20 Years Later, the Y2K Bug Seems Like a Joke—Because Those Behind the Scenes Took It Seriously
This article goes through the events of Y2K, a time when people feared that computers would fail as the year 2000 approached. On December 31, 1999, John Koskinen, who led the U.S. Y2K efforts, flew to New York to show that everything would be fine when the new year arrived. The issue was caused by older computer systems using only two digits for the year, making people worry that when the year switched from 1999 to 2000, computers might think it was 1900, causing errors like financial miscalculations or power outages.
While some people panicked and stocked up on supplies, experts and programmers had been preparing for years. About $100 billion was spent in the U.S. alone to prevent any issues, and thanks to their efforts, the new millennium started without major problems. Although Y2K became a joke afterward, the article points out that many programmers worked tirelessly to fix the issue but received little recognition for their work. Some of the fixes they implemented are still being used today.
In my opinion, Y2K shows how careful planning and behind-the-scenes work can prevent disasters, even when the public doesn’t always see the value in it at the time. The fact that nothing happened is a testament to how well-prepared everyone was.
Title: Hacked Ecovacs robot vacuums go berserk yelling racial slurs and chasing dogs
Owners of Ecovacs Deebot X2 robot vacuums reported a hacking spree, which spanned a few days in multiple US cities. Some users told ABC that their robots sounded like broken-up radio signals, and the Ecovacs app revealed that an attacker was accessing the live camera feed and remote control feature. Despite resetting the password and rebooting the robot, the erratic behavior soon started again.
Security researchers had previously notified Ecovacs of significant security flaws. One affected the Bluetooth connector, allowing complete access to the X2 model from over 100 meters away. Another faulty system was the PIN code protecting the robot’s video feed and remote control feature. Hackers managed to disable the warning sound that should play when the camera is being used.
Ecovacs issued a patch and plans to release a firmware update in November to enhance security. Users are advised to use strong, unique passwords and improve their WiFi security.
Italy’s Intesa said it alerted authorities on security breach after checks
Italy’s Intesa Sanpaolo said it had been able to alert the country data protection authority about the data violation performed by one of its employees only after carrying out careful and extended checks on the events. Intesa said it had not yet received any information from prosecutors, after news agency ANSA reported the bank had been placed under investigation alongside its employee following the alleged data breach affecting thousands of account holders including Prime Minister Giorgia Meloni. The news is still breaking, i will keep the class posted as the investigation unfolds. https://www.reuters.com/technology/cybersecurity/italys-intesa-said-it-alerted-authorities-security-breach-after-checks-2024-10-14/
Taiwan Visitors exposed in massive hotel booking data leak
OwlTing is a blockchain technology solution company. They exposed the personal data of 765,000 users, mostly hotel guests in Taiwan. This was attributed to improperly configuring their Amazon S3 bucket. This leak revealed sensitive information like full names, phone numbers, and hotel booking details. This made users vulnerable to identity theft and fraud. Though OwlTing downplayed the severity, the exposed data posed significant risks, especially through phishing and social engineering attacks. The incident highlights the critical need for robust and effective security measures when it comes to sensitive data on cloud platforms.
The Hidden Costs of Maintenance in the Cost Breakdown Equation
Since Christopher took the topic that I really wanted to talk about *shakes fist* this topic is the other thing that came to my mind as I was working on the case study. Throughout my career getting buy-in on maintenance has been one of the most challenging continuous issues I have faced. In our current economic system where value is generated by creating new and exciting ways to generate growth and attract investors, we as auditors and security professionals can regularly find ourselves fighting an uphill battle for support around maintaining systems. Because of that I think that it is more important then ever to find a way to best express the cost of failing to maintain systems to leadership.
