ONE CYBER-CRIME TAKES PLACE EVERY 10 MINUTES IN NCR, SAY EXPERTS
Col Pankaj Verma, a cyber security expert associated with the TCG Digital, said cyber security could never be foolproof, adding that even the networks of big organizations such as the LinkedIn had been hacked in the past. Pawan Duggal, a lawyer specializing in the field of cyber laws and e-commerce, said anything digital or electronic was covered under the cyber laws. These days, even a class 6 student knows how to hack a wi-fi password and every such offender claims to be an ethical hacker, whereas there is nothing called an ethical hacker, as per the laws of the country,” Tandon said. Every 10 minutes, one cyber-crime took place in the National Capital Region (NCR) and over 22,782 such complaints were lodged in the first six months of 2017, a cyber security expert said on Thursday. When we talk about Digital India, it should actually be Safer Digital India,” Tandon said. CBI inspector Akanksha Gupta said the police of all the states should have technological expertise and the law enforcement agencies should have dedicated wings to tackle the “cyber warfare”. Rakshit Tandon, a cyber security expert and consultant, shared this information at a panel discussion—‘Challenges in Cyberspace’—at the Amity University’s Noida campus. The Global Conference on Cyberspace (GCCS) 2017 will be hosted for the first time in India in November to promote the Digital India mission of Prime Minister Narendra Modi. He added that most of the offenders were not even aware of the cyber laws. “Most of the cyber-crime offenders are youth and college students.
EMMA WATSON AND MORE CELEBS’ PRIVACY THREATENED AS INSTAGRAM HACKERS SELL CONTACT DETAILS ON DARK WEB
Instagram co-founder and CTO Mike Krieger said in a blog post: “Although we cannot determine which specific accounts may have been impacted, we believe it was a low percentage of Instagram accounts. Hackers are reportedly selling millions of Instagram users’ personal contact details, including those of celebrities, via a searchable database named Doxagram at just $10. The revelation comes after Selena Gomez’s Instagram account was hacked and multiple nude photos of her ex-boyfriend Justin Bieber were posted. “While Instagram has now fixed the bug that lead to the leak, the cat is out of the bag now, and those affected will have to take extra care to maintain their privacy,” RepKnight cybersecurity analyst Patrick Martin wrote in a blog post. According to a list of 1,000 names sent to the Daily Beast, some of the political figures affected include the president of United States’ official account as well as White House director of social media Dan Scavino. “As dark web specialists at RepKnight, we were able to track down the identities of some of those affected using our sophisticated monitoring tools. If you’ve been hacked and someone’s posted your contact details on a site that Google cannot reach, you’re highly unlikely to ever understand the severity of that hack. Multiple media outlets and a security firm have reported that the affected celebrity users range from Emma Watson, Emilia Clarke and Taylor Swift to the POTUS, David Beckham and Indian cricket legend Sachin Tendulkar. At RepKnight we see thousands upon thousands of posts every day relating to corporate and consumer data appearing on the dark web for sale, with those affected none the wiser. Earlier this week, Instagram disclosed that a bug in its API was exploited by hackers to obtain the phone numbers and email addresses of of its “high-profile users”.
OVER 711 MILLION EMAILS LEAKED IN MASSIVE ONLINER SPAMBOT DATA BREACH
The spambot captured millions of email and server login credentials, as part of the spammer’s massive malware campaign to bypass spam filters by sending spam emails via “legitimate” email servers. “What’s scary about the spambot leak is that this data has been scraped and scavenged from older data breaches,” Ross Brewer, vice president and managing director EMEA at LogRhythm told IBTimes UK. Hunt also discovered that part of the data trove, when checked against HIBP, came from the LinkedIn data breach, as well as other hacks. Over 711 million email records, including passwords have been leaked in one of the largest data breaches in history. “Just for a sense of scale, that’s almost one address for every single man, woman and child in all of Europe,” Australian security researcher Troy Hunt who runs the HaveIBeenPwned (HIBP) data breach notification site, said in his blog. According to Benkow the spambot was also used to spread the Ursnif data-stealing banking malware, which researchers say also comes with spy features such as taking screenshots, keystroke logging and more. The spammers used the 80 million servers to send nearly 630 million targets “fingerprinting” emails, in efforts to scope out the targets, ZDNet reported. “Hunt said that both he and Benkow have contacted a “trusted source” in Netherlands, where the spambot’s IP address is located, to get law enforcement to shut down the spambot. One part (~2 millions) seems to come from a Facebook phishing campaign, those I have tested seems to be working and were not on HIBP,” Benkow said in his blog. The reality is that, because of these regular data dumps, no one’s data is safe.
