MasterCard Website Hacked By Indonesian Hackers
Waqas
https://www.hackread.com/indonesian-hackers-hack-mastercard-website/
Excerpt:
“On 25th April, 2015, Indonesian hackers going with the group handle of Gantengers Crew hacked and defaced the Online Resources domain of US based Financial Services Company MasterCard.â€
Â
Fraudsters steal millions from Ryanair account
Â
Zeljka Zorz
http://www.net-security.org/secworld.php?id=18327
Excerpt:
“Fraudsters have apparently managed to syphon some 4.5 million euros (about $5 million) out of a bank account belonging to Ryanair, Europe's biggest low-cost airline.â€
Â
Banking Trojan delivered to companies via macro-based malware
Â
Zeljka Zorz
http://www.net-security.org/malware_news.php?id=3027
Excerpt:
“Cybercriminals continue targeting enterprises with malicious emails whose ultimate goal is to infect company computers with the Dyre/Dyreza banking malware.â€
Â
Police dismantle gang of online fraudsters and romance scammers
Â
http://www.net-security.org/secworld.php?id=18320
Excerpt:
“The Italian Financial Police (Guardia di Finanza), supported by Europol, arrested 10 members of a transnational criminal group. The criminals, mainly Nigerian citizens, were involved in laundering the proceeds of online fraud, amounting to over EUR 2.5 million.â€
Â
Researchers mount cyber attacks against surgery robot
Â
Zeljka Zorz
http://www.net-security.org/secworld.php?id=18321
Excerpt:
“A group of researchers from University of Washington have tested the security of a teleoperated robotic surgery system created by their colleagues, and have found it severely lacking.â€
Â
Consumers urged to be careful when giving out info during transactions
Â
Hemananthani Sivanandam
Excerpt:
“Read the fine print before signing any document and do not needlessly divulge information for commercial transactions.These are the basic rules to avoid being spammed by telemarketers.The advice comes from PersoÂnal Data Protection Malaysia Commissioner Mazmalek Mohamad.â€
Â
High-profile data breaches made most CEOs re-examine security programs
Â
http://www.net-security.org/secworld.php?id=18297
Excerpt:
“There has been increased board- and C-level interest in information security programs in light of recent high-profile data breaches such as those affecting Sony, Anthem and JP Morgan, the results of a Netskope survey have revealed.â€
Â
Wi-Fi SSID names could allow to crash or hack mobile devices
Â
Pierluigi Paganini
http://securityaffairs.co/wordpress/36211/hacking/wi-fi-ssid-dos-flaw.html
Excerpt:
“Security researchers discovered a bug in WiFi SSID management that could be exploited by hackers to crash Android, Windows, Linux systems or hack them.â€
Â
Card skimming gang stole 3M euros using ghost PoS terminals
Â
http://www.net-security.org/secworld.php?id=18289
Excerpt:
“French police supported by Europol's European Cybercrime Centre (EC3) have arrested 18 members of a criminal gang who were illegally using modified, ’ghost’ point-of-sale (POS) terminals.â€
Â
German intelligence agency helped NSA spy on EU companies
Â
Zeljka Zorz
http://www.net-security.org/secworld.php?id=18305
Excerpt:
“Germany's Federal Intelligence Service (BND) has been aiding the US NSA spy on European companies and politicians since 2008, possibly even earlier, Der Spiegel claimsâ€
Â
1-15 April 2015 Cyber Attacks Timeline
Â
Paolo Passeri
http://hackmageddon.com/2015/04/20/1-15-april-2015-cyber-attacks-timeline/
Excerpt:
“Spring is sprung, but unfortunately the nice season is not enough to keep the crooks’ hands off their keyboard, as the growing trend continues, and this first half of April has shown a sustained number of attacks.â€
Â
Hacktivists are targeting law enforcement personnel, warns FBI
Â
Zeljka Zorz
http://www.net-security.org/secworld.php?id=18279
Excerpt:
“The FBI has issued an alert for law enforcement personnel and public officials, warning them that they may be targeted by hacktivists.â€
Â
SwaggSec Hacker Sentenced to Prison for Attacks
Â
Anthony M. Freed
http://blog.norsecorp.com/2015/04/20/swaggsec-hacker-sentenced-to-prison-for-attacks/
Excerpt:
“Mario Patrick Chuisano, a member of the SwaggSec hacking group, was sentenced to three years in federal prison and ordered to pay $2,662,438.80 in restitution for participating in a series of attacks that that targeted at DirecTV, Farmers Insurance and the Los Angeles Department of Public Works.â€
Â
Israeli military networks breached by hackers: researchers
Â
Joseph Menn
http://www.reuters.com/article/2015/04/18/us-cyberattack-israel-idUSKBN0N81KY20150418?
