Attacks News, Articles and Updates

UK police use DDoS-style attacks on suspected drug dealer's phones

UK police tried DDoS style attacks to disrupt service on suspected drug dealer's phones in cases where they couldn't prosecute but were looking to interfere with the drug trade.

Hospitality industry is key infosec battleground

The hospitality industry has become an unlikely front line in the cyber-security battle, as a combination of desirable personal data, high-net worth individuals and complex network topography has seen attacks rise significantly.

The Iranian Cyber-threat

Amid reports of Russian hackers influencing elections, Chinese hackers pilfering state secrets, and North Korea launching ransomware attacks, it would be easy to underestimate Iran's potential as a cyber-threat to the US.

Misconfigured memcached server DDoS threat is too powerful to be ignored

DDoS threat actors have started to exploit a known problem with unsecured Memcache servers to launch hugely powerful attacks with little in the way of resource investment required.

Councils failing on cyber-security, say campaigners

UK councils are suffering from a lack of training in the face of a vast number of cyber attacks, averaging 37 attacks per minute, according to a new report.

UK government publicly blames Russia for NotPetya attacks

The UK government publicly accused Russia of carrying out the June 2017 NotPetya ransomware attacks in June 2017 as part of a deliberate attack on the Ukraine state.

App zero-day flaw exploited to fool users into malicious downloads

Attackers were found exploiting a zero-day Telegram app vulnerability in order to make the names and extensions of malicious files appear more legitimate, in hopes that users who received these files would more willingly open them.

Threats in SSL traffic rocket by 30 percent

While the use of HTTPS encryption is on the rise, the same is unfortunately true of attackers using it to mask their operations, according to a new report.

Criminals ramps up server-side attacks

Hackers are increasingly turning to server-side attacks, according to a new report. Report notes fall in use of client-side exploit kits.

Making sense of indicators in security

An Indicator of Compromise is typically observed after an initial attack or compromise, whereas Indicators of attack (IOAs) are events that may reveal an active attack before IOCs become visible.

Pulse Secure VPN vulnerability can allow MITM attacks

The Software Engineering Institute at Carnegie Mellon University (KB CERT) posted an advisory warning stating the Pulse Secure VPN Linux graphic user interface (GUI) fails to validate SSL certificates.

96% of organisations hit in email attacks in the second half of 2017

96 percent of organisations were targeted by Business Email Compromise (BEC) attacks in the second half of 2017, primarily because such attacks did not include malicious payloads or attachments.

More than half of ransomware victims hit at least twice

Most ransomware victims hit more than once, and don't have defences. Industry adopting AI that deploys deep learning neural network machine learning is predictive by looking for and identifying the techniques scammers use.

TopHat campaign targets Middle East with malware exploiting Google+, Pastebin, and

A wave of attacks leveraging the popular third-party services Google+, Pastebin, and is targeting individuals and organisations within the Palestinian Territories.

NotPetya attack totally destroyed Maersk's computer network: chairman

Shipping giant and NotPetya victim Maersk was forced to replace tens of thousands of servers and computers in the aftermath of the 17 June ransomware attack, the company's charman said in Davos at the World Economic Forum.

Spyware replaced ransomware as hackers' weapon of choice in 2017

While ransomware attacks on consumers and businesses slowed down towards the fag end of 2017, they were replaced by spyware campaigns which rose by over 800 percent year-on-year.

US Defence Dept stops 36M malicious emails daily, 600 Gbps DDoS attacks

Attackers continue to consider email an attractive attack vector and this highlights the stresses that security pros face daily trying to sort through threats.

Hackers crack BlackWallet DNS server, steal US$ 400,000

Attackers have made off with up to US$ 400,000 (£290,000) in cryptocurrency after an ingenious attack on Stellar Lumen (XLM) wallet, BlackWallet.

Blender 3D open source platform plagued with arbitrary code vulnerabilities

Cisco Talos researchers identified multiple unpatched vulnerabilities in the Blender Open Source 3D creation suite that could allow an attacker to run arbitrary code.

Researchers: Security of messaging apps breaks down during group chats

Vulnerabilities in the group communication protocols of three encrypted messaging apps - WhatsApp, Signal, and Threema - could allow attackers to willfully subvert their integrity and confidentiality.

North Korean Monero miner: educational tool or weapon prototype?

A North Korean cryptominer is raising questions as to whether it is an educational tool or a prototype to carry out silent attacks on unsuspecting CPUs.

Necurs botnet launches massive 47 million emails per day campaign

The Necurs botnet continued to launch massive global ransomware attacks through the holidays with researchers stopping as many as 47 million emails per day.

Criminals spoof scanners and printers by the millions to spread malware

Cyber-criminals are spoofing scanners by the millions to launch attacks containing malicious attachments that appear to be coming from the network printer.

The arms race escalates: cyber-security predictions for 2018

For every business opportunity that our hyper-connected world is creating, that same hyper-connectivity creates criminal opportunity for cyber-attackers.

Predictions A - Z for 2018 - Dystopian or Utopian dawn?

Happy New Year! SC Media UK resumes news reporting on 2 Jan 2018. During the break, catch up on our experts' predictions for a range of positive and negative futures, from the impacts of AI to likely new Zero days.

North Korea bitten by bitcoin bug: Lazarus Group now financially motivated

Several multistage attacks that use cryptocurrency-related lures to infect victims with backdoors and reconnaissance malware that have been attributed to the Lazarus Group have been uncovered by Proofpoint researchers.

Loki Bot expands from Excel spreadsheet to attack other office applications

Security researchers have discovered a new attack vector launched through Microsoft Excel spreadsheets, and the Loki Bot has just recently expanded into other Office applications.

Shut for the holidays? Beware, cyber-criminals may play while you're away

It's essential that IT teams complete patching, updates and changes to their networks before high volume traffic times hit so they can focus on responding quickly to network events and security issues says James Barrett.

Attackers exploit old WordPress to inject code enabling site redirection

Attackers exploited an old WordPress vulnerability to infect more than one thousand websites with malware capable of injecting malvertising and even creating a rogue admin user with full access privileges, according to researchers.

#OpIsrael attacks feared in response to US moving embassy to Jerusalem

Anti-Israeli factions of the Anonymous collective opposed to US Foreign policy declared that they would be launching attacks against all websites deemed to be Israeli- or US-government affiliated in their latest #OpIsrael campaign.