LESSONS FOR INDIA: HIGH-TECH KENYAN VOTING SYSTEM HACKED, SUPREME COURT ANNULS ELECTIONS
The election of President Uhuru Kenyatta on August 8 was annulled because the election process, held through electronic voting machines (EVM), was presumably hacked, favouring Kenyatta. While in India all machines are standalone systems, not connected to any internet or any other network, the Kenyan machines—the Independent Electoral and Boundaries Commission (IEBC) of Kenya selected the French firm Safran Identity & Security to supply the machines and the software—are online and polling can be monitored in real time as each input information is immediately relayed through the internet to the server and to the monitoring system. Even if EVMs in India are standalone machines, it has been proved unofficially—no official testing was allowed with a free hand by the Election Commission of India—that these machines are hackable. The court said that the IEBC had committed “irregularities and illegalities” during the elections, harming the integrity of the election and that another presidential election should to be held in 60 days. A recent news item about the cancellation of Kenyan elections by the country’s Supreme Court may not have raised too many eyebrows in India. Russia had managed to hack into the US voting system’s email block and managed to influence the elections there. Judge David Maraga’s pronouncement is critical— the decision was Okayed by four out of a bench of six judges—because no presidential election in Kenya has ever been nullified before. If that rings a bell, one has to put a caveat that Kenyan EVMs are different from Indian ones. If India wishes to opt for the Kenyan system, which is said to be fail-proof, it can easily use the huge Aadhaar data bank. On Election Day, voters would go into the polling booth and simply place their thumbs on the iPads or such device and his or her vote would immediately be logged. The biometric data stored in the system would automatically audit polling, check for duplicates and delete them.
SWEDISH GOVERNMENT’S MAJOR DATA LEAK: LESSONS FOR THE ENTERPRISE
When a business suffers a data breach, affected customers shouldn’t have to find out from news articles or social media that their information may have been compromised; they deserve to be informed directly. If the outsourcer suffers a breach, the data controller will still be held accountable regardless of whether they had any direct control over cybersecurity. When governments suffer data breaches, it combines the traditional public relations fallout with political scandal. The huge breach took place during an outsourcing project with IBM Sweden, when information was made readily accessible to IT contractors from other countries who had not been security checked. In July 2017, the Swedish Government disclosed that it had leaked the details of nearly all of its citizens after information from the country’s driving licence database was made available. To make matters worse, the scale of breaches are often exaggerated to make them more newsworthy, but, when firms don’t communicate what they know about the breach as soon as possible, such articles seem more credible. Yet, what appears to be lost on some is that when they outsource or put data in the cloud, the organisation, in this case the Swedish Transportation ministry, remains the data controller, meaning the accountability for security and privacy remains with them. Ultimately, politics mixed with data breaches is a toxic recipe. All businesses will suffer data breaches of varying significance, but it’s how that they respond to them which can really cause the lasting damage. When outsourcing is the most practical option, businesses tend to transfer some of the risk onto third parties through contracts, setting specific clauses that ensure data is being stored, processed, and used in ways relative to its sensitivity.
TARINGA HACKED: MORE THAN 28 MILLION USER RECORDS STOLEN FROM POPULAR SOCIAL WEBSITE
According to The Hacker News, a data breach notification service called LeakBase obtained a copy of the database and – upon analysis – found that it contained a total of 28,722,877 records including usernames, hashed credentials and personal email addresses. In a more detailed analysis of the leaked credentials, the LeakBase researchers claimed the passwords were shockingly weak – including 123456, 000000, Barcelona, metallica, qwertyuiop and Santiago. LeakBase, which charges customers for the ability to check if their details are included in hacked databases, claimed that it had already cracked 26,939,351 (93. The Taringa website claimed to have 28,511,984 registered users at the time of writing meaning that, if accurate, hackers were able to compromise the vast majority of the platform’s overall userbase. Impacted Taringa users confirmed the records were linked to personal profiles, The Hacker News reported after being provided with a slice of 4. Security administrators confirmed that a password reset would be enforced for all affected users and noted that it would be bulking up encryption on new passwords. Last year, a similar breach notification website known as LeakedSource published some of the biggest leaks (in size, if not importance) known to date. More than 28 million records linked to Taringa, a Reddit-like social networking website popular in Latin America, have reportedly been stolen by hackers. There were, the service claimed, a total of 15 million unique credentials included in the database. It also remains unclear how LeakBase obtained a copy of the records.
