Mobile phone holders all over the UK may be seeing an increase in SMS phishing (smishing) attacks from the Royal Mail – the messages say the user owes a small fee to pay on postage or the package will be returned to sender. Cybercriminals using this tactic are preying on people who might actually be expecting something in the post (like me!) I do also have the image of the text if you would like me to send it. The worrying thing about this one is that the link it sends to is an https link, which we often get…
Author: ISBuzz Team
Almost a week after the significant ransomware attack on the Ireland Health Service (HSE) network, the group responsible has started leaking patients’ medical and personal details online. HSE publicly disclosed the attack on Friday, when the organisation announced that it had shut down its IT systems. The attack affected diagnostic services and forced many hospitals to cancel appointments. The Financial Times claims to have seen screenshots and files, seemingly confirming that the Conti ransomware group is now leaking data onto the dark web. Irish Prime Minister Micheál Martin has ruled out paying a ransom to the Conti cyber gang.
We’re quickly moving toward a reality where everything needs to be signed. Not just the software we buy from third-party vendors, but also the software we build and deploy within our own organizations — everything from PowerShell scripts, Bash scripts, containers, libraries, files, and executables. Thanks to the adoption of CI/CD and build and test automation tools, application and operations teams are moving faster than ever, but that means fewer human eyes with a direct line of sight into what’s happening throughout the pipeline.
BACKGROUND: The Solar Winds CEO has announced that its infamous hack may have happened months earlier than thought. Sudhakar Ramakrishna suggested that hackers that penetrated 10 U.S. government agencies and scores of companies may have been inside his company’s network as early as January 2019. Eric Milam, VP of Research and Intelligence, BlackBerry shares his view: this is not a shock! Many threat actors lie low for months before activation. This means organisations must be deploying tools to catch breaches even once they have happened.
BACKGROUND: New Zealand’s Waikato District Health Board confirmed on May 18th that it is addressing a “cyber security incident” and was experiencing full outage of its information systems, impacting the district’s hospitals and health services which are currently operating without IT support. An expert with Gurucul offers perspective.
BACKGROUND: Earlier this week, Cloudflare drew attention drawn to the ineffectiveness of the CAPTCHA tool that so many of us annoyingly go along with, forcing us to count the number of traffic lights before we can purchase tickets. At the same time, suggestions were made about replacing it with a personal security key.
BACKGROUND: It has been reported that personal information of customers of property website MyHome.ie was “inadvertently” leaked online, the company has confirmed. A large number of customer files which were uploaded onto the MyHome.ie “customer relationship management (CRM) system” from 2014 were also, “unbeknownst” to the company, “automatically stored in a temporary folder on the MyHome.ie server”.
BACKGROUND: Following recent news on Elon Musk impersonators earning millions through crypto-scams, please find comments from industry leader on how organisations need to fight misinformation without playing the blame game on consumers, and how initiatives like the UK’s Online Safety Bill is a welcome step forward.
It has been reported that the FBI says that complaints concerning online scams and investment fraud have now reached a record-breaking level. The FBI’s Internet Crime Complaint Center (IC3) received its six millionth complaint on May 15, 2021. According to the US agency, annual complaint volumes increased by close to 70% between 2019 and 2020. The most common crimes reported were phishing scams, schemes relating to non-payment or non-delivery, and extortion attempts.
New research from Kaspersky shows Bizarro banking Trojan expands its attacks to Europe with customers from 70 banks targeted in Spain, Portugal, France and Italy. The report reads in part: “Bizarro has x64 modules and is able to trick users into entering two-factor authentication codes in fake pop-ups. It may also use social engineering to convince victims to download a smartphone app. The group behind Bizzaro uses servers hosted on Azure and Amazon (AWS) and compromised WordPress servers to store the malware and collect telemetry.” An expert with Veridium offers perspective.