Cyber Crime

Related News

$15 million business email scam campaign in the US exposed

  • Charlie Osborne
  • Published date: 2020-09-30 13:30:03

The FBI is investigating the global campaign in which millions of dollars have been stolen from at least 150 victims.

The FBI is investigating a global business email compromise (BEC) campaign that has netted cybercriminals at least $15 million in illicit proceeds.  On Wednesday, cybersecurity researchers from Miti… [+3608 chars]

Android Trojan Called 'Alien' Can Steal OTPs, And Risk Your Bank Account

  • Sarthak Dogra
  • Published date: 2020-09-30 12:16:56

One-time passwords or OTPs are often considered to be the single most important security check in the digital payment system through any bank. While many of us find them to be unbreachable, the fact of the matter is that some Android malwares are capable of e…

One-time passwords or OTPs are often considered to be the single most important security check in the digital payment system through any bank.  While many of us find them to be unbreachable, the fac… [+2369 chars]

Remove AnyGameSearch Browser Redirect

  • Martin Beltov
  • Published date: 2020-09-28 10:36:00

AnyGameSearch Redirect – Why is it in My Browser Programs? The AnyGameSearch Redirect is a recently discovered web-based threat that is currently being used to install dangerous malware onto a given computer. The criminals behind it are constantly using diffe…

Seeing AnyGameSearch redirect in your browsers? AnyGameSearch is a suspicious domain as it can redirect and even trigger malicious actions in your browsers. AnyGameSearch can push advertisements and … [+16696 chars]

Minnesota Warns of Possible Health Care Patient, Donor Data Breach

  • None
  • Published date: 2020-09-22 05:31:50

Patients and donors to at least four different health care providers in Minnesota are being notified that their personal information may have been compromised. The potential data breach involves hundreds of thousands of patients and donors at Children’s Minne…

Patients and donors to at least four different health care providers in Minnesota are being notified that their personal information may have been compromised. The potential data breach involves hun… [+1185 chars]

Is Coinbase Safe? A Modern Financial Lesson

  • None
  • Published date: 2020-09-21 13:42:00

– make sure you have t he most recent operating system and security updates uninstall all suspicious or unnecessary software from your device. – install an ad blocker to make your browser more secure. 6. Beware of phishing Phishing is a malicious technique us…

What privacy and security concerns should Coinbase users have? Is Coinbase safe to use? What should you keep in mind before you dive? In this guide, I will walk you through all that and more. As a c… [+14412 chars]

Health Care Patient, Donor Data May Have Been Breached

  • Associated Press
  • Published date: 2020-09-18 14:29:41

Patients and donors to at least four different health care providers in Minnesota are being notified that their personal information may have been compromised. The potential data breach involves hundreds of thousands of patients and donors at Children’s Minne…

Patients and donors to at least four different health care providers in Minnesota are being notified that their personal information may have been compromised. The potential data breach involves hun… [+1434 chars]

Minnesota's second-largest health care data breachhits Children's, Allina

  • None
  • Published date: 2020-09-17 14:50:57

Posted by Destry Winant on Sep 17https://www.startribune.com/minnesota-s-second-largest-health-care-data-breach-hits-children-s-allina/572430632/ Hundreds of thousands of patients and donors to Children’s Minnesota and Allina Health hospitals are getting let…

BreachExchange mailing list archives Minnesota's second-largest health care data breachhits Children's, Allina From: Destry Winant <destry () riskbasedsecurity com>Date: Thu, 17 Sep 2020 09:… [+9192 chars]

Health care patient, donor data may have been breached

  • None
  • Published date: 2020-09-17 11:53:29

MINNEAPOLIS (AP) — Patients and donors to at least four different health care providers in Minnesota are being notified that their personal information may have been compromised. The...

MINNEAPOLIS (AP) Patients and donors to at least four different health care providers in Minnesota are being notified that their personal information may have been compromised. The potential data … [+1198 chars]

Minnesota's second-largest health care data breach hits Children's, Allina, other providers

  • Joe Carlson
  • Published date: 2020-09-16 20:45:41

The hack was part of a ransomware attack on a cloud computing company called Blackbaud, which manages databases for a number of nonprofits.