WESTERN ENERGY SECTOR AT RISK OF TOTAL SABOTAGE BY NEW ‘DRAGONFLY’ HACKING CAMPAIGN
A highly experienced and possibly state-sponsored hacking group codenamed ‘Dragonfly’ may be gearing up for fresh sabotage cyberattacks on the energy sector in Europe and North America, according to research released this week (6 September) by Symantec. Often, Symantec said, sabotage attacks are “preceded by an intelligence-gathering phase where attackers collect information about target networks and systems. This year, Symantec observed the group using a toolkit known as “Phishery” which has been publicly available since last year and used to to infect unwitting targets. Experts say that they use a variety of tactics to stay hidden – often using publicly available malware or toolkits and staying away from “zero-days”, which are exploits for software flaws known only to the cybercriminal. The initial phase, the security firm said, appears to have been exploratory “where the attackers were simply trying to gain access to the networks of targeted organisations” to plan future cyber-assaults. Dragonfly is widely considered to be an advanced persistent threat (APT) group and is also known to researchers under the names Energetic Bear and Crouching Yeti. Dragonfly has been active since 2011, but went dark for a short period of time after being exposed by security researchers in 2014. In 2016 and 2017, the group conducted a malicious email campaign that contained “very specific content related to the energy sector” and aimed to hijack sensitive network credentials. “This is clearly an accomplished attack group,” Symantec warned in its latest threat report on the unit. Across the world, there has been a spike in energy sector attacks in the past two years.
INDIAN GOVT FEARS HACKING OF SET TOP BOXES MAY LEAD TO TRANSMISSION OF MALICIOUS CONTENT
Official sources told that the matter has been raised at the highest quarters within the Ministry of Electronics and IT, and other wings of the government have also been sounded about regarding the potential threat. The government is looking into this issue, and the potential threats, very seriously,” one of the source said. The fear is that the “potential vulnerability” of these digital boxes could make them easy prey for Chinese hackers who may black them at will, or use them for transmission of potentially-malicious content. The official source said that the government will study the issue threadbare before taking a final view on the matter. “Vikki Choudhry, who heads the Home Digital cable network in Delhi, said that the boxes being secured from China lack any kind of a secure network and run the risk of being hacked into very easily by the concerned foreign vendor. oop Sharma, president of Cable Operators Federation of India (COFI), said that the government has not given any particular incentive for local companies to manufacture in India. After the introduction of conditional access system (CAS) across the country, the digital set-top boxes (STBs) have been installed at every nook-and-corner of the country with cable transmission going digital. “We are alert to the situation and the possible threats,” the source said. “The foreign CAS company can potentially shut down the services for a particular channel in a particular geography.”The note makes further observations about the potential threat.
BT CUSTOMERS TARGETED BY SUSPECTED SCAM CALLERS FROM INDIA
A spokesperson for the company said that they never call customers to ask for their personal information out of the blue, reports the Register. The report also mentioned a case where a BT customer claimed to have lost thousands of pounds because of this scam. One of the more popular methods used by the scammers as found on the message board seems to be calling people to tell them that their modem has issues and that they can find instances of interference from the customer’s side. “Even if someone quotes your BT account number, you shouldn’t trust them with your personal information,” said a spokesperson in a statement. Ans according to reports, the callers might have accessed personal contact information of users. The spokesperson reminded customers to always shred their bills after they are paid as a lot of information can be gotten out of them. Scam call centres calling people and scamming them into sending them money is an issue that seems to be quite prevalent in India. ” has a number of stories of people being contacted for private information with some of the callers having extensive details about their targets. After they have their target’s attention by promising increased speeds, they reportedly offer a few “fixes” for which they request the customer to open a web conference or remote access website– a type of program that will hand over full control of a computer to a third party over the internet. It is not clear if the American scam is in any way related to the BT scam.
NSE ISSUES ALERT ON LOCKY RANSOMEWARE
NSE has directed its members to keep a close watch on their operating systems for timely detection of ‘Locky Ransomware’ following a government alert on the spread of this malware. Rival BSE had also asked its trading members and listed firms yesterday to take preventive measures to protect their computer networks from the ransomware.Locky Ransomware scrambles the contents of a computer or server and demands payment to unlock them, usually in form of virtual currency bitcoins. The latest alerts from NSE and BSE follow similar advisories about WannaCry and Petya ransomware. “Keep the operating system third party applications (MS office, browsers, browser plugins) up-to-date with the latest patches,” NSE said in a circular. It also suggested updation of firmware for all network components and network products, ensuring that anti-virus signatures are updated on all assets and blocking of suspicious IP addresses on firewall as well as of USB usage. “As the future course of events with regards to this threat (Locky Ransomware) are not known, members are advised to keep a close watch on their systems to identify timely detection and remediation of this threat,” NSE said. The government on September 2 had issued an alert on spread of Locky Ransomware.