Lebanese hackers stole a ton of data then left it on an open server

The Electronic Frontier Foundation and mobile security company Lookout released a report today detailing a major hacking campaign — dubbed Dark Caracal — that’s believed to have originated from Lebanon’s General Directorate of General Security (GDGS), one of the country’s intelligence agencies. The companies found information gathered from thousands of victims from over 20 countries through espionage efforts extending back to 2012. Targets included military personnel, journalists, activists, financial institutions and manufacturing companies and some of the stolen data included documents, call records, texts, contact information and photos. Michael Flossman, a Lookout security researcher, told the Associated Press , “It was everything. Literally everything.” The hackers used malicious apps that resembled legitimate communication platforms like Signal and WhatsApp to steal the trove of data, loading up the fake versions with malware that allowed them to tap into users’ conversations. “One of the interesting things about this ongoing attack is that it doesn’t require a sophisticated or expensive exploit, ” EFF Staff Technologist Cooper Quintin said in a statement . “Instead, all Dark Caracal needed was application permissions that users themselves granted when they downloaded the apps, not realizing that they contained malware.” However, the hackers’ storage of the stolen info also wasn’t terribly sophisticated, as it was all left exposed online on an unprotected server. “It’s almost like thieves robbed the bank and forgot to lock the door where they stashed the money, ” Mike Murray, Lookout’s head of intelligence, told the AP . The EFF and Lookout were able to link the data to a WiFi network coinciding with the location of Lebanon’s GDGS. “Based on the available evidence, it is likely that the GDGS is associated with or directly supporting the actors behind Dark Caracal, ” noted the report. EFF Director of Cybersecurity Eva Galperin said that pinpointing the campaign to such a precise location was remarkable, telling the AP , “We were able to take advantage of extraordinarily poor operational security.” Via: Associated Press Source: Lookout

Visit link:
Lebanese hackers stole a ton of data then left it on an open server

Accenture left four servers of sensitive data completely unprotected

UpGuard has yet again uncovered a trove of corporate data left unprotected, this time from major consulting and management firm Accenture . The data — contained on four cloud-based storage servers — were discovered by UpGuard Director of Cyber Risk Research Chris Vickery in mid-September and weren’t protected by a password. Anyone with the servers’ web addresses could download the stored information, which included decryption keys, passwords and customer info. And Accenture’s client list includes a number of large companies. On its website , Accenture says its clients “span the full range of industries around the world and include 94 of the Fortune Global 100 and more than three-quarters of the Fortune Global 500.” UpGuard says that the information stored on the unprotected servers could have been used to attack Accenture itself as well as a number of its clients and Vickery told ZDNet that the data amounted to the “keys to the kingdom.” In a blog post about the exposure, UpGuard said, “Taken together, the significance of these exposed buckets is hard to overstate. In the hands of competent threat actors, these cloud servers, accessible to anyone stumbling across their URLs, could have exposed both Accenture and its thousands of top-flight corporate customers to malicious attacks that could have done an untold amount of financial damage.” This data exposure is just the latest to be sniffed out by cybersecurity firm UpGuard. Other recent discoveries by the company include Election Systems & Software’s exposure of 1.8 million Chicago residents’ personal information, Deep Root Analytics’ leak of nearly 200 million US citizens’ data, the release of 14 million Verizon customers’ info by Nice Systems and exposure of classified intelligence data by a US defense contractor. In light of these repeated mishandlings of sensitive data, it’s becoming increasing clear that major companies need to take a serious look at their cybersecurity practices. UpGuard quickly notified Accenture after discovering the exposed data and the company secured the servers soon thereafter. Accenture also said that UpGuard was the only non-authorized visitor to access the servers. Accenture told ZDNet , “We closed the exposure when the Amazon Web Services S3 issue was first reported. As we continue our forensic review we may learn more but, the email and password information in the database is more than two and a half years old and for Accenture users of a decommissioned system.” Source: UpGuard

Read the article:
Accenture left four servers of sensitive data completely unprotected

