<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by LedgerOps on Medium]]></title>
        <description><![CDATA[Stories by LedgerOps on Medium]]></description>
        <link>https://medium.com/@LedgerOps?source=rss-285bf348997b------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/1*Q4WVp_wU3N8jpTcUsqjdBg.png</url>
            <title>Stories by LedgerOps on Medium</title>
            <link>https://medium.com/@LedgerOps?source=rss-285bf348997b------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Sat, 16 May 2026 16:32:48 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@LedgerOps/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Last Week In CyberSecurity News — January 22, 2020 — LedgerOps]]></title>
            <link>https://medium.com/@LedgerOps/last-week-in-cybersecurity-news-january-22-2020-ledgerops-a70f25e411f?source=rss-285bf348997b------2</link>
            <guid isPermaLink="false">https://medium.com/p/a70f25e411f</guid>
            <category><![CDATA[microsoft]]></category>
            <category><![CDATA[cybersecurity-news]]></category>
            <category><![CDATA[nsa]]></category>
            <category><![CDATA[citrix]]></category>
            <category><![CDATA[hacking]]></category>
            <dc:creator><![CDATA[LedgerOps]]></dc:creator>
            <pubDate>Wed, 22 Jan 2020 00:00:00 GMT</pubDate>
            <atom:updated>2020-01-22T17:30:41.862Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*2lkkH5_hkf3oZOvHOtby8Q.jpeg" /></figure><h3>Last Week In CyberSecurity News — January 22, 2020 — LedgerOps</h3><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FQfCiMV8GkAQ%3Ffeature%3Doembed&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DQfCiMV8GkAQ&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FQfCiMV8GkAQ%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/33bc0ba5d9dc8fe9404a4c2583bdfae4/href">https://medium.com/media/33bc0ba5d9dc8fe9404a4c2583bdfae4/href</a></iframe><h3>Proof-of-Concept Exploits Published for Microsoft-NSA Crypto Bug</h3><p>Security researchers have released proof-of-concept (PoC) code for a recently disclosed vulnerability in the Windows operating system. The vulnerability, CVE-2020–0601, was initially reported to Microsoft by the U.S National Security Agency (NSA) and affects Windows CryptoAPI, a significant component that handles cryptographic operations.</p><p>According to cybersecurity researcher Tal Be’ery, “the root cause of this vulnerability is a flawed implementation of the Elliptic Curve Cryptography (ECC) within Microsoft’s code.”</p><p>According to the disclosures by the NSA, the DHS, and Microsoft, <a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0601">CVE-2020–0601</a> (also known as CurveBall) can be exploited to:</p><ul><li>launch MitM (man-in-the-middle) attacks as well as intercept and fake HTTPS connections</li><li>fake signatures for files and emails</li><li>fake signed-executable code launched inside Windows</li></ul><p>Government agencies have been ordered to patch the vulnerability within ten days of its announcement. As PoC exploit code has been published online, it’s as important as ever to apply the proper patch updates.</p><p>Kudelski Security <a href="https://github.com/kudelskisecurity/chainoffools">published</a> the first CurveBall exploit, and shortly after, Danish security researcher group Ollypwn published their <a href="https://github.com/ollypwn/cve-2020-0601">code</a>, as well. Thankfully, Windows Defender has received updates to detect active exploitation and warn users of a potential threat to their systems.</p><h3>ollypwn on Twitter</h3><p>Windows Defender caught some attempts while testing. PoC should be ready soon #x509 #crypt32</p><h3>Amitai Rottem on Twitter</h3><p>Windows Defender Antivirus detects files w/crafted certificates exploiting the certificate validation vulnerability: ​Exploit:Win32/CVE-2020-0601.A (PE files) Exploit:Win32/CVE-2020-0601.B (Scripts) Also, #Microsoft Defender ATP has a threat report on your posture. #CVE-2020-0601</p><p>Read more <a href="https://www.zdnet.com/article/proof-of-concept-exploits-published-for-the-microsoft-nsa-crypto-bug/">here</a></p><h3>Law Enforcement Seizes WeLeakInfo.com for Selling Access to Data From Data Breaches</h3><p>The FBI has seized WeLeakInfo.com, a subscription-based search engine that allows users to explore personal information from over 10,000 data breaches. According to the U.S. Department of Justice <a href="https://www.justice.gov/usao-dc/pr/weleakinfocom-domain-name-seized">announcement</a>, the website illegally obtained and sold data breach information, amounting to over 12 billion records.</p><p>The two individuals allegedly involved in the WeLeakInfo operation were arrested in the Netherlands and Ireland. They are believed to have made over £200,000 of which the U.S. Department of Justice, along with other organizations, could trace back to the individual IP addresses of the arrestees.</p><p>The U.K. National Crime Agency has been able to establish “links between the purchase of cybercrime tools, such as remote access Trojans (RATs) and cryptors, and weleakinfo.com.” As seen below, to access the 12.5 billion records stolen from data breaches, users could subscribe to various plans for as little as $2.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*0jwhPdf_L-jm8cU8qbtDzA.png" /></figure><p>Read more <a href="https://www.bleepingcomputer.com/news/security/weleakinfocom-seized-for-selling-info-from-data-breaches-2-arrested/">here</a></p><h3>Citrix Releases Patches for Critical ADC Vulnerability Under Active Attack</h3><p>For almost a month now, Citrix Application Delivery Controllers (ADC) and Citrix Gateways have been <a href="https://support.citrix.com/article/CTX267027">vulnerable</a> to a critical path traversal flaw (CVE-2019–1978). The flaw allows an unauthenticated entity to perform arbitrary code execution on vulnerable servers.</p><p>It affects all versions of the software, including:</p><ul><li>Citrix ADC and Citrix Gateway version 13.0 all supported builds</li><li>Citrix ADC and NetScaler Gateway version 12.1 all supported builds</li><li>Citrix ADC and NetScaler Gateway version 12.0 all supported builds</li><li>Citrix ADC and NetScaler Gateway version 11.1 all supported builds</li><li>Citrix NetScaler ADC and NetScaler Gateway version 10.5 all supported builds</li></ul><p>Citrix’s announcement of the flaw did not initially provide any software patches; however, they did offer mitigation steps.</p><p>Thankfully, Citrix has now begun to release its <a href="https://www.citrix.com/blogs/2020/01/19/vulnerability-update-first-permanent-fixes-available-timeline-accelerated/">first batch of updates</a>, which provides permanent patches for ADC versions “11.1 and 12.0 that also apply to ADC and Gateway VPX hosted on ESX, Hyper-V, KVM, XenServer, Azure, AWS, GCP or on a Citrix ADC Service Delivery Appliance (SDX).”</p><p>Get more information <a href="https://thehackernews.com/2020/01/citrix-adc-patch-update.html">here</a></p><h3>Critical WordPress Bug Leaves 320,000 Sites Open to Attack</h3><p>According to researchers from WebArx, two WordPress plugins, InfiniteWP Client and WP Time Capsule, suffer from a new vulnerability. Both plugins contain a flaw that allows an attacker to access a site’s backend with no password. According to a WebArc blog post, an attacker only needs the admin username to access the site’s backend.</p><p>Both plugins were created to allow users to authenticate to numerous WordPress installations from one central server. According to the WordPress plugin library, 300,000 websites are running a vulnerable version of the InfiniteWP Client plugin, and 20,000 are running a vulnerable version of the WP Time Capsule plugin.</p><p>The proof-of-concept attack on InfiniteWP Client “requires a payload encoded with JSON, then Base64. Next, it is sent raw to the targeted site in a POST request,” and the WP Time Capsule Bug “only needs to contain a certain string in the body of the raw POST request.”</p><p>To mitigate the vulnerability, researchers recommend updating both software versions of the plugins.</p><p>Read more <a href="https://threatpost.com/wordpress-bug-leaves-sites-open-to-attack/151911/">here</a></p><h3>Bot List With Telnet Credentials for More Than 500,000 Servers and IoT Devices Leaked Online</h3><p>A cybercriminal has recently dumped an extensive list of Telnet credentials for over 510,000 servers and smart devices. According to SecurityAffairs, this is the largest leak of Telnet passwords ever reported.</p><p>The list was first posted on a popular hacking forum under the operator of a DDoS booter service and includes IP addresses as well as the usernames and passwords of the Telnet service for each device.</p><p>A quick look at the list reveals that many of the device’s login information contains default, or easy-to-guess, credentials.</p><p>The top five credentials in the list were:</p><ul><li>root:[blank] — 782</li><li>admin:admin — 634</li><li>root:root — 320</li><li>admin:default — 21</li><li>Default:[blank] — 18</li></ul><p>Security researcher Victor Gevers analyzed the list and found that more than 8,200 IP addresses were unique, and around 2,174 were accessible via Telnet by using the leaked credentials.</p><p>Read more <a href="https://securityaffairs.co/wordpress/96583/iot/500k-telnet-credentials-leaked.html">here</a></p><p><em>Originally published at </em><a href="https://ledgerops.com/blog/2020/2/22/last-week-in-blockchain-and-cybersecurity-news-january-22nd-2020"><em>https://ledgerops.com</em></a><em> on January 22, 2020.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=a70f25e411f" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Last Week In CyberSecurity News — January 14, 2020 — LedgerOps]]></title>
            <link>https://medium.com/@LedgerOps/last-week-in-cybersecurity-news-january-14-2020-ledgerops-6f972e9641ed?source=rss-285bf348997b------2</link>
            <guid isPermaLink="false">https://medium.com/p/6f972e9641ed</guid>
            <category><![CDATA[security]]></category>
            <category><![CDATA[citrix]]></category>
            <category><![CDATA[checkpeople]]></category>
            <category><![CDATA[ledgerops]]></category>
            <category><![CDATA[data-breach]]></category>
            <dc:creator><![CDATA[LedgerOps]]></dc:creator>
            <pubDate>Tue, 14 Jan 2020 00:00:00 GMT</pubDate>
