Protection of Information Assets
October 6, 2022 by David Lanter 11 Comments
Chinenye Marylyn Akinola says
October 10, 2022 at 11:10 pm
US Airport Websites Hit by Suspected Pro-Russian Cyberattacks!
The websites for a number of major US airports were briefly taken offline Monday after a cyberattack promoted by a pro-Russian hacking group. The distributed denial of service (DDoS) attacks hit the airport websites of several major US cities including Atlanta, Chicago, Los Angeles, New York, Phoenix and St Louis. A DDoS attack involves knocking a website offline by flooding it with traffic.
The airport websites were targeted after the pro-Russian hacking group known as “KillNet” published a list of sites and encouraged its followers to attack them. The DDoS attacks only affected the public-facing websites of the airports, which supply flight and services information and do not have any impact on operations. Atlanta’s Hartsfield-Jackson Airport said its website is “up and running after an incident early this morning that made it inaccessible to the public.”
“An investigation into the cause of the incident is underway,” it said. “At no time were operations at the airport impacted.” Most of the airport websites targeted appeared to be functioning normally after being temporarily knocked offline. KillNet claimed responsibility last week for attacks on a number of US state government websites, and it has taken aim at other countries opposing Russia’s invasion of Ukraine. There was no immediate comment from the US Cybersecurity and Infrastructure Security Agency (CISA).
Frank Kofi Kpotivi says
October 12, 2022 at 10:37 am
Hi Marylyn i came across this news on the media yesterday and i was wondering why the attackers disrupt the service of the Ports also why the US cybersecurity ,CISA hasnt made any comment yet. So many questions to ask from here
Hi Marylyn i came across this news on the media yesterday and i was wondering why the attackers disrupt the service of the Ports also why the US cybersecurity ,CISA hasn’t made any comment yet. So many questions to ask from here
Aayush Mittal says
October 11, 2022 at 12:18 pm
Data Access Agreement begins between US and UK governments.
The Data Access Agreement technically allows each country’s investigators to benefit from faster access to data stored by service providers in the other country. Previously investigators were forced to lodge requests via Mutual Legal Assistance Treaties (MLATs), which was a slow, painful and error-prone process. This agreement will allow law enforcement agencies to gain more effective access to information and evidence that relates to the prevention, detection, investigation or prosecution of serious crime.
However, it is also important to note that security of the data in motion and possession by other country still holds a major risk. Data legality is a concern due to the GDPR privacy law. Legal experts are still concerned about the breach of data protection laws and are further determining applicability of US or UK legal privilege protections.
Mengqi Xiong says
October 12, 2022 at 11:10 am
PayPal has a great reputation for safety and security, which makes PayPal the first choice for many e-commerce businesses/individuals who need a way to accept payments online. Fraudsters are using a new scam impersonating PayPal, asking victims to install software to remotely control their computers and transfer money from their bank accounts. First, victims receive an email with a PayPal invoice listing transaction detail for goods or services provided by a third-party vendor without authorization. When victims notice an unauthorized transaction on an invoice, they call the hotline on the invoice and ask for a refund. The victim’s phone is then forwarded to a “third-party vendor agent” impersonated by the scammer, who also claims to be able to assist the victim. Finally, the scammer will instruct the victim to download a set of software on the computer in order to cancel the transaction. Once the victim installs the software on the computer, the scammers can remotely control their computer. At this time, the victim logs into their online bank account, and all the money in their bank account will be transferred.
Both organizations and individuals should focus more on enhancing cybersecurity awareness, including training, and educating the entire organization/individual to help mitigate phishing attacks.
Sunam Rijal says
October 12, 2022 at 2:48 pm
Toyota reveals data leak of 300000 customers
Toyota warned that nearly 300K customers may have had their personal data leaked as an access key was publicly available on GitHub for almost five years.
Email address and customer control numbers of 296019 people who have used T-connect (service that connects vehicle via network) were exposed since July 2017.