North Korean spy successfully managed to infiltrate cybersecurity training firm using stolen credentials and a fake VPN — here’s how you could avoid becoming a victim
KnowBe4, a cybersecurity awareness company, recently discovered it had inadvertently hired a North Korean spy, highlighting the vulnerabilities in modern remote hiring processes. Despite conducting rigorous background checks and video interviews, the individual bypassed security measures, which only came to light when malware was detected on the company-issued laptop. The incident underscores the growing sophistication of fraudsters, using advanced techniques to create false identities. KnowBe4 emphasizes the importance of recognizing red flags during recruitment, such as inconsistencies in candidates’ backgrounds, reluctance to participate in video interviews, or lack of a digital footprint. To mitigate such risks, companies should implement measures like Multi-Factor Authentication (MFA), pre-configured secure devices, zero-trust policies, and thorough identity verification. KnowBe4 shared this experience to help other organizations strengthen their security practices.
A new ‘super-realistic’ AI scam could get your Gmail account hacked
This new AI scam targets Gmail users by enhancing traditional phishing techniques with AI-generated voices, making the scam more convincing and increasing its success rate. Scammers send messages asking users to restore their Gmail accounts and follow up with calls that appear to come from Google support, warning of suspicious activity. The realistic AI-generated voice and a phone number that may link to a genuine-looking Google business page make it challenging to identify the scam. Users should be wary of unsolicited calls, urgent requests, and demands for sensitive information, as Google does not typically contact users by phone for security issues.
India’s Star Health says it received $68,000 ransom demand after data leak
A significant data breach has occurred, resulting in the unauthorized exposure of sensitive information, including tax details and medical records. This breach was facilitated using Telegram chatbots and a dedicated website. In response to this alarming incident, the insurer has taken legal action against both Telegram and the individual believed to be responsible for the hacking. Despite the serious nature, Telegram has not fully complied with the company’s requests to ban the accounts associated with the hacker. While some chatbots have been removed from the platform, the lack of complete cooperation has raised further concerns. In an effort to strengthen its response, the insurer is also seeking support from Indian cybersecurity authorities to help identify the hacker and mitigate any further risks associated with this breach.
In October of 2023 a cybercrime gang compromised Boeing with a ransomware attack and threatened Boeing to pay them within 6 days or they would leak sensitive data. The ransomware attack affected parts and distribution so luckily no flights were affected. However the ransomware group, LockBit, came out and said that they were negotiating with Boeing for a few days until eventually Boeing stopped communicating with the group. LockBit eventually published 43GB of data that included files for configuration backups for IT management software, and logs for monitoring and auditing tools. As a result, other organizations such as the U.S. branch of ICBC and DP world were affected. LockBit was able to exploit a vulnerability in Citrix’s software, known as Citric Bleeed, which is what allowed them access to Boeing’s systems. The incident resulted in the CISA and FBI urging organizations to patch the Citrix Bleed vulnerability as soon as possible.
Title: Online Scammers Looking to Cash In on Hurricane Milton Disaster
In the wake of Hurricane Milton, officials are warning consumers to be on the lookout for scammers in person and online. The department of Justice and the Consumer Financial Protection Bureau warned that scammers will target those affected by the storm, as well as well-meaning people trying to help them in the form of fraudsters impersonating hurricane-aid charities. The cybersecurity and Infrastructure Agency released a separate advisory warning of potential online scams that could come in the form of emails, messages on social media, texts, phone calls or even a knock on their door from an actual person. They list the following to avoid natural disaster scams
-If someone says you have to act now, don’t.
-Take a close look at email addresses and URLs
-Only give to verified charities
-Stick to trusted sources for storm advice.
-Say no to “officials” who ask for money
-Help others by reporting scams
In a recent cyberattack, hackers took control of robot vacuums in several U.S. cities. The robots ‘Ecovacs Deebot X2’ type, which was made in China. Attackers took control of the robots from afar and used their cameras and mics to scream racial slurs at the owners. In one case, a thief got into the live feed and audio of a vacuum for a family in Minnesota, which raised concerns about privacy breaches. There were reports of several similar hacks happening in different places, which made people worry about a known security hole in the device. Even though cybersecurity experts had warned them about the weakness before, Ecovacs didn’t do enough to fix it, which led to these leaks. Later, the company admitted that it had been hacked and blamed weak security measures and attacks that used stolen credentials. They promised that there would be changes in the future. But some customers said Ecovacs was wrong for downplaying how bad things were and not telling them about the problems. The story talks about how important hacking is for smart home gadgets and the problems that could happen if they aren’t protected properly.
