Daily NCSC-FI news followup 2020-07-24

Garmin outage caused by confirmed WastedLocker ransomware attack

www.bleepingcomputer.com/news/security/garmin-outage-caused-by-confirmed-wastedlocker-ransomware-attack/ Wearable device maker Garmin shut down some of its connected services and call centers on Thursday following what the company called a worldwide outage, now confirmed to be caused by a WastedLocker ransomware attack. Lisäksi

www.zdnet.com/article/garmin-services-and-production-go-down-after-ransomware-attack/ ja

www.forbes.com/sites/leemathews/2020/07/23/garmins-alleged-ransomware-wastedlocker-evil-corp/ ja thehackernews.com/2020/07/garmin-ransomware-attack.html ja


Poliisi varoittaa Microsoft huijaussoitoista – älä anna pankkitietoja tai henkilötietoja puhelimessa

www.poliisi.fi/tietoa_poliisista/tiedotteet/1/1/poliisi_varoittaa_microsoft_huijaussoitoista_-_ala_anna_pankkitietoja_tai_henkilotietoja_puhelimessa_91999?language=fi Poliisi muistuttaa, että pankkitunnustietoja tai henkilötietoja ei pidä koskaan luovuttaa, jos ei ole varma vastaanottajasta. Viranomaiset, rahalaitokset tai muut asialliset tahot eivät koskaan kysy tällaisia tietoja puhelimitse. Lisäksi

www.poliisi.fi/tietoa_poliisista/tiedotteet/1/1/poliisi_muistuttaa_edelleen_-_ala_anna_pankkitunnuksiasi_kenellekaan_92000?language=fi – – Poliisi muistuttaa edelleen : Älä anna pankkitunnuksiasi kenellekään

Spanish state-owned railway infrastructure manager ADIF infected with ransomware

securityaffairs.co/wordpress/106304/cyber-crime/adif-revil-ransomware-attack.html ADIF, a Spanish state-owned railway infrastructure manager under the responsibility of the Ministry of Development, was hit by REVil ransomware operators

Twitter hackers read private messages of 36 high-profile accounts

www.bleepingcomputer.com/news/security/twitter-hackers-read-private-messages-of-36-high-profile-accounts/ Twitter today admitted that the attackers behind last week’s incident read the private messages of 36 out of a total of 130 high-profile accounts targeted in the attack. Lisäksi

www.theregister.com/2020/07/23/twitter_hack_dutch_politician_dms_accessed/ ja


ASUS Home Router Bugs Open Consumers to Snooping Attacks

threatpost.com/asus-home-router-bugs-snooping-attacks/157682/ The two flaws allow man-in-the-middle attacks that would give an attacker access to all data flowing through the router. Lisäksi


Yhdysvaltain ja Kiinan kylmä sota jatkuu kahta kiinalaishakkeria syytetään yritysvakoilusta

www.kauppalehti.fi/uutiset/yhdysvaltain-ja-kiinan-kylma-sota-jatkuu-kahta-kiinalaishakkeria-syytetaan-yritysvakoilusta/dbbfd712-71de-478b-9943-f8ebebd26997 Yhdysvallat on julkaissut tietoja syytteestä kahta kiinalaishakkeria kohtaan. Syytteen mukaan hakkerit onnistuivat kymmenen vuoden aikana kaappaamaan valtavan määrän salaista dataa amerikkalaisyrityksistä. Lisäksi


New variant of Phobos ransomware is coming

blog.360totalsecurity.com/en/new-variant-of-phobos-ransomware-is-coming/ Recently, 360 Security Center has detected that a new variant of the Phobos ransomware virus appeared on the network. The virus uses software such as system activation tools as a carrier to induce users to download and install, steal the user’s machine information, and further pass the Trojan C&C server Download encryption ransomware related programs and implement Bitcoin ransomware.

A vigilante is sabotaging the Emotet botnet by replacing malware payloads with GIFs

www.zdnet.com/article/a-vigilante-is-sabotaging-the-emotet-botnet-by-replacing-malware-payloads-with-gifs/ An unknown vigilante hacker has been sabotaging the operations of the recently-revived Emotet botnet by replacing Emotet payloads with animated GIFs, effectively preventing victims from getting infected.

Alert (AA20-206A) Threat Actor Exploitation of F5 BIG-IP CVE-2020-5902

us-cert.cisa.gov/ncas/alerts/aa20-206a CISA is issuing this alert in response to recently disclosed exploits that target F5 BIG-IP devices that are vulnerable to CVE-2020-5902. F5 Networks, Inc. released a patch for CVE-2020-5902 on June 30, 2020. Unpatched F5 BIG-IP devices are an attractive target for malicious actors. Affected organizations that have not applied the patch to fix this critical remote code execution (RCE) vulnerability risk an attacker exploiting CVE-2020-5902 to take control of their system. Note: F5’s security advisory for CVE-2020-5902 states that there is a high probability that any remaining unpatched devices are likely already compromised.

You might be interested in …

Daily NCSC-FI news followup 2021-04-20

Pulse Connect Secure Security Update blog.pulsesecure.net/pulse-connect-secure-security-update/ The Pulse Secure team recently discovered that a limited number of customers have experienced evidence of exploit behavior on their Pulse Connect Secure (PCS) appliances. We are sharing information about the investigation and our actions through several communications channels in the best interests of our customers and the greater […]

Read More

Daily NCSC-FI news followup 2021-06-08

Justice Dept. Claws Back $2.3M Paid by Colonial Pipeline to Ransomware Gang krebsonsecurity.com/2021/06/justice-dept-claws-back-2-3m-paid-by-colonial-pipeline-to-ransomware-gang/ The U.S. Department of Justice said today it has recovered $2.3 million worth of Bitcoin that Colonial Pipeline paid to ransomware extortionists last month. Lisäksi: thehackernews.com/2021/06/us-recovers-23-million-ransom-paid-to.html. Lisäksi: threatpost.com/fbi-claws-back-millions-darksides-ransom/166705/. Lisäksi: yle.fi/uutiset/3-11970237 StackOverflow, Twitch, Reddit, others down in Fastly CDN outage www.bleepingcomputer.com/news/security/stackoverflow-twitch-reddit-others-down-in-fastly-cdn-outage/ Major websites […]

Read More

Daily NCSC-FI news followup 2021-03-08

A Basic Timeline of the Exchange Mass-Hack krebsonsecurity.com/2021/03/a-basic-timeline-of-the-exchange-mass-hack/ Sometimes when a complex story takes us by surprise or knocks us back on our heels, it pays to revisit the events in a somewhat linear fashion. Heres a brief timeline of what we know leading up to last weeks mass-hack, when hundreds of thousands of Microsoft […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.