Hundreds of thousands of patients and donors to Children's Minnesota and Allina Health hospitals are getting letters saying some of their personal data may have been exposed in the second-largest hea… [+9738 chars]

Why North Korean cyber attacks will get worse -- and US intelligence won't help - NK News

  • None
  • Published date: 2020-09-11 09:51:00

For years, casual observers of North Korean cyber threats smirked at the country’s lack of Internet access and technical expertise. It took the Sony Pictures hack of 2014 to upend the perception that the DPRK had nothing more than “ragged, self-made technolog…

For years, casual observers of North Korean cyber threats smirked at the countrys lack of Internet access and technical expertise. It took the Sony Pictures hack of 2014 to upend the perception that … [+5457 chars]

Australian government releases best practices on securing IoT devices

  • None
  • Published date: 2020-09-04 14:30:12

None

<div class="body gsd-paywall article-body"><p>The Australian Government has released The Code of Practice: Securing the Internet of Things for Consumers (Code of Practice). The guide represents a first step in the Australian Government’s approach to improve the security of IoT devices in Australia. This Code of Practice is a voluntary set of measures the Australian Government recommends for industry as the minimum standard for IoT devices. The Code of Practice will also help raise awareness of security safeguards associated with IoT devices, build greater consumer confidence in IoT technology and allow Australia to reap the benefits of greater IoT adoption.</p> <p>The Code of Practice was developed by the Department of Home Affairs, in partnership with the Australian Signals Directorate’s Australian Cyber Security Centre, and follows nation-wide engagement with industry and the Australian public. The Code of Practice was recognized as a necessary step to lifting the cyber security of internet-connected devices domestically. The Code of Practice is designed for an industry audience and comprises 13 principles. The Australian Government recommends industry prioritize the top three principles because action on default passwords, vulnerability disclosure and security updates will bring the largest security benefits in the short term. </p> <div id="div-gpt-ad-article-body-sky-mobile" class="advertisement"></div> <p>In acknowledgement of the global nature of this issue, the Code of Practice aligns with and builds upon guidance provided by the United Kingdom and is consistent with other international standards. The principles will help inform domestic and international manufacturers about the security features expected of devices available in Australia. </p> <p>Mark Kedgley, CTO at <a href="https://www.newnettechnologies.com/">New Net Technologies (NNT)</a>, a Naples, Florida-based provider of IT security and compliance software, says, “Consumer IoT is at the extreme end of the ‘ease of use versus security’ conflict because the devices in question are typically seen as non-threatening, simple in terms of function and very much ‘fit and forget’. However, any vulnerable device is a foothold that may be exploited to enable a more damaging breach to be enacted, so IoT security is still a real and serious threat to personal information and financial theft."</p> <p>"The Code of Practice is welcome because there needs to be official guidance for manufacturers and consumers and ultimately, in the event of any negligence on the part of a manufacturer, a set of minimum standards against which litigation can be taken when needed," adds Kedgley. "Where they may have gone further is to compel device manufacturers to make setup and management tasks both mandatory and automatic. For example, setting unique credentials, disabling function and enabling software updates, rather than just suggesting these practices should be provided.”</p> <div id="div-gpt-ad-sidebar-sky-mobile" class="advertisement"></div> <p>Ben Pick, Senior Application Security Consultant at <a href="https://nvisium.com/">nVisium</a>, a Falls Church, Virginia-based application security provider, notes that these practices demonstrate a good starting point for IoT security. "However, two of them will be difficult, if not impossible, to maintain. Keeping software securely updated and making it easy for consumers to delete their personal data defies the standard usage of such devices. Most companies have found it cheaper to build new devices rather than support robust software maintenance plans. Additionally, collected data tends to be sold to third parties, preventing their complete deletion," says Pick. "Personally, I hope companies are forced to follow these practices and that the practices themselves become a springboard for more extensive security policies in the coming years.”</p> </div>

Why You Should Take Internet Security Seriously

  • Adam Walker
  • Published date: 2020-09-03 00:00:52

We’re often told that we should make sure to have different passwords for each account, turn on two-factor security, and keep our computers updated. All of these things can be troublesome though. Having multiple passwords makes it harder to keep track of them…

Were often told that we should make sure to have different passwords for each account, turn on two-factor security, and keep our computers updated. All of these things can be troublesome though. Havi… [+3389 chars]

US Reveals New North Korean BLINDINGCAN RAT

  • Phil Muncaster
  • Published date: 2020-08-20 11:10:00

Malware was used to target defense contractors, says CISA

The US government is warning of a new remote access trojan (RAT) being used by North Korea’s notorious Lazarus Group. The latest Department of Homeland Security (DHS) malware analysis report (MAR) i… [+1774 chars]

SANS Institute Says Multiple Employees Targeted inRecent Attack

  • None
  • Published date: 2020-08-18 14:23:07

Posted by Destry Winant on Aug 18https://www.securityweek.com/sans-institute-says-multiple-employees-targeted-recent-attack The SANS Institute says the recently disclosed security incident involved phishing emails being sent to several of its employees. The…

BreachExchange mailing list archives SANS Institute Says Multiple Employees Targeted inRecent Attack From: Destry Winant &lt;destry () riskbasedsecurity com&gt;Date: Tue, 18 Aug 2020 08:49:30 -050… [+3580 chars]

