Tag Archive for: Caught

I warned about Putin’s cyber army and now I’ve caught Russian hackers trying to spy on MY home computer, says our reporter Toby Walne


The Russians are coming. They might not be knocking down our doors, but cyber hackers are already invading our computers. And I can vouch for the disruption they are causing. My personal computer has been crippled by ‘attacks from Russia,’ as they have tried to hijack my email account. 

It has been a harrowing experience because my computer is like an extra limb – and essential for my work. 

As a victim of the Kremlin’s red army of online fraudsters, I can no longer send or receive emails. Worse still, I am worried the Russians could be watching my every move – with KGB-style online eavesdropping. 



Advice: Expert Colin Tankard helps Toby Walne tighten up the security on his computer system following the attack


© Provided by This Is Money
Advice: Expert Colin Tankard helps Toby Walne tighten up the security on his computer system following the attack

Quite why I have been targeted I cannot say. Journalist I may be, but my emails are full of tips on bleeding radiators to keep heating bills down – not the codes to Britain’s nuclear arsenal. 

It has left me feeling not only violated, but also paranoid. At any moment, they could plunder my computer files and demand money in a blackmail ‘ransomware’ attack – or by stealing enough data, even empty my bank account. 

The trigger for the attacks on my machine remains unknown, but may have been a result of me downloading ‘Bad Rabbit’ software – malware – when I pressed a button thinking I was updating software. Such malware ransacks your computer of information and appears to originate from Russia. 

Then again, perhaps the Kremlin found my details on the dark web – where it appears my personal information and passwords had been leaked, following hacks into services I have used in the past. 

Or maybe I had been targeted following a warning article written in The Mail on Sunday in March about ‘Putin’s hackers’. 

Frightening though the experience has been, at least I am now aware what is going on and can take action. And according to cyber experts, I am not alone. The Russians are targeting thousands – maybe millions – of people’s computers in order to disrupt Western economies following the invasion of Ukraine. 

This is not just revenge for sanctions – creating disruption and panic for computer users – but to swindle us…

Source…

Hackers caught dropping malware into Microsoft Teams chats


Microsoft Teams users have been told to be on alert after hackers were spotted slipping malicious .exe executable files into conversations on the app.

The files in question are capable of self-administration and can write data to the Windows registry, install DLL programs, and create shortcut links, according to Check Point firm Avanan.

Hackers are likely to be using email spoofing to first gain access to Teams, before attaching malicious .exe files labelled “User Centric” to conversations, according to the researchers.

Upon clicking, the file will automatically take control of the user’s computer.

Avanan cyber security researcher and analyst Jeremy Fuchs said hackers “can steal Microsoft 365 credentials from a previous phishing campaign, giving them carte blanche access to Teams and the rest of the Office suite”.

After gaining access to Teams, circumventing any existing security measures is remarkably easy, Fuchs noted. Teams’ default protections are lacking, with limited scans for malicious files and links. Most email security solutions do not provide robust protection for Teams, adding to the problem.

Teams is particularly vulnerable given that end users implicitly, and freely share sensitive information through the service.

“Medical staff generally know the security rules and risk of sharing information via email, but ignore those when it comes to Teams. Further, nearly every user can invite people from other departments and there is often minimal oversight when invitations are sent or received from other companies,” explained Fuchs.

Several steps can be taken to mitigate the attack potential, including installing a sandbox that downloads and inspects all for malicious content, implementing multiple layers of security across all forms of communication, including Teams, and encouraging end users to flag suspicious files.

Featured Resources

Oracle analytics for dummies

Freedom from data overload

Download now

Why smart businesses view a data fabric as an inevitable approach to becoming data driven

Adopting a data-driven strategy for success

Free Download

Putting the insurance industry back in safe hands

The role of payments in digital transformation

Free Download

The top three IT pains…

Source…

New Zealand may be caught up in massive global hack – tech expert


An IT security expert says New Zealand organisations may have been caught up in a sophisticated global ransomware attack.

cybercrime, hacking and technology concept - male hacker in dark room writing code or using computer virus program for cyber attack

Photo: 123RF

The attack came to light early yesterday, hitting a Miami-based IT company, Kaseya, and infiltrating companies using that firm’s software.

Daniel Ayers said this sort of “supply chain” attack is significant and there are a number of IT service providers in New Zealand that use Kaseya.

“There’s been information released on the internet that there are people affected in New Zealand. Some of the anti-virus providers have released information that they have seen detections in New Zealand.”

Ayers said the timing of the attack means some companies may not discover they are affected until they start work tomorrow morning.

Local tech company Datacom said it has shut down its servers that use Kaseya software after the attack.

A spokesperson for the company said it had been decommissioning the software, even before yesterday’s attack.

It has been monitoring the situation for its customers and has not found any sign of incursions.

The cyber-security watchdog CertNZ is advising organisations using Kaseya to shut down those servers.

Kaseya provides IT management software for Managed Service Providers (MSPs) and small to mid-sized businesses (SMBs) – linking clients and partners in New Zealand.

Kaseya has previously publicised its links to New Zealand-based CodeBlue and other Australasian IT companies, including BigAir, Datacom, eNerds, Leap Consulting, Surety IT and Ricoh Australia.

President Joe Biden has directed US intelligence agencies to investigate who was behind the attack that also hit hundreds of American businesses.

As well, 500 Coop supermarket stores in Sweden have been forced to close.

Coop Sweden said it closed more than half of its 800 stores on Friday after point-of-sale tills and self-service checkouts stopped working.

Security firm Huntress said it believed the Russia-linked REvil ransomware gang was to blame for the latest ransomware outbreak. Last month, the FBI blamed the same group for paralysing meat packer JBS.

In a statement, the US Cybersecurity and Infrastructure Security Agency said it was “taking action to understand…

Source…

Learnt hacking on YouTube, 11-year-old caught demanding Rs 10 crore from father


News Highlights: Learnt hacking on YouTube, 11-year-old caught demanding Rs 10 crore from father.

Lucknow: In what appears to be a bad effect of online classes during Covid times, an 11-year-old boy studying in Class V learned to hack from YouTube and victimized his own father by sending an extortion email for Rs 10 crore.

The minor had learned about cybercrime and security measures during the online computer lessons at school. To dig further into the topic, he took to videos on YouTube and learned how to hack email IDs and mobile numbers.

To test hacking techniques he picked up from YouTube, he hacked the email ID and mobile number of his father and other family members and started sending unsolicited threatening emails and messages on their mobile.

The bizarre case was reported from Indirapuram in Ghaziabad. The defendant’s father has a good position in the government. He and others in the family got scared and had sleepless nights when they started receiving these emails and messages.

The family was amazed that the person who sent them e-mails knew everything about them and their smallest household activities. Initially, the ‘tormented’ officer had sought help from his internet service provider, but found no help.

The ordeal of the officer’s family lasted a month from December 23 to January 24. His patience ended when he received an extortion email demanding Rs 10 crore or their secrets will be made public.

He went to the cyber cell and filed a complaint. When the cell investigated the case, it was found that the internet protocol (IP) address used by the hacker came only from their home. The cyber cell in charge, Sumit Kumar, questioned all family members individually to find out that the hacker was only their 11-year-old son.

During his questioning, he admitted to sending these emails and messages after becoming aware of cybercrime during online classes at school. The boy told the investigating officer that he learned to hack after seeing many videos on the subject on YouTube.

The cyber cell’s sleuths further question him to find out whether the minor has also sent such emails to his friends and relatives. The cell is also contacting school authorities to find out…

Source…