TweakTown NewsRefine News by Category:
Google said it was not hacked and a Gmail username and password list with more than 5 million accounts was harvested over time. It seems most likely that the email usernames and passwords were taken due to phishing scams and by trying to log into hacked websites, according to security experts.
"We're always monitoring for these dumps so we can respond quickly to protect our users," the Google security team said in a blog post following news of the username/password leak. "We found that less than 2% of the username and password combinations might have worked, and our automated anti-hijacking systems would have blocked many of those login attempts. We've protected the affected accounts and have required those users to reset their passwords."
Google recommends two-step verification anytime a Gmail user logs into an account from a new device or IP address. Users should also regularly change passwords and ensure they are using different passwords for their online bank accounts, email, and social networking websites.
Home Depot was recently compromised in a cyberattack that could number more victims than Target's data breach last year, but security experts warn different types of attacks were used. Home Depot was hit by FrameworkPOS, a clever piece of malware that stole data from store registers while being masked as anti-virus software.
Also, the Home Depot malware had lines of code that mentioned U.S. influence in Libya and growing support for the Ukrainian government against a growing regional conflict. It seems likely that Russian hackers were responsible for stealing the data for two purposes: to generate revenue from the stolen data, and to send a political message to the United States.
"The development of a new piece of malware is not something you take lightly - this required some engineering," said Dan Guido, Trail of Bits information security company CEO. "It's probably not the same group that (hit) Target."
There are now more than 15 million smartphones running with some type of malware, and security threats continue to emerge, according to Kindsight Security Labs, an Alcatel-Lucent company. At least sixty percent of infected phones are running Google Android, with around 40 percent of Microsoft Windows PCs accessing mobile networks making up the rest of the reported threats.
Four out of the 10 top threats facing smartphone owners is now spyware, with criminals able to monitor phone calls, text and photo images, GPS location, and Internet browsing history. However, most Android malware isn't overly sophisticated and cybercriminals are adjusting how to develop their attacks for smartphones and other mobile devices.
Even though Android and PCs running Windows make up most infected devices spotted by Kindsight Security Labs, criminals have shown greater interest in trying to compromise Apple iPhone devices. Security experts recommend users run anti-virus and anti-malware software on their phones, which offers an additional layer of protection.
Salesforce, a company specializing in enterprise CRM, warned that its customers are being targeted with the Dyreza malware designed to steal data and credentials. Specifically, Dyreza was known to target financial institutions, and aims for larger companies. Salesforce was careful to ensure its customers that this isn't a security vulnerability within its platform.
"We currently have no evidence that any of our customers have been impacted by this, and we are continuing our investigation," Salesforce said in a statement. "If we determine that a customer has been impacted by this malware, we will reach out to them with next steps and further guidance."
To counter this threat, Salesforce urged customers to deploy IP range restrictions from corporate networks and VPNs only - along with using two-factor authentication to ensure only approved users are accessing CRM databases. As more information is stored - and accessible - in the cloud, security concerns such as this incident can make it even more difficult for businesses to keep data secure.
The U.S. Army has steadily improved its Army Cyber Command abilities, and needs to double the amount of cyber-related positions in the next two years. Each cyber team is about the same size of a traditional platoon, with combat missions slightly larger. The teams consist of enlisted soldiers, NCOs, warrant officers, officers and Army civilian employees.
"These soldiers are so unique, and they're so skilled and they're so few," said Command Sgt. Major. Rodney Harris, Army Cyber Command, recently noted. "The chief of staff of the Army has asked us to focus hard on what we're doing for talent management..."
It's difficult to accurately determine what foreign militaries are doing to staff their cyber-related positions - but with select countries using their military to help launch cyberattacks - this is a major initiative for the U.S. military. As weapon systems are increasingly connected to systems that open up the possibility of cyberattacks, the military's cyber teams will be responsible for ensuring they aren't accessed by foreign enemies.
Following all of the attention Apple's iCloud service has received since a 4chan member posted stolen nude photos of celebrities, cybercriminals are now launching another wave of Apple ID phishing attacks. Apple has improved iCloud security, along with allowing users to see when their accounts have been accessed, but customers will have to stay on their toes to avoid being phished.
The criminals behind this phishing attack currently operate the Kelihos/Waledac botnet, as they expand their digital activities. The phishing email mimics an Apple website which users access by clicking a fraudulent email - and once the username and password has been submitted, the data is likely harvested.
"It is possible that the timing of the [phishing] campaign is not a coincidence and the controllers of the botnet are attempting to exploit public fears about the security of Apple IDs to lure people into surrendering their credentials," Symantec researchers recently noted.
The HealthCare.gov website was hacked by cybercriminals, but no data was taken, according to the Obama Administration when it informed Congress. The incident was simply described as "an intrusion on a test server" related to HealthCare.gov. The security breach took place in July and wasn't discovered until late August.
It seems the test server was using a default password that was never changed - and shouldn't have been connected to the Internet in the first place. To make matters even worse, regularly scheduled security scans never occurred as they should have by administrators. The Department of Homeland Security (DHS) and other federal investigators are now trying to determine who is responsible.
"Our review indicates that the server did not contain consumer personal information, data was not transmitted outside the agency and the website was not specifically targeted," said Aaron Albright, Centers for Medicare and Medicaid Services spokesperson. "We have taken measures to further strengthen security."
The use of social engineering, typically leading to phishing attacks, remains a major threat against enterprise networks, according to the McAfee Labs Threats Report: August 2014. Using its own McAfee Phishing Quiz, 80 percent of participants were unable to identify at least one of seven phishing emails - and the human resources and finance departments scored poorly.
Stolen data from compromised websites, especially following Heartbleed, shows how vulnerable unpatched websites can be - only serving as a treasure trove for cybercriminals. In addition, there were a number of new malware attacks and network threats that companies struggle to defend against.
"One of the great challenges we face today is upgrading the Internet's core technologies to better suit the volume and sensitivity of traffic it now bears," said Vincent Weafer, McAfee Labs SVP. "Every aspect of the trust chain has been broken in the last few years - from passwords to OpenSSL public key encryption and most recently USB security."
Goodwill issued a public update regarding a data breach that was uncovered in late July, with no evidence of malware on retail store point-of-sale (POS) systems. However, a third-party vendor was affected and that opened the door to customer names, payment card numbers, and expiration dates to be accessed by cybercriminals.
The forensics investigation said the malware attack took place between February 10, 2013 to August 14, 2014 - and there appears to be very little fraudulent activity noticed by customers.
"We continue to take this matter very seriously," said Jim Gibbons, Goodwill CEO and president, in a public statement. " We took immediate steps to address this issue, and we are providing extensive support to the affected Goodwill members in their efforts to prevent this type of incident from occurring in the future."
The celebrity photo scandal that took the Internet by storm over the weekend likely was caused by computer forensics technology used by the police. Using the Elcomsoft Phone Password Breaker (EPPB) software, designed for police and government agencies, people who purchase the software can snag photos from iCloud backups.
Instead of using iBrute to steal a user's iCloud login and password, using EPPB allows criminals to download an iPhone or iPad backup into a single folder - in addition to photos and videos, they can access application data, text messages, contacts, and other data. Apple released a carefully worded statement that said its iCloud and Find My Phone services were not hit by a data breach.
The use of Elcomsoft's software, along with Oxygen, Cellebrite and other similar programs have given cybercriminals the ability to compromise users in an easier, streamlined manner. EPPB is available for $399 - and doesn't require any government or police credentials - and can also be found on piracy websites.