Cybersecurity Firm Warns Of Threats To 2024 Presidential Election Integrity
This article details the risk of cyberthreats related to the 2024 presidential election. It warns the public of AI impersonation and ransomware attacks that originate from sending phishing emails and media while impersonating presidential candidates and result in ransomware attacks. The article also documents adversaries such as Russia, China, North Korea, etc. as sponsoring espionage attempts on the government ahead of the 2024 election. Lastly, the article gives advice for the use of safeguards such as multi factor authentication, strong passwords, and vigilance to combat the vulnerabilities that are often targeted by threat actors.
Comcast uses a cloud computing company called, Citrix. Citrix recently patched a vulnerability in the system earlier in the month (October 2023). Xfinity learned that unauthorized users gained access to its internal systems between Oct. 16 and Oct. 19, gaining access to 35.8 million individuals confidential information such as their names, contact information, account usernames and passwords, birthdates, parts of their Social Security numbers and answers to their security questions. All Xfinity customers were required reset their usernames and passwords and encouraged to use two-factor authentication to secure their accounts.
20 Years Later, the Y2K Bug Seems Like a Joke—Because Those Behind the Scenes Took It Seriously
This article goes through the events of Y2K, a time when people feared that computers would fail as the year 2000 approached. On December 31, 1999, John Koskinen, who led the U.S. Y2K efforts, flew to New York to show that everything would be fine when the new year arrived. The issue was caused by older computer systems using only two digits for the year, making people worry that when the year switched from 1999 to 2000, computers might think it was 1900, causing errors like financial miscalculations or power outages.
While some people panicked and stocked up on supplies, experts and programmers had been preparing for years. About $100 billion was spent in the U.S. alone to prevent any issues, and thanks to their efforts, the new millennium started without major problems. Although Y2K became a joke afterward, the article points out that many programmers worked tirelessly to fix the issue but received little recognition for their work. Some of the fixes they implemented are still being used today.
In my opinion, Y2K shows how careful planning and behind-the-scenes work can prevent disasters, even when the public doesn’t always see the value in it at the time. The fact that nothing happened is a testament to how well-prepared everyone was.
https://time.com/5752129/y2k-bug-history/
Title: Hacked Ecovacs robot vacuums go berserk yelling racial slurs and chasing dogs
Owners of Ecovacs Deebot X2 robot vacuums reported a hacking spree, which spanned a few days in multiple US cities. Some users told ABC that their robots sounded like broken-up radio signals, and the Ecovacs app revealed that an attacker was accessing the live camera feed and remote control feature. Despite resetting the password and rebooting the robot, the erratic behavior soon started again.
Security researchers had previously notified Ecovacs of significant security flaws. One affected the Bluetooth connector, allowing complete access to the X2 model from over 100 meters away. Another faulty system was the PIN code protecting the robot’s video feed and remote control feature. Hackers managed to disable the warning sound that should play when the camera is being used.
Ecovacs issued a patch and plans to release a firmware update in November to enhance security. Users are advised to use strong, unique passwords and improve their WiFi security.
https://cybernews.com/news/hacked-ecovacs-robot-vacuums-yelling-racial-slurs/
Italy’s Intesa said it alerted authorities on security breach after checks
Italy’s Intesa Sanpaolo said it had been able to alert the country data protection authority about the data violation performed by one of its employees only after carrying out careful and extended checks on the events. Intesa said it had not yet received any information from prosecutors, after news agency ANSA reported the bank had been placed under investigation alongside its employee following the alleged data breach affecting thousands of account holders including Prime Minister Giorgia Meloni. The news is still breaking, i will keep the class posted as the investigation unfolds.
https://www.reuters.com/technology/cybersecurity/italys-intesa-said-it-alerted-authorities-security-breach-after-checks-2024-10-14/
Taiwan Visitors exposed in massive hotel booking data leak
OwlTing is a blockchain technology solution company. They exposed the personal data of 765,000 users, mostly hotel guests in Taiwan. This was attributed to improperly configuring their Amazon S3 bucket. This leak revealed sensitive information like full names, phone numbers, and hotel booking details. This made users vulnerable to identity theft and fraud. Though OwlTing downplayed the severity, the exposed data posed significant risks, especially through phishing and social engineering attacks. The incident highlights the critical need for robust and effective security measures when it comes to sensitive data on cloud platforms.
