MasterCard Website Hacked By Indonesian Hackers

Waqas

https://www.hackread.com/indonesian-hackers-hack-mastercard-website/

Excerpt:

“On 25th April, 2015, Indonesian hackers going with the group handle of Gantengers Crew hacked and defaced the Online Resources domain of US based Financial Services Company MasterCard.”

 


Fraudsters steal millions from Ryanair account

 

Zeljka Zorz

http://www.net-security.org/secworld.php?id=18327

Excerpt:

“Fraudsters have apparently managed to syphon some 4.5 million euros (about $5 million) out of a bank account belonging to Ryanair, Europe's biggest low-cost airline.”

 


Banking Trojan delivered to companies via macro-based malware

 

Zeljka Zorz

http://www.net-security.org/malware_news.php?id=3027

Excerpt:

“Cybercriminals continue targeting enterprises with malicious emails whose ultimate goal is to infect company computers with the Dyre/Dyreza banking malware.”

 


Police dismantle gang of online fraudsters and romance scammers

 

http://www.net-security.org/secworld.php?id=18320

Excerpt:

“The Italian Financial Police (Guardia di Finanza), supported by Europol, arrested 10 members of a transnational criminal group. The criminals, mainly Nigerian citizens, were involved in laundering the proceeds of online fraud, amounting to over EUR 2.5 million.”

 


Researchers mount cyber attacks against surgery robot

 

Zeljka Zorz

http://www.net-security.org/secworld.php?id=18321

Excerpt:

“A group of researchers from University of Washington have tested the security of a teleoperated robotic surgery system created by their colleagues, and have found it severely lacking.”

 


Consumers urged to be careful when giving out info during transactions

 

Hemananthani Sivanandam

http://www.thestar.com.my/News/Nation/2015/04/13/Avoid-spam-read-fine-print-Consumers-urged-to-be-careful-when-giving-out-info-during-transactions/

Excerpt:

“Read the fine print before signing any document and do not needlessly divulge information for commercial transactions.These are the basic rules to avoid being spammed by telemarketers.The advice comes from Perso­nal Data Protection Malaysia Commissioner Mazmalek Mohamad.”

 


High-profile data breaches made most CEOs re-examine security programs

 

http://www.net-security.org/secworld.php?id=18297

Excerpt:

“There has been increased board- and C-level interest in information security programs in light of recent high-profile data breaches such as those affecting Sony, Anthem and JP Morgan, the results of a Netskope survey have revealed.”

 


Wi-Fi SSID names could allow to crash or hack mobile devices

 

Pierluigi Paganini

http://securityaffairs.co/wordpress/36211/hacking/wi-fi-ssid-dos-flaw.html

Excerpt:

“Security researchers discovered a bug in WiFi SSID management that could be exploited by hackers to crash Android, Windows, Linux systems or hack them.”

 


Card skimming gang stole 3M euros using ghost PoS terminals

 

http://www.net-security.org/secworld.php?id=18289

Excerpt:

“French police supported by Europol's European Cybercrime Centre (EC3) have arrested 18 members of a criminal gang who were illegally using modified, ’ghost’ point-of-sale (POS) terminals.”

 


German intelligence agency helped NSA spy on EU companies

 

Zeljka Zorz

http://www.net-security.org/secworld.php?id=18305

Excerpt:

“Germany's Federal Intelligence Service (BND) has been aiding the US NSA spy on European companies and politicians since 2008, possibly even earlier, Der Spiegel claims”

 


1-15 April 2015 Cyber Attacks Timeline

 

Paolo Passeri

http://hackmageddon.com/2015/04/20/1-15-april-2015-cyber-attacks-timeline/

Excerpt:

“Spring is sprung, but unfortunately the nice season is not enough to keep the crooks’ hands off their keyboard, as the growing trend continues, and this first half of April has shown a sustained number of attacks.”

 


Hacktivists are targeting law enforcement personnel, warns FBI

 

Zeljka Zorz

http://www.net-security.org/secworld.php?id=18279

Excerpt:

“The FBI has issued an alert for law enforcement personnel and public officials, warning them that they may be targeted by hacktivists.”

