'Data of over 6K Indian firms is up for sale on Internet'

Agencies
October 4, 2017

Mumbai, Oct 4: Global IT security firm Quick Heal's Enterprise Security brand Seqrite has discovered an advertisement on DarkNet forum that claims to have access to data of over 6,000 Indian businesses that include Internet Service Providers (ISPs), some of the key government organisations, banks and enterprises.

Seqrite Cyber Intelligence Labs, along with its partner seQtree InfoServices, tracked the advertisement where the unknown hacker has priced the information at 15 Bitcoins (nearly Rs. 42 lakh) and is offering network takedown of affected organisations for an unspecified amount, the company said in a statement on Tuesday.

"This can be a major tool of mass disruption if a non-state actor gets hands on it," Seqrite said on its website.

The organisations whose services may be at risk are: UIDAI (Aadhaar), Idea Telecom, Bombay Stock Exchange (BSE), Flipkart, DRDO, Aircel, Reserve Bank of India, BSNL, SBI, TCS, ISRO, ICICI Prudential Mutual Fund, VMWare, Employees' Provident Fund Organisation and various Indian state government portals, among others.

"We have alerted the government authorities well within time. If someone gets control over this massive data that is currently up for sale on DarkNet, the above mentioned organisations and enterprises can get affected," Rohit Srivastwa, Senior Director, Cyber Education and Services at Quick Heal, told IANS.

Following a detailed investigation, researchers identified the affected organisation as India's national Internet registry IRINN (Indian Registry for Internet Names and Numbers) which comes under the National Internet Exchange of India (NIXI).

As a precautionary measure, Seqrite reached out to the government authorities and Asia Pacific Network Information Centre (APNIC), recommending to them to alert all potentially affected organisations and urge them to change passwords and get their servers and systems patched with latest updates.

According to the researchers, the seller claims to have the ability to tamper the IP allocation pool, which could result in a serious outage or Denial of Service (DoS) attack-like condition.

"This could impact various content delivery network (CDN) and hosting providers as well. If the hacker gets an interested buyer, then an attack on the system could disrupt Internet IP allocation and affect Internet services in India," the company said.

"Along with the access, the hacker is also selling credentials and various contractual business documents and claims to have access to a large database of Asia Pacific Network Information Centre (APNIC)," it added.

The IRINN provides allocation and registration services of IP addresses and autonomous system numbers.

It comes under NIXI which "is the neutral meeting point of the ISPs in India with the primary objective being the facilitation of exchange of domestic Internet traffic between peering ISP members".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
April 28,2020

Los Angeles, Apr 28: People who experience loss of smell as one of the COVID-19 symptoms are likely to have a mild to moderate clinical course of the disease, according to a study which may help health care providers determine which patients require hospitalisation.

The findings, published in the journal International Forum of Allergy & Rhinology, follows an earlier study that validated the loss of smell and taste as indicators of infection with the novel coronavirus, SARS-CoV-2.

According to the scientists from the University of California (UC) San Diego Health in the US, patients who reported loss of smell were 10 times less likely to be hospitalised for COVID-19 compared to those without the symptom.

"One of the immediate challenges for health care providers is to determine how to best treat persons infected by the novel coronavirus," said Carol Yan, first author of the current study and rhinologist from the UC San Diego Health.

"If they display no or mild symptoms, can they return home to self-quarantine or will they likely require hospitalisation? These are crucial questions for hospitals trying to efficiently and effectively allocate finite medical resources," Yan said.

The findings, according to the researchers, suggest that loss of smell may be predictive of a milder clinical course of COVID-19.

"What's notable in the new findings is that it appears that loss of smell may be a predictor that a SARS-CoV-2 infection will not be as severe, and less likely to require hospitalisation," Yan said.

"If an infected person loses that sense, it seems more likely they will experience milder symptoms, barring other underlying risk factors," she added.

Risk factors for COVID-19 previously reported by other studies include age, and underlying medical conditions, such as chronic lung disease, serious heart conditions, diabetes, and obesity.

In the current study, the scientists made a retrospective analysis between March 3 and April 8 including 169 patients who tested positive for COVID-19 at UC San Diego Health.

They assessed olfactory and gustatory data for 128 of the 169 patients, 26 of whom required hospitalisation.

According to the researchers, patients who were hospitalised for COVID-19 treatment were significantly less likely to report anosmia or loss of smell -- 26.9 per cent compared to 66.7 per cent for COVID-19-infected persons treated as outpatients.

Similar percentages were found for loss of taste, known as dysgeusia, they said.

"Patients who reported loss of smell were 10 times less likely to be admitted for COVID-19 compared to those without loss of smell," said study co-author Adam S. DeConde.

"Moreover, anosmia was not associated with any other measures typically related to the decision to admit, suggesting that it's truly an independent factor and may serve as a marker for milder manifestations of Covid-19," DeConde said.

The researchers suspect that the findings hint at some of the physiological characteristics of the infection.

"The site and dosage of the initial viral burden, along with the effectiveness of the host immune response, are all potentially important variables in determining the spread of the virus within a person and, ultimately, the clinical course of the infection," DeConde said.

If the SARS-CoV-2 virus initially concentrates in the nose and upper airway, where it impacts olfactory function, that may result in an infection that is less severe and sudden in onset, decreasing the risk of overwhelming the host immune response, respiratory failure, and hospitalisation, the scientists added.

