International Operation Knox offline the infamous REvil Ransomware Group

Endless drumbeat High-profile ransomware attacks continued this week, but Google’s Threat Analysis Group also raised awareness of tactical “pass-the-cookie” attacks that hackers have used to hijack prominent YouTube channels in recent years. While such attacks are not new, Google has taken significant concerted action to curb the trend. Compromised YouTube channels have been used to broadcast cryptocurrency scams and other misinformation.

Meanwhile, the International Organization for Standardization last week released its first set of sex toy manufacturing guidelines, a major step towards establishing minimum safety standards across the industry. The document dubbed ISO 3533 or “Sex Toys: Designs and Safety Requirements for Products in Direct Contact with Genitals, Anus or Both”, although significant, does not set clear guidelines for digital security or privacy, both in cases where sex toys are already significant and influential. Stumbled.

If you’re thinking about account security and want a simple weekend project to help get things to shore, double-check that you have two-factor authentication enabled wherever two-factor authentication is offered. And if you want to go into authentication apps, tell Twilio Authy from Google Authenticator, we’ve got a guide to how to do it easily without losing access anywhere.

But wait, there’s more. Every week we collect all the security news that Wired has not covered deeply. Click the title to read the full story, and stay safe there.

The infamous Russia-based ransomware gang Reveal, which was responsible for the JBS Meat attack in June and a software deal run by Kaseya in July, was itself hacked and dropped offline by a consortium of government law enforcement groups. The FBI, U.S. Cyber ​​Command, and the Secret Service have worked with other government partners on a project to destroy REvil’s infrastructure. After the Cassava breach in July and the resulting ransomware attack, the FBI itself was able to seize a public decryption from Reveal. But officials have blocked the tool so they do not disclose their access to REvil’s infrastructure. After some of the gang’s platforms went offline in July, members recovered from their backups in September and inadvertently restored law enforcement system access in the process, opening the door to takedown. REvil’s website and data leaking platform “Happy Blog” are no longer accessible.

The Sinclair Broadcast Group, the second-largest television station operator in the United States, suffered a ransomware attack earlier this week that affected the company’s operations and broadcasts. The malicious encryption tool used in the attack is similar to the one previously used by the Russian criminal gang Evil Corporation. The malware has been blamed on this gang in the past. Sinclair struggled to stabilize its operations throughout the week, and employees reported a chaotic situation as stations worked to maintain their broadcasts. “Our focus remains on a third-party cybersecurity firm, continuing to work closely with other incident response professionals, law enforcement agencies and government agencies as part of our investigation and response to this incident,” Sinclair said in a statement on Thursday.

A hacker apparently compromised with Argentine Registro Nacional de las Personas, stealing all Argentine personal information. The trove is now personally promoting for sale in the criminal cycle. The breach occurred last month and targeted government IT networks, also known as RENAPER, to access the database. The agency issues national identity cards, and other government agencies may ask for its database. Government officials said in a statement that the attackers used a vulnerability to create a valid user account to access the database instead of hacking it. The first signs of the breach came in early October when a newly created Twitter account posted pictures and other personal information of 44 prominent Argentine ID cards, including President Alberto Fernandez and football stars Lionel Messi and Sergio Aguero.

On Thursday, the Federal Trade Commission called on six major U.S.-based Internet service providers for their shady data management practices and lack of meaningful privacy and security controls. The study focuses on AT&T Mobility, Celco Partnership (Verizon Wireless), Charter Communications Operating, Comcast (Exfinity), T-Mobile US and Google Fiber. ISPs do not clear their privacy practices, the FTC has found out and do not adequately disclose how they use customer data. The investigation further indicated that making it challenging for services to opt out of their customers ’data collection.

The problems have been well known for years, but the efforts of the public and private sectors to prevent such abuses have clearly not been sufficient. “While consumers must expect that ISPs will collect specific information about the websites they visit as part of the provision of Internet services, they will probably be surprised at the amount of data collected and collected for purposes not related to the service they request.” “In particular, browsing data, television viewing history, email and search content, data from connected devices, location information and race and ethnic data,” the FTC report wrote.

More great cable story

Source link

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button