https://cybernews.com/security/taiwan-visitors-exposed-in-massive-data-leak-owlting/
The Hidden Costs of Maintenance in the Cost Breakdown Equation
Since Christopher took the topic that I really wanted to talk about *shakes fist* this topic is the other thing that came to my mind as I was working on the case study. Throughout my career getting buy-in on maintenance has been one of the most challenging continuous issues I have faced. In our current economic system where value is generated by creating new and exciting ways to generate growth and attract investors, we as auditors and security professionals can regularly find ourselves fighting an uphill battle for support around maintaining systems. Because of that I think that it is more important then ever to find a way to best express the cost of failing to maintain systems to leadership.
https://fastercapital.com/content/The-Hidden-Costs-of-Maintenance-in-the-Cost-Breakdown-Equation.html
North Korean spy successfully managed to infiltrate cybersecurity training firm using stolen credentials and a fake VPN — here’s how you could avoid becoming a victim
https://www.techradar.com/pro/north-korean-spy-successfully-managed-to-infiltrate-cyber-security-training-firm-using-stolen-credentials-and-a-fake-vpn-here-s-how-you-could-avoid-becoming-a-victim
KnowBe4, a cybersecurity awareness company, recently discovered it had inadvertently hired a North Korean spy, highlighting the vulnerabilities in modern remote hiring processes. Despite conducting rigorous background checks and video interviews, the individual bypassed security measures, which only came to light when malware was detected on the company-issued laptop. The incident underscores the growing sophistication of fraudsters, using advanced techniques to create false identities. KnowBe4 emphasizes the importance of recognizing red flags during recruitment, such as inconsistencies in candidates’ backgrounds, reluctance to participate in video interviews, or lack of a digital footprint. To mitigate such risks, companies should implement measures like Multi-Factor Authentication (MFA), pre-configured secure devices, zero-trust policies, and thorough identity verification. KnowBe4 shared this experience to help other organizations strengthen their security practices.
A new ‘super-realistic’ AI scam could get your Gmail account hacked
This new AI scam targets Gmail users by enhancing traditional phishing techniques with AI-generated voices, making the scam more convincing and increasing its success rate. Scammers send messages asking users to restore their Gmail accounts and follow up with calls that appear to come from Google support, warning of suspicious activity. The realistic AI-generated voice and a phone number that may link to a genuine-looking Google business page make it challenging to identify the scam. Users should be wary of unsolicited calls, urgent requests, and demands for sensitive information, as Google does not typically contact users by phone for security issues.
https://www.msn.com/en-us/news/technology/a-new-super-realistic-ai-scam-could-get-your-gmail-account-hacked/ar-AA1sjfPF?ocid=msedgntp&pc=U531&cvid=ca4de32011764a63ba3650c1e4f8e8ae&ei=39
India’s Star Health says it received $68,000 ransom demand after data leak
A significant data breach has occurred, resulting in the unauthorized exposure of sensitive information, including tax details and medical records. This breach was facilitated using Telegram chatbots and a dedicated website. In response to this alarming incident, the insurer has taken legal action against both Telegram and the individual believed to be responsible for the hacking. Despite the serious nature, Telegram has not fully complied with the company’s requests to ban the accounts associated with the hacker. While some chatbots have been removed from the platform, the lack of complete cooperation has raised further concerns. In an effort to strengthen its response, the insurer is also seeking support from Indian cybersecurity authorities to help identify the hacker and mitigate any further risks associated with this breach.
