that leakedAttack.Databreachthousands of employee W-2 forms to an unknown scammer . That 's according to our news reporting partners at CBS4 Indy . Company officials called police about the leak Monday afternoon . Somebody posing asAttack.PhishingCEO Scott Wise emailedAttack.Phishinga payroll employee , asking her to send all 4,000 W-2 forms to him . The e-mail wasn ’ t really from Wise , but the employee did send all the forms , giving the scammer personal finance information for all those employees . Scotty ’ s Brewhouse executives contacted the IRS and Indianapolis Metropolitan Police Department about the breach . They ’ re now working to notify all their employees and give them steps to protect their financial information . IMPD and other agencies are involved in the investigation into who sentAttack.Phishingthe bogus email . This email scamAttack.Phishingmatches a phishing schemeAttack.Phishingthat prompted a warning from the IRS last year during tax season . At that time , the agency recorded a 400 percent increase in this kind of scam . The IRS has a website to use if your W-2 or other information has been leakedAttack.Databreach. Tuesday evening , Scotty 's Brewhouse issued a statement on the situation : Yesterday Scotty ’ s Holdings , LLC and its subsidiary , affiliate and managed entities were the victims of an email phishing scamAttack.Phishingthat resulted in the disclosure of 2016 W-2 information . Scotty ’ s has confirmed that no customer information was obtainedAttack.Databreachby the scammers in yesterday ’ s phishing scamAttack.Phishing. Scotty ’ s is working closely with federal and local law enforcement and the credit bureaus to limit any potential misuse of the information that was obtainedAttack.Databreachand to identify and apprehend the scammers . “ Unfortunately , Scotty ’ s was the target of and fell victim to scammers , as so many other companies have , ” said Scott Wise , CEO of Scotty ’ s Holdings , LLC . “ Scotty ’ s employees and customers are of tremendous importance to the company and Scotty ’ s regrets any inconvenience to its employees that may result from this scamming incident . Scotty ’ s will continue to work with federal and local law enforcement , the Internal Revenue Service and credit bureaus to bring the responsible party or parties to justice. ” Scotty ’ s alerted authorities immediately after it learned of the scam . A toll-free number was set up by the company to answer employee questions . The company will also make available to affected employees one year of credit monitoring at no cost to employees , in addition to providing information regarding available resources for its employees to monitor their credit .
Last week HackRead exclusively reported on a vendor sellingAttack.Databreachover 1 million Gmail and Yahoo accounts on a Dark Web marketplace . Now , the same vendor is back with yet another listing and this time the victims are PlayStation users . The vendor who goes by the handle of “ SunTzu583 ” is sellingAttack.Databreach640,000 accounts of PlayStation users in just USD 35.71 ( 0.0292 BTC ) stolenAttack.Databreachfrom an unknown database . These accounts contain emails along with their clear-text passwords . According to SunTzu583 , the database was not directly stolenAttack.Databreachfrom PlayStation servers , but it does contain unique accounts of PlayStation users . SunTzu583 goes on to explain that these accounts may also work on other sites however they can be mainly used for PlayStation-related activities . It must be noted that in 2015 , 2.5 million Xbox ( Xbox 360 ISO ) and Playstation accounts ( PSP ISO ) were stolenAttack.Databreachand leakedAttack.Databreachon the Dark Web marketplaces in February 2017 . Also , about five months ago several PlayStation users were complaining that their accounts have been hackedAttack.Databreachand in some cases , their funds were missing . While the vendor has already announced that the database is not directly stolenAttack.Databreachfrom PlayStation servers , it is quite possible that it was takenAttack.Databreachfrom a third party server . We at HackRead can not confirm the authenticity of this database , but if you have an account on PSN , it is advisable to change its password and also use a different password on other sites .
