In light of the recent news around the fraudulent banking scam using text messages to steal sensitive bank details amid the Covid-19 vaccine rollout, the expert provides an insight below.
Author: ISBuzz Team
A cybercriminal group has posted what it claims are documents stolen from Hackney Council in a ransomware attack last year. Last year in October, the council was hit with serious cyber-attack. The council is working with UK’s National Cyber Security Centre (NCSC) and the Ministry of Housing to investigate the impact of the incident. The stolen documents contain very sensitive information such as “passportsdump”, “staffdata” and “PhotoID” and were posted on a darknet.
Nissan North America has had the source code of mobile apps and internal tools leaked online after misconfiguring one of its Git Servers. The Git Server has default username and password (admin/admin) and is now taken offline. The Nissan is investigating the leak. Offering insight on the story are the following cybersecurity professionals.
Dutch company Eye Control found a major security vulnerabilities in products shipped by networking firm Zyxel. The discovery found that an admin-level backdoor account hardcoded into the company’s VPN hardware, Firewalls and acess point controllers. The cybercriminals are now exploited this vulnerability to gain access to these devices. The cybersecurirty experts below highlighted the danger of compromising the network devices especially the VPN.
Researcher Chuong Dong has uncovered a new ransomware operation called Babuk that launched at the beginning of 2021 and has since amassed a small list of victims from around the world. It uses some of the new techniques he’s seen see such as multi-threading encryption as well as abusing the Windows Restart Manager similar to Conti and REvil.
Following the news that the banking industry trade body, UK Finance, is calling for an increase to the contactless payment limit from £45 to £100, please find a comment below from the CEO of the biometric company.
Nation-state cyber-attacks have never been more complex than they are right now. The fallout of the SolarWinds breach continues to reverberate across the industry, and the conversation is shifting to how to mitigate and defend against the next attack on this scale. There is no silver bullet for the insidious nature of supply chain attacks. However, a Cybersecurity expert outlines the imperative need for Zero Trust solutions as a central part of detecting and mitigating nation-state attacks.
CISA has just issued a statement citing that Russia is “likely” behind SolarWinds attack, with the FBI, NSA and The Office of The Director of National Intelligence (ODNI) and acknowledging the formation of a task force. Excerpt: On behalf of President Trump, the National Security Council staff has stood up a task force construct known as the Cyber Unified Coordination Group (UCG), composed of the FBI, CISA, and ODNI with support from NSA, to coordinate the investigation and remediation of this significant cyber incident involving federal government networks. The UCG is still working to understand the scope of the incident but…
A group of U.S. intelligence agencies on Tuesday formally accused Russia of being linked to the recently discovered hack of IT group SolarWinds that compromised much of the federal government. The FBI, the Office of the Director of National Intelligence (ODNI), the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) attributed the effort to Russia. The group had set up a cyber unified coordination group in December after the compromise of SolarWinds was revealed. “This work indicates that an Advanced Persistent Threat (APT) actor, likely Russian in origin, is responsible for most or all of the recently discovered, ongoing cyber compromises of both government…
The announcement that certificates for older Android versions will expire on the 1st September 2021 has meant that some devices and websites are likely to witness problems as early as January. As past experiences have clearly shown, expiring certificates and lack of updates provide cybercriminals with the perfect window to exploit vulnerabilities.