Source: https://www.reuters.com/world/india/indias-star-health-says-it-received-68k-ransom-demand-after-data-leak-2024-10-12/
LockBit ransomware leaks gigabytes of Boeing data
In October of 2023 a cybercrime gang compromised Boeing with a ransomware attack and threatened Boeing to pay them within 6 days or they would leak sensitive data. The ransomware attack affected parts and distribution so luckily no flights were affected. However the ransomware group, LockBit, came out and said that they were negotiating with Boeing for a few days until eventually Boeing stopped communicating with the group. LockBit eventually published 43GB of data that included files for configuration backups for IT management software, and logs for monitoring and auditing tools. As a result, other organizations such as the U.S. branch of ICBC and DP world were affected. LockBit was able to exploit a vulnerability in Citrix’s software, known as Citric Bleeed, which is what allowed them access to Boeing’s systems. The incident resulted in the CISA and FBI urging organizations to patch the Citrix Bleed vulnerability as soon as possible.
https://www.bleepingcomputer.com/news/security/lockbit-ransomware-leaks-gigabytes-of-boeing-data/#:~:text=LockBit%20ransomware%20has%20leaked%20more%20than%2043GB%20of,recent%20of%20them%20with%20an%20October%2022%20timestamp.
Title: Online Scammers Looking to Cash In on Hurricane Milton Disaster
In the wake of Hurricane Milton, officials are warning consumers to be on the lookout for scammers in person and online. The department of Justice and the Consumer Financial Protection Bureau warned that scammers will target those affected by the storm, as well as well-meaning people trying to help them in the form of fraudsters impersonating hurricane-aid charities. The cybersecurity and Infrastructure Agency released a separate advisory warning of potential online scams that could come in the form of emails, messages on social media, texts, phone calls or even a knock on their door from an actual person. They list the following to avoid natural disaster scams
-If someone says you have to act now, don’t.
-Take a close look at email addresses and URLs
-Only give to verified charities
-Stick to trusted sources for storm advice.
-Say no to “officials” who ask for money
-Help others by reporting scams
Link: https://www.msn.com/en-us/news/other/federal-officials-warn-of-scammers-looking-to-cash-in-on-hurricane-milton-disaster/ar-AA1rZcRe?ocid=BingNewsSerp
In a recent cyberattack, hackers took control of robot vacuums in several U.S. cities. The robots ‘Ecovacs Deebot X2’ type, which was made in China. Attackers took control of the robots from afar and used their cameras and mics to scream racial slurs at the owners. In one case, a thief got into the live feed and audio of a vacuum for a family in Minnesota, which raised concerns about privacy breaches. There were reports of several similar hacks happening in different places, which made people worry about a known security hole in the device. Even though cybersecurity experts had warned them about the weakness before, Ecovacs didn’t do enough to fix it, which led to these leaks. Later, the company admitted that it had been hacked and blamed weak security measures and attacks that used stolen credentials. They promised that there would be changes in the future. But some customers said Ecovacs was wrong for downplaying how bad things were and not telling them about the problems. The story talks about how important hacking is for smart home gadgets and the problems that could happen if they aren’t protected properly.
Article: https://www.abc.net.au/news/2024-10-11/robot-vacuum-yells-racial-slurs-at-family-after-being-hacked/104445408
Cybersecurity Firm Warns Of Threats To 2024 Presidential Election Integrity
This article details the risk of cyberthreats related to the 2024 presidential election. It warns the public of AI impersonation and ransomware attacks that originate from sending phishing emails and media while impersonating presidential candidates and result in ransomware attacks. The article also documents adversaries such as Russia, China, North Korea, etc. as sponsoring espionage attempts on the government ahead of the 2024 election. Lastly, the article gives advice for the use of safeguards such as multi factor authentication, strong passwords, and vigilance to combat the vulnerabilities that are often targeted by threat actors.
Source: https://www.benzinga.com/government/24/10/41346351/cybersecurity-firm-warns-of-threats-to-2024-presidential-election-integrity
Xfinity hack affects nearly 36 million customers. Here’s what to know.
https://www.cbsnews.com/news/xfinity-hack-customers-usernames-passwords/
Comcast uses a cloud computing company called, Citrix. Citrix recently patched a vulnerability in the system earlier in the month (October 2023). Xfinity learned that unauthorized users gained access to its internal systems between Oct. 16 and Oct. 19, gaining access to 35.8 million individuals confidential information such as their names, contact information, account usernames and passwords, birthdates, parts of their Social Security numbers and answers to their security questions. All Xfinity customers were required reset their usernames and passwords and encouraged to use two-factor authentication to secure their accounts.