Hackers strike globally in nearly 100 countries exploiting US spy agency tool

May 13, 2017

New Delhi, May 13: Hackers exploiting software stolen from the National Security Agency have executed cyberattacks that has hit dozens of countries worldwide, says a report, which has fretted the authorities.

USspy

It is believed that the cyber extortionists have managed to trick victims into opening malicious malware attachments to spam emails that appeared to contain invoices, job offers, security warnings and other legitimate files.

The ransomware encrypted data on the computers, demanding payments of $300 to $600 to restore access.

Security researchers said they observed some victims paying via the digital currency bitcoin, though they did not know what percent had given in to the extortionists.

Researchers with security software maker Avast said they had observed 57,000 infections in 99 countries with Russia, Ukraine and Taiwan the top targets.

The most disruptive attacks were reported in Britain, where hospitals and clinics were forced to turn away patients after losing access to computers.

International shipper FedEx Corp said some of its Windows computers were also infected. "We are implementing remediation steps as quickly as possible," it said in a statement.

Still, only a small number of US-headquartered organizations were hit because the hackers appear to have begun the campaign by targeting organizations in Europe, said Vikram Thakur, research manager with security software maker Symantec.

By the time they turned their attention to the United States, spam filters had identified the new threat and flagged the ransomware-laden emails as malicious, Thakur said.

The US Department of Homeland Security said late on Friday that it was aware of reports of the ransomware, was sharing information with domestic and foreign partners and was ready to lend technical support.

Telecommunications company Telefonica was among many targets in Spain, though it said the attack was limited to some computers on an internal network and had not affected clients or services. Portugal Telecom and Telefonica Argentina both said they were also targeted.

Private security firms identified the ransomware as a new variant of "WannaCry" that had the ability to automatically spread across large networks by exploiting a known bug in Microsoft's Windows operating system.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 13,2020

New Delhi, Jul 13: The Telecom Regulatory Authority of India (TRAI) has blocked Bharti Airtel's Platinum and Vodafone Idea's RedX premium plans that offer faster data speeds and priority services to customers as both the plans were violating net neutrality norms.

The telecom watchdog has asked Bharti Airtel to explain within seven days how such a similar plan being launched does not violate the rules of net neutrality.

Vodafone Idea's RedX plan has been in the market since November 2019. They made some modifications in May 2020 and the Bharti Airtel was soon going to launch a similar plan.

According to TRAI, the higher speed for premium customers discriminate against others and violates net neutrality.

Responding to TRAI's move, Airtel spokesperson said: "We are passionate about delivering the best network and service experience to all our customers. This is why we have a relentless obsession to eliminate faults and have been consistently recognised by international agencies as the best network in terms of speed, latency and video experience."

"At the same time, we want to keep raising the bar for our post-paid customers in terms of service and responsiveness. This is an ongoing effort at our end," the spokesperson said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 15,2020

Cybercriminals continue to exploit public fear of rising coronavirus cases through malware and phishing emails in the guise of content coming from the Centers for Disease Control and Prevention (CDC) in the US and World Health Organisation (WHO), says cybersecurity firm Kaspersky.

In the APAC region, Kaspersky has detected 93 coronavirus-related malware in Bangladesh, 53 in the Philippines, 40 in China, 23 in Vietnam, 22 in India and 20 in Malaysia. 

Single-digit detections were monitored in Singapore, Japan, Indonesia, Hong Kong, Myanmar, and Thailand. 

Along with the consistent increase of 2019 coronavirus cases comes the incessant techniques cybercriminals are using to prey on public panic amidst the global epidemic, the company said in a statement. 

Kaspersky also detected emails offering products such as masks, and then the topic became more commonly used in Nigerian spam emails. Researchers also found scam emails with phishing links and malicious attachments.

One of the latest spam campaigns mimics the World Health Organisation (WHO), showing how cybercriminals recognise and are capitalising on the important role WHO has in providing trustworthy information about the coronavirus.

"We would encourage companies to be particularly vigilant at this time, and ensure employees who are working at home exercise caution. 

"Businesses should communicate clearly with workers to ensure they are aware of the risks, and do everything they can to secure remote access for those self-isolating or working from home," commented David Emm, principal security researcher.

Some malicious files are spread via email. 

For example, an Excel file distributed via email under the guise of a list of coronavirus victims allegedly sent from the World Health Organisation (WHO) was, in fact, a Trojan-Downloader, which secretly downloads and installs another malicious file. 

This second file was a Trojan-Spy designed to gather various data, including passwords, from the infected device and send it to the attacker.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 22,2020

New Delhi, Jan 22: "Don't get into a trap. Your security is in your hands," the Border Security Force (BSF) has said issuing its social media rules for its officers and men. It has directed them not to use 42 mobile applications and show caution while using Facebook, Twitter and WhatsApp.

"Be cautious while using social media," said the BSF in a circular issued recently.

"Before using WhatsApp, Facebook, Twitter and other social media platforms, one needs to keep in mind that you are border guarding force and Central Civil Services (Conduct) Rules rule duly are applicable," it said.

It further pointed out that by commenting/writing about or forwarding unverified reports and rumours one violates laws of land.

"Several times unverified reports would be presented in way that they are absolutely true and start believing it. Seeing such post always use your commonsense and never get into the trap (sic.)," it state adding that the anti-national elements uses social media to propagate their agenda to cause unrest in India.

A picture clicked by Border Security Force personnel and posted on a social media platform remains there for always. Therefore, one should use officially approved pictures about any incident or untoward incidents related to Border Security Force, stated the circular. It pointed that unauthorised persons should not engage into taking pictures of the incidents.

It also highlighted how through social media, a few BSF personnel have fallen into trap of espionage racket carried out by enemy countries.

"Our security and respect is in our hands. Always think twice whether you are doing correct by accepting friendship requests from unknown persons, especially women and girls," it cautioned the troopers and officers.

It also highlighted that while going on leave and joining back the force, always follow the rules and regulations laid out for safety and security. "This is for your own safety," it stressed in the end.

The BSF has also issued a list of 42 mobile applications that needs to be completely avoided by serving BSF officers and jawans.

They are MI store, Weibo, Wechat, Shareit, Truecaller, UC News, UC Browser, Beautyplus, NewsDog, Viva Video - QU video Inc, Parallel Space, Apus Browser, Perfect Corp, Virus Cleaner - HI Security Lab, CM browser, MI Community, DU recorder, Vault Hide - No mobile Security, Youcam Makeup, Cachecleaner DU Apps Studio, DU battery saver, DU privacy, 360 security, DU Browser,Clean master - Cheeta Mobile, Baidu Translate, Wonder Camera - Bindu Inc, ES Ifle Explorer, Photo Wonder, QQ international , QQ music, QQ Mail, AA player, QQ News Feed, Wesync, QQ security Center, Selfie City, Mail Master, Mi Video Call -Xaomi and QQ launcher.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.