The past week was marked by several reports of data breaches. In particular, an incorrectly configured account in the cloud Box.com caused the leakage of confidential data and business documents dozens of major companies, including Amadeus, Apple, Herbalife, Schneider Electric, the Discovery channel and even the Box. The problem was that the account holders Box Enterprise did not put in the settings, share links to files/folders option “People in your company”, as a result, all new links that are supposed to be hidden, were in the public domain.

In an open access Network was discovered unprotected Elasticsearch database with profiles of around 33 million job seekers living in China. Database size is 57 GB included user names, information about gender, marital status and age, home address, city of residence, phone number, and information about education, previous employment, and salary. The owner of the database could not be established.

Free has also been found databases of large Internet shop Gearbest, specializing in the sale of electronics, household appliances, household goods and other products. Database included 1.5 million records with confidential customer data resource, including customer names, their mailing and electronic addresses, telephone numbers, information about purchased goods, payment information, IP-addresses, passport details and passwords. Anyone could log into DB and get the opportunity to change their personal information and even change your password.

Unknown compromised government website of Pakistan and gave him a Keylogger and JavaScript Scanbox framework for the collection of user data, checking the status of your application to obtain Pakistani citizenship. The administration of the resource does not respond to the message of the researchers of the infection, at present, the website continues to be compromised.

Chinese cybercriminal group Winnti Group hacked into one gaming platform and network of two Asian manufacturers of computer games and is implemented in their products in the background. The product is the Infestation game from Taiwanese developer Extreme Electronics and gaming platform Garena. The name of the third game is unknown. Winnti Group has implemented a malicious code in the main executable file of the products. The malware starts to execute in PC memory and during execution of the protected encryption. The game/platform game works as if nothing had happened. That is, the attackers modified the source code is not a product, but only the build configuration.

Government agencies in China were attacked with the use of extortionate FOR GandCrab. The ransomware spread via e-mail. The attacks began on 11 March this year. It is currently unknown who is the organizer of the attacks, but judging by some signs, the campaign could be the handiwork of cyber criminals from North Korea.

Experts have detected a malware operation which has been infecting PoS terminals, institutions in hospitality and entertainment DMSniff malware designed to steal credit card data of visitors. The number and names of the affected companies were not disclosed. Malware campaign still active.

Last week it became aware of two malicious campaigns aimed at owners of mobile devices based on Android. In the first, called Simbad, the attackers infected devices of the same malware designed to display advertisements. In the second case, the criminals collected contact information from devices without the knowledge of the owners, using for this purpose the malicious apps, the total number of downloads exceeded 111 million

Read more •••

LEAVE A REPLY

Please enter your comment!
Please enter your name here