Scorpene leak: The Scorpene-class submarines are developed a French company called DCNS. A former French Navy officer who quit the service in the early 1970s and worked for French defense companies for more than 30 years before becoming a subcontractor to DCNS – copied sensitive data from DCNS along with a French colleague and took it to a Southeast Asian country, where they were employed in a private company. This 22,400 page sensitive data was then stored in one of the company servers. In 2013, they both were sacked and the company found their replacement in Australia, with whom the company shared this data over the internet. Last week, the information on the Scorpene submarine and excerpts have been released by ‘The Australian’ newspaper. The person plans to surrender the disk to the Australian government on Monday. Indian Defense Minister Manohar Parrikar played down the leak, saying it is “not a big worry”.
Apple releases ‘Emergency’ patch after advanced spyware targets human rights Activist: Apple has released iOS 9.3.5 update for iPhones and iPads to patch three zero-day vulnerabilities after a piece of spyware was found targeting the iPhone used by a renowned UAE human rights defender. NSO Group, which sells spying and surveillance software, has been exploiting three zero-day security vulnerabilities in order to spy on dissidents and journalists. The zero-day exploits have allowed the company to develop sophisticated spyware tools that can access the device location, contacts, texts, calls logs, emails and even microphone. Apple fixed these three vulnerabilities within ten days after being informed. Apple had recently announced a bug bounty reward of up-to US$200K.
ATMs in Thailand hacked; 12 Million Baht stolen; 10,000 ATMs prone to hackers: An Eastern European gang of criminals has stolen over 12 Million Baht (approx. US$350k) from a total of 21 ATMs in Bangkok and other five provinces by hacking a Thai bank’s ATM network. Hackers were able to infect the GSB (Govt. Savings Bank)’s ATM machines by inserting malware infected cards into it and then making it spew out up-to 40k Bhat for every transaction.
Mail.ru forums hacked: Over 25 million accounts associated with forums hosted by Russian internet giant Mail.ru have been stolen by hackers. The databases were stolen in early August, according to breach notification site LeakedSource.com, which obtained a copy of the databases. The hackers’ names aren’t known, but they used known SQL injection vulnerabilities found in older vBulletin forum software to get access to the databases. In the recent past, using outdated software has led to hacking of Steam Game Forums and Clash of Kings Forums.
Wildfire Ransomware code cracked: Victims of the Wildfire Ransomware can get their encrypted files back without paying hackers the ransom, after the ‘No More Ransom’ initiative released a free decryption tool. ‘No More Ransom’ runs a web portal that provides keys for unlocking files encrypted by various strains of ransomware, including Shade, Coinvault, Rannoh, Rakhn and, most recently, Wildfire. The Ransom was for 1.5 Bitcoins (1 Bitcoin = US$575) and the victims were Dutch speakers from Netherlands and Belgium. Meanwhile in India – Shri Dhanvantari Herbals – An Indian Ayurvedic pharmaceutical company based in Punjab has been hit by Ransomware.
Dropbox prompts users to reset old passwords: Dropbox is asking users to change their old passwords as part of a “preventative measure”. In a blog post, the file-sharing and cloud storage company called out to users who haven’t changed their passwords since mid-2012, saying the login credentials are potentially at risk and should be updated. As is often the case, some people reuse their usernames and passwords across different web services, when anyone of them is compromised like LinkedIn or MySpace did, it leads to Password reuse attacks.
Opera browser reports breach: The company revealed that attackers gained access to Opera Sync, a service that lets users synchronize their browser data and settings across multiple platforms. It is investigating the incident, but initially believes the attack may have compromised user data, including passwords and login names. Opera counts 350 million users across its range products with 1.7 million Sync users. The company has reset all passwords and emailed all registered Opera sync users with details.
Leaked Exploits are Legit and belong to NSA- Cisco & Fortinet confirm: Last issue we discussed about the NSA hack and its leaked hacking tools. NSA was systematically spying on customers of big technology companies like Cisco, Fortinet, and Juniper for at least a decade. After a thorough investigation, Cisco confirmed the authenticity of these exploits, saying that these hacking tools contain exploits that leverage two security vulnerabilities affecting Cisco ASA software designed to protect corporate and government networks and data centers. Fortinet, also warned of a high-risk vulnerability leaked in the NSA hack, which affects older versions of its FortiGate firewalls. The identity of the hackers-‘The Shadow Brokers’ is still a mystery.
GozNym Trojan spreads to attack German banks: Last week, Researchers confirmed that the financial malware, a Trojan discovered in April this year, has recently targeted 13 German banks and their local subsidiaries. The hybrid malware (Gozi ISFB Malware + Nymaim malware), includes an exploit kit dropper, web-injection capabilities, encryption, anti-VM, and control flow obfuscation, making the malware persistent, difficult to detect, and also very powerful. The malware sends victims to fraudulent, carbon-copy websites of financial institutions in order to lure them into parting with their online banking details.
170 cyber frauds in 7 months in Visakhapatnam: In the past seven months, Vizag has registered 170 cyber fraud cases, of which 110 are related to siphoning off of money from bank accounts. The spurt in one-time passwords (OTP) frauds has left the police befuddled. “Despite several warnings, citizens fall prey to conmen and share confidential details. NIST (US National Institute of Standards and Technology) has declared -SMS-based Two-Factor Authentication (2FA), to be insecure.