            <atom:updated>2020-01-14T18:19:41.288Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*AqsUq-rNCTp0CCbiix4JHg.jpeg" /></figure><h3>Last Week In CyberSecurity News — January 14, 2020 — LedgerOps</h3><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FVQgr36K7qqs%3Ffeature%3Doembed&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DVQgr36K7qqs&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FVQgr36K7qqs%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/1a6525786efbbfbad3cea31f59f7959e/href">https://medium.com/media/1a6525786efbbfbad3cea31f59f7959e/href</a></iframe><h3>56.25M US Residents’ CheckPeople Records Exposed on Chinese Server</h3><p>Data from CheckPeople, a subscription-based service that allows users to search for certain information of other individuals, was recently exposed on a server with a Chinese IP address. The leaked data includes names, home addresses, phone numbers, ages, names of relatives, criminal records, and more. The archive was stored on a NoSQL database of metadata linking to CheckPeople.com.</p><p>Further investigation showed that the archive of data belongs to an IP address utilized by Alibaba’s web hosting company in Hangzhou, China. The data itself is not sensitive; however, having all the information in one place provides easy access for scammers, phishers, and other malicious actors to download it in bulk and conduct nefarious actions with it. The mass amount of data can also have negative consequences in combination with more sensitive information.</p><p>Read more <a href="https://securityaffairs.co/wordpress/96238/data-breach/checkpeople-data-leak.html">here</a></p><h3>PoC Exploits Released for Citrix ADC and Gateway RCE Vulnerability — Over 80,000 Vulnerable to Attacks</h3><p>For almost a month, Citrix Application Delivery Controllers (ADC) and Citrix Gateways have been <a href="https://support.citrix.com/article/CTX267027">vulnerable</a> to a critical path traversal flaw (CVE-2019–1978). The flaw allows an unauthenticated entity to perform arbitrary code execution on vulnerable servers.</p><p>It affects all versions of the software, including:</p><ul><li>Citrix ADC and Citrix Gateway version 13.0 all supported builds</li><li>Citrix ADC and NetScaler Gateway version 12.1 all supported builds</li><li>Citrix ADC and NetScaler Gateway version 12.0 all supported builds</li><li>Citrix ADC and NetScaler Gateway version 11.1 all supported builds</li><li>Citrix NetScaler ADC and NetScaler Gateway version 10.5 all supported builds</li></ul><p>Citrix’s announcement of the flaw did not include any security patches; however, they offered <a href="https://support.citrix.com/article/CTX267679">mitigation</a> steps to help system administrators guard their server against attacks.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2F5U5Hk2CzIAk%3Ffeature%3Doembed&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D5U5Hk2CzIAk&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2F5U5Hk2CzIAk%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="640" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/a0273b9d5299f57d04d17c20b9f16d54/href">https://medium.com/media/a0273b9d5299f57d04d17c20b9f16d54/href</a></iframe><p>According to Shodan, and other online-monitoring tools, over 80,000 Citrix ADC or Gateway servers are publicly accessible and exploitable due to the flaw.</p><p>As multiple groups have released proof-of-concept exploit code (<a href="https://github.com/trustedsec/cve-2019-19781">Tool1</a>, <a href="https://github.com/projectzeroindia/CVE-2019-19781">Tool2</a>) for the vulnerability, it’s likely that thousands of attackers will begin to exploit vulnerable servers.</p><p>Read more <a href="https://thehackernews.com/2020/01/citrix-adc-gateway-exploit.html">here</a></p><h3>Hundreds of Millions of Cable Modems Are Vulnerable to New Cable Haunt Vulnerability</h3><p>Cable Haunt, a new security flaw impacting cable modems that use Broadcom chips, is believed to affect over 200 million cable modems throughout Europe. The flaw resides in a standard component in Broadcom chips, named a spectrum analyzer. A spectrum analyzer protects against signal surges and disturbances coming from a coax cable.</p><p>According to a team of Danish security researchers, the Broadcom chip spectrum analyzer lacks security in various areas, including default credentials, a programming error in its firmware, and a lack of protection against DNS rebinding attacks.</p><p>According to the security researchers and ZDNet, an attacker can use Cable Haunt to:</p><ul><li>Change the default DNS server</li><li>Conduct remote man-in-the-middle attacks</li><li>Hot-swap code or even the entire firmware</li><li>Upload, flash, and upgrade firmware silently</li><li>Disable ISP firmware upgrade</li><li>Change every config file and settings</li><li>Get and set SNMP OID values</li><li>Change all associated MAC addresses</li><li>Change serial numbers</li><li>Be exploited in botnet</li></ul><p>A <a href="https://github.com/Lyrebirds/Cable-Haunt-Report/releases/latest/download/report.pdf">white paper</a> and a <a href="https://cablehaunt.com/">dedicated website</a> were published by the security researchers, which contains further information about Cable Haunt.</p><p>The researchers have also provided <a href="https://github.com/Lyrebirds/sagemcom-fast-8690-exploit">proof-of-concept code</a> that ISP users can implement to test their routers Cable Haunt attack vulnerabilities.</p><p>Get more information <a href="https://www.zdnet.com/article/hundreds-of-millions-of-cable-modems-are-vulnerable-to-new-cable-haunt-vulnerability/">here</a></p><h3>New York Man Sentenced in ATM Skimming Conspiracy</h3><p>Bogdan Rusu has been sentenced to five years in prison for orchestrating an elaborate ATM skimming campaign, allowing him to gather $390,141 from numerous victims. According to the <a href="https://www.justice.gov/opa/pr/member-atm-skimming-conspiracy-targeting-multiple-new-jersey-bank-locations-sentenced-60">Department of Justice press release</a>, Bogdan pled guilty to participating in the scheme and stated that he used card-reading devices with pinhole cameras throughout New Jersey, Massachusetts, and New York bank locations.</p><p>Once Rusu stole customer information and other data, he would then transfer the information to counterfeit payment cards which could steal money from the victims.</p><p>The case also introduced a larger ATM skimming scheme that involved over 11 individuals. The crooks were able to collect more than $868,000 from multiple accounts.</p><p>Read more <a href="https://threatpost.com/joker-androids-malware-ramps-volume/151785/">here</a></p><h3>Nemty Ransomware to Start Leaking Non-Paying Victims’ Data</h3><p>To punish victims who refuse to pay their ransom, Nemty ransomware is implementing a tactic started by the Maze and Sodinokibi ransomware gangs.</p><p>Traditionally, ransomware groups encrypt files within an organization and demand a ransom to decrypt the data. Recently though, ransomware groups, including Nemty, have been stealing files before they encrypt them. And if a victim doesn’t pay the ransom, the ransomware releases small pieces of stolen data online until the victim makes payment.</p><p>Nemty plans to develop a blog website that publishes all stolen information from ransomware victims that reject the given ransom.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*aXRtKO2tWMraFqDZjWZsFA.png" /><figcaption>BleepingComputer</figcaption></figure><p>Read more <a href="https://www.bleepingcomputer.com/news/security/nemty-ransomware-to-start-leaking-non-paying-victims-data/">here</a></p><p><em>Originally published at </em><a href="https://ledgerops.com/blog/2020/14/last-week-in-blockchain-and-cybersecurity-news-january-14th-2020"><em>https://ledgerops.com</em></a><em> on January 14, 2020.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=6f972e9641ed" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Last Week In CyberSecurity News — January 7, 2020 — LedgerOps]]></title>
            <link>https://medium.com/@LedgerOps/last-week-in-cybersecurity-news-january-7-2020-ledgerops-59d11fce8123?source=rss-285bf348997b------2</link>
            <guid isPermaLink="false">https://medium.com/p/59d11fce8123</guid>
            <category><![CDATA[security]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[google]]></category>
            <category><![CDATA[ransomware]]></category>
            <category><![CDATA[travelex]]></category>
            <dc:creator><![CDATA[LedgerOps]]></dc:creator>
            <pubDate>Tue, 07 Jan 2020 00:00:00 GMT</pubDate>
            <atom:updated>2020-01-07T18:09:45.199Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*dIn04BYPCKhQF6Gemo5bew.jpeg" /></figure><h3>Last Week In CyberSecurity News — January 7, 2020 — LedgerOps</h3><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FO9l7ROheAtQ%3Ffeature%3Doembed&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DO9l7ROheAtQ&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FO9l7ROheAtQ%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/055c68777bf1f875aa64b4b405615efe/href">https://medium.com/media/055c68777bf1f875aa64b4b405615efe/href</a></iframe><h3>Sodinokibi Ransomware Hits Travelex, Demands $3 Million</h3><p>On December 31, Travelex, an international foreign currency exchange company, fell victim to a cyberattack that temporarily affected several services within the organization. As a precaution to protect data and reduce the spread of the virus, Travelex had to shut down all of its computer systems, causing issues for the 1,500+ stores across the world.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*2-XmPopyzt5L0CZO3y3SCg.png" /></figure><p>According to ComputerWeekly, it was a Sodinokibi ransomware attack that infiltrated the company.</p><p>A conversation between BleepingComputer and the Sodinokibi group revealed that the malicious actors have “encrypted the entire Travelex network and copied more than 5GB of personal data, which includes dates of birth, social security numbers, card information and other details.” Furthermore, the Sodinokibi group states that they’ve deleted the backup files and are demanding a $3 million ransom.</p><p>Information on how the attackers gained an initial foothold on the Travelex network has not been revealed; however, Travelex has been known to utilize insecure services in the past.</p><p>Read more <a href="https://www.bleepingcomputer.com/news/security/sodinokibi-ransomware-hits-travelex-demands-3-million/">here</a></p><h3>Microsoft: RDP Brute-Force Attacks Last 2–3 days on Average</h3><p>Microsoft recently published a months-long study into the impact of RDP brute-force attacks throughout various organizations in the corporate world. In the study, over 45,000 workstations running Microsoft Defender Advanced Threat protection collected data on RDP-login related events. And researchers for in total, 0.08% of RDP brute-force attacks are successful, and they last an average of 2–3 days.</p><p>RDP stands for Remote Desktop Protocol; it’s a feature within the Windows operating system that allows users to log in to a remote computer using a similar interface as a standard desktop.</p><p>According to Microsoft, “successful brute force attempts are not uncommon; therefore, it’s critical to monitor at least the suspicious connections and unusual failed sign-ins that result in authenticated sign-in events.”