Tag Archive for: impersonated

Hackers impersonated Ukrainian agencies in emails to Polish officials


The hacker group UAC-0050 sent emails claiming to be from Ukrainian government agencies to Polish state authorities, the State Special Communications Service reported on Dec. 8.

Government employees in Poland and Ukraine received emails with subject lines related to “debts” and “legal claims,” according to an investigation carried out by the Computer Emergency Response Team of Ukraine (CERT-UA). The emails also contained attachments in the form of password-protected RAR files.

When opened, these files could infect users’ computers with RemcosRAT or MeduzaStealer malware.

The emails came from legitimate government accounts that had been compromised, according to CERT-UA. Many of them came from the gov.ua domain.

CERT-UA is reportedly taking measures to localize and counteract the cyber threat.

The UAC-0050 hacker group has previously sent emails impersonating the Security Service of Ukraine (SBU), the Pechersk Court, and Ukrtelecom.

The State Special Communications Service came under new leadership on Dec. 1. Yurii Myronenko was named the new agency head after its previous chief Yurii Shchyhol was dismissed amid charges of embezzlement.

Ukraine war latest: Scammers reportedly cheat volunteers out of millions on drone purchases

Key developments on Dec. 8: * Investigation reveals scheme to steal money from volunteers on drone purchases * Germany hands over shells, drones, other equipment in latest delivery to Ukraine * Ambassador: Russia holds 500 Ukrainian medical workers captive * Russian strike on Dnipropetrovsk Obl…

The Kyiv IndependentAlexander Khrebet

We’ve been working hard to bring you independent, locally-sourced news from Ukraine. Consider supporting the Kyiv Independent.

Source…

Hackers in Cox Communications Data Breach Impersonated Company’s Support Agent to Access Customer Information


Atlanta-based digital cable television, internet, and phone services provider Cox Communications has disclosed a data breach that exposed customer information.

Cox said it learned on October 11, 2021, that a hacker impersonated a support agent and gained access to some customers’ personal information.

With over 20,000 employees and 6.5 million customers, Cox ranks as the third-largest cable television provider and seventh telephone carrier in the United States.

The October data breach was the second cybersecurity incident, six months after the ransomware attack that affected Cox Media Group (CMG) in June 2021.

Hackers accessed personally identifiable information (PII) in the Cox data breach

Cox Communications said that the hackers impersonated a support agent and accessed customer account information. The hacker accessed the customer’s name, address, telephone number, username, PIN code, Cox account number, Cox.net email address, account security question and answer, and/or the types of digital services subscribed.

“On October 11, 2021, Cox learned that an unknown person(s) had impersonated a Cox agent and gained access to a small number of customer accounts,” Cox said.

Subsequently, the company launched an internal investigation, took additional steps to secure the affected customer accounts, and notified the relevant law enforcement agencies.

However, the data breach notification did not clarify whether customers’ financial information or passwords were accessed.

Similarly, the company did not disclose whether the data breach affected its partners’ operations. Usually, threat actors target upstream vendors like Cox to compromise their downstream customers through supply chain attacks.

Although subscribers’ financial information was likely not affected, the company advised its customers to monitor their financial accounts for suspicious activity.

Similarly, they should change their passwords on other online accounts that share passwords with the compromised Cox accounts.

Paul Laudanski, Head of Threat Intelligence at Tessian said the Cox Communications data breach highlighted the risk of password reuse. Additionally, he noted that support…

Source…

2 million people—and some dead ones—were impersonated in net neutrality comments

Enlarge / An analysis from New York Attorney General Eric Schneiderman. (credit: New York Attorney General’s office)

An analysis of public comments on the FCC’s plan to repeal net neutrality rules found that 2 million of them were filed using stolen identities. That’s according to New York Attorney General Eric Schneiderman.

“Millions of fake comments have corrupted the FCC public process—including two million that stole the identities of real people, a crime under New York law,” Schneiderman said in an announcement today. “Yet the FCC is moving full steam ahead with a vote based on this corrupted process, while refusing to cooperate with an investigation.”

Some comments were submitted under the names of dead people.

Read 14 remaining paragraphs | Comments

Biz & IT – Ars Technica