Daily NCSC-FI news followup 2019-12-25

Toistasataa kiinalaista pidätettiin Nepalissa epäiltynä kyberhuijauksesta

yle.fi/uutiset/3-11134577 Ratsiassa takavarikoitiin yli 700 puhelinta ja 400 tietokonetta.

Staying Cyber-Safe This Holiday Season

www.fortinet.com/blog/industry-trends/staying-cyber-safe-this-holiday-season.html Look-alike websites, fake shipping notifications, e-cards, emergency scams, phony charities, free gift cards etc. These are the most common forms of holiday scams.

Signs of Phishing: Protecting Yourself During the Holidays

www.tripwire.com/state-of-security/featured/signs-of-phishing-protecting-yourself-during-the-holidays/ Some things to look for in trying to spot phishing emails.

Sextortionists return for Christmas – price goes down, threats go up

nakedsecurity.sophos.com/2019/12/24/sextortionists-return-for-christmas-price-goes-down-threats-go-up/ Criminals try to avoid email filters by using inline images of their ransom demands. Delete the email and have a merry holiday instead!

How E-commerce Sites Can Counter ‘AuthBots’

blog.radware.com/security/botnets/2019/12/how-e-commerce-sites-can-counter-authbots/ Cybercriminals are siphoning the personal information of millions of shoppers. Dubbed AuthBots because of their persistent attempts at cracking authentication, this botnet group targets ecommerce firms with large-scale credential stuffing and cracking attacks to take over user accounts.

Maze Ransomware Releases Files Stolen from City of Pensacola

www.bleepingcomputer.com/news/security/maze-ransomware-releases-files-stolen-from-city-of-pensacola/ The actors behind the Maze Ransomware have released 2GB of files that were allegedly stolen from the City of Pensacola during their ransomware attack.. Criminals demanded a $1 million ransom to decrypt their files.

Entercom Radio Network Hit By Second Cyber Attack This Year

www.bleepingcomputer.com/news/security/entercom-radio-network-hit-by-second-cyber-attack-this-year/ This is the second time the network has to recover from a cyber event, the first one hitting in September being a ransomware attack that caused significant financial losses.. Considering the short time required to resume activity to a relatively normal level, it may be that the security measures installed after the attack in September paid off.

Marketing Agency Temporarily Halts Operations after Ransomware Attack

www.tripwire.com/state-of-security/security-data-protection/marketing-agency-temporarily-halts-operations-after-ransomware-attack/ Sandra Franecke, CEO of the Heritage Company, sent a letter to employees that the company would temporarily be suspending its operations. She went on to ask the agencys more than 300 employees to call the company on January 2nd to see if any progress had been made in recovering systems.. See also: 22 ransomware prevention tips


You might be interested in …

Daily NCSC-FI news followup 2021-01-07

Linux malware authors use Ezuri Golang crypter for zero detection www.bleepingcomputer.com/news/security/linux-malware-authors-use-ezuri-golang-crypter-for-zero-detection/ Multiple malware authors are using the “Ezuri” crypter and memory loader to make their code undetectable to antivirus products. Source code for Ezuri, written in Golang, is available on GitHub for anyone to use. December 2020’s Most Wanted Malware: Emotet Returns as Top Malware […]

Read More

Daily NCSC-FI news followup 2020-04-15

Pelaavatko lapset työkoneellasi? Se voi olla vakava tietoturvariski, varoittaa F-Securen Mikko Hyppönen yle.fi/uutiset/3-11293842 Tietomurron mahdollisuus kasvaa, mikäli työntekoon käytetään omia laitteita ilman kunnon suojausta. Alert (AA20-106A) – Guidance on the North Korean Cyber Threat www.us-cert.gov/ncas/alerts/aa20-106a The U.S. Departments of State, the Treasury, and Homeland Security, and the Federal Bureau of Investigation are issuing this advisory […]

Read More

Daily NCSC-FI news followup 2019-07-28

Who’s Behind the Syrian Electronic Army? – An OSINT Analysis ddanchev.blogspot.com/2019/07/whos-behind-syrian-electronic-army.html Continuing the “FBI Most Wanted Cybercriminals” series I’ve decided to continue providing actionable threat intelligence on some of the most prolific and wanted cybercriminals in the World through the distribution and dissemination of actionable intelligence regarding some of the most prolific and wanted cybercriminals.. […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.