</p><p>Recommendations for system administrators to lessen the risk of a successful RDP attack include combining and monitoring multiple signals that incorporate the:</p><ul><li>hour of the day and day of the week of failed sign-in and RDP connections</li><li>timing of a successful sign-in following failed attempts</li><li>Event ID 4625 logon type (filtered to network and remote interactive)</li><li>Event ID 4625 failure reason (filtered to %%2308, %%2312, %%2313)</li><li>cumulative count of distinct usernames that failed to sign in without success</li><li>count (and cumulative count) of failed sign-ins</li><li>count (and cumulative count) of RDP inbound external IPs</li><li>count of other machines having RDP inbound connections from one or more of the same IP</li></ul><p>Read more <a href="https://www.zdnet.com/article/microsoft-rdp-brute-force-attacks-last-2-3-days-on-average/">here</a></p><h3>School Software Provider Active Network Discloses Data Breach</h3><p>Active Network, a web-based school management software for kindergarten to twelfth-grade schools and counties, has suffered a significant security breach affecting thousands of individuals. According to the company’s <a href="https://oag.ca.gov/system/files/Individual%20Letter%20CA.pdf">breach notice</a>, parents who accessed a portion of their accounting software to pay school fees or pay for materials between October 1, 2019, and November 13, 2019, may have had their personal information stolen.</p><p>Exposed data includes:</p><ul><li>Names,</li><li>Store username and password,</li><li>Payment card number,</li><li>Payment card expiration date,</li><li>Payment card security code.</li></ul><p>Malicious actors were able to steal payment data through a software skimmer as parents sent payments through the Active Network web application.</p><p>Active Network has launched an investigation with the help of a cybersecurity firm to analyze the issue further.</p><p>Get more information <a href="https://ledgerops.com/blog/2020/1/7/Active%20Network,%20a%20web-based%20school%20management%20software%20for%20kindergarten%20to%20twelfth-grade%20schools%20and%20counties,%20has%20suffered%20a%20significant%20security%20breach%20affecting%20thousands%20of%20individuals.%20According%20to%20the%20company%E2%80%99s%20breach%20notice,%20parents%20who%20accessed%20a%20portion%20of%20their%20accounting%20software%20to%20pay%20school%20fees%20or%20pay%20for%20materials%20between%20October%201,%202019,%20and%20November%2013,%202019,%20may%20have%20had%20their%20personal%20information%20stolen.%20%20%20%20Exposed%20data%20includes:%20%20%20Names,%20%20%20%20Store%20username%20and%20password,%20%20%20%20Payment%20card%20number,%20%20%20%20Payment%20card%20expiration%20date,%20%20%20%20Payment%20card%20security%20code.%20%20%20%20%20Malicious%20actors%20were%20able%20to%20steal%20payment%20data%20through%20a%20software%20skimmer%20as%20parents%20sent%20payments%20through%20the%20Active%20Network%20web%20application.%20%20%20%20%20%20Active%20Network%20has%20launched%20an%20investigation%20with%20the%20help%20of%20a%20cybersecurity%20firm%20to%20analyze%20the%20issue%20further.">here</a></p><h3>Google Boots Security Camera Maker From Nest Hub After Private Images Go Public</h3><p>A Reddit user named <em>Dio-V</em> first reported the issue, stating that their Google Nest Hub (which is connected to a Xiaomi Mijia 1080p Smart IP camera) <a href="https://www.reddit.com/r/googlehome/comments/eine1m/when_i_load_the_xiaomi_camera_in_my_google_home/">shows videos of strangers</a> instead of their footage. The post drew a great deal of attention, including Google Support — who stated that Google would disable “all Xiaomi integrations on [their] devices” while they work on the issue.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*4GPd1S-xotKRtUf0OTTXfA.png" /></figure><p>Further investigation into the issue revealed that a cache update to improve camera streaming quality was responsible for the issue and only happened in “extremely rare conditions.” A Xiaomi spokesperson spoke to Threatpost, stating that the Reddit user experienced this bug due to poor network conditions in combination with the cache update.</p><p>As connected cameras have caused significant privacy issues for consumers, bugs like these certainly do not instill confidence in the technology.</p><p>Read more <a href="https://threatpost.com/google-boots-security-camera-maker-from-nest-hub-after-private-images-go-public/151512/">here</a></p><h3>Chrome Extension Caught Stealing Crypto-Wallet Private Keys</h3><p>A Chrome extension was recently caught injecting JavaScript code into web pages to steal private keys and passwords from cryptocurrency portals and wallets. The malicious wallet, aptly named <a href="https://shitcoinwallet.co/">Shitcoin Wallet</a>, allows users to manage Ethereum (ETH) coins as well as ERC20-based tokens. To use the service, though, a user has to install a chrome extension or download a Windows desktop app.</p><p>According to Harry Denley, the director of security at MyCrypto, the Shitcoin Wallet utilizes malicious code when users “navigate to five well-known and popular cryptocurrency management platforms.” The code then steals login credentials along with private keys and sends them to an erc20wallet[.]tk third-party website.</p><p>According to ZDNet and Denley, the malicious process follows these steps:</p><ul><li>Users install the Chrome extension</li><li>The Chrome extension requests permission to inject JavaScript (JS) code on 77 websites [listed <a href="https://gist.github.com/campuscodi/b63ea104e1cf17ef446dfa8e67651e5f#file-manifest-json-L33">here</a>]</li><li>When users navigate to any of those 77 sites, the extension loads and injects <a href="https://gist.github.com/campuscodi/1154becfce7ab1cb6dafa3cabfa28c9f">an additional JS file</a> from: <a href="https://erc20wallet[.]tk/js/content_.js">https://erc20wallet[.]tk/js/content_.js</a></li><li>This JS file contains obfuscated code [deobfuscated <a href="https://pastebin.com/raw/ZtUpWVvT">here</a>]</li><li>The code activates on five websites: MyEtherWallet.com, Idex.Market, Binance.org, NeoTracker.io, and Switcheo.exchange</li><li>Once activated, the malicious JS code records the user’s login credentials, searches for private keys stored inside the dashboards of the five services, and finally, sends the data to erc20wallet[.]tk</li></ul><p>It is still unclear whether the Shitcoin Wallet team or a third-party actor is responsible for the malicious code.</p><p>Read more <a href="https://www.zdnet.com/article/chrome-extension-caught-stealing-crypto-wallet-private-keys/">here</a></p><p><em>Originally published at </em><a href="https://ledgerops.com/blog/2020/1/7/last-week-in-blockchain-and-cybersecurity-news-january-7th-2020"><em>https://ledgerops.com</em></a><em> on January 7, 2020.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=59d11fce8123" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Last Week In CyberSecurity News — December 31, 2019 — LedgerOps]]></title>
            <link>https://medium.com/@LedgerOps/last-week-in-cybersecurity-news-december-31-2019-ledgerops-3dbd3ea8b65?source=rss-285bf348997b------2</link>
            <guid isPermaLink="false">https://medium.com/p/3dbd3ea8b65</guid>
            <category><![CDATA[data-breach]]></category>
            <category><![CDATA[hacking]]></category>
            <category><![CDATA[ransomware]]></category>
            <category><![CDATA[wyze]]></category>
            <category><![CDATA[security]]></category>
            <dc:creator><![CDATA[LedgerOps]]></dc:creator>
            <pubDate>Tue, 31 Dec 2019 00:00:00 GMT</pubDate>
            <atom:updated>2019-12-31T19:35:44.539Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*e-q2cjcXaUtzBqiWUcBfDw.jpeg" /></figure><h3>Last Week In CyberSecurity News — December 31, 2019 — LedgerOps</h3><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FXNanRBcra_E%3Ffeature%3Doembed&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DXNanRBcra_E&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FXNanRBcra_E%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/81865275141447cdfcef6cb847e65d79/href">https://medium.com/media/81865275141447cdfcef6cb847e65d79/href</a></iframe><h3>Data Breach at Wyze Labs Exposes Information of 2.4 Million Customers</h3><p>Last week, Wyze, a cost-effective home-security system company, experienced a large-scale breach impacting 2.4 million customers. Cybersecurity consulting firm Twelve Security <a href="https://blog.12security.com/wyze/">notified</a> Wyze about the breach, stating that Wi-Fi network details and email addresses of customers had been exposed for a total of 23 days. The unsecured database was connected to an Elasticsearch cluster from December 4, 2019, to December 27, 2019.</p><p>Wyze placed the cause of the data leak on an employee mistake that persisted due to a lack of security protocol enforcement. A new employee created a “flexible database to quickly pull user analytics, such as camera connectivity rates, user growth and the number of devices connected per user,” however, (s)he didn’t configure the proper security protocols on the database.</p><p>Wyze sent an email out Tuesday morning to its customers with further information about the breach and what actions the security company will take to protect its customers in the future.</p><p>Read more <a href="https://www.nytimes.com/2019/12/30/business/wyze-security-camera-breach.html">here</a></p><h3>North Korean Hackers Allegedly Steal ‘Highly Sensitive Information’ From Microsoft Users</h3><p>Microsoft is suing Thallium, an infamous North Korean hacking group, for allegedly stealing highly sensitive information from multiple organizations and individuals within the United States.</p><p>According to CNN and Microsoft, “Thallium targeted government employees, think tanks, university staff and members of groups that work on issues including nuclear proliferation and human rights”</p><p>More specifically, the lawsuit calls out two individuals who Microsoft believes work for Thallium. Using spear phishing attacks, Thallium has allegedly stolen passwords and other sensitive information from individual users. Once the group obtains login credentials, they scavenge emails, contact lists, and all additional information stored on Microsoft users’ accounts.</p><p>According to Microsoft, Thallium has been active since 2010 and poses a substantial threat to several organizations around the United States.</p><p>Read more <a href="https://www.cnn.com/2019/12/30/tech/microsoft-hackers-lawsuit-north-korea/index.html?fbclid=IwAR03dn7icgfLrOJU7i1XdjbiSmptraIyT4heU0aJasFW7sbEG-4tbIVj7ms">here</a></p><h3>Maze Ransomware Releases Files Stolen From City of Pensacola</h3><p>Earlier this month, Pensacola became a victim of a ransomware attack, forcing the city to shut down its computer systems. Attackers used “Maze Ransomware” and demanded a $1 million ransom to decrypt the city’s files.