Excerpt:
“Hackers have managed to penetrate computer networks associated with the Israeli military in an espionage campaign that skillfully packages existing attack software with trick emails, according to security researchers at Blue Coat Systems Inc.â€
Â
University group reveals geo-inference attack threat that uses browser cache to reveal user location
Â
Bob Yirka
http://phys.org/news/2015-04-university-group-reveals-geo-inference-threat.html
Excerpt:
“A team of researchers at the National University of Singapore has published a paper on their university web site outlining what they describe as geo-inference attacks—where hackers can set up a website and then use cache information in a user's browser to reveal their geographical location.â€
Â
Teenagers Suspected of Hacking Belgian and French Websites
Â
AFP
http://www.securityweek.com/teenagers-suspected-hacking-belgian-and-french-websites
Excerpt:
“Two teenagers are suspected of having hacked the websites of Belgian and French newspapers earlier in the week, prosecutors said Friday.â€
Â
Target to pay banks $19m for hack losses
Â
Karl Flinders
http://www.computerweekly.com/news/4500244509/Target-to-pay-banks-19m-for-hack-losses
Excerpt:
“US retailer Target has agreed to pay banks issuing MasterCard up to $19m to help them recover losses suffered in a 2013 data breach when up to 40 million accounts were breached.â€
Â
WikiLeaks releases hacked Sony documents, revealing poor password practices
Â
Graham Cluley
https://grahamcluley.com/2015/04/wikileaks-sony-pictures-passwords/
Excerpt:
“As if it wasn't bad enough that Sony Pictures found itself comprehensively hacked late last year and its emails and confidential data trawled through, WikiLeaks has now made things even more uncomfortable for the firm by creating a searchable online archive of the 30,287 documents and 173,132 emails.â€
Â
Wi-Fi on planes opens door to in-flight hacking, warns US watchdog
Â
Alex Hern
http://www.theguardian.com/technology/2015/apr/15/wi-fi-on-planes-in-flight-hacking-us-government
Excerpt:
“Hackers on commercial flights could now bring down the plane they are on by using the on board Wi-Fi, a US government watchdog has warned.â€
Â
HSBC Finance Corporation confirms data breach
Â
Zeljka Zorz
http://www.net-security.org/secworld.php?id=18228
Excerpt:
“A breach notification letter sent to the New Hampshire Attorney General’s Office by the HSBC Finance Corporation has revealed that sensitive mortgage information of customers of a number of its subsidiaries has been potentially compromised.â€
Â
Attorney claims cops planted spying malware on drive containing evidence
Â
Zeljka Zorz
http://www.net-security.org/malware_news.php?id=3018
Excerpt:
“Police force using malware in investigation is not an unheard-of situation but, according to an affidavit filed in a whistle-blower case against the Fort Smith Police Department (Arkansas), the department tried to use backdoors and keyloggers to spy on a lawyer that represents three police officers that work or worked for the department.â€
Â
Attackers use deceptive tactics to dominate corporate networks
Â
http://www.net-security.org/secworld.php?id=18208
Excerpt:
“Cyber attackers are infiltrating networks and evading detection by hijacking the infrastructure of major corporations and using it against them, according to Symantec.â€
Â
18-year-old bug can be exploited to steal credentials of Windows users
Â
Zeljka Zorz
http://www.net-security.org/secworld.php?id=18210
Excerpt:
“A new technique for exploiting an 18-year-old bug in Windows Server Message Block (SMB), which would allow attackers to intercept user credentials, had been uncovered by Cylance researcher Brian Wallace.â€
Â
Google Malaysia hacked by Bangladeshi hackers
Â
Vijay
http://www.techworm.net/2015/04/google-malaysia-hacked-by-bangladeshi-hackers.html
Excerpt:
“In what seems to be case of DNS hijacking, hackers hijacked the Google Malaysia page and redirected the visitors of Google Malaysia’s website to black page proclaiming that it has been “hacked!.â€
Â
Political SCADA attacks on the rise - or are they?