`` Since this afternoon , I have been unable to use Teamviewer through a TalkTalk connection , '' said the first user that complained about the block , saying that TeamViewer works fine from his mobile 4G connection , but not his home TalkTalk line . Tens of other users followed suite and shared similar experiences . As it became clear to all that TalkTalk had banned TeamViewer on its network , the company admitted the issues through a representative . Apologies for the confusion , but I can confirm that we have implemented a number of network changes that have blocked a number of applications including Teamviewer We constantly monitor for potentially malicious internet traffic , so that we can protect our customers from phishingAttack.Phishingand scamming activities . As part of this work , we have recently blocked a number of sites and applications from our network , and we ’ re working hard to minimise the impact on our customers . We are working with teamviewer and other 3rd parties on implementing some additional security measures that would enhance the security to all customers of these services but we will continue to block any sites/applications reported by customers to reduce the opportunity for fraud to take place . The issues the TalkTalk representative was referring to are a wave of scams that have hit TalkTalk customers over the past year . The data of millions of TalkTalk customers leakedAttack.Databreachonline in 2015 when the company experienced three separate data breachesAttack.Databreachin the same year . Scammers have been using some of the leaked TalkTalk data to target the ISP 's customers during the past two years . Several topics on the TalkTalk forums detail such events , which all start with a phone call from one of the scammers . In many cases , the scammer has an Indian accent , poses asAttack.Phishinga TalkTalk employee , and asks users to install TeamViewer to assist customers with a technical issue or to fixVulnerability-related.PatchVulnerabilitysecurity errors . TeamViewer , which is a legitimate app used worldwide by tech departments , allows the scammer to access the victim 's computer and install malware such as keyloggers or backdoor trojans right under the unsuspecting victim 's nose . In some cases , parts of the TeamViewer app has even been embedded in malware directly , as to simplify the process of stealing dataAttack.Databreachvia a legitimate communications channel , disguising the data theft operationsAttack.Databreachunder TeamViewer traffic . Apps like TeamViewer , Supremo , and LogMeIn , have all been used as part of tech support scams for years . The only surprise is TalkTalk 's pro-active reaction , which comes two days after the BBC ran a story documenting the operations of an Indian scam call center that was specifically targeting TalkTalk customers . Anticipating criticism from customers , other news outlets , and a possible sanction from government agencies , TalkTalk decided to take a pro-active approach and fight the scammers by blocking some of the apps they used . For its part , TeamViewer has been very accommodating , saying in a statement published yesterday that the two companies are in `` extensive talks to find a comprehensive joint solution to better address this scamming issue . '' In an email , a TeamViewer spokesperson told Bleeping Computer they expect to reach a consensus with TalkTalk , who is `` aware that this not a TeamViewer specific issue , '' and both companies are working to `` bring about additional measures to thwart scamming . '' Imagine if Team Viewer and other such remote software would give a big red alert explaining that their software is often used by criminals stating they were from ISPs , Microsoft or some security tech as the first window seen when opening the software .
On the one hand , it gives them a bit of plausible deniability while reaping the potential spoils of each attack , but if the hackers are n't kept on a tight leash things can turn bad . Karim Baratov , the 22-year-old Canadian hacker who the FBI alleges Russia 's state security agency hired to carry out the Yahoo breach , did n't care much for a low profile . His Facebook and Instagram posts boasted of the million-dollar house he bought in a Toronto suburb and there were numerous pictures of him with expensive sports cars -- the latest an Aston Martin DB9 with the license plate `` MR KARIM . '' But forget those for a moment and consider he was n't very careful in hiding his hacking work . In the domain name records , he listed his home address . “ When you bring in amateurs who don ’ t follow standard protocol , that carries risk , ” said Alex Holden , chief information security officer at Hold Security . At the time , the company notified the FBI but only believed 26 accounts had been targeted . It was n't until mid 2016 that the true enormity of the hack started to become apparent . Security experts say it ’ s possible Baratov or a second hacker hired to help might have bragged online about the hack at some point , tipping off U.S. investigators . And then in August 2016 a database allegedly stolenAttack.Databreachfrom Yahoo was found circulatingAttack.Databreachon the black market . “ Some of the information about this hackAttack.Databreachwas basically leakedAttack.Databreach, ” Holden said . “ That ’ s not a sign of a mature intelligence operation ” . So why did Russia turn to a 22-year-old from Canada ? According to the indictment , Baratov broke into the accounts through spear phishing email attacksAttack.Phishing, which are often designed to dupeAttack.Phishingvictims into handing over password information . However , spear phishingAttack.Phishingonly works best if the emails appear authentic . “ The benefit of having Karim , the Canadian , on the team probably allowed creation of far more believable phishing attacksAttack.Phishingdue to his being a native English speaker , ” said Chester Wisniewski , a research scientist at security firm Sophos , in an email . In addition to Baratov , the Russian agents allegedly hired a 29-year-old Latvian named Aleksey Belan , who pulled off the main hack againstAttack.DatabreachYahoo , and stoleAttack.Databreachthe database involving 500 million user accounts . By outsourcing the operation to Belan , Russia probably wanted to conceal the true motives for the Yahoo breach , Wisniewski said . Prior to Wednesday ’ s indictment , Belan himself was already a wanted man for hacks against U.S. e-commerce companies . “ There is also the ‘ cover ’ of criminal actions to potentially obfuscate the spying that was allegedly the real purpose ” . In response to Wednesday 's criminal indictments by the FBI , the Russian government is denying any involvement , and calling the allegations a distraction . Baratov , who has been arrested in Canada , is also claiming innocence , according to his lawyer . But if the allegations are true , it does show one example of how Russia is harnessing the power of cybercriminals for spying purposes -- and how it can get sloppy
A few months ago we exclusively reported on a Dark Web vendor selling 1 Billion user accounts stolenAttack.Databreachfrom the Chinese Internet giants . Now , another vendor going by the handle of CosmicDark is sellingAttack.Databreacha database containing 100,759,591 user accounts stolenAttack.Databreachfrom of Youku Inc. , a popular video service in China . The database according to vendor ’ s listing was leakedAttack.Databreachin 2016 and leakedAttack.Databreachon the Internet this year . Although it is unclear how the database was stolenAttack.DatabreachCosmicDark is sellingAttack.Databreachthe whole package for USD 300 ( BTC 0.2559 ) . The data contains emails and passwords decrypted with MD5 & SHA1 hashes . According to the sample data ( 552 accounts ) provided by CosmicDark , most of the emails are based on @ 163.com , @ qq.com , and @ xiaonei.com . It must be noted that based on HackRead ’ s research the encrypted passwords provided in the sample data have already been decrypted and publically available on the Internet . Also , HaveIbeenpwned , a platform where you can check if your account has been compromisedAttack.Databreachhas also confirmed the breachAttack.Databreach. It is unclear whether Youku Inc. is aware of the breach or has notified its users , however it is evident that it poses a massive privacy threat to their users . Furthermore , vendors in the same marketplace are sellingAttack.Databreach21 million Gmail and Yahoo accounts , 640,000 decrypted PlayStation accounts , millions of accounts from 11 hacked Bitcoin forums and millions of accounts stolenAttack.Databreachfrom 25 hacked vBulletin forums .
