International Operation Knocks Notorious REvil Ransomware Group Offline

the eternal drumbeat of high-profile ransomware attacks continued this week, but Google’s Threat Analysis Group also raised awareness of the fraudulent “pass-the-cookie” attacks used by hackers in recent years to hijack popular YouTube channels. While this is not a new type of attack, Google is taking significant coordinated action to curb the trend. The compromised YouTube channels are used to spread cryptocurrency scams and spread other false information.

Meanwhile, the International Organization for Standardization released the first set of instructions on sex toy manufacturing last week in a major step for creating the least minimum safety standards across the industry. Called ISO 3533 or “Sex Toys: Design and Safety Requirements for Products in Direct Contact to the Genitalia, the Anus, or Equivalent,” the document, while essential, does not teach clear instructions for digital security or privacy, the same places where there are sex toys meaningful and impactful stumbling blocks.

If you’re thinking about account security and want a quick weekend project to help with things, also check if you have enabled proof for two reasons wherever it is offered. And if you want to move between authentication applications, say from Google Authenticator to Twilio Authy, we have guide to making it quick without losing access anywhere.

But wait, there’s more. Each week we focus on all the WIRED security news not covered in depth. Click on the news headlines to read the full stories, and stay safe there.

The famous Russia-based ransomware gang REvil, responsible for Attack on JBS Meat in June and the Kaseya manages the software compromise in July, itself was hacked and tapped offline by a consortium of government law enforcement groups. The FBI, U.S. Cyber ​​Command, and Secret Service are working with other government partners on the project to sabotage REvil’s infrastructure. After the Kaseya breach and consequent ransomware attack in July, the FBI acquired a universal decryptor from REvil itself. But officials restricted the equipment so they would not disclose their access to REvil’s infrastructure. After some gang platforms were taken offline in July, members restored them from backup in September, and inadvertently opened up access to the law enforcement system in the process, opening up at the door for a removal. REvil’s website and the platform-leaking “Happy Blog” platform are no longer accessible.

The second-largest operator of the U.S. television station, Sinclair Broadcast Group, was hit by a ransomware attack last week that affected the company’s operations and broadcasting. The malicious encryption tool used in the attack is same as the one used before by convicted Russian criminal Evil Corp.. The malware was dedicated to the gang in the past. Sinclair struggled to stabilize its operation all week, and employees reported a chaotic situation as stations worked to keep up their broadcasts. “Our focus continues to be working closely with a third-party cybersecurity firm, other incident response professionals, law enforcement, and government agencies as part of our investigation and response. in this incident, ”Sinclair said in a statement Thursday.

A hacker has apparently compromised the Registro Nacional de las Personas of Argentina, stealing the personal data of all Argentines. The trove now surrounds the privately sold by criminal circles. The violation occurred last month and targeted government government networks to access the database, also known as RENAPER. The agency issues national identification cards, and other government agencies can query its database. Government officials are told a statement that the attackers contained a legitimate user account to access the database rather than hacking it by exploiting a vulnerability. The first signs of violation occurred on the first of October when a newly created Twitter account posted ID card photos and other personal information about 44 famous Argentines. , with President Alberto Fernández and soccer stars Lionel Messi and Sergio Aguero.

On Thursday, the Federal Trade Commission summoned six U.S.-based internet service chiefs for their shady methods of data management and lack of meaningful privacy and security controls. The study focused on AT&T Mobility, Cellco Partnership (Verizon Wireless), Charter Communication Operating, Comcast (Xfinity), T-Mobile US, and Google Fiber. ISPs have not made their privacy procedures clear, the FTC has found, and are not a no-brainer on how they use customer data. The investigation also explained that the services were challenged for their customers to opt out of data collection.

The issues are known for many years, but government and private sector efforts to curb such abuses are clearly not enough fire. “While consumers certainly expect ISPs to collect specific information about the websites they visit as part of providing internet services, they may be surprised at the amount of data collected and aggregated for the purposes of unrelated to the provision of the service they requested, “the FTC wrote in the report,” in particular, browsing data, television viewing history, email content and searches, data from connected devices , location information, and race and ethnicity data. “

More WIRED Stories

Source link


Leave a Reply

Your email address will not be published. Required fields are marked *