</p><p>Last week, the cybercriminals released 2GB of the 32GB of data they stole and encrypted from the Pensacola network. In a discussion with Bleeping Computer, the attackers stated that the purpose of releasing Pensacola’s data was to prove that more than a few files were taken during the ransomware attack and that more data may be released in the future.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*D8M8AqO33vK4vw-avW8q6w.png" /></figure><p>Get more information <a href="https://www.bleepingcomputer.com/news/security/maze-ransomware-releases-files-stolen-from-city-of-pensacola/">here</a></p><h3>US Coast Guard Discloses Ryuk Ransomware Infection at Maritime Facility</h3><p>The US Coast Guard (USCG) recently experienced a Ryuk ransomware attack, causing the organization to go offline for more than 30 hours. According to USCG officials, the initial point of compromise was a malicious email sent to a facility employee. Once the malware entered the facility’s IT network, the threat spread quickly and impacted “industrial control systems that monitor and control cargo transfer and encrypted files critical to process operations.”</p><p>According to ZDNet and Coast Guard officials, the infection caused a large disruption within the network, halting camera and physical access control systems, process control monitoring systems, and more.</p><p>Ransomware attacks have become increasingly common throughout 2019. As usual, it’s recommended to keep your antivirus software up-to-date and practice proper cybersecurity hygiene when browsing the internet.</p><p>Read more <a href="https://www.zdnet.com/article/us-coast-guard-discloses-ryuk-ransomware-infection-at-maritime-facility/">here</a></p><h3>Special Olympics New York Hacked to Send Phishing Emails</h3><p>Special Olympics New York, a nonprofit organization that provides training and athletic competitions to thousands of children and adults, experienced a security incident last week resulting in the hacking of their email servers. Due to this incident, malicious actors were able to impersonate the organization and send out phishing emails stating that an “impending donation transaction that would automatically debit $1,942,49 from the target’s account within two hours.”</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*eDBDxv0SVPLinLoatLD49w.png" /><figcaption>Bleeping Computer</figcaption></figure><p>The email provided a link that directs the victim to the attackers’ landing page. The landing page is no longer available, but the phisher likely utilized it to collect victims’ credit card details.</p><p>After discovering the security breach, Special Olympics New York sent out an email disclosing the hack and telling recipients to disregard the previous message (the phishing email).</p><p>Thankfully, no financial information was taken as only the communication systems were impacted by the hack.</p><p>Read more <a href="https://www.bleepingcomputer.com/news/security/special-olympics-new-york-hacked-to-send-phishing-emails/">here</a></p><p><em>Originally published at </em><a href="https://ledgerops.com/blog/2019/12/31/last-week-in-blockchain-and-cybersecurity-news-december-31st-2019"><em>https://ledgerops.com</em></a><em> on December 31, 2019.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=3dbd3ea8b65" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Last Week In CyberSecurity News — December 24, 2019 — LedgerOps]]></title>
            <link>https://medium.com/@LedgerOps/last-week-in-cybersecurity-news-december-24-2019-ledgerops-3fe70a02ecdb?source=rss-285bf348997b------2</link>
            <guid isPermaLink="false">https://medium.com/p/3fe70a02ecdb</guid>
            <category><![CDATA[botnet]]></category>
            <category><![CDATA[hacker]]></category>
            <category><![CDATA[cryptocurrency]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[data-breach]]></category>
            <dc:creator><![CDATA[LedgerOps]]></dc:creator>
            <pubDate>Tue, 24 Dec 2019 00:00:00 GMT</pubDate>
            <atom:updated>2019-12-24T18:26:16.489Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*cRQ_GX6q8rDl9vNF82WpAQ.jpeg" /></figure><h3>Last Week In CyberSecurity News — December 24, 2019 — LedgerOps</h3><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FJag2A9y7Phc%3Ffeature%3Doembed&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DJag2A9y7Phc&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FJag2A9y7Phc%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/ce84562182e368fbcabb6373cd599560/href">https://medium.com/media/ce84562182e368fbcabb6373cd599560/href</a></iframe><h3>9-Month Data Breach Affects Millions of Wawa Customers</h3><p>Last week, Wawa <a href="https://www.wawa.com/alerts/data-security?utm_source=TWITTER&amp;utm_medium=social&amp;utm_campaign=Reactive%7C&amp;utm_content=100001079794554&amp;linkId=100000009711028">announced</a> that millions of customers might have had their credit or debit card information stolen in a data breach impacting almost all of their store locations. According to the report, malware, which originated on March 4, was discovered on Wawa’s payment processing servers on December 10. As a result of the breach, Wawa is offering enrollment in a credit monitoring service, Experian Identity Works, free of charge.</p><p>Wawa’s CEO Chris Gheysens states that stolen information includes:</p><ul><li>credit and debit card numbers,</li><li>expiration dates,</li><li>and cardholder names on payment cards.</li></ul><p>Potentially all Wawa in-store payment terminals and fuel dispensers became compromised at different points.</p><p>If you have been to a Wawa sometime between March and December, monitoring your payment card account statements and checking your credit reports will help mitigate any potential fraudulent activity.</p><p>Read more <a href="https://www.delish.com/food-news/a30299240/wawa-data-breach-millions-affected-2019/">here</a></p><h3>LifeLabs Data Breach Exposes Personal Info of 15 Million Customers</h3><p>LifeLabs recently experienced a data breach, exposing the sensitive information of almost 15 million Canadian clinical laboratory customers. Of those 15 million customers, around 85 thousand had their lab results exposed as well.</p><p>The stolen information includes:</p><ul><li>Customer names</li><li>Addresses</li><li>Emails</li><li>Logins</li><li>Passwords</li><li>Dates of birth</li><li>Health card numbers</li></ul><p>You can find the data breach announcement <a href="https://customernotice.lifelabs.com/">here</a>.</p><p>Read more <a href="https://www.bleepingcomputer.com/news/security/lifelabs-data-breach-exposes-personal-info-of-15-million-customers/">here</a></p><h3>Cryptocurrency-Mining Botnet Uses a Taylor Swift Image to Hide Malware Payloads</h3><p>A botnet, named MyKingz (also known as DarkCloud, Smominru, or Hexmen), is currently using an image of Taylor Swift to hide malware payloads which infect various devices over the internet.</p><p>MyKingz utilizes an internet scanning module that targets vulnerable hosts to gain an initial foothold on a victim’s device. Typically, the botnet abuses unpatched vulnerabilities in Telnet, SSH, RDP, and other software related programs; however, it’s now using steganography-based attacks.</p><p>Steganography is a tactic to hide malicious files inside of legitimate ones. According to Sophos, a UK-based security firm, MyKingz is hiding malicious EXE files inside of JPEG images of Taylor Swift. MyKingz uses this technique with the hopes of tricking security software on enterprise networks into only detecting a JPEG file download, rather than a malicious EXE file.</p><p>Cybercriminals have used other steganography-based attacks in the past, such as hiding EXE files in WAV audio files. The MyKingz attacks have proved successful as Sophos estimates it currently makes $300 a day, totaling over $3 million as of this writing.</p><p>You can read more about MyKingz <a href="https://www.sophos.com/en-us/medialibrary/pdfs/technical-papers/sophoslabs-uncut-mykings-report.pdf">here</a>.</p><p>Get more information <a href="https://www.zdnet.com/article/cryptocurrency-mining-botnet-uses-a-taylor-swift-image-to-hide-malware-payloads/">here</a></p><h3>Apple Opens Its Invite-Only Bug Bounty to the Public, $1M Payout Included</h3><p>Apple has officially announced its private bug bounty program, providing rewards from $25,000 to $1 million. The bug bounty encompasses a variety of products, including Macs, iPhones, iPads, and Apple TVs.</p><p>The substantial $1 million bounty requires security researchers to provide a reliable exploit for a zero-click remote chain with full kernel execution and persistence on Apple’s latest hardware as well as a bypass for Apple’s kernel Pointer authentication code.</p><p>According to Apple, vulnerability types include:</p><ul><li>Unauthorized iCloud account access</li><li>Physical access to device</li><li>Lock screen bypass</li><li>User data extraction</li><li>User-installed app: unauthorized access to sensitive data</li><li>User-installed app: kernel code execution</li><li>User-installed app: CPU side-channel attack</li><li>Vulnerabilities that can be exploited using a malicious application</li><li>And much more</li></ul><p>Read more <a href="https://threatpost.com/apples-bug-bounty-opens-1m-payout/151334/">here</a></p><h3>CVE-2019–19781 Citrix Flaw Puts 80,000 Companies at Risk</h3><p>A critical vulnerability in Citrix’s Application Delivery Controller (NetScaler ADC) and Citrix Gateway has put over 80,000 companies at risk. The vulnerability, <a href="https://support.citrix.com/article/CTX267027">CVE-2019–19781</a>, affects all supported versions of the product on all supported platforms.</p><p>According to the security researcher who discovered the vulnerability, the flaw allows “attackers [to] obtain direct access to the company’s local network from the Internet,” and it “does not require access to any accounts,” allowing it to be performed by any external attacker.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*wnzKI3BQFPy6fQz5iDZEIg.png" /><figcaption>SecurityAffairs</figcaption></figure><p>As Citrix applications are widely used in corporate networks, remediating the flaw is critical. Thankfully, Citrix has released <a href="https://support.citrix.com/article/CTX267679">steps</a> to lessen the risk of a successful attack with a recommendation to update all vulnerable software versions.</p><p>Read more <a href="https://securityaffairs.co/wordpress/95548/hacking/cve-2019-19781citrix-flaw.html">here</a></p><p><em>Originally published at </em><a href="https://ledgerops.com/blog/2019/12/24/last-week-in-blockchain-and-cybersecurity-news-december-24th-2019"><em>https://ledgerops.com</em></a><em> on December 24, 2019.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=3fe70a02ecdb" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Last Week In CyberSecurity News — December 17, 2019 — LedgerOps]]></title>