 


SwaggSec Hacker Sentenced to Prison for Attacks

 

Anthony M. Freed

http://blog.norsecorp.com/2015/04/20/swaggsec-hacker-sentenced-to-prison-for-attacks/

Excerpt:

“Mario Patrick Chuisano, a member of the SwaggSec hacking group, was sentenced to three years in federal prison and ordered to pay $2,662,438.80 in restitution for participating in a series of attacks that that targeted at DirecTV, Farmers Insurance and the Los Angeles Department of Public Works.”

 


Israeli military networks breached by hackers: researchers

 

Joseph Menn

http://www.reuters.com/article/2015/04/18/us-cyberattack-israel-idUSKBN0N81KY20150418?

Excerpt:

“Hackers have managed to penetrate computer networks associated with the Israeli military in an espionage campaign that skillfully packages existing attack software with trick emails, according to security researchers at Blue Coat Systems Inc.”

 


University group reveals geo-inference attack threat that uses browser cache to reveal user location

 

Bob Yirka

http://phys.org/news/2015-04-university-group-reveals-geo-inference-threat.html

Excerpt:

“A team of researchers at the National University of Singapore has published a paper on their university web site outlining what they describe as geo-inference attacks—where hackers can set up a website and then use cache information in a user's browser to reveal their geographical location.”

 


Teenagers Suspected of Hacking Belgian and French Websites

 

AFP

http://www.securityweek.com/teenagers-suspected-hacking-belgian-and-french-websites

Excerpt:

“Two teenagers are suspected of having hacked the websites of Belgian and French newspapers earlier in the week, prosecutors said Friday.”

 


Target to pay banks $19m for hack losses

 

Karl Flinders

http://www.computerweekly.com/news/4500244509/Target-to-pay-banks-19m-for-hack-losses

Excerpt:

“US retailer Target has agreed to pay banks issuing MasterCard up to $19m to help them recover losses suffered in a 2013 data breach when up to 40 million accounts were breached.”

 


WikiLeaks releases hacked Sony documents, revealing poor password practices

 

Graham Cluley

https://grahamcluley.com/2015/04/wikileaks-sony-pictures-passwords/

Excerpt:

“As if it wasn't bad enough that Sony Pictures found itself comprehensively hacked late last year and its emails and confidential data trawled through, WikiLeaks has now made things even more uncomfortable for the firm by creating a searchable online archive of the 30,287 documents and 173,132 emails.”

 


Wi-Fi on planes opens door to in-flight hacking, warns US watchdog

 

Alex Hern

http://www.theguardian.com/technology/2015/apr/15/wi-fi-on-planes-in-flight-hacking-us-government

Excerpt:

“Hackers on commercial flights could now bring down the plane they are on by using the on board Wi-Fi, a US government watchdog has warned.”

 


HSBC Finance Corporation confirms data breach

 

Zeljka Zorz

http://www.net-security.org/secworld.php?id=18228

Excerpt:

“A breach notification letter sent to the New Hampshire Attorney General’s Office by the HSBC Finance Corporation has revealed that sensitive mortgage information of customers of a number of its subsidiaries has been potentially compromised.”

 


Attorney claims cops planted spying malware on drive containing evidence

 

Zeljka Zorz

http://www.net-security.org/malware_news.php?id=3018

Excerpt:

“Police force using malware in investigation is not an unheard-of situation but, according to an affidavit filed in a whistle-blower case against the Fort Smith Police Department (Arkansas), the department tried to use backdoors and keyloggers to spy on a lawyer that represents three police officers that work or worked for the department.”

 


Attackers use deceptive tactics to dominate corporate networks

 

http://www.net-security.org/secworld.php?id=18208

Excerpt:

“Cyber attackers are infiltrating networks and evading detection by hijacking the infrastructure of major corporations and using it against them, according to Symantec.”

 


18-year-old bug can be exploited to steal credentials of Windows users

 

Zeljka Zorz

http://www.net-security.org/secworld.php?id=18210

Excerpt:

“A new technique for exploiting an 18-year-old bug in Windows Server Message Block (SMB), which would allow attackers to intercept user credentials, had been uncovered by Cylance researcher Brian Wallace.”