Â
Doug Drinkwater
http://www.scmagazineuk.com/political-scada-attacks-on-the-rise--or-are-they/article/408671/
Excerpt:
“Released earlier today, the report takes in network and telemetry data from Dell SonicWall customers across 200 countries, and its headline findings include that cyber-criminals are increasingly reliant on SSL/TLS encryption, are working on new and emerging Point-of-Sale (POS) malware and have also taken to attacking supervisory control and data acquisition (SCADA) systems.â€
Man gets 150 months in prison for selling stolen and counterfeit credit cards
http://www.net-security.org/secworld.php?id=18195
Excerpt:
“A member of the identity theft and credit card fraud ring known as Carder.su was sentenced to 150 months in federal prison for selling stolen and counterfeit credit cards over the Internet. He was further ordered to pay $50.8 million in restitution.â€
Hackers took over social media accounts of Iranian state Al Alam TV
Pierluigi Paganini
http://securityaffairs.co/wordpress/35920/hacking/iranian-state-al-alam-hacked.html
Excerpt:
“Unknown hackers took over social media accounts of Iranian state Al Alam TV spreading fake news of the death of an Iran-allied rebel leader in Yemen.â€
SIMDA: A Botnet Takedown
Trend Micro
http://blog.trendmicro.com/trendlabs-security-intelligence/simda-a-botnet-takedown/
Excerpt:
“The collaboration between Trend Micro, INTERPOL, Microsoft, Kaspersky Lab, and the Cyber Defense Institute resulted in a triumph for the security industry earlier this week: the takedown of the SIMDA botnet. Trend Micro provided information such as the IP addresses of the affiliated servers and statistical information about the malware used, which led to the disruption of the botnet activities.â€
Insecure Passwords or Insecure People?
Richard Walters
http://www.infosecurity-magazine.com/opinions/insecure-passwords-insecure-people/
Excerpt:
“For all the talk about multi-factor authentication and the mainstream adoption of biometrics, passwords are not going away. Whilst there are more secure alternatives, and other authentication methods that can be used alongside the humble password, like it or not, the password is going to be around for a long time.â€
16-31 March 2015 Cyber Attacks Timeline
Paolo Passeri
http://hackmageddon.com/2015/04/07/16-31-march-2015-cyber-attacks-timeline/
Excerpt:
“Two weeks packed with events, started in the worst possible way, with the massive cyber attack against Premera Blue Cross (11 million customers affected), and continued with the same baffling trend, since the list of organizations targeted by massive breaches, includes other primary companies such as British Airways, Slack and Twitch (an Amazon-owned game video streaming service)â€
Critical infrastructure commonly hit by destructive cyber attacks, survey reveals
Warwick Ashford
Excerpt:
“Critical infrastructure organisations are commonly targeted by cyber attacks that are aimed at manipulating equipment or destroying rather than stealing data, a survey has revealed.â€
How to protect from threats against USB enabled devices
Sergio Galindo
http://www.net-security.org/article.php?id=2255
Excerpt:
“Reports have been circulating that e-cigarette chargers from China were corrupted and infected machines with malware. Many journalists took the story at face value, even though the only source was a single post on the subreddit r/talesfromtechsupport. As the story goes, an executive’s system was infected by malware. IT ‘scoured’ the system for answers and finally found out the only possible source was the executive’s e-cig charger. The device was made in China and the assumption was the malware was loaded intentionally onto the charger’s firmware.â€
Cyber crooks go after enterprise millions with Dyre malware, social engineering
Zeljka Zorz
http://www.net-security.org/malware_news.php?id=3007
Excerpt:
“An experienced and resource-backed cybercrime gang" is using the relatively new Dyre/Dyreza banking Trojan coupled with effective social engineering to steal millions from businesses, IBM Security Intelligence researchers John Kuhn and Lance Mueller warned.â€
