Largest U.S. pipeline shuts down operations after ransomware attack
www.bleepingcomputer.com/news/security/largest-us-pipeline-shuts-down-operations-after-ransomware-attack/ Colonial Pipeline, the largest fuel pipeline in the United States, has shut down operations after suffering what is reported to be a ransomware attack. Colonial Pipeline transports refined petroleum products between refineries located in the Gulf Coast and markets throughout the southern and eastern United States. The company transports 2.5 million barrels per day through its 5,500 mile pipeline and provides 45% of all fuel consumed on the East Coast.. Also:
How China turned a prize-winning iPhone hack against the Uyghurs
www.technologyreview.com/2021/05/06/1024621/china-apple-spy-uyghur-hacker-tianfu/ An attack that targeted Apple devices was used to spy on Chinas Muslim minorityand US officials claim it was developed at the countrys top hacking competition.. In March 2017, a group of hackers from China arrived in Vancouver with one goal: Find hidden weak spots inside the worlds most popular technologies. Googles Chrome browser, Microsofts Windows operating system, and Apples iPhones were all in the crosshairs. But no one was breaking the law. These were just some of the people taking part in Pwn2Own, one of the worlds most prestigious hacking competitions.
Instagramista löytyi useita vaarallisia tilejä varo näiltä tulevia yhteydenottoja
www.iltalehti.fi/tietoturva/a/e62af4f1-b397-4ba6-8e89-b284e6dfb44f Instagramissa erottuu uusi huijaustrendi, jossa rikolliset perustavat valetilejä oikeiden tilien seuraajien huijaamiseksi arvontojen avulla. Liikkeellä on useita valetilejä, jotka on luotu imitoimaan aitoja, suosittuja tilejä. Valetilit on tavallisesti luotu niin, että niissä on käytetty aitojen tilien kuvia sekä kuvausta, jolloin ne ovat suoria kopioita. Toisissa tapauksissa tili saattaa olla tehty niin, että se näyttää oikean tilin rinnakkaistililtä, jonka kautta väitetään arvontojen palkintojenjaon tapahtuvan. Valetilit ilmestyvät usein nopeasti sen jälkeen, kun aito tili on laittanut pystyyn arvonnan.
Business email compromise campaign targets wide range of orgs with gift card scam
www.microsoft.com/security/blog/2021/05/06/business-email-compromise-campaign-targets-wide-range-of-orgs-with-gift-card-scam/ Cybercriminals continue to target businesses to trick recipients into approving payments, transferring funds, or, in this case, purchasing gift cards. This kind of email attack is called business email compromise (BEC)a damaging form of phishing designed to gain access to critical business information or extract money through email-based fraud. In this blog, we want to share our investigation of a BEC campaign that used attacker-created email infrastructure to facilitate gift card theft.
Ransomware gangs have leaked the stolen data of 2,100 companies so far
www.bleepingcomputer.com/news/security/ransomware-gangs-have-leaked-the-stolen-data-of-2-100-companies-so-far/ Since 2019, ransomware gangs have leaked the stolen data for 2,103 companies on dark web data leaks sites. When modern ransomware operations began in 2013, the attacker’s goal was to encrypt as many companies as possible and then demand a ransom payment for a decryptor. Since the beginning of 2020, ransomware operations began conducting a new tactic called double-extortion.
ISPs Funded 8.5 Million Fake Comments Opposing Net Neutrality
www.wired.com/story/isps-funded-85-million-fake-comments-opposing-net-neutrality/ The secret campaign, backed by major broadband companies, used real peoples names without their consent. THE LARGEST INTERNET providers in the US funded a campaign that generated “8.5 million fake comments” to the Federal Communications Commission as part of the ISPs’ fight against net neutrality rules during the Trump administration, according to a report issued Thursday by New York state attorney general Letitia James.
Are The Notorious Cyber Criminals Evil Corp actually Russian Spies?