Daily NCSC-FI news followup 2020-11-01

Nyt tuli peli, jota puolustusministeriökin hehkuttaa: “Nyt saa pelata työajalla”

www.is.fi/digitoday/tietoturva/art-2000006705549.html Digiturvallinen elämä -peli ei vie paljoa aikaa, mutta sen hyödyt voivat kantaa pitkälle.

US Cyber Command exposes new Russian malware

www.zdnet.com/article/us-cyber-command-exposes-new-russian-malware/#ftag=RSSbaffb68 Together with CISA and the FBI, US Cyber Command wish Russian state hackers a “Happy Halloween!”. Six of the eight samples are for the ComRAT malware (used by the Turla hacking group), while the other two are samples for the Zebrocy malware (used by the APT28 hacking group).

A new scam uses Google Drive to send out a deluge of dodgy links

www.wired.co.uk/article/google-drive-spam-comments-phishing Scammers are luring people into Google Drive documents in an attempt to get them to visit potentially malicious websites. Scammers just found a new phishing lure to play with: Google Drive. A flaw in the Drive is being exploited to send out seemingly legitimate emails and push notifications from Google that, if opened, could land people on malicious websites. The scam itself is nothing new messages asking you to click on dodgy links are as old as the internet itself but could catch a lot of people off guard. The smartest part of the scam is that the emails and notifications it generates come directly from Google. On mobile, the scam uses the collaboration feature in Google Drive to generate a push notification inviting people to collaborate on a document. If tapped, the notification takes you directly to a document that contains a very large, tempting link. An email notification created by the scam, which also comes from Google, also contains a potentially malicious link. Unlike regular spam, which Gmail does a pretty good job of filtering out, this message not only makes it into your inbox, it gets an added layer of legitimacy by coming from Google itself.

Ransom Hackers In Finland Are Using Psychotherapy Medical Records As Ammunition

www.forbes.com/sites/michalgromek/2020/10/31/ransom-hackers-in-finland-are-using-psychotherapy-medical-records-as-ammunition/ Multiple potentially unrelated individuals have gained access to Vastaamo’ psychotherapy centres which treated up to 50.000 patients primarily in Oulu and Tampere. The hackers exploited a security breach of 2018 and early 2019 which seems to not have been extensively reported to authorities or the general public.

Ex-tietosuojavaltuutettu Reijo Aarnio jyrähtää vielä kerran: Vastaamon tietomurto on digitaalista väkivaltaa ja verinen vääryys

yle.fi/uutiset/3-11615577 Aarnion yli kahdenkymmenen vuoden ura päättyi kauhuesimerkkiin siitä mitä tapahtuu, kun yritys ei huolehdi tietoturvastaan.

Naked Zoom Users Targeted By New Cybercrime Campaign

www.forbes.com/sites/daveywinder/2020/11/01/naked-zoom-users-targeted-by-new-cybercrime-campaign/ An ongoing cybercrime campaign targets Zoom users who may have got naked or intimate on camera.

Gold seller JM Bullion hacked to steal customers’ credit cards

www.bleepingcomputer.com/news/security/gold-seller-jm-bullion-hacked-to-steal-customers-credit-cards/ Precious metal online retailer JM Bullion has disclosed a data breach after their site was hacked to include malicious scripts that stole customers’ credit card information.

You might be interested in …

Daily NCSC-FI news followup 2021-01-03

2021 Cybersecurity Trends: Bigger Budgets, Endpoint Emphasis and Cloud threatpost.com/2021-cybersecurity-trends/162629/ Insider threats are redefined in 2021, the work-from-home trend will continue define the threat landscape and mobile endpoints become the attack vector of choice, according 2021 forecasts. After shrinking in 2020, cybersecurity budgets in 2021 climb higher than pre-pandemic limits. Authentication, cloud data protection and […]

Read More

Daily NCSC-FI news followup 2020-06-29

PROMETHIUM extends global reach with StrongPity3 APT blog.talosintelligence.com/2020/06/promethium-extends-with-strongpity3.html The PROMETHIUM threat actor active since 2012 has been exposed multiple times over the past several years.. However, this has not deterred this actor from continuing and expanding their activities. By matching indicators such as code similarity, command and control (C2) paths, toolkit structure and malicious behavior, […]

Read More

Daily NCSC-FI news followup 2021-05-11

Companies 5 Million Personal identifiable information records detected on an AWS service due to misconception of users blog.checkpoint.com/2021/05/11/companies-5-million-personal-identifiable-information-records-detected-on-an-aws-service-due-to-misconception-of-users/ CPR was able to detect personal records in Amazon Web Services (AWS). By analyzing and enumerating public AWS Systems Manager (SSM) documents, CPR retrieved over five million personally identifiable information records and credit card transactions of companies, […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.