SANS Institute Says Multiple Employees Targeted in Recent Attack

  • Ionut Arghire
  • Published date: 2020-08-17 14:15:27

The SANS Institute says the recently disclosed security incident involved phishing emails being sent to several of its employees. read more

The SANS Institute says the recently disclosed security incident involved phishing emails being sent to several of its employees. The attack was discovered on August 6 and resulted in 28,000 records… [+2991 chars]

USD’s Justice in Mexico releases 2020 Organized Crime and Violence in Mexico Report

  • None
  • Published date: 2020-08-14 00:00:00

None

<div class="body gsd-paywall article-body"><p style="clear:right;">Justice in Mexico, a research and public policy organization based at the University of San Diego, has released the second edition of <a href="https://justiceinmexico.org/justice-in-mexico-releases-2020-organized-crime-and-violence-in-mexico-report/"><em>Organized Crime and Violence in Mexico Report</em></a>.  This study builds on 10 years of reports published by Justice in Mexico under the title <em>Drug Violence in Mexico</em>, compiling the most recent data and analysis of crime, violence, and rule of law in Mexico to help inform government officials, policy analysts, and the general public. In addition to homicide, the report has expanded the scope of past editions to provide insight regarding trends in crimes such as kidnapping, extortion, and robbery.</p> <p style="clear:left;"><u>Key Takeaways From the 2020 Report:</u></p> <div id="div-gpt-ad-article-body-sky-mobile" class="advertisement"></div> <ul> <li>The country’s public security challenges have evolved significantly due to diversification and proliferation of organized crime.</li> <li>A defining statistic of crime in Mexico is the homicide rate, which rose to its highest recorded level in 2019. In 2019, the Executive Secretariat for the National Public Security System (<em>Secretariado Ejecutivo del Sistema Nacional de Seguridad Pública</em>) (SNSP) reported a nationwide total of 29,406 murder cases (including cases with multiple homicides), resulting in 34,588 individual victims (an average of 2,884 victims per month).</li> <li>Although 2019 was the most violent year on record, the increase in intentional homicides has slowed.</li> <li>In 2019, the number of cases of intentional injury in Mexico increased for the fourth straight year in a row.</li> <li>The number of officially reported kidnappings in Mexico had slowly and steadily risen over the years but leveled off in 2018 and 2019 where there was a roughly 15% increase with 1,329 (2018) and 1,323 (2019).</li> <li>Over the years, there has been a steady rise in officially reported cases of extortion from 5,072 cases in 2015 to nearly 8,500 cases in 2019.</li> <li>In 2019, Mexico recorded its most violent year on record for women.</li> <li>Cases classified as femicides grew from 411 in 2015 to 945 in 2019, representing an increase of approximately 130%.</li> <li>Nearly half (45%) of all women in Mexico reported being victims of violence at the hands of their partner and 18% specified that they were victims of physical abuse.</li> <li>The killings of high-profile targets such as mayors, local political figures police, military officers, and journalists have also increased.</li> <li>25 current, former, or aspiring mayors were assassinated in 2019. Statistics drawn from Justice in Mexico’s <em>Memoria</em> database suggest that mayors are 13 times more likely to be murdered than the average individual.</li> <li><em>Memoria</em> dataset includes 13 journalists and media workers killed in 2019.</li> </ul> <div id="div-gpt-ad-sidebar-sky-mobile" class="advertisement"></div> </div>

Cybersecurity training and certification firm SANS Institute suffers data breach

  • Duncan Riley
  • Published date: 2020-08-13 03:07:48

Proving that no one is safe from cyber attacks, cybersecurity training and certification services provider SANS Institute has suffered a data breach with the records of some 28,000 customers stolen. The breach involved a phishing attack on an employee that in…

Proving that no one is safe from cyberattacks, cybersecurity training and certification services provider SANS Institute has suffered a data breach with the records of some 28,000 customers stolen. … [+3858 chars]

16-30 June 2020 Cyber Attacks Timeline

  • Paolo Passeri
  • Published date: 2020-08-12 12:53:24

It's time to post the second timeline of June, where I have collected 84 events (including 4 that were published in the first half of the month). This number confirms a decreasing trend, likely due to the diminishing impact of the COVID-19-themed attacks. Unf…

It’s time to post the second timeline of June, where I have collected 84 events (including 4 that were published in the first half of the month). This number confirms a decreasing trend, likely due t… [+34925 chars]

Incident Response Analyst Report 2019

  • None
  • Published date: 2020-08-06 12:07:00

Download full report (PDF) GIXnews As an incident response service provider, Kaspersky delivers a global service that results in global visibility of adversaries’ cyber-incident tactics and techniques used in the wild. In this report, we share our teams’ conc…

Download full report (PDF) As an incident response service provider, Kaspersky delivers a global service that results in global visibility of adversaries’ cyber-incident tactics and techniques used … [+14641 chars]

