Ransomware attacks, supply chain hacks, escalating tensions with Iran

  • Ransomware attacks are truly nothing new at this point, but 2019 is looking like a banner year for them
  • A destructive strain called LockerGoga has specifically been victimizing industrial and manufac­turing firms
  • Forcing production plants to switch to manual control or exacting long-term damage in systems that control physical equipment
  • A legitimate software vendor pushes out what looks like a trustworthy software update to users, but it’s really a destructive instrument of cyberwar. 
  • Russian hackers spread destructive malware in part by compromising the update mechanism for a Ukrainian accounting application.

FACEBOOK HACK: HOW TO FIND OUT IF YOUR DATA HAS BEEN STOLEN

  • Logged into your account is going to this help center page.
  • Hit the Privacy tab. From here, you can control who gets to see your future posts and friends list.
  •  Click on Limit Past Posts, then select Limit Old Posts and finally hit Confirm on the pop-up.
  • In Settings, go to the Timeline and Tagging and edit the sections you want to lockdown.
  •  Restricted list here, which means they’ll still be friends with you but will only be able to see your public posts and things you share on a mutual friend’s Timeline.

Investigation of Walmart Email Breach

  • The FBI is investigating allegations that employees from one of Walmart’s technology suppliers were illegally monitoring the retailer’s e-mail communication.
  • Compucom technician took a photo of an email about an internal Walmart disciplinary matter and sent it to a Walmart employee he had been chatting with on an instant messaging system
  • The photo was then forwarded accidentally to the daughter of a second Walmart employee who reported it to the company’s security department
  • The case exposes a potential vulnerability for companies that rely on contractors for technical work, giving outsiders broad access to sensitive internal documents with little oversight in the process.

Company terminated its contract with Compucom

Amazon Ring video doorbell flaw left users open to attack

  • A vulnerability in Amazon’s Ring video doorbells left the internet-of-things devices open to a variety of attacks
  • Bitdefender found that the Ring Video Doorbell Pro’s companion smartphone app sent wireless network credentials to the device in plain HTTP language during the set-up and configuration stage
  • Attackers can send these de-authentication frames at any time to a wireless device. Once the device loses its ‘heartbeat’, it automatically enters configuration mode.
  • ESET warned that many Amazon Echo and Kindle devices remained open to a different Wi-Fi vulnerability, a Key Reinstallation Attack (Krack attack)
  • A Krack attack enables the attacker to trick a device into reinstalling a key that is already in use by another device, enabling them to gain visibility of data packets crossing the network.