Hope you had a great week, today is a bit gloomy here in Japan. But rain or shine, there is news to recap. So let’s get to it.
- First, it looks the Mark Zuckerberg had his Twitter and Pinterest account hacked. The Saudi hacker group “OurMine” hacked his account using the password found in the massive LinkedIn password data dump. They cracked his password, and tried it on several other service and went on from there. His password was really weak as well, which really doesn’t bode well for someone responsible for so many users on his own service.
- Read More @ http://thehackernews.com/2016/06/facebook-zuck-hacked.html
- Next, an interesting article on ransomware known as “SNSLocker” I have not heard of this one until now, as it doesn’t seem to be very prevalent. Through analysis of it’s code it looks like the researchers at TrendMicro discovered that the ransomware is actually storing server credentials in its code. Sloppy to say the least, but with how easy it seems to be to setup and run, all types of operations will exist, I suppose.
- Read More @ http://blog.trendmicro.com/trendlabs-security-intelligence/ransomware-leaves-server-keys-code/
- Next, keeping up with the ransomware theme, a great write up on history and evolution of ransomware as it became the dominant threat in the malware landscape. Great read.
- Read More @ https://blog.malwarebytes.org/cybercrime/2016/06/ransomware-dominates-the-threat-landscape/
- And to illustrate the above point, it looks like the University of Calgary has payed a sizable ransom following a ransomware attack. The ransomware in question is still unknown, but the affect seems to have been quite widespread as the University felt compelled to pay despite security experts discouraging companies from actually paying the criminals.
- Read More @ https://threatpost.com/university-of-calgary-pays-20k-following-ransomware-attack/118562/
- Next, moving on to Point of Sale malware. Krebs On Security has a great article taking an in depth look at a PoS botnet that has infected the CiCi’s Pizza chain. Good read as always.
- Read More @ http://krebsonsecurity.com/2016/06/slicing-into-a-point-of-sale-botnet/
- Next, it seems as if the Angler Exploit Kit might have been put out of commission. Caffeine, the resident EK expert, noticed that Angler traffic has essentially disappeared as of June 7th. Speculation exists as to whether arrests were made in regards to the authors, or if they are simply stepping back in order to try and fade away in order to avoid arrest. Given that Angler has been one of the dominant players in this space, this is quite a surprise.
- Read More @ http://malware.dontneedcoffee.com/2016/06/is-it-end-of-angler.html
- Next, another Point of Sale malware article. This one taking a look at the reputation damage caused to companies by such breaches, and also the common targets of PoS malware.
- Read More @ http://blog.trendmicro.com/pos-hacks-damage-company-reputation/
- Lastly, news of a third party vendor associated with State Farm insurance company misusing payment card information has surfaced. State Farm started informing affected customers of the misuses, and offered credit monitoring service for those affected. Just goes to show how easy it is for information to be misused when it’s available to the wrong people, or in this case, partners.
- Read More @ http://www.scmagazine.com/state-farm-security-incident-resulted-in-compromised-customer-data/article/501689/