeljka Zorz

http://www.net-security.org/secworld.php?id=17641

Excerpt:

“Once again, ATMs have been "hacked" by individuals taking advantage of default, factory-set passcodes. This time the passcode hasn't been guessed, or ended up online for everyone to know because it was printed in the ATM's service manual - the individual who, with the help of an accomplice, managed to cash out $400,000 in 18 months was a former employee of the company that operated the kiosk ATMs they targeted.”

 


Best practices for government agencies to secure IT infrastructure

 

http://www.net-security.org/secworld.php?id=17636

Excerpt:

“Many government agencies, departments, subcontractors, service providers, and organizations that operate IT systems on behalf of the government must ensure protection of their critical infrastructure and ensure data security and continuous systems operation.”

 


73% of organizations say BYOD increases security risks

 

http://www.net-security.org/secworld.php?id=17623

Excerpt:

“Findings from a Kensington survey on the security risks created by BYOD policies in the enterprise show that 73 percent believe that BYOD represents greater security risks for their organization, and yet 59 percent still approve the use of personal devices for business usage.”

 


Darkhotel espionage campaign targets corporate executives traveling abroad

 

http://www.net-security.org/secworld.php?id=17612

Excerpt:

“Kaspersky Lab researched the Darkhotel espionage campaign, which has lurked in the shadows for at least four years while stealing sensitive data from selected corporate executives traveling abroad.”

 


China is building a quantum encryption network between Beijing and Shanghai

 

http://www.net-security.org/secworld.php?id=17613

Excerpt:

 

“The race for setting up a secure long-distance communication network based on quantum encryption is on, and China is currently in the lead, reports Malcolm Moore.”


Mobile security breaches impacted 68% of organizations

http://www.net-security.org/secworld.php?id=17587

Excerpt:

“Mobile security breaches have affected 68 percent of organizations in the last 12 months, according to a new global study from BT. Despite this, organizations are still not taking sufficient security measures to protect themselves against mobile threats, such as lost or stolen devices and malware infections.”

 


New technique makes phishing sites easier to create, more difficult to spot

 

http://www.net-security.org/secworld.php?id=17592

Excerpt:

“Researchers have spotted a new technique used by phishers which could trick even more users into believing they are entering their information in a legitimate web form.”

 


Risky file sharing practices can cause data loss and compliance violations

 

http://www.net-security.org/secworld.php?id=17579

Excerpt:

“Organizational leadership is failing to respond to the escalating risk of ungoverned file sharing practices among their employees, and that employees routinely breach IT policies and place company data in jeopardy, according to the Ponemon Institute.”

 


227,747 new malware samples are created daily

 

http://www.net-security.org/malware_news.php?id=2905

Excerpt:

“The growth of malware appears unstoppable. In total, some 20 million new strains were created worldwide in the third quarter of the year, at a rate of 227,747 new samples every day.”

 


Extracting data from air-gapped computers via mobile phones

 

http://www.net-security.org/secworld.php?id=17583

Excerpt:

“A group of researchers from the Department of Information Systems Engineering at Ben-Gurion University in Israel have demonstrated and detailed a technique that can allow attackers to exfiltrate data from an "air-gapped" computer.”