 


Google Malaysia hacked by Bangladeshi hackers

 

Vijay

http://www.techworm.net/2015/04/google-malaysia-hacked-by-bangladeshi-hackers.html

Excerpt:

“In what seems to be case of DNS hijacking, hackers hijacked the Google Malaysia page and redirected the visitors of Google Malaysia’s website to black page proclaiming that it has been “hacked!.”

 


Political SCADA attacks on the rise - or are they?

 

Doug Drinkwater

http://www.scmagazineuk.com/political-scada-attacks-on-the-rise--or-are-they/article/408671/

Excerpt:

“Released earlier today, the report takes in network and telemetry data from Dell SonicWall customers across 200 countries, and its headline findings include that cyber-criminals are increasingly reliant on SSL/TLS encryption, are working on new and emerging Point-of-Sale (POS) malware and have also taken to attacking supervisory control and data acquisition (SCADA) systems.”


Man gets 150 months in prison for selling stolen and counterfeit credit cards

http://www.net-security.org/secworld.php?id=18195

Excerpt:

“A member of the identity theft and credit card fraud ring known as Carder.su was sentenced to 150 months in federal prison for selling stolen and counterfeit credit cards over the Internet. He was further ordered to pay $50.8 million in restitution.”


Hackers took over social media accounts of Iranian state Al Alam TV

Pierluigi Paganini

http://securityaffairs.co/wordpress/35920/hacking/iranian-state-al-alam-hacked.html

Excerpt:

“Unknown hackers took over social media accounts of Iranian state Al Alam TV spreading fake news of the death of an Iran-allied rebel leader in Yemen.”


SIMDA: A Botnet Takedown

Trend Micro

http://blog.trendmicro.com/trendlabs-security-intelligence/simda-a-botnet-takedown/

Excerpt:

“The collaboration between Trend Micro, INTERPOL, Microsoft, Kaspersky Lab, and the Cyber Defense Institute resulted in a triumph for the security industry earlier this week: the takedown of the SIMDA botnet. Trend Micro provided information such as the IP addresses of the affiliated servers and statistical information about the malware used, which led to the disruption of the botnet activities.”


Insecure Passwords or Insecure People?

Richard Walters

http://www.infosecurity-magazine.com/opinions/insecure-passwords-insecure-people/

Excerpt:

“For all the talk about multi-factor authentication and the mainstream adoption of biometrics, passwords are not going away. Whilst there are more secure alternatives, and other authentication methods that can be used alongside the humble password, like it or not, the password is going to be around for a long time.”


16-31 March 2015 Cyber Attacks Timeline

Paolo Passeri

http://hackmageddon.com/2015/04/07/16-31-march-2015-cyber-attacks-timeline/

Excerpt:

“Two weeks packed with events, started in the worst possible way, with the massive cyber attack against Premera Blue Cross (11 million customers affected), and continued with the same baffling trend, since the list of organizations targeted by massive breaches, includes other primary companies such as British Airways, Slack and Twitch (an Amazon-owned game video streaming service)”


Critical infrastructure commonly hit by destructive cyber attacks, survey reveals

Warwick Ashford

http://www.computerweekly.com/news/4500243886/Critical-infrastructure-commonly-hit-by-destructive-cyber-attacks-survey-reveals

Excerpt:

“Critical infrastructure organisations are commonly targeted by cyber attacks that are aimed at manipulating equipment or destroying rather than stealing data, a survey has revealed.”


How to protect from threats against USB enabled devices

Sergio Galindo

http://www.net-security.org/article.php?id=2255

Excerpt:

“Reports have been circulating that e-cigarette chargers from China were corrupted and infected machines with malware. Many journalists took the story at face value, even though the only source was a single post on the subreddit r/talesfromtechsupport. As the story goes, an executive’s system was infected by malware. IT ‘scoured’ the system for answers and finally found out the only possible source was the executive’s e-cig charger. The device was made in China and the assumption was the malware was loaded intentionally onto the charger’s firmware.”