            <link>https://medium.com/@LedgerOps/last-week-in-cybersecurity-news-december-17-2019-ledgerops-2c3c5bedb1d1?source=rss-285bf348997b------2</link>
            <guid isPermaLink="false">https://medium.com/p/2c3c5bedb1d1</guid>
            <category><![CDATA[cryptocurrency]]></category>
            <category><![CDATA[new-orleans]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[ransomware]]></category>
            <dc:creator><![CDATA[LedgerOps]]></dc:creator>
            <pubDate>Tue, 17 Dec 2019 00:00:00 GMT</pubDate>
            <atom:updated>2019-12-17T17:11:47.728Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*IicySdcVV4rp1YF8SDMZSA.png" /></figure><h3>Last Week In CyberSecurity News — December 17, 2019 — LedgerOps</h3><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2Fd6DVxwETp_E%3Ffeature%3Doembed&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Dd6DVxwETp_E&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2Fd6DVxwETp_E%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/6d263b5fc836d7edee5e5b7e10ae1c37/href">https://medium.com/media/6d263b5fc836d7edee5e5b7e10ae1c37/href</a></iframe><h3>New Orleans Declares State of Emergency Following Ransomware Attack</h3><p>Another ransomware attack has claimed a new victim; this time New Orleans has been forced to shut down its computers after a cyberattack. According to a press conference by Kim LaGrue, the city’s head of IT, suspicious activity was discovered around 5 a.m. last Friday. Once the city confirmed it was under attack, officials shut down its servers and computers.</p><p>Even though ransomware was detected throughout the organization, no ransom requests were made. According to BleepingComputer, the ransomware attack on the city of New Orleans was likely conducted by the Ryk Ransomware cybercriminals.</p><p>Memory dumps uploaded from a US IP address to VirusTotal contained several references to New Orleans and Ryuk. Colin Cowie of Red Flare Security discovered this, providing a picture showing that the ransomware encrypted New Orleans’s “Contracts and Revenue” file share.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1002/1*f0uAsNHKHIwSOfKatqQClQ.png" /></figure><p>According to BleepingComputer and Cowie, the memory dump is for an executable named ‘yoletby.exe.’ It contains numerous “references to the City of New Orleans, including domain names, domain controllers, internal IP addresses, usernames, file shares, and references to the Ryuk ransomware.”</p><p>As of right now, it is unknown if the attackers have requested a ransom.</p><p>Read more <a href="https://www.bleepingcomputer.com/news/security/ryuk-ransomware-likely-behind-new-orleans-cyberattack/">here</a></p><h3>Batch of 460,000+ Payment Cards Sold on Black Market Forum</h3><p>Security researchers have discovered four databases containing credit card information throughout various underground markets.</p><p>Initially, two databases, each holding the information of over 30,000 credit cards, were available on the popular black-market forum, Joker. Each card was available for $3.00, and 85 to 90 percent of the cards were valid with the proper documentation necessary to purchase items online.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*LG7nAqjVeL46tclB3T79iQ.png" /></figure><p>According to Group-IB, a cybersecurity company based out of Singapore, the two databases are reportedly related to the Top 10 Turkish banks.</p><p>At the end of last month, two more databases opened up on the Joker’s Stash forum. Each database contained data for 190,000 to 205,000 credit cards, each costing $1.00.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*tmmO1bqWy4GGNl9hu1Q4vA.png" /></figure><p>According to BleepingComputer, the data within each database includes the expiration date, CVV code (card verification value), card number, and the name of the owner as well as other information such as email addresses, names, and phone numbers.</p><p>The overall source of the data is still unknown; however, you should be mindful of your credit card bill to reduce the damage of any fraudulent activity.</p><p>Read more <a href="https://www.bleepingcomputer.com/news/security/batch-of-460-000-payment-cards-sold-on-black-market-forum/">here</a></p><h3>New Plundervolt Attack Impacts Intel CPUs</h3><p>Last week, academics disclosed a new attack that affects the information inside Intel Software Guard eXtensions (SGX), a highly secured area of Intel CPUs. The attack, named Plundervolt, exploits the interface “through which an operating system can control an Intel processor’s voltage and frequency — the same interface that allows gamers to overclock their CPUs.”</p><p>By tampering with the amount of voltage a CPU receives, researchers were able to alter bits inside SGX, causing exploitable errors. A malicious actor can use this vulnerability to recover encryption keys or inject bugs in a (previously) secure software environment.</p><p>Intel SGX is a security feature present in all modern Intel CPUs which allows developers to isolate applications in secure environments. Doing so enables the applications to trust the CPU with sensitive information away from other applications running on the operating system.</p><p>Fortunately, this vulnerability cannot be exploited remotely as it needs to run with root privileges from an app on the infected host. Patches were released last week as part of security advisory <a href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00289.html">INTEL-SA-00289</a>, providing device administrators a new BIOS option to disable the volt-changing interface on their systems.</p><p>The vulnerability impacts Intel desktops, servers, and mobile CPUs. According to Intel, the following CPU series are vulnerable to Plundervolt attacks:</p><ul><li>Intel® 6th, 7th, 8th, 9th &amp; 10th Generation CoreTM processors</li><li>Intel® Xeon® Processor E3 v5 &amp; v6</li><li>Intel® Xeon® Processor E-2100 &amp; E-2200 families</li></ul><p>Get more information <a href="https://www.zdnet.com/article/new-plundervolt-attack-impacts-intel-cpus/">here</a></p><h3>FIN8 Targets Card Data at Fuel Pumps</h3><p>Fuel pumps at gas stations seem to be a new target for the notorious FIN8 cybercrime group. According to Visa’s online public alert, two separate payment card detail skimming campaigns have emerged in the past year.</p><p>The first attack compromises point-of-sale (PoS) systems by sending phishing emails to employees that include a malicious link which installs a remote access trojan on the merchant network. After gaining a successful foothold inside a network, the attacker moves laterally into the PoS environment and harvests payment card data.</p><p>The second type of attack targets similar gas-pump dispensers within North America; however, the initial compromise of the network is still unknown.</p><p>Gas stations have become an increasingly popular target for cyberattacks due to their typical lack of security.</p><p>Read more <a href="https://threatpost.com/fin8-targets-card-data-fuel-pumps/151105/">here</a></p><h3>SEC Charges Shopin Founder with Fraud over Unregistered $42M ICO</h3><p>The United States Securities and Exchange Commission (SEC) has charged Eran Eyal, the founder of Shopin, for allegedly running a scam initial coin offering (ICO). According to the <a href="https://www.sec.gov/news/press-release/2019-259">SEC</a>, Eyal defrauded investors in his initial coin offering which raised more than $42 million. He is also accused of operating an unregistered ICO without any proper documentation.</p><p>Shopin advertised a service consisting of universal shopper profiles on the blockchain. Additionally, the service would “track customer purchase histories across online retailers and recommend products based on the collected data.” However, according to the SEC, Shopin has not developed a functional platform for the product.</p><p>The SEC also alleges that Eyal “misappropriated investor funds for his personal use, including at least $500,000 used for rent, shopping, entertainment expenses, and a dating service.” Eyal pled guilty to criminal charges brought by the New York Attorney General’s office and pled guilty to operating three security fraud schemes, including Shopin.</p><p>CoinDesk states that around $450,000 in cryptocurrency will be turned over to the New York State Attorney General, and Eyal will have to step down from his role as CEO of Shopin as well as pay over $600,000 in fines and restitution due to his actions.</p><p>Read more <a href="https://securityaffairs.co/wordpress/95083/breaking-news/shopin-unregistered-42m-ico.html">here</a></p><p><em>Originally published at </em><a href="https://ledgerops.com/blog/2019/12/17/last-week-in-blockchain-and-cybersecurity-news-december-17th-2019"><em>https://ledgerops.com</em></a><em> on December 17, 2019.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=2c3c5bedb1d1" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Last Week In CyberSecurity News — December 3, 2019 — LedgerOps]]></title>
            <link>https://medium.com/@LedgerOps/last-week-in-cybersecurity-news-december-3-2019-ledgerops-64bd4e1a1542?source=rss-285bf348997b------2</link>
            <guid isPermaLink="false">https://medium.com/p/64bd4e1a1542</guid>
            <category><![CDATA[upbit]]></category>
            <category><![CDATA[hacker]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[data-breach]]></category>
            <category><![CDATA[cryptocurrency]]></category>
            <dc:creator><![CDATA[LedgerOps]]></dc:creator>
            <pubDate>Tue, 03 Dec 2019 00:00:00 GMT</pubDate>
