Daily NCSC-FI news followup 2021-08-25

Ransomware: These four rising gangs could be your next major cybersecurity threat

www.zdnet.com/article/ransomware-these-four-rising-threats-could-be-the-next-major-cybersecurity-risk-facing-your-business/#ftag=RSSbaffb68 Cybersecurity researchers have warned of four emerging families of ransomware that could pose a significant cybersecurity threat to businesses. . Ransomware remains one of the key cybersecurity threats facing businesses around the world as cyber criminals try to compromise networks and encrypt them to demand ransom payments, which can amount to millions. Cybersecurity researchers at Palo Alto Networks have detailed four upcoming families of ransomware discovered during investigations and under the right circumstances, any of them could become the next big ransomware threat. LockBit 2.0, AvosLocker, Hive ransomware, and Hello Kitty ransomware.

Hacktivists leak videos of abuse in Iran Evin prison

therecord.media/hacktivists-leak-videos-of-abuse-in-iran-evin-prison/ A hacktivist group going by the name of Adalat Ali (Ali’s Justice) has breached the internal CCTV system at Evin, a prison complex in Tehran where Iran houses most of its political prisoners, and leaked videos showing extensive prisoner abuse. The videos were shared on Sunday with reporters from Radio Farda (Radio Free Europe), Iran International, and the Associated Press. Timestamped to 2020 and 2021, the videos show Evin guards beating prisoners, prisoners attempting to commit suicide, or prisoners passing out and being dragged across hallways.

Fake Apple rep amasses 620, 000+ stolen iCloud pics, vids in hunt for images of nude women to trade

www.theregister.com/2021/08/24/los_angeles_county_man_pretended/ A California man this month admitted he hoarded hundreds of thousands of photos and videos stolen from strangers’ Apple iCloud accounts to find and share images of nude young women. Prosecutors in Florida had charged Hao Kuo Chi, 40, of Los Angeles County, who uses the first name David, with conspiracy and computer fraud. Chi, using the online name “icloudripper4you, ” worked with other unidentified miscreants to obtain files from Apple customers’ iCloud accounts by impersonating Apple customer support representatives in email messages. Starting in September 2014 and continuing at least through May 2018, Chi obtained victims’ Apple IDs and passwords by posing as a tech support rep and used those credentials to scour their iCloud accounts for nude pictures and videos. He then shared those intimate files with others, with whom he communicated “using a foreign-based end-to-end encrypted email service to maintain anonymity, ” prosecutors said.

Uudet laivat ovat täynnä verkkoon yhdistettyjä laitteita ja se altistaa ne kyberhyökkäyksille myös tuliterä Aurora Botnia on kelluva tietokone

yle.fi/uutiset/3-12026736 Uudet laivat ovat täynnä satoja, jopa tuhansia sensoreita, jotka välittävät tietoa aluksen toiminnasta ja kunnosta. Reaaliaikainen data säästää paljon rahaa, mutta mitä enemmän laitteita on kiinni verkossa, sitä suurempi on kyberturvallisuusriski. Kim Halavakosken mukaan esimerkiksi tietokoneiden määrä laivalla riippuu paljon laivasta, sen tarkoituksesta ja iästä. Vanhoissa laivoissa on yleensä joku PC-tietokone, jota käytetään, kun taas uusimmissa matkustajalaivoissa on paljon tietokoneita erilaisiin tarkoituksiin. Näiden lisäksi varsinkin uusimmista laivoista löytyy esineiden internetiä eli satoja tai jopa tuhansia sensoreita, jotka verkkoon kytkettynä lähettävät reaaliaikaista dataa laivan “voinnista”. “Ne ovat myös niin sanottuja tyhmiä laitteita, joita ei ole alun perin suunniteltu tietoturvallisiksi. Halpa hinta tarkoittaa, ettei laitteita ole suunniteltu kyberturvallisiksi eli ovat verkkoon kytkettynä haavoittuvaisia”, toteaa Kim Halavakoski.