Cyber crooks go after enterprise millions with Dyre malware, social engineering

Zeljka Zorz

http://www.net-security.org/malware_news.php?id=3007

Excerpt:

“An experienced and resource-backed cybercrime gang" is using the relatively new Dyre/Dyreza banking Trojan coupled with effective social engineering to steal millions from businesses, IBM Security Intelligence researchers John Kuhn and Lance Mueller warned.”


Indonesian Hackers Deface Subdomain of United Nations Website

Waqas

https://www.hackread.com/indonesian-hackers-deface-subdomain-of-united-nations-website/

Excerpt:

“A group of hackers going with the handle of Indonesian Cyber Freedom has hacked and defaced a sub-domain of the United Nations website, just few hours ago.”


Data Breach – Hackers violated a server at Linux Australia

Pierluigi Paganini

http://securityaffairs.co/wordpress/35739/cyber-crime/data-breach-linux-australia.html

Excerpt:

“The organization Linux Australia revealed that one of its servers was hacked. The personal data of conference attendees might have been exposed.”


Hacking ATMs, Literally

Brian Krebs

https://krebsonsecurity.com/2015/04/hacking-atms-literally/

Excerpt:

“Most of the ATM skimming attacks written about on this blog conclude with security personnel intervening before the thieves manage to recover their skimmers along with the stolen card data and PINs. However, an increasingly common form of ATM fraud — physical destruction — costs banks plenty, even when crooks walk away with nothing but bruised egos and sore limbs.”


Digital privacy and Internet security to intersect at Digital Rights Europe

http://www.net-security.org/secworld.php?id=18167

Excerpt:

“Digital Rights Ireland, Ireland's leading digital rights advocacy group, has gathered an expert group of Irish and international speakers for the inaugural Digital Rights Europe conference this April 15th in Dublin.”


Fourth Hacker Stealing Sensitive Data from Game Companies Pleads Guilty

Ionut Ilascu

http://news.softpedia.com/news/Fourth-Hacker-Stealing-Sensitive-Data-from-Game-Companies-Pleads-Guilty-477527.shtml

Excerpt:

“A 19-year-old admitted in court that between 2012 and 2014 he was part of an international hacking ring that hacked into the computer networks of different video game companies and stole intellectual property estimated to be worth at least $100 / €92 million.”


Boards must up their game before the hackers claim checkmate

Ian Pratt

http://www.net-security.org/article.php?id=2254

Excerpt:

“In today’s climate, the cyber security paradigm is a reactive cycle. When a threat is uncovered, it is examined and a counter-measure is created, with response times varying from weeks to years.”


Crypto ransomware sightings and trends for Q1 2015

Anthony Joe Melgarejo

http://www.net-security.org/malware_news.php?id=3006

Excerpt:

“It seems that cybercriminals have yet to tire of creating crypto-ransomware malware.”


US to enact sanctions against foreign cyber attackers

Zeljka Zorz

http://www.net-security.org/secworld.php?id=18163

Excerpt:

“US president Barack Obama has signed on Wednesday a new executive order aimed at imposing "sanctions on individuals or entities that engage in malicious cyber-enabled activities that create a significant threat to the national security, foreign policy, or economic health or financial stability of the United States."


French, Italian users targeted with judicial-themed spam leading to malware

Zeljka Zorz

http://www.net-security.org/malware_news.php?id=3003

Excerpt:

“Trend Micro researchers are warning about a clever and very well executed email spam campaign that has been targeting and continues to target French users with the goal of infecting their machine with backdoor malware, banking malware, and ransomware.”


Cyber threat intelligence: Perception and use

http://www.net-security.org/secworld.php?id=18157

Excerpt:

“Most companies believe threat intelligence is essential for a well-rounded cybersecurity defense and has proven effective in stopping security incidents, according to a survey by Webroot and the Ponemon Institute. However, improvements are necessary to make threat intelligence more timely, accurate and actionable in order to strengthen an organization’s security posture.”


Consumers would sell personal information for a price

http://www.net-security.org/secworld.php?id=18158

Excerpt:

“Consumers crave privacy, but do not typically alter actions to protect themselves, according to a global study conducted by the Ponemon Institute.”