Equifax tries to explain its response to a massive security breach

A day after announcing that hackers stole personal information tied to 143 million people in the US , Equifax’s response to the breach has come under scrutiny. Language on the website where people could find out if they were affected seemed to say that by signing up they would waive any right to join a class action suit against the company — something New York Attorney General Eric Schneiderman said is “unacceptable and unenforceable.” The company has since explained it does not apply to the data breach at all, but that hasn’t stopped misinformation from spreading. After conversations w my office, @Equifax has clarified its policy re: arbitration. We are continuing to closely review. pic.twitter.com/WcPZ9OqMcL — Eric Schneiderman (@AGSchneiderman) September 8, 2017 Equifax: In response to consumer inquiries, we have made it clear that the arbitration clause and class action waiver included in the Equifax and TrustedID Premier terms of use does not apply to this cybersecurity incident, Of course, considering the extent of what has leaked and the number of people affected, a hyperbolic reaction to anything surrounding this incident is understandable. Still, there are a few steps that people can and should take, now that we know someone has stolen more than enough information to perpetrate identity theft on a massive scale. Now that the language has been clarified, it appears legally clear to use Equifax’s website to check things out. Among Engadget staff, a few of us received notices that we aren’t among those impacted, but most weren’t so lucky. Still, there are questions about how secure the site itself is, since it requests the last six digits of each person’ social security number (and guessing first three isn’t as hard as you might think). Also, it doesn’t appear to work particularly well , responding to test and “gibberish” input with a claim that it’s part of the breach also. The best information on how to respond is available from the FTC . The government agency lays out solid next steps, like checking your credit report for any suspicious entries, as well as placing a freeze (there’s more advice on that here ) and/or fraud alert on your account with the major credit bureaus. This will make it harder for a thief to create a fake account for you and should force creditors to verify your identity. Finally, it’s important to file your taxes early, before a scammer potentially can. Source: Equifax , FTC

View article:
Equifax tries to explain its response to a massive security breach

NIST Updates Cybersecurity Framework

NIST Cybersecurity Framework Version 1.1 adds a new section on cybersecurity management, risk management metrics and measures. Nixon Peabody explains. The post NIST Updates Cybersecurity Framework appeared first on ChannelE2E .

Visit link:
NIST Updates Cybersecurity Framework

Hillary Clinton Didn’t Encrypt Her Secretary of State Emails For Months 

New details have emerged about exactly how Hillary Clinton secured the homebrew private email servers she used as Secretary of State. The punchline? Clinton didn’t encrypt her emails or use a certificate for her first three months running the State Department. Read more…

More:
Hillary Clinton Didn’t Encrypt Her Secretary of State Emails For Months 

Some Stock Broker Lost $75,000 To Hackers Over One Email

The SEC just revealed that the vast majority of brokerages and financial advisers have been hit with cyberattacks . The agency’s report also reveals : “One adviser reported a loss in excess of $75, 000 related to a fraudulent email, for which the client was made whole.” LOL what? Read more…

See more here:
Some Stock Broker Lost $75,000 To Hackers Over One Email

Someone Claiming to Be ISIS Says They Hacked CENTCOM, Leaks Docs Online

U.S. Central Command’s Twitter and YouTube accounts just lit up in a bad way. It looks like somebody who’s claiming to be ISIS managed to gain access to the account and is currently tweeting images of documents, allegedly internal CENTCOM documents. The first tweet links to a Pastebin post with links to downloads of “confidential data.” Read more…

See original article:
Someone Claiming to Be ISIS Says They Hacked CENTCOM, Leaks Docs Online

U.S. Army Compares New Hacker School To "The Birth Of The Air Force"

Over the next three years, the U.S. Army will be filling its brand new cyber warfare institute at West Point with the best and brightest hackers it can find. Not just hackers, however: the institute will bring together psychologists, lawyers, mathematicians—anyone who can help the country win the inevitable cyber war and save America. Read more…

View original post here:
U.S. Army Compares New Hacker School To "The Birth Of The Air Force"

Hackers Can Force ATMs to Spit Out Money With a Text Message

It’s getting remarkably easy to hack ATMs these days, and security researchers say that Microsoft’s aging Windows XP is making the problem worse. This week, security analysts at Symantec blogged about a new technique popping up in Mexico that uses text messages to give hackers access. It’s as wild as it sounds. Read more…        

Continue reading here:
Hackers Can Force ATMs to Spit Out Money With a Text Message

Every Single Gmail Message You Send Will Now Be Encrypted

Good news, security lovers! Google just announced that Gmail will be all encrypted all the time. More specifically, every single email you send or receive will use an encrypted HTTPS connection, regardless of which device you’re using and which network. Even public Wi-Fi is okay. Read more…        

Taken from:
Every Single Gmail Message You Send Will Now Be Encrypted