Indonesian Hackers Deface Subdomain of United Nations Website
Waqas
https://www.hackread.com/indonesian-hackers-deface-subdomain-of-united-nations-website/
Excerpt:
“A group of hackers going with the handle of Indonesian Cyber Freedom has hacked and defaced a sub-domain of the United Nations website, just few hours ago.â€
Data Breach – Hackers violated a server at Linux Australia
Pierluigi Paganini
http://securityaffairs.co/wordpress/35739/cyber-crime/data-breach-linux-australia.html
Excerpt:
“The organization Linux Australia revealed that one of its servers was hacked. The personal data of conference attendees might have been exposed.â€
Hacking ATMs, Literally
Brian Krebs
https://krebsonsecurity.com/2015/04/hacking-atms-literally/
Excerpt:
“Most of the ATM skimming attacks written about on this blog conclude with security personnel intervening before the thieves manage to recover their skimmers along with the stolen card data and PINs. However, an increasingly common form of ATM fraud — physical destruction — costs banks plenty, even when crooks walk away with nothing but bruised egos and sore limbs.â€
Digital privacy and Internet security to intersect at Digital Rights Europe
http://www.net-security.org/secworld.php?id=18167
Excerpt:
“Digital Rights Ireland, Ireland's leading digital rights advocacy group, has gathered an expert group of Irish and international speakers for the inaugural Digital Rights Europe conference this April 15th in Dublin.â€
Fourth Hacker Stealing Sensitive Data from Game Companies Pleads Guilty
Ionut Ilascu
Excerpt:
“A 19-year-old admitted in court that between 2012 and 2014 he was part of an international hacking ring that hacked into the computer networks of different video game companies and stole intellectual property estimated to be worth at least $100 / €92 million.â€
Boards must up their game before the hackers claim checkmate
Ian Pratt
http://www.net-security.org/article.php?id=2254
Excerpt:
“In today’s climate, the cyber security paradigm is a reactive cycle. When a threat is uncovered, it is examined and a counter-measure is created, with response times varying from weeks to years.â€
Crypto ransomware sightings and trends for Q1 2015
Anthony Joe Melgarejo
http://www.net-security.org/malware_news.php?id=3006
Excerpt:
“It seems that cybercriminals have yet to tire of creating crypto-ransomware malware.â€
US to enact sanctions against foreign cyber attackers
Zeljka Zorz
http://www.net-security.org/secworld.php?id=18163
Excerpt:
“US president Barack Obama has signed on Wednesday a new executive order aimed at imposing "sanctions on individuals or entities that engage in malicious cyber-enabled activities that create a significant threat to the national security, foreign policy, or economic health or financial stability of the United States."
French, Italian users targeted with judicial-themed spam leading to malware
Zeljka Zorz
http://www.net-security.org/malware_news.php?id=3003
Excerpt:
“Trend Micro researchers are warning about a clever and very well executed email spam campaign that has been targeting and continues to target French users with the goal of infecting their machine with backdoor malware, banking malware, and ransomware.â€
Cyber threat intelligence: Perception and use
http://www.net-security.org/secworld.php?id=18157
Excerpt:
“Most companies believe threat intelligence is essential for a well-rounded cybersecurity defense and has proven effective in stopping security incidents, according to a survey by Webroot and the Ponemon Institute. However, improvements are necessary to make threat intelligence more timely, accurate and actionable in order to strengthen an organization’s security posture.â€
Consumers would sell personal information for a price
http://www.net-security.org/secworld.php?id=18158
Excerpt:
“Consumers crave privacy, but do not typically alter actions to protect themselves, according to a global study conducted by the Ponemon Institute.â€