            <atom:updated>2019-12-03T15:48:35.183Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Kgvo2HhncAQwxOiofESR8Q.jpeg" /></figure><h3>Last Week In CyberSecurity News — December 3, 2019 — LedgerOps</h3><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FSEA8qZjLlPw%3Ffeature%3Doembed&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DSEA8qZjLlPw&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FSEA8qZjLlPw%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/fee604a4511cf3808c0ca4e907d98f74/href">https://medium.com/media/fee604a4511cf3808c0ca4e907d98f74/href</a></iframe><h3>Data of 21 Million Mixcloud Users up for Sale on the Dark Web</h3><p>Online music streaming service Mixcloud confirmed last Saturday that it had experienced a data breach affecting 21 million users. And the hacker behind the breach has contacted several journalists, providing data samples to prove its legitimacy.</p><p>The stolen data includes usernames, email addresses, hashed passwords, registration dates, IP addresses, and more. Mixcloud has stated that the hashed passwords should remain safe as they are salted and encrypted using SHA256; however, they have advised users to reset their passwords for additional protection.</p><p>The person(s) behind the breach goes by the name A_W_S and has previously worked with other hackers such as Gnosticplaters. A_W_S has also claimed to be responsible for data breaches involving Vanva, Chegg, StockX, PromoFarma, and more. According to ZDNet, the data for the previous breaches were put on sale earlier this year. And the stolen Mixcloud data is currently being advertised on the dark web for $2,000.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*rwJLIBis2BAa2sbFtzrIrQ.png" /><figcaption>ZDNet</figcaption></figure><p>Read more <a href="https://www.zdnet.com/article/data-of-21-million-mixcloud-users-put-up-for-sale-on-the-dark-web/">here</a></p><h3>Europol Shuts Down ‘Imminent Monitor’ RAT Operations with 13 Arrests</h3><p>Imminent Monitor, a remote administration framework used by cybercriminals, was shut down by a coordinated international law enforcement operation. According to Europol, both buyers and sellers of the Imminent Monitor Remote Access Trojan (IM-RAT) were targeted during the operation. Over 14,500 individuals have bought the IM-RAT, and it’s been used to attack victims throughout 124 countries.</p><p>High-ranking customers of the IM-RAT were also arrested throughout the operation. These arrests were conducted throughout Australia, Colombia, Czechia, the Netherlands, Poland, Spain, Sweden, and the United Kingdom. According to TheHackerNews, the IM-RAT allows full control over the victims’ devices, allowing the malicious actor to conduct these actions:</p><ul><li>record keystrokes,</li><li>steal data and passwords from browsers,</li><li>spy on victims via their webcams,</li><li>download/execute files,</li><li>disable anti-virus and anti-malware software,</li><li>terminate running processes,</li><li>perform dozens of other actions.</li></ul><p>The trojan itself costs as little as $25 with lifetime access, making a cheap and accessible weapon to those who want to carry out malicious attacks.</p><p>You can find Europol’s press release <a href="https://www.europol.europa.eu/newsroom/news/international-crackdown-rat-spyware-which-takes-total-control-of-victims%E2%80%99-pcs">here</a>.</p><p>Read more <a href="https://thehackernews.com/2019/11/europol-imminent-monitor-rat.html">here</a></p><h3>Upbit Cryptocurrency Exchange Hacked, $48.5 Million Worth of ETH Stolen</h3><p>Upbit, a South Korean cryptocurrency exchange, has disclosed a security breach resulting in the theft of $48.5 million worth of cryptocurrency from its hot wallets. Malicious actors were able to siphon 342,000 ETH, further establishing the importance of minimizing the use of hot wallets to store large sums of cryptocurrency. The cryptocurrency has been transferred to a <a href="https://www.blockchain.com/eth/address/0xa09871AEadF4994Ca12f5c0b6056BBd1d343c029">wallet</a> — 0xa09871AEadF4994Ca12f5c0b6056BBd1d343c029.</p><p>Upbit states that the exchange will cover the stolen funds, and it will restore regular operations in a few weeks. As a security precaution, all funds that are currently in its hot wallets have been transferred to a cold wallet.</p><p><a href="https://www.reddit.com/r/CryptoCurrency/comments/e2di1q/upbit_confirms_340000_eth_hacked/">Some</a> users are suspicious of the incident, stating that the theft of the funds is due to an exit scam or inside job.</p><p>Get more information <a href="https://securityaffairs.co/wordpress/94463/cyber-crime/upbit-exchange-hacked.html">here</a></p><h3>Adobe Magento Marketplace Exposes User Info in Data Breach</h3><p>Magento Marketplace, a repository that provides free and paid extensions/themes for the e-commerce platform, has been breached, resulting in the theft of account information. Last year, Adobe acquired Magento for $1.68 billion.</p><p>Data from the breach includes names, emails, MageIDs, billing and shipping addresses, and phone numbers. According to BleepingComputer, other compromised information includes the percentages of payments to developers.</p><p>Magento explains that a vulnerability within the platform allowed an unauthorized third party to gain access to their system; however, the vulnerability was identified and quickly fixed.</p><p>Read more <a href="https://www.bleepingcomputer.com/news/security/adobe-magento-marketplace-exposed-user-info-in-data-breach/">here</a></p><h3>Dexphot Malware Hijacks 80K+ Devices to Mine Cryptocurrency</h3><p>Dexphot has utilized a complex attack chain combined with antivirus evasion techniques to infect more than 80,000 devices. Once a device is infected, the malware siphons its CPU power to mine cryptocurrency. To evade security solutions, Dexphot implements “layers of obfuscation, encryption and randomized file names to hide its installation process.”</p><p>The malware also contains a script that monitors services and checks the status of the malicious processes running on the victims’ computers. If one process is interrupted, others will continue to run, adding redundancy to the malware attack.</p><p>Microsoft’s Defender ATP Research Team has released a blog post describing the malware. You can find it <a href="https://www.microsoft.com/security/blog/2019/11/26/insights-from-one-year-of-tracking-a-polymorphic-threat/">here</a>.</p><p>Read more <a href="https://threatpost.com/dexphot-malware-cryptocurrency/150634/">here</a></p><p><em>Originally published at </em><a href="https://ledgerops.com/blog/2019/12/3/last-week-in-blockchain-and-cybersecurity-news-december-3-2019"><em>https://ledgerops.com</em></a><em> on December 3, 2019.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=64bd4e1a1542" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Last Week In CyberSecurity News — November 26, 2019 — LedgerOps]]></title>
            <link>https://medium.com/@LedgerOps/last-week-in-cybersecurity-news-november-26-2019-ledgerops-79eaf8871c90?source=rss-285bf348997b------2</link>
            <guid isPermaLink="false">https://medium.com/p/79eaf8871c90</guid>
            <category><![CDATA[data-lake]]></category>
            <category><![CDATA[ledgerops]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[monero]]></category>
            <category><![CDATA[google]]></category>
            <dc:creator><![CDATA[LedgerOps]]></dc:creator>
            <pubDate>Tue, 26 Nov 2019 00:00:00 GMT</pubDate>
            <atom:updated>2019-11-26T16:58:33.965Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*eT92pVFCJayaCTIbUNUHag.jpeg" /></figure><h3>Last Week In CyberSecurity News — November 26, 2019 — LedgerOps</h3><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FM-bGm9YNcmo%3Ffeature%3Doembed&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DM-bGm9YNcmo&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FM-bGm9YNcmo%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/1adad0680229782687e9de1858770468/href">https://medium.com/media/1adad0680229782687e9de1858770468/href</a></iframe><h3>Extensive Hacking Operation Discovered in Kazakhstan</h3><p>Last Friday, Qihoo 360, a Chinese cybersecurity vendor, published a report exposing an extensive hacking operation focusing on people in Kazakhstan. Targets include government agencies, foreign diplomats, researchers, journalists, and government dissidents, among others. The malicious actors are said to have extensive resources and could develop “private hacking tools, buy expensive spyware off the surveillance market and even invest in radio communications interception hardware.”</p><p>Qihoo 360 researchers named the group behind the campaign as Golden Falcon or APT-C-34. However, according to Kaspersky, Golden Falcon is another name for <a href="https://securelist.com/octopus-infested-seas-of-central-asia/88200/">DustSquad</a>, a hacking group that has been active for the past two years. The report further explains Golden Falcon’s operations, stating the information stolen was seemingly categorized by city and each city’s folder contained data from numerous victims. In total, researchers discover victims from the 13 largest cities in Kazakhstan and more.</p><p>According to ZDNet, two hacking tools were used by Golden Falcon. The first, a Remote-Control System, is a surveillance kit sold by HackingTeam, and the second is a backdoor trojan named Harpoon, which “appears to have been developed by the group itself.”</p><p>Qihoo 360 obtained the manual for the backdoor. The backdoor mechanisms include:</p><ul><li>Keylogging</li><li>Stealing of clipboard data</li><li>Taking a screenshot of the active window at predetermined intervals</li><li>Listing the contents of a given directory</li><li>Getting Skype login name, contact list, and chat message history</li><li>Getting Skype and Google Hangouts contacts and voice recordings</li><li>Recording sound via the microphone, eavesdropping</li><li>Copying a specified file from the target computer</li><li>Automatically copying files from removable media</li><li>Storing all intercepted data in an encrypted data file, inside a specified directory</li><li>Sending stolen data to a specified FTP server</li><li>Running a program or operating system command</li><li>Downloading files from a given FTP into a specific directory</li><li>Remotely reconfiguring and update components</li><li>Receiving data files from a given FTP and automatically extract the files to a specified directory</li><li>Self-destructing</li></ul><p>Read more <a href="https://www.zdnet.com/article/extensive-hacking-operation-discovered-in-kazakhstan/">here</a></p><h3>Personal and Social Information of 1.2B People Exposed on Open Elasticsearch Install</h3><p>The database, discovered by Bob Diachenko and Vinny Troia, contains more than four terabytes of data, making it one of the largest data leaks from a single organization. The leaked data includes personal and social information, such as names, email addresses, and phone numbers as well as LinkedIn and Facebook profile information. The data within the server appears to be from two different data enrichment companies, People Data Labs and OxyData.io.</p><p>The server itself was unprotected and easily accessible via <a href="http://35.199.58.125:9200/">http://35.199.58.125:9200</a>. While it appears that sensitive data remained safe, leaving any server unsecured is has the potential for catastrophe.</p><p>Read more <a href="https://securityaffairs.co/wordpress/94275/breaking-news/elasticsearch-social-information-1-2b-people.html">here</a></p><h3>Coin Stealer Found in Monero Linux Binaries from Official Site</h3><p>Last week, Monero’s official website was compromised, resulting in a coin stealer being implanted within their Linux 64-bit command-line Monero binaries. Multiple concerned users reported throughout Reddit, Twitter, and GitHub that the binaries downloaded from the website did not have matching hashes for over 40 minutes.