Recovering a hacked account

www.ncsc.gov.uk/guidance/recovering-a-hacked-account Whether it’s your email, social media or some other type of online service, there are many things which can alert you to the fact that someone else is accessing your account. Being locked out of the account is an obvious indication that something has gone wrong, but the signs can be more subtle. Things to look out for include logins or attempted logins from strange locations or at unusual times. Changes to your security settings and messages sent from your account that you don’t recognise are also give aways. However you discover the problem, once you know your account has been hacked, this is what you should do: 1. Update your devices, 2. Contact your provider, 3. If your email account was hacked, 4. Change passwords, 5. Set up 2-factor authentication, 6. Notify your contacts, 7. If you can’t recover your account, 8. Contact Action Fraud.

SteelSeries bug gives Windows 10 admin rights by plugging in a device

www.bleepingcomputer.com/news/security/steelseries-bug-gives-windows-10-admin-rights-by-plugging-in-a-device/ The official app for installing SteelSeries devices on Windows 10 can be exploited to obtain administrator rights, a security researcher has found. Leveraging the bug is possible during the device setup process, using a link in the License Agreement screen that is opened with SYSTEM privileges. A real SteelSeries device is not necessary to exploit the bug.

Windows 10 KB5005932 fixes devices that can’t install new updates

www.bleepingcomputer.com/news/microsoft/windows-10-kb5005932-fixes-devices-that-cant-install-new-updates/ Microsoft has released the Windows 10 KB5005932 setup update to fix ‘”PSFX_E_MATCHING_BINARY_MISSING” errors when attempting to install the latest cumulative updates. After installing the May 25, 2021 (KB5003214) and June 21, 2021 (KB5003690) cumulative updates, some Windows 10 21H1, 20H2, and 2004 users have been unable to install the latest cumulative updates (LCU) released as a preview or on Patch Tuesday. When attempting to install the LCU, they are shown a “PSFX_E_MATCHING_BINARY_MISSING” error message, and the cumulative update fails to install. The inability to install these updates is preventing devices from receiving the latest security updates and bug fixes.

Tasan 30 vuotta sitten Linus Torvalds mullisti maailman

www.tivi.fi/uutiset/tv/7d4ec5d0-a045-4f9a-82de-fbe673256fef Vuonna 1991 ohjelmistosuunnittelija Linus Torvalds julkaisi Linuxin ensimmäisen version – onnittelut Linuxille!

You might be interested in …

Daily NCSC-FI news followup 2021-12-01

APT groups from China, Russia, and India adopt novel attack technique therecord.media/apt-groups-from-china-russia-and-india-adopt-novel-attack-technique/ State-sponsored hacking groups, also known as advanced persistent threats (ATPs), have adopted this year a new attack technique called “RTF Template Injection, ” which has brought a new twist and made their attacks harder to detect and stop. In a report today, email […]

Read More

Daily NCSC-FI news followup 2019-12-09

2020 is when cybersecurity gets even weirder, so get ready www.zdnet.com/article/2020-is-when-cybersecurity-gets-even-weirder-so-get-ready/ AI-powered deepfakes, ransomware, IoT, and 5G all mean that protecting your data is about to get a lot harder. Tech analyst Forrester predicts that deepfakes could end up costing businesses a lot of money next year: as much as $250m. That might happen in […]

Read More

Daily NCSC-FI news followup 2021-05-05

Uudistettu strategia kirkastaa HVK:n toiminnan tavoitteita www.huoltovarmuuskeskus.fi/huoltovarmuusorganisaatio/huoltovarmuuskeskus/strategia-visio-ja-missio Yritysten kyberturvallisuuden edistäminen ja dynaamisen, ennakoivan tilannekuva- ja -analyysitoiminnon tärkeys korostuvat. Varkaiden kiero tekniikka yleistyy Android-puhelimissa kohteena verkkopankit ja kryptovaluutat www.is.fi/digitoday/tietoturva/art-2000007959216.html Hyökkäyksissä haittaohjelmat piirtävät puhelimen ruudulle aidon sovelluksen päälle erittäin uskottavia ja tarkkoja kirjautumisruutuja jallittaakseen uhrin syöttämään tunnuksensa rikollisille. 882 sovellusta joutui tällaisen hyökkäyksen kohteeksi vuonna 2019, mutta […]

Read More

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.