A form of Android ransomware which threatens to send the victim's private information and web history to all of their contacts has been discovered in the official Google Play app store.
LeakerLocker doesn't actually encrypt the victims' files, but instead claims to have made a backup of data stored on the device and threatens to share it with all of the user's phone and email contacts. Those behind the malware demand $50 in exchange for not leaking personal data including photos, Facebook messages, web history, emails, location history and more, playing on fears of potential embarrassment rather than any form of cryptography.
Read moreA darknet trader is illegally selling the Medicare patient details of any Australian on request by “exploiting a vulnerability” in a government system, raising concerns that a health agency may be seriously compromised.
An investigation can reveal that a darknet vendor on a popular auction site for illegal products claims to have access to any Australian’s Medicare card details. The seller is using a Australian Department of Human Services logo to advertise their services, which they dub “the Medicare machine”. Medicare card details are not publicly available. They are valuable to organised crime groups, because they allow them to produce fake physical Medicare cards.
Read moreCustomers of Dell devices might be exposed to cyber-attacks, as the pre-installed software includes vulnerabilities that could allow hackers to disable security solutions and to escalate privileges. Expert has discovered 3 different vulnerabilities affecting select Dell systems, urging customers to install the latest updates as soon as possible to prevent attacks.
First and foremost, there’s a privilege escalation vulnerability which exists in the SboxDrv.sys driver. The researcher says the security flaw can be exploited by sending crafted data to the \Device\SandboxDriverApi device driver because it provides read and write rights to everyone.
Read moreSouth Korea is a leader in the ethereum cryptocurrency; a full 20 percent of global ether trades are exchanged for South Korea's currency, the won. Now, all the attention appears to have attracted hackers.
Last week, customer information and allegedly "billions" of won were stolen from South Korea's largest exchange for buying and selling ether as well as it's more popular and established cousin bitcoin. South Korea-based Bithumb is the fourth largest cryptocurrency exchange in the world by volume, and the second largest ethereum exchange behind China's OKCoin. Bithumb contacted South Korea's cyber crime watchdog on Friday after it learned of the hack.
Read moreA popular wallet system for storing the Ethereum Classic cryptocurrency has been hacked, and users are urged to refrain from using the service for now. At about 11pm BST on Thursday 29 June, Classic Ether Wallet was hijacked by a hacker who used social engineering to trick the wallet service's web host into giving them access.
The hacker called German web host 1and1's customer support, pretending to be the owner of the domain. The hacker convinced 1and1 to give them gain access to the site's domain registration, then changed the domain's settings to point the domain at their own hostile server. This means that if the wallet is used to make any transactions, the hacker can steal the coins.
Read moreNo US nuclear power plant has been penetrated in a cyber attack, an industry spokesman said on Saturday, when asked to comment on a US government warning last week about a hacking campaign targeting the sector.
The U.S. Department of Homeland Security and Federal Bureau of Investigation said that nuclear sector was among those targeted in a hacking campaign data back to at least May. Hackers used "phishing" emails to obtain credentials to gain access to networks of their targets. “None of America’s 99 operating nuclear plants have been penetrated by a cyber attack," said a spokesman for industry trade group Nuclear Energy Institute.
Read moreIn May, the WannaCry ransomware virus quickly spread around the world infecting hundreds of thousands of computers and locking their owners out of files. Now, another piece of malware is infecting machines at scale.
A new strain of malicious code dubbed Petya was first spotted encrypting computers in Ukraine before reportedly infecting systems in Spain, Germany, Israel, the UK, Netherlands and the US. It has impacted a number of industries, with governments, shipping firms, a petroleum giant and even the Chernobyl nuclear reactor all reporting instances of Petya. "It's massive," Christiaan Beek, a lead scientist and principal engineer at McAfee, told about the situation in Ukraine.
Read moreParliament has been hit by a cyber attack, officials at Westminster say. The "sustained" hack began on Friday night, prompting officials to disable remote access to the emails of MPs, peers and their staff as a safeguard.
The parliamentary authorities said hackers had mounted a "determined attack" on all user accounts "in an attempt to identify weak passwords". Government sources say it appeared the attack has been contained but it will "remain vigilant". A parliamentary spokeswoman said they were investigating the attack and liaising with the National Cyber Security Centre.
Read moreHonda Motor Company was forced to halt vehicle production this week after finding WannaCry ransomware in its plant computer network. Its Sayama Plant in northwest Tokyo has a daily output of roughly 1,000 vehicles, ranging from Accord to Odyssey models, but was closed down on Monday after the ransomware was discovered on Sunday 18 June.
While production has today continued, the data breach continues to prove the lasting effects of WannaCry. A spokesperson told the virus had affected networks across Japan, North America, Europe, China and other regions, despite efforts to secure its systems in mid-May when the virus caused widespread.
Read moreThe notion of “the privacy of your own home” may be becoming a thing of the past. Cheap software has reportedly spread in the Chinese Internet, allowing web-connected cameras and home surveillance devices to be infiltrated.
Virtually anyone can buy the hacking software for just $28 with an attached list of IP addresses and a manual on how to use the malware, China’s CCTV broadcaster reported after conducting an investigation. The malware scans for internet-connected webcams, giving its buyers easy access to them. The tool has recently spread in Chinese online chat rooms, along with usernames and passwords to affected devices.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland