Tag Archive for: Suffers

Roku Suffers Data Breach, Hackers Sell Credentials of Hundreds of 15,000 Stolen Accounts


Streaming platform Roku officially discloses hackers have successfully breached its systems to steal more than 15,000 customer accounts containing sensitive information. Hundreds of the accounts are reportedly being sold online as the breach has given hackers access to the owner’s stored credit card information to make illegal purchases.

With over 80 million active users, the firm reportedly disclosed the hack on Friday in documents it filed with the attorneys general of Maine and California. Fifteen thousand three hundred sixty-three accounts were compromised between December 28, 2023, and February 21, 2024, according to the papers.

The documents show that hackers gained access to the accounts by obtaining login credentials from other sources, instead of getting into Roku’s system. Using a hacking technique called a credential stuffing assault, threat actors gather credentials that have been made public in past data breaches and then try to use them to access other websites.  

DNA Testing Companies Adopt Two-Factor Authentication in Response to 23andMe Data Breach

(Photo : THOMAS SAMSON/AFP via Getty Images)
An agent of the operational center of the French National Cybersecurity Agency (ANSSI) checks datas on a computer in Paris on November 24, 2022.

According to the firm, once an account was compromised, threat actors were able to alter all of the user’s data, including passwords, email addresses, and shipping addresses.

Roku clarified, however, that the unauthorized actors who gained access to the impacted Roku accounts did not have dates of birth, social security numbers, complete payment account numbers, or any other kind of sensitive personal information that needed to be disclosed.  

This essentially locked the user out of the account, enabling threat actors to utilize the saved credit card information to make transactions without sending order confirmation emails to the actual account holder.

According to BleepingComputer, several threat actors are employing the Open Bullet 2 or SilverBullet cracking tools to carry out credential-stuffing assaults. With the help of these apps, hackers can import custom configuration files made specifically to carry out credential-stuffing attacks against particular…

Source…

Belgian brewer suffers ransomware attack


Duvel Moortgat brewery says it suffered a cyberattack on Wednesday – but drinkers will be relieved to learn it has enough beer in stock to weather the storm.

So raise a glass, if you can, to the fortitude of Duvel Moortgat, after it told local media in Belgium alarms went off in the early hours of March 6th at its IT department, which scrambled to meet the incoming ransomware attack.

“Ransomware had been detected,” said spokesperson Ellen Aarts later that day. “Production was therefore immediately stopped. It is not yet known when it could start again. We hope today or tomorrow.”

But she added: “We have more than enough beer in stock to cover this production stop.”

Duvel’s brewery is in Breendonk, Antwerp. Best known for its eponymously named Duvel, a golden ale sold internationally and noted for its strength and flavor, it also produces the popular Vedett and Maredsous beers.

Predictably, Belgian beer drinkers reacted to news of the incident posted on Reddit with typical bar-room humor.

“This must be met with nuclear retaliation,” joked drunkbelgianwolf.

“I think this should be classified under National Emergency,” agreed De-Roymeester.

Modoz, however, had an insight to offer. “My friend working there just told me that the beer pumps are still working,” they posted, “so all people working there (except IT) are now drinking beers in the cafeteria.”

Which, Cybernews must note, is really too bad for the IT department.

At the time of writing, it is not yet known precisely when Duvel Moortgat will resume full-scale production – nor who was responsible for the attack.


More from Cybernews:

Google employee charged with stealing AI trade secrets

As Big Tech scrambles to meet EU rules, investigations seen as likely

LinkedIn down for thousands of users

Sam Altman’s eye-scanning Worldcoin ‘Orb’ banned in Spain

US gov to pay hospitals struggling in UnitedHealth hack, advocates want more

Subscribe to our newsletter

Source…

Huber Heights, Ohio, Suffers Ransomware Attack on Systems


A number of government services are unavailable in Huber Heights, Ohio, following a ransomware attack over the weekend on the city of 40,000 near Dayton.

The ransomware was initially discovered at the city’s dispatch center early Sunday, but public safety departments are now running normally after switching to a Montgomery County location, local news reported. The city reiterated in an online update that “public safety services remain unimpacted.”

Meanwhile, the attack has affected city divisions for economic development, engineering, finance, human resources, tax, utilities and zoning, the city said. This prevents residents from paying utility bills online; as such, the city is suspending late penalties and disconnections through the end of November. Residents can still pay now by bringing cash or check, alongside their billing receipt, to the water department office.


City Manager Rick Dzik said in the online announcement that the city expects services to remain impacted for “at least a week.” According to local news, the city has declared a state of emergency.

Dzik said the city will post updates on the situation daily at 2 p.m. on its website, www.hhoh.org, and on Facebook. The incident is not impeding the city council meeting scheduled for Tuesday, which will livestream on the city Facebook page at 6:00 p.m.

The city is working to determine what data may have been compromised and will notify those found to be affected.

The ransomware attack hit the city at 8:13 a.m. Sunday, Nov. 12, per the city. Dzik told local news station WKEF that he received a call at noon that some computers at the dispatch center were experiencing issues.

“They had called in our on-site or city IT department, to start investigating which is when they discovered there was some ransomware installed on a few computers,” Dzik told the outlet.

Per the city, the IT department is coordinating with state, local and federal law enforcement as well as third parties as it investigates the incident.

Source…

Industrial and Commercial Bank of China suffers ransomware attack; trades in US Treasury market disrupted: Report


Industrial and Commercial Bank of China (ICBC), the country’s largest commercial lender by assets, reportedly suffered a ransomware attack on Thursday that disrupted the trades in the US Treasury market. However, the impact of the ransomware attack seemed to be limited, Reuters reported.

In a statement, ICBC Financial Services said a ransomware attack resulted in disruption to certain systems and it was conducting an investigation and “progressing its recovery efforts.”

The bank said it had successfully cleared Treasury trades executed on Wednesday and repurchase agreements (repo) financing trades done on Thursday.

The Treasury trades executed on Wednesday and repurchase agreements (repo) financing trades done on Thursday had been successfully cleared, the bank said.

(Exciting news! Mint is now on WhatsApp Channels :rocket: Subscribe today by clicking the link and stay updated with the latest financial insights! Click here!)

Bloomberg reported citing people familiar with the situation that a prolific criminal gang known as Lockbit is suspected to have orchestrated the hack.

According to some market participants, trades going through ICBC were not settled due to the attack and this affected market liquidity, Reuters reported.

In ransomware attacks, hackers encrypt an organization’s systems and demand ransom payments in exchange for unlocking them. 

The Financial Times earlier had reported that the US Securities Industry and Financial…

Source…