"This is a hypothesis, but it's also similar to the concept underlying live vaccinations," DeConde explained.

"At low dosage and at a distant site of inoculation, the host can generate an immune response without severe infection," he added.

Loss of smell, according to the study, might also indicate a robust immune response which has been localised to the nasal passages, limiting effects elsewhere in the body.

Citing the limitations of the study, the scientists said they relied upon self-reporting of anosmia from participants, which posed a greater chance of recall bias among patients once they had been diagnosed with COVID-19.

They added that patients with more severe respiratory disease requiring hospitalisation may not be as likely to recognise or recall the loss of smell.

So the researchers said more expansive studies are needed for validating the results.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 22,2020

Kochi, May 22: During the nationwide COVID-19 lockdown, Kerala recorded the highest number of cyber attacks followed by Punjab and Tamil Nadu, a study by anti-virus software firm K7 Computing said on Thursday.

In a statement issued in Chennai, the company said its K7 Computing's Cyber Threat Report, a comprehensive analysis of cyber attacks during the lockdown has found that Kerala recorded the highest number of cyber attacks during this period. The report analyses various cyber attacks within India during the pandemic and reveals that threat actors targeted the state with COVID-themed attacks aimed at exploiting user trust.

In Kerala, regions like Kottayam, Kannur, Kollam, and Kochi saw the highest hits with 462, 374, 236, and 147 attacks respectively, while the state as a whole saw around 2,000 attacks during the period - the highest thus far in the country.

This was followed by Punjab with 207 attacks and Tamil Nadu with 184 attacks, the company said.

The sudden surge in the frequency of attacks witnessed from February 2020 to mid-April 2020 indicates that scamsters across the world were exploiting the widespread panic around coronavirus at both the individual and corporate level.

These attacks aimed to compromise computers and mobile devices to gain access to users' confidential data, banking details, and cryptocurrency accounts.

The key threats seen during this period ranged from phishing attacks to rogue apps disguised as COVID-19 information apps that targeted users' sensitive data. Phishing attacks were noticed more in Tier-II and Tier-III cities while the metros fared better. Smaller cities saw over 250 attacks being blocked per 10,000 users.

Users from Ghaziabad and Lucknow seem to have faced almost 6 and 4 times the number of attacks as Bengaluru users.

According to the statement, a majority of the recorded attacks were phishing attacks with sophisticated campaigns that could easily snare even the most educated users. These attacks were aimed at heightening users' fears and creating a sense of urgency to take action.

K7 Labs noticed phishing attacks where scamsters posed as representatives of the United States Department of Treasury, the World Health Organization (WHO), and the Centres for Disease Control and Prevention (CDC), the company said.

Users were encouraged to visit links that would automatically download malware on the host computer such as the Agent Tesla keylogger or Lokibot information-stealing malware, infamous banking Trojans such as Trickbot or Zeus Sphinx, and even disastrous ransomware.

Other attacks included infected COVID-19 Android apps like CoronaSafetyMask that scam users with promises of masks for an upfront payment; the spyware app Project Spy; and seemingly genuine apps that are infected with dangerous malware like banking Trojans such as Ginp, Anubis and Cerberus.

"Covid-19 has created an ideal situation for various threat actors to target individuals and enterprises alike. The panic caused by the stringent lockdown measures and rapid spread of this virus has left many people looking for more information on the situation," J. Kesavardhanan, Founder and CEO of K7 Computing was quoted as saying in the statement.

"Threat actors exploit this fear to their advantage and scam users into downloading malicious software and divulging sensitive information like banking codes. The need to be cyber cautious has never been greater. This is more so in the case of corporates who have adopted a work from home policy hurriedly without adequate cyber hygiene. We have seen an increase in attacks on enterprises and SME employees as well," he added.

Such attacks are expected to continue till normalcy returns. Social engineering attacks targeted at winning users' trust will gain momentum.

Healthcare institutions, well-known government offices, and international organisations will continue to be a prime target throughout the pandemic, the statement said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 8,2020

Consumer watchdog Which? has claimed that more than one billion Android phones and tablets are vulnerable to hackers as they no longer supported by security updates.

According to the research report, the most at-risk phones are any that run Android 4 or older and those smartphones running Android 7.0 which can not be updated are also at risk.

Based on data from Google analysed by Which?, two in five android device users around the world are no longer receiving the important updates. Currently, those devices are unlikely to have issues, but the lack of security leaves them open to attack.

"It is very concerning that expensive Android devices have such a short shelf life before they lose security support, leaving millions of users at risk of serious consequences if they fall victim to hackers," Kate Bevan editor Which? said in a statement.

"Google and phone manufacturers need to be upfront about security updates with clear information about how long they will last and what customers should do when they run out. The government must also push ahead with planned legislation to ensure manufacturers are far more transparent about security updates for smart devices and their impact on consumers," Kate added.

Android phone released around 2012 or earlier, including popular models like the Samsung Galaxy S3 and Sony Xperia S, are particularly at risk to hackers.

Which? has made suggestions to Android users on what to consider if they have an older phone that may be at risk.

Any Android device which is more than two years old, check whether it can be updated to a newer version of the operating system. If it is on an earlier version than Android 7.0 Nougat, try to update via Settings> System>Advanced System update.

In case a user is not able tto update the phone, the device could be at risk of being hacked if it is running a version of Android 4 or lower.

A user also need to be careful about downloading apps outside the Google Play store and should also install a mobile anti-virus via an app.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.