</p><h3>Monero || #xmr on Twitter</h3><p>Monero Security Warning: CLI binaries available on https://t.co/UYopePqqdo may have been compromised at some point during the last 24h. Investigations ongoing. https://t.co/BqnONy4PPg</p><p>Moderators on Monero’s subreddit recommended that users verify the integrity of the binaries with Fluffypony’s GPG key to ensure validity. SerHack, a security researcher and contributor to the Monero project, stated that he discovered <a href="https://www.reddit.com/r/Monero/comments/dyfozs/security_warning_cli_binaries_available_on/f810dr6/">a coin stealer</a> embedded within the non-verified CLI binaries. A detailed analysis of the malware can be found <a href="https://bartblaze.blogspot.com/2019/11/monero-project-compromised.htmlhttps://bartblaze.blogspot.com/2019/11/monero-project-compromised.html">here</a>.</p><p>Get more information <a href="https://www.bleepingcomputer.com/news/security/coin-stealer-found-in-monero-linux-binaries-from-official-site/">here</a></p><h3>Google Offers up to $1.5 Million Bounty for Remotely Hacking Titan M Chip</h3><p>Google has <a href="https://security.googleblog.com/2019/11/expanding-android-security-rewards.html">announced</a> an increase in various rewards for finding and reporting critical vulnerabilities in the Android operating system. The most significant increase includes a $1 million bug bounty for a “full chain remote code execution exploit with persistence which compromises the Titan M secure element on Pixel devices.” If a security researcher can achieve full chain remote execution in developer preview versions of Android, Google will pay an additional $500,000, making the total $1.5 million for the find.</p><p>Google’s Titan M is a dedicated chip that protects devices against boot-time attacks. The separated hardware chip works with sensitive data, passcode verification, private, keys and more. Other new bounties include data exfiltration and lock screen bypass vulnerabilities.</p><p>In total, Google has paid out $1.5 million in 2019 as part of its bug bounty program.</p><p>Read more <a href="https://thehackernews.com/2019/11/google-pixel-titan-m-chip.html">here</a></p><h3>TrickBot Trojan Getting Ready to Steal OpenSSH and OpenVPN Keys</h3><p>TrickBot, the banking trojan that seems to evolve constantly, has upgraded its capabilities with an updated password grabber module. The new module steals OpenSSH private keys and OpenVPN passwords/configuration files. This February, the password stealer module was upgraded to take VNC, PuTTY, and Remote Desktop Protocol (RDP) credentials.</p><p>According to security researchers, TrickBot uses HTTP POST requests to send OpenSSH and OpenVPN passwords to their Command and control (C2) servers. The Unit 42 research team states that the “best security practices like running fully-patched and up-to-date versions of Microsoft Windows will hinder or stop TrickBot infections,” further emphasizing the importance of keeping a healthy patching schedule.</p><p>Read more <a href="https://www.bleepingcomputer.com/news/security/trickbot-trojan-getting-ready-to-steal-openssh-and-openvpn-keys/">here</a></p><p><em>Originally published at </em><a href="https://ledgerops.com/blog/2019/11/26/last-week-in-blockchain-and-cybersecurity-news-november-26-2019"><em>https://ledgerops.com</em></a><em> on November 26, 2019.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=79eaf8871c90" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Last Week In CyberSecurity News — November 19, 2019 — LedgerOps]]></title>
            <link>https://medium.com/@LedgerOps/last-week-in-cybersecurity-news-november-19-2019-ledgerops-a1d7990cfaa1?source=rss-285bf348997b------2</link>
            <guid isPermaLink="false">https://medium.com/p/a1d7990cfaa1</guid>
            <category><![CDATA[security]]></category>
            <category><![CDATA[newsletter]]></category>
            <category><![CDATA[ledgerops]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[hacker]]></category>
            <dc:creator><![CDATA[LedgerOps]]></dc:creator>
            <pubDate>Tue, 19 Nov 2019 00:00:00 GMT</pubDate>
            <atom:updated>2019-11-19T16:09:04.814Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*nf170eB_B4CB61LqWjnYZg.jpeg" /></figure><h3>Last Week In CyberSecurity News — November 19, 2019 — LedgerOps</h3><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FHk2rw6wnnKs%3Ffeature%3Doembed&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DHk2rw6wnnKs&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FHk2rw6wnnKs%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/4dbd4aa21f1889ca7e4159e87486e7a6/href">https://medium.com/media/4dbd4aa21f1889ca7e4159e87486e7a6/href</a></iframe><h3>New WhatsApp Bug Could Have Let Hackers Secretly Install Spyware on Your Device</h3><p>Yet again, WhatsApp is experiencing troubles related to the security infrastructure of its messaging platform. Last month, the company quietly patched another critical vulnerability which allowed a malicious actor to compromise devices remotely.</p><p>The vulnerability,<strong> CVE-2019–1193</strong>, is a stack-based buffer overflow issue that resides in the way WhatsApp parses the stream data of an MP4 file. This vulnerability results in denial-of-service or remote code execution attacks in which an attacker can steal secure chat messages and files you store in the application.</p><p>To exploit the vulnerability, an attacker first develops a malicious MP4 file and sends it to a vulnerable user. The file then installs a malicious backdoor on the device without the user’s knowledge.</p><p>The vulnerability affects all users of WhatsApp, including Apple iOS, Android, and Microsoft Windows devices.</p><p>According to a <a href="https://www.facebook.com/security/advisories/cve-2019-11931">statement</a> by Facebook, the affected app versions include:</p><ul><li>Android versions before 2.19.274</li><li>iOS versions before 2.19.100</li><li>Enterprise Client versions before 2.25.3</li><li>Windows Phone versions before and including 2.18.368</li><li>Business for Android versions before 2.19.104</li><li>Business for iOS versions before 2.19.100</li></ul><p>Read more <a href="https://thehackernews.com/2019/11/whatsapp-hacking-vulnerability.html">here</a></p><h3>TSX Speculative Attack Allows Theft of Sensitive Data from Latest Intel CPUs</h3><p>A new vulnerability, CVE-2019–11135, which affects the latest Intel CPUs, has been disclosed. And criminals can exploit the vulnerability to launch a TSX Speculative attack.</p><p>Transactional Synchronization Extensions (TSX) is a feature within Intel processors that adds hardware transactional memory support. The TSX feature has been implemented within all Intel CPUs manufactured since 2013.</p><p>A local attacker or malicious code can exploit this feature to steal sensitive information from the operating system kernel. This type of attack also targets speculative execution that work to improve performance within the processors.</p><p>Researchers discovered that “aborting memory transactions may allow processes to compute the data found in other running processes, including operating system kernel data. An attacker could exploit the flaw to steal sensitive data, including passwords and encryption keys.”</p><p>You can find technical details on the <a href="https://zombieloadattack.com/">Zombieload website</a>.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fplayer.vimeo.com%2Fvideo%2F372763488%3Fapp_id%3D122963&amp;dntp=1&amp;url=https%3A%2F%2Fvimeo.com%2F372763488&amp;image=https%3A%2F%2Fi.vimeocdn.com%2Fvideo%2F830678912_1280.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=vimeo" width="1280" height="720" frameborder="0" scrolling="no"><a href="https://medium.com/media/a26ab0b2cccb4985aa73dec4bfa1c118/href">https://medium.com/media/a26ab0b2cccb4985aa73dec4bfa1c118/href</a></iframe><p>Read more <a href="https://securityaffairs.co/wordpress/93816/hacking/tsx-speculative-attack.html">here</a></p><h3>Chrome, Edge, Safari Hacked at Elite Chinese Hacking Contest</h3><p>China’s top hacking competition, <a href="http://www.tianfucup.com/">Tianfu Cup</a>, is a two-day event, similar to Pwn2Own, where Chinese security researchers test zero-days against some of the most popular applications used throughout the world. On the first competition day, 32 hacking sessions were scheduled; of these, 13 were successful, seven failed, and 12 sessions were abandoned.</p><p>According to ZDNet, security researchers were successful in breaking into:</p><ul><li>(3 successful exploits) Microsoft Edge (the old version based on the EdgeHTML engine, not the new Chromium version) [<a href="https://twitter.com/TianfuCup/status/1195551119922982912">tweet</a>]</li><li>(2) Chrome [<a href="https://twitter.com/TianfuCup/status/1195571660096585728">tweet</a>]</li><li>(1) Safari [<a href="https://twitter.com/TianfuCup/status/1195584699680190466">tweet</a>]</li><li>(1) Office 365 [<a href="https://twitter.com/TianfuCup/status/1195576069446746113">tweet</a>, <a href="https://twitter.com/TianfuCup/status/1195602374678573056">tweet</a>]</li><li>(2) Adobe PDF Reader [<a href="https://twitter.com/TianfuCup/status/1195624774682038272">tweet</a>]</li><li>(3) D-Link DIR-878 router [<a href="https://twitter.com/TianfuCup/status/1195629013395337216">tweet</a>]</li><li>(1) qemu-kvm + Ubuntu [<a href="https://twitter.com/TianfuCup/status/1195638648923779073">tweet</a>, <a href="https://twitter.com/TianfuCup/status/1195617940579635201">tweet</a>]</li></ul><p>The organizers of the event plan to report all bugs to the respective organizations when the competition finishes.</p><p>On the second day, eight out of the 16 sessions were successful.</p><p>Successful exploits targeted:</p><ul><li>(4) D-Link DIR-878 [<a href="https://twitter.com/TianfuCup/status/1195939810558398464">tweet</a>]</li><li>(2) Adobe PDF Reader [<a href="https://twitter.com/TianfuCup/status/1195900405365891072">tweet</a>]</li><li>(1) VMWare Workstation [<a href="https://twitter.com/TianfuCup/status/1195904787373383681">tweet</a>, <a href="https://twitter.com/TianfuCup/status/1195910677241532416">tweet</a>]</li></ul><p>Team360Vulcan won the competition, earning them $382,500 for hacking “Microsoft Edge, Microsoft Office 365, qemu+Ubuntu, Adobe PDF Reader, and VMWare Workstation.”</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*j8_H977ctq7Im_CmhD-JLw.png" /></figure><p>Get more information <a href="https://www.zdnet.com/article/chrome-edge-safari-hacked-at-elite-chinese-hacking-contest/">here</a></p><h3>Two Charged Over Crypto Theft via SIM Swapping, Death Threats</h3><p>The Boston U.S. District Court has arrested and charged two men for stealing high-value social media accounts as well as hundreds of thousands of dollars worth of cryptocurrency by using death threats, hacking, and SIM swapping attacks.</p><p>The two men, Eric Meiggs and Declan Harrington, “were charged with one count of conspiracy, eight counts of wire fraud, one count of computer fraud and abuse, and one count of aggravated identity theft.”</p><p>Both defendants allegedly targeted cryptocurrency executives and other high-profile targets. They stole funds by taking over various victims’ online accounts and siphoning the cryptocurrency from their Block.io or Coinbase wallets.