Roadside Cameras Infected with WannaCry Virus Invalidate 8,000 Traffic Tickets

Long-time Slashdot reader nri tipped us off to a developing story in Victoria, Australia. Yahoo News reports: Victoria Police officials announced on Saturday, June 24, they were withdrawing all speed camera infringement notices issued statewide from June 6 after a virus in the cameras turned out to be more widespread than first thought. “That does not mean they [the infringement notices] won’t not be re-issued, ” Assistant Commissioner Doug Fryer told reporters, explaining that he wants to be sure the red light and speed cameras were working correctly. Acting Deputy Commissioner Ross Guenther told reporters on Friday that 55 cameras had been exposed to the ransomware virus, but they’ve now determined 280 cameras had been exposed. The cameras are not connected to the internet, but a maintenance worker unwittingly connected a USB stick with the virus on it to the camera system on June 6. Fryer said that about 1643 tickets would be withdrawn — up from the 590 that police had announced on Friday — and another five and a half thousand tickets pending in the system would be embargoed. Fryer said he was optimistic the 7500 to 8000 tickets affected could be re-issued, but for now police would not issue new tickets until police had reviewed the cameras to ensure they were functioning properly… The “WannaCry” malware caused the cameras to continually reboot, Fryer said. Fryer said there was no indication the malware had caused inaccurate radar readings, but police were being “over cautious” to maintain public faith in the system. Last week Victoria’s Police Minister was “openly furious” with the private camera operator, saying the group hadn’t notified the relevant authorities about the infection. Read more of this story at Slashdot.

More:
Roadside Cameras Infected with WannaCry Virus Invalidate 8,000 Traffic Tickets

Concern growing for brain-invading worms, spread by slugs and rats

Adult female worm of Angiostrongylus cantonensis recovered from rat lungs with characteristic barber-pole appearance (anterior end of worm is to the top). Scale bar = 1 mm. (credit: Lindo et al. ) There have been six cases of a rare parasitic infection called “rat lungworm” in Maui in the last three months, health officials reported this week. The number is small, but it’s a dramatic jump from the normal number of cases. In the decade before this period, the island had only seen two other cases. The surprising uptick has health officials and residents alike worried about the rise of the worm, which can invade the human brain. In infected people, the infection may be symptomless and resolve on its own. But for others, rat lungworm moves into the brain and can cause inflammation, pain, and other neurological problems such as tremors. In those cases, it can be fatal. In all cases, rat lungworm is very difficult to diagnose, and there is no treatment. So far, at least three of the six cases have been confirmed by the state. There’s also a seventh possible case. Read 8 remaining paragraphs | Comments

Continue Reading:
Concern growing for brain-invading worms, spread by slugs and rats

A rash of invisible, fileless malware is infecting banks around the globe

(credit: INVISIBLE-MAN_1933_James Whale) Two years ago, researchers at Moscow-based Kaspersky Lab discovered their corporate network was infected with malware that was unlike anything they had ever seen . Virtually all of the malware resided solely in the memory of the compromised computers, a feat that had allowed the infection to remain undetected for six months or more. Kaspersky eventually unearthed evidence that Duqu 2.0, as the never-before-seen malware was dubbed, was derived from Stuxnet, the highly sophisticated computer worm reportedly created by the US and Israel to sabotage Iran’s nuclear program. Now, fileless malware is going mainstream, as financially motivated criminal hackers mimic their nation-sponsored counterparts. According to research Kaspersky Lab plas to publish Wednesday, networks belonging to at least 140 banks and other enterprises have been infected by malware that relies on the same in-memory design to remain nearly invisible. Because infections are so hard to spot, the actual number is likely much higher. Another trait that makes the infections hard to detect is the use of legitimate and widely used system administrative and security tools—including PowerShell , Metasploit , and Mimikatz —to inject the malware into computer memory. “What’s interesting here is that these attacks are ongoing globally against banks themselves,” Kaspersky Lab expert Kurt Baumgartner told Ars. “The banks have not been adequately prepared in many cases to deal with this.” He went on to say that people behind the attacks are “pushing money out of the banks from within the banks,” by targeting computers that run automatic teller machines. Read 5 remaining paragraphs | Comments

Read the article:
A rash of invisible, fileless malware is infecting banks around the globe