Chinese Scammers Take Mattel To the Bank, Phishing Them For $3 Million

itwbennett quotes a report from The Associated Press: Mattel, the popular toy maker behind Barbie and Hot Wheels, was the victim of a phishing attack last year that nearly cost them $3 million. On April 30, 2015, a Mattel finance executive got a note from the new CEO, Christopher Sinclair, requesting a new vendor payment to China. Transfers required approval from two high-ranking managers; the finance exec qualified and so did the CEO. The transfer was made. The only thing preventing a total loss was the fact that the following day was a bank holiday. Details of the attack against Mattel come from a report by the Associated Press, investigating money laundering and other financial crime in Wenzhou, China. Read more of this story at Slashdot.

Read this article:
Chinese Scammers Take Mattel To the Bank, Phishing Them For $3 Million

A Former State Department Employee Is Going to Prison for Twisted Sorority-Girl ‘Sextortion’ Scheme 

A former State Department employee will spend 57 months in prison for a “sextortion” cyberstalking crime that sounds like an SVU sweeps-week plot, only weirder and more awful. Read more…

Original post:
A Former State Department Employee Is Going to Prison for Twisted Sorority-Girl ‘Sextortion’ Scheme 

Bitcoin Trading Platform Announces Huge Downtime Following Cyber-Attack

An anonymous reader writes: BitQuick, a US-based Bitcoin trader has announced that it will shut down its platform for up to 2 to 4 weeks following a cyber-attack this week. The platform took this step because it has not yet identified how the hackers infiltrated their systems. It is unusual for companies to take down their systems for weeks, but after the recent Cryptsy and LoanBase hacks, the company is not willing to lose millions of dollars worth of Bitcoin. BitQuick announced clients of the incident, and 97% already withdrew their funds from the platform. Read more of this story at Slashdot.

More:
Bitcoin Trading Platform Announces Huge Downtime Following Cyber-Attack

New Ransomware-as-a-Service Speaks To Victims

itwbennett writes: Cerber, a new file-encrypting ransom ware, has a couple of interesting features. First, according to cyber intelligence outfit SenseCy, it is available for sale ‘as a service’ on a private Russian-language forum, which makes it ‘available to low-level criminals who might not have the coding skills or resources to create their own ransom ware, ‘ writes Lucian Constantin. Second, one of the 3 files it drops on a victim’s desktop is a VBS (Visual Basic Scripting) file containing text-to-speech code that converts text into an audio message. ‘When the above script is executed, your computer will speak a message stating that your computer’s files were encrypted and will repeat itself numerous times, ‘ said Lawrence Abrams, administrator of the technical support forum BleepingComputer.com, in a blog post. Read more of this story at Slashdot.

Read the original:
New Ransomware-as-a-Service Speaks To Victims

German Police Allowed To Use Its Own "Federal Trojan"

An anonymous reader writes: The German Interior Ministry has approved for investigative use a spying Trojan developed by the German Federal Criminal Police (a so-called “federal Trojan”). In fact, it could end up being used as early as this week. The police will have to get a court order to use the spyware, and prove that the suspect is involved in a crime threatening citizens’ “life, limb or liberty”. The malware has been developed in-house, and has been available since autumn 2015. It is supposed to be used only for so-called telecommunication surveillance at the source, i.e. to read emails, chats and wiretap phone calls made by the target via his or her computer or smartphone, and not to access files, steal passwords, or set up video or audio surveillance via the device. Read more of this story at Slashdot.

More here:
German Police Allowed To Use Its Own "Federal Trojan"

Metel Hackers Roll Back ATM Transactions, Steal Millions

msm1267 writes: Researchers from Kaspersky Lab’s Global Research & Analysis Team today unveiled details on two new criminal operations that have borrowed heavily from targeted nation-state attacks, and also shared an update on a resurgent Carbanak gang, which last year, it was reported, had allegedly stolen upwards of $1 billion from more than 100 financial companies. The heaviest hitter among the newly discovered gangs is an ongoing campaign, mostly confined to Russia, known as Metel. This gang targets machines that have access to money transactions, such as call center and support machines, and once they are compromised, the attackers use that access to automate the rollback of ATM transactions. As the attackers empty ATM after ATM—Metel was found inside 30 organizations—the balances on the stolen accounts remained untouched. Read more of this story at Slashdot.

See more here:
Metel Hackers Roll Back ATM Transactions, Steal Millions

Ransomware Hits Three Indian Banks, Causes Millions In Damages

An anonymous reader writes: Ransomware has locked computers in three major Indian banks and one pharmaceutical company. While the ransom note asks for 1 Bitcoin, so many computers have been infected that damages racked up millions of dollars. According to an antivirus company that analyzed the ransomware, it’s not even that complex, and seems the work of some amateur Russians. Read more of this story at Slashdot.

More:
Ransomware Hits Three Indian Banks, Causes Millions In Damages

Symantec Disavows Business Partner Caught Running a Tech Support Scam

An anonymous reader writes: Malwarebytes has caught one of Symantec’s resellers running a tech support scam that was scaring users into thinking they were infected with malware and then graciously offering to sell Symantec’s security software at inflated rates. Malwarebytes played along with their scam and found out the company behind it was Silurian Tech Support, located somewhere in North India (surprised?).Symantec told El Reg that it terminated the reseller’s contract and will work with law enforcement to defend its brand and intellectual property. Read more of this story at Slashdot.

Visit link:
Symantec Disavows Business Partner Caught Running a Tech Support Scam

Cryptsy Bitcoin Trader Robbed, Blames Backdoor In the Code of a Wallet

An anonymous reader writes: Cryptsy, a website for trading Bitcoin, Litecoin, and other smaller crypto-currencies, announced a security incident, accusing the developer of Lucky7Coin of stealing 13, 000 Bitcoin and 300, 000 Litecoin, which at today’s rate stands more than $5.7 million / €5.2 million. Cryptsy says “the developer of Lucky7Coin had placed an IRC backdoor into the code of [a] wallet, which allowed it to act as a sort of a Trojan, or command and control unit.” Coincidentally this also explains why two days after the attack was carried out, exactly 300, 000 Litecoin were dumped on the BTC-e exchange, driving Litecoin price down from $9.5 to $2. Read more of this story at Slashdot.

See the original post:
Cryptsy Bitcoin Trader Robbed, Blames Backdoor In the Code of a Wallet