Incident Response Analyst Report 2019

  • None
  • Published date: 2020-08-06 10:40:00

Conclusion. In 2019, the cyberattack curve was not flattened. There was an increase in the number of incidents accompanied by greater commitment among victims to understand the full attack picture. Victims from all regions suffered from a variety of attacks a…

Download full report (PDF) As an incident response service provider, Kaspersky delivers a global service that results in global visibility of adversaries cyber-incident tactics and techniques used i… [+15004 chars]

Incident Response Analyst Report 2019

  • Ayman Shaaban
  • Published date: 2020-08-06 10:00:34

As an incident response service provider, Kaspersky delivers a global service that results in a global visibility of adversaries’ cyber-incident tactics and techniques on the wild. In this report, we share our teams’ conclusions and analysis based on incident…

Download full report (PDF) As an incident response service provider, Kaspersky delivers a global service that results in global visibility of adversaries’ cyber-incident tactics and techniques used … [+14885 chars]

Nation State Attackers Shift to Credential Theft

  • Dan Raywood
  • Published date: 2020-07-29 11:31:00

Nation state attackers shift from financial theft and gain to stealing user credentials

A greater focus is being placed on credential theft by nation state actors rather than stealing money. Speaking on a virtual briefing, Jens Monrad, head of Mandiant Threat Intelligence for EMEA at F… [+2653 chars]

Governor Larry Hogan announces expansion of Maryland Criminal Intelligence Network

  • None
  • Published date: 2020-07-29 00:00:00

None

<div class="body gsd-paywall article-body"><p align="left">Governor Larry Hogan announced the addition of law enforcement agencies in Baltimore County and Harford County to the Maryland Criminal Intelligence Network, a criminal justice strategy <a data-saferedirecturl="https://www.google.com/url?q=https://governor.maryland.gov/2017/12/05/governor-larry-hogan-announces-statewide-violent-crime-initiatives/&amp;source=gmail&amp;ust=1595959829877000&amp;usg=AFQjCNHd2JyGeJE7mmPK1GcZz3VNjuXExg" href="https://governor.maryland.gov/2017/12/05/governor-larry-hogan-announces-statewide-violent-crime-initiatives/" rel="noopener noreferrer" target="_blank">announced by Governor Hogan in 2017</a>, that encourages local, state, and federal law enforcement agencies to collaborate and share information to target, disrupt, and dismantle gangs, as well as criminal organizations involved in drug, firearm, and human trafficking operations. The new coalitions will be led by the Baltimore County Police Department and the Harford County State’s Attorney’s Office.</p> <p align="left">“Law enforcement agencies have disrupted and dismantled more than 800 criminal organizations under the Maryland Criminal Intelligence Network since 2018,” said Governor Larry Hogan. “The addition of Baltimore County and Harford County to this dynamic network, strengthens our coordinated efforts to investigate, arrest, and prosecute those who terrorize our communities.”</p> <div id="div-gpt-ad-article-body-sky-mobile" class="advertisement"></div> <p align="left">The MCIN initiative is funded through the Governor’s Office of Crime Prevention, Youth, and Victim Services. Baltimore County and Harford County were chosen based on crime statistics, proximity to Baltimore City and other jurisdictions participating in the initiative to enhance investigations, as well as proximity to major interstates that can be used for organized criminal activity like drug, firearm, and human trafficking. Adding law enforcement partnerships in Baltimore and Harford Counties will enhance investigations and increase the ability for all MCIN coalitions to share information and leverage resources.</p> <p align="left">There are now 14 MCIN coalitions in Maryland, with the addition of Baltimore and Harford counties. </p> <div id="div-gpt-ad-sidebar-sky-mobile" class="advertisement"></div> </div>

Lazarus Group Shifts Gears with Custom Ransomware

  • None
  • Published date: 2020-07-28 21:50:00

The North Korea-linked APT group has developed its own ransomware strain to better conduct financial theft, researchers report.

The North Korea-linked APT group has developed its own ransomware strain to better conduct financial theft, researchers report.Lazarus Group, a prominent advanced persistent threat (APT) group linked… [+5500 chars]

Cyber Crime and Prevention of Electronic Crimes Bill - Pakistan Today

  • PakistanToday
  • Published date: 2020-07-14 18:35:00

Cyberlaws are needed badly By: Changezi Sandhu. Cybercrime is also known as a computer-oriented crime in which a network or computer is used for illegal activities. Cybercrime has become a wide term in the ongoing technological era where technological innovat…

<ul><li>Cyberlaws are needed badly</li></ul>By: Changezi Sandhu Cybercrime is also known as a computer-oriented crime in which a network or computer is used for illegal activities. Cybercrime has be… [+5764 chars]