The leak was caused by a website development contractor mistakenly uploaded source code of T-connect to GitHub Source code contained access key to the T-connect data server which provided access to users email and customer control numbers.
Upon discovery, the GitHub repo was immediately made private.
Company warned customers to be aware of phishing emails that may arise from the leak and suggest to not open any emails without recognizing the sender and suggest being careful when clicking any link appear on email.
October 12, 2022 at 3:19 pm
Hackers Using Vishing to Trick Victims into Installing Android Banking Malware
Android Banking Malware
Malicious actors are resorting to voice phishing (vishing) tactics to dupe victims into installing Android malware on their devices, new research from ThreatFabric reveals.
The Dutch mobile security company said it identified a network of phishing websites targeting Italian online-banking users that are designed to get hold of their contact details.
Telephone-oriented attack delivery (TOAD), as the social engineering technique is called, involves calling the victims using previously collected information from fraudulent websites.
The caller, who purports to be a support agent for the bank, instructs the individual, on the other hand, to install a security app and grant it extensive permissions, when, in reality, it’s malicious software intended to gain remote access or conduct financial fraud.
Android Banking Malware
What’s more, the infrastructure utilized by the threat actor has been found to deliver a second malware named SMS Spy that enables the adversary to gain access to all incoming SMS messages and intercept one-time passwords (OTPs) sent by banks.
Pranavi Yadalam Sekhar says
October 12, 2022 at 5:47 pm
Voice phishing campaigns are increasingly being used to dupeep victims into installing Android malware on their mobile devices. Malicious actors are resorting to voice phishing (vishing) tactics, new research from ThreatFabric reveals. The Dutch mobile security company said it identified a network of phishing websites targeting Italian online-banking users. A threat actor has been found to be using TOAD tactics to mount convincing Android malware campaigns that have otherwise relied on rogue ads and adware. The infrastructure for SMS Spy allows the adversary to access all incoming SMS messages and intercept one-time passwords (OTPs) sent by banks.
Wei Zhang says
October 12, 2022 at 9:16 pm
QBot Malware Infects Over 800 Corporate Users in New, Ongoing Campaign
Qbot uses multiple attack vectors to infect victims. It distributes phishing emails that contain malicious documents, attachments, or password-protected profiles with additional documents, luring victims to open the email and click the “Enable content”. It is an information stealer with backdoors and self-spreading capabilities, as well as the ability to self-spread, evade detection and debugging, and install additional malware on infected machines. Between September 28 and October 7, nearly 1,800 users worldwide were infected with QBot in just ten days. More than half of the new victims are business users. Although QBot only spreads through phishing software, it has been active since 2009 and has been able to attack thousands of victims in short order. There is a long way to go to cultivate employees’ awareness of network security.
Shadrack Owusu says
October 12, 2022 at 11:04 pm
Switching on to better disaster recovery.
Amazon Relational Database Service (Amazon RDS) for Oracle is a fully managed commercial database service that automates many administrative tasks. A new feature called Data Guard (DG) switchover turbocharges data protection and management of Amazon RDS for Oracle by making it faster and safer for customers to test and maintain Oracle database environments both on-premises and in the AWS cloud.
Essential areas that are served by DG switchover include planned maintenance of systems, data traffic planning across different regions, and infrastructure management
As aspiring IT professionals, one of the major challenges will be planning and testing systems to make sure they will do the job expected whilst maintaining compliance. The article claims the new DG switchover and automated backup features in RDS for Oracle will give database administrators more peace of mind.
Nishant Shah says
October 13, 2022 at 5:26 pm
Instagram: The Most Invasive App?
1) 52% of all the apps share your data with third parties.
2) Instagram shares 79% of your data including browsing history and personal information with others online.
3) When it comes to collecting your data, social media platforms are the worst offenders. On average 80% of apps use your data to market their products in their respective apps.
4) Netflix, Signal, Microsoft Teams, Skype, and Clubhouse top the list of safest to use apps.
You must be logged in to post a comment.