</p><p>According to the <a href="https://www.justice.gov/opa/pr/two-massachusetts-men-arrested-and-charged-nationwide-scheme-steal-social-media-accounts-and">unsealed indictment</a>, the defendants conducted several attacks, including:</p><ul><li>Identifying potential victims who likely had significant amounts of cryptocurrency, for example, executives of cryptocurrency companies.</li><li>Researching potential victims using online tools.</li><li>Engaging in SIM swapping in order to take control of victims’ cell phone number</li><li>Leveraging their control over victims’ cell phones to obtain unauthorized access to the victims’ online accounts, including email accounts, social media accounts, and cryptocurrency accounts.</li><li>Using their access to victims’ accounts, to take control of, and steal things of value from, the victims’ online accounts, including their account handles and their cryptocurrency.</li><li>Selling or otherwise transferring victims’ log-in credentials, account handles, and cryptocurrency to others in exchange for money or other things of value.</li><li>Using victims hacked online accounts to communicate with the victims’ friends and family in order to ask for money and cryptocurrency.</li><li>Communicating with co-conspirators via online social media and chat platforms.</li><li>Using multiple online accounts to hide their identities and evade detection by law enforcement.</li></ul><p>Both Meiggs and Harrington face a maximum of 20 years in prison for wire fraud with an additional two years in prison for aggravated identity theft.</p><p>Read more <a href="https://www.bleepingcomputer.com/news/security/two-charged-over-crypto-theft-via-sim-swapping-death-threats/">here</a></p><h3>GitHub Launches Security Lab to Boost Open-Source Security</h3><p>Last week, during the GitHub Universe developer conference, GitHub announced plans to launch a global platform for reporting and fixing security vulnerabilities in open-source projects. Google, Oracle, Mozilla, Intel, Uber, VMWare, and more have already partnered up with GitHub for the Security Lab project.</p><p>GitHub states that at least 40 percent of security flaws affecting open source code don’t receive a CVE when they’re announced. Therefore, those vulnerabilities are excluded from public databases which would alert customers of the risk.</p><p>As an additional security measure, GitHub also offers a token-scanning system to spot hard-coded credentials throughout various formats, a system used by 20 different cloud providers.</p><p>Read more <a href="https://nakedsecurity.sophos.com/2019/11/18/github-launches-security-lab-to-boost-open-source-security/">here</a></p><p><em>Originally published at </em><a href="https://ledgerops.com/blog/2019/11/19/last-week-in-blockchain-and-cybersecurity-news-november-19th-2019"><em>https://ledgerops.com</em></a><em> on November 19, 2019.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=a1d7990cfaa1" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Last Week In CyberSecurity News — November 12, 2019 — LedgerOps]]></title>
            <link>https://medium.com/@LedgerOps/last-week-in-cybersecurity-news-november-12-2019-ledgerops-385e9bfbd97b?source=rss-285bf348997b------2</link>
            <guid isPermaLink="false">https://medium.com/p/385e9bfbd97b</guid>
            <category><![CDATA[ransomware]]></category>
            <category><![CDATA[amazon]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[amazon-ring]]></category>
            <category><![CDATA[data-breach]]></category>
            <dc:creator><![CDATA[LedgerOps]]></dc:creator>
            <pubDate>Tue, 12 Nov 2019 00:00:00 GMT</pubDate>
            <atom:updated>2019-11-12T16:56:47.260Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*zISDofAjQ-GZxiE6pzNKkA.jpeg" /></figure><h3>Last Week In CyberSecurity News — November 12, 2019 — LedgerOps</h3><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FGdIYLS3vf58%3Ffeature%3Doembed&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DGdIYLS3vf58&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FGdIYLS3vf58%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/dc069aa8492e34632d710792b6ab058f/href">https://medium.com/media/dc069aa8492e34632d710792b6ab058f/href</a></iframe><h3><strong>Amazon’s Ring Video Doorbell Lets Attackers Steal Your Wi-Fi Password</strong></h3><p>Bitdefender security researchers have <a href="https://labs.bitdefender.com/2019/11/ring-video-doorbell-pro-under-the-scope/">disclosed</a> a high-severity vulnerability in Amazon’s Ring Video Doorbell Pro devices that allows nearby criminals to steal your Wi-Fi password, among other cyberattacks. The popular wireless home security doorbell cameras are used by millions of individuals around the world to see and speak to anyone in front of the camera.</p><p>For the device to work, you need to connect it to your Wi-Fi network, and during the setup steps, you must enable configuration mode from the doorbell. While the device is in configuration mode, it produces an access point with no password. And when you share your home’s Wi-Fi password, the device sends it insecurely through plain HTTP. During this time, a nearby attacker could connect to the unprotected access point and steal your Wi-Fi password using a man-in-the-middle attack.</p><p>Malicious actors can abuse this vulnerability by triggering the reconfiguration process of the Ring Video Doorbell Pro. Researchers state,</p><p><em>“One way to do this is to continuously send deauthentication packets, so that the device is dropped from the wireless network. At this point, the app loses connectivity and tells the user to reconfigure the device.”</em></p><p>Once the device enters configuration mode, the user has to re-share their Wi-Fi credentials, allowing an attacker to capture the plaintext.</p><p>According to Bitdefender and The Hacker News, once the attacker has the user’s Wi-Fi password, they can launch various attacks, including:</p><ul><li>Interacting with all devices within the household network;</li><li>Intercepting network traffic to run man-in-the-middle attacks</li><li>Accessing all local storage (NAS, for example) and subsequently accessing private photos, videos and other types of information,</li><li>Exploiting all vulnerabilities existing in the devices connected to the local network and getting full access to each device, which may lead to reading emails and private conversations,</li><li>Getting access to security cameras and stealing video recordings.</li></ul><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Bn8k_HB23pVTIqAM2PJJLw.png" /></figure><p>Read more <a href="https://thehackernews.com/2019/11/ring-doorbell-wifi-password.html">here</a></p><h3>DNA-Testing Startup Veritas Genetics Discloses Security Breach</h3><p>Veritas Genetics, a “whole genome sequencing company” that provides actionable insights for a healthier life and family, has disclosed a security breach containing the exposure of customer information.</p><p>The company discovered unauthorized access to its customer-facing portal and stated only a portion of its customers has been impacted. The company did not reveal further information on when or how long customer data has been exposed. In the company’s statement, it assured customers that DNA test results and health records were not accessed.</p><p>Read more <a href="https://securityaffairs.co/wordpress/93560/data-breach/veritas-genetics-data-breach.html">here</a></p><h3>Quiksilver and Billabong Affected by Ransomware Attack</h3><p>One of the world’s largest brands of surfwear and board sport-related equipment manufacturers was hit by a ransomware attack that affected its subsidiaries, including Quiksilver, Billabong, DC Shoes, Element, and more. The attack forced the company to shut down multiple systems all over the world. And, employees were prohibited from turning on their computers until the system was cleaned.</p><p>The attack also affected many of its communications and sales/distribution networks. The systems seem to have been restored and are now operating normally.</p><p>Get more information <a href="https://www.bleepingcomputer.com/news/security/quiksilver-and-billabong-affected-by-ransomware-attack/">here</a></p><h3>Encrypted Emails on macOS Found Stored in Unprotected Way</h3><p>Bob Gendler, an Apple IT specialist, has discovered a in macOS computers in which emails that are supposed to be protected with encryption are stored in a .db file unencrypted, rendering the purpose of an encrypted email useless.</p><p>To be affected, an individual would have to “be using macOS and Apple Mail, as well as be using Apple Mail to send encrypted emails without using FileVault to encrypt the entire system.”</p><p>The flaw brings up the question as to what else is tracked and improperly stored within the operating system. Gendler informed Apple on July 29 regarding this issue, but Apple has yet to resolve or address it.</p><p>Read more <a href="https://threatpost.com/encrypted-emails-on-macos-found-stored-in-unprotected-way/150065/">here</a></p><h3>Google Asks Three Mobile Security Firms to Help Scan Play Store Apps</h3><p>Google has had a long history of battling malicious applications in its Play Store. To help maintain a safer and more cyber-conscious app environment, Google has partnered with three cybersecurity firms — , , and — to start a new project called the App Defense Alliance.</p><p>The App Defense Alliance aims to improve the security scans that Android apps go through before being published on the Play Store by utilizing various malware and threat detection engines.</p><p>Typically, when an app developer applies to be listed on the Play Store, the app is scanned using Google Play Connect and a Google-internal system called Bouncer. While these systems have caught numerous malicious applications, it hasn’t been perfect. Many malicious actors have developed mitigations to get past Bouncer and Play Protect scans, such as using a multi-stage delivery system.</p><p>In Google’s announcement, the company states that it is “integrating [its] Google Play Protect detection systems with each partner’s scanning engines” and “this will generate new app risk intelligence as apps are being queued to publish.”</p><p>As malicious applications are becoming more common, these additional processes appear to be a correct step in the never-ending process of battling trojans and other malware threats.</p><p>Read more <a href="https://www.zdnet.com/article/google-asks-three-mobile-security-firms-to-help-scan-play-store-apps/">here</a></p><p><em>Originally published at </em><a href="https://ledgerops.com/blog/2019/11/12/last-week-in-blockchain-and-cybersecurity-news-november-12th-2019"><em>https://ledgerops.com</em></a><em> on November 12, 2019.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=385e9bfbd97b" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>