Daily NCSC-FI news followup 2021-08-15

T-Mobile Investigating Claims of Massive Customer Data Breach

www.vice.com/en/article/akg8wg/tmobile-investigating-customer-data-breach-100-million T-Mobile says it is investigating a forum post claiming to be selling a mountain of personal data. The forum post itself doesn’t mention T-Mobile, but the seller told Motherboard they have obtained data related to over 100 million people, and that the data came from T-Mobile servers.

Hacker Returns $600+ Million Haul in Poly Network Cryptocurrency Heist

www.msspalert.com/cybersecurity-breaches-and-attacks/hacker-returns-600-million-haul-in-poly-network-cryptocurrency-heist/ A hacker atypically has returned all of the more than $600 million in digital coins they stole on Tuesday August 11, 20p21 from Poly Network, a decentralized financial (DeFi) platform, in what’s said to be one of the largest cryptocurrency heists in history.

Network access to Pakistan’s top fed agency FBR sold on Russian forum

www.hackread.com/network-access-pakistans-top-fbr-russian-forum/ The Federal Board of Revenue (FBR) of Pakistan (fbr.gov.pk) has suffered a large-scale cyber attack. This was revealed after a group of unknown hackers were found selling network access to the agency with more than 1500 computer systems on a Russian cybercrime forum.

Mitä valtiollinen kybervakoilu tarkoittaa Suomelle?

www.tivi.fi/uutiset/mita-valtiollinen-kybervakoilu-tarkoittaa-suomelle/f2a594f5-0d2e-41a5-b60e-aa5696616698 Räätälöidyn, tarkkaan kohdistetun ja ennalta-arvaamattoman kybervakoilun riski kasvaa Suomessa. Vakoilu voi olla osa tiedonkeruutoimintaa tai laajempaa, esimerkiksi tietojärjestelmiin kohdistuvaa operaatiota. [TILAAJILLE]

Puhelimessa haittaohjelma? Uskomattoman yksinkertainen kikka auttaa pitkälle

www.is.fi/digitoday/tietoturva/art-2000008186492.html Uudelleenkäynnistys voi kuulostaa äkkiseltään lähinnä kuluneelta nettivitsiltä, mutta siitä on usein ratkaisevaa apua haittaohjelman iskiessä. Konstiin ei pidä kuitenkaan luottaa liikaa.

Ford bug exposed customer and employee records from internal systems

www.bleepingcomputer.com/news/security/ford-bug-exposed-customer-and-employee-records-from-internal-systems/ A bug on Ford Motor Company’s website allowed for accessing sensitive systems and obtaining proprietary data, such as customer databases, employee records, internal tickets, etc. The data exposure stemmed from a misconfigured instance of Pega Infinity customer engagement system running on Ford’s servers.

You might be interested in …

Daily NCSC-FI news followup 2020-05-26

New Zealand introduces Bill to block violent extremist content www.zdnet.com/article/new-zealand-introduces-bill-to-block-violent-extremist-content/ It would make livestreaming of objectionable content a criminal offence, censorship calls will be made immediately, and take-down notices will be backed by law. YK: kyberiskuissa roimaa kasvua supervalta boikotoi kokousta www.tivi.fi/uutiset/tv/b9faeb00-ec81-42a1-ba54-18f88164034f YK varoitti perjantaina kyberrikosten olevan kasvussa koronapandemian aikana. YK:n epävirallisessa turvallisuusneuvoston kokouksessa perjantaina […]

Read More

Daily NCSC-FI news followup 2019-08-31

VLAN as an additional security layer www.kaspersky.com/blog/vlan-security/28253/ Every company has employees who handle large volumes of external e-mail. HR officers, PR managers, and salespeople are a few common examples. In addition to their regular mail, they receive a lot of spam, phishing messages, and malicious attachments. Moreover, the nature of their work requires them to […]

Read More

Daily NCSC-FI news followup 2019-10-16

Phorpiex Botnet Sending Out Millions of Sextortion Emails Using Hacked Computers thehackernews.com/2019/10/phorpiex-botnet-sextortion-emails.html A decade-old botnet malware that currently controls over 450,000 computers worldwide has recently shifted its operations from infecting machines with ransomware or crypto miners to abusing them for sending out sextortion emails to millions of innocent people. Docker Containers Riddled with Graboid Crypto-Worm […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.