One of the biggest and most popular social networking platforms , Snapchat , has once again become the center of attention . But this time , it is for all the wrong reasons with tweets and hashtags ( # Uninstall_Snapchat and # BoycottSnapchat ) urging people to get rid of the app . Apparently , the outrage started in India , after one of Snapchat ’ s former employees said that the CEO of the company had no intention to expand the business to India since the Snapchat platform is meant for “ rich people ” and not for “ poor countries ” like India and or Spain . Enraged India first reacted on Twitter , and after that , the hacktivist group Anonymous India claimed that they were responsible for 1.7 million Snapchat users ’ data leakAttack.Databreach. The hacking group has supposedly foundVulnerability-related.DiscoverVulnerabilityvulnerabilities in Snapchat ’ s systems and managed to stealAttack.Databreach1.7 million user data and leakedAttack.Databreachthem on the dark web . It seems that the hackers belong to one of the many bug bounty hunting groups that are findingVulnerability-related.DiscoverVulnerabilityflaws in systems of big companies in exchange for money . It appears that the flaw in Snapchat ’ s security was discoveredVulnerability-related.DiscoverVulnerabilitylast year , but never reportedVulnerability-related.DiscoverVulnerabilityto the authorities . Now , the same flaw was used to steal Snapchat users data , reportsVulnerability-related.DiscoverVulnerabilityDailyMail . The hackers are also demanding that the CEO apologize or an intensive strike against Snapchat will be launched . So far , Snapchat itself hasn ’ t confirmed any data leaksAttack.Databreachand we ’ re still waiting for an official comment from the social media giant . So far , the company has claimed that the allegations are ridiculous and that the app is available worldwide for everyone who wishes to use it . A spokesperson for the company has denied everything that Snapchat is being accused of . Despite this , the outrage on the social media continues , and many are still persuading others to boycott the application , or better yet – to completely uninstall it . The ratings of the company have dropped down fast , and the app is currently rated with only one star on the Apple ’ s App Store , while before this ‘ incident ’ it had a full five-star rating . And when it comes to Google Play Store , the app has a four-star rating at the time of writing . It ’ s unknown what will happen with the company now that their reputation has dropped down so dramatically , but whatever they decide to do to fixVulnerability-related.PatchVulnerabilitythis , they better do it fast .
The group of hackers that leakedAttack.Databreachthe upcoming fifth season of “ Orange Is the New Black ” this weekend may have also secured accessAttack.Databreachto some three dozen other shows and movies . TheDarkOverlord , as the group calls itself , provided cybersecurity blog DataBreaches.net with a long list of movies and TV shows it claimed to have stolenAttack.Databreachfrom Larson Studios , a Hollywood-based audio post-production company . In addition to “ Orange Is the New Black , ” it also lists a number of high-profile shows from the big broadcast networks , including ABC ’ s “ The Catch , ” NBC ’ s “ Celebrity Apprentice , ” CBS ’ “ NCIS Los Angeles , ” and Fox ’ s “ New Girl. ” Other shows included are IFC ’ s “ Portlandia , ” FX ’ s “ It ’ s Always Sunny in Philadelphia , ” “ Breakthrough ” from NatGeo , E ! ’ s “ The Arrangement , ” “ Bunk ’ d ” from the Disney Channel , and Netflix ’ s “ Bill Nye Saves the World. ” The list also makes mention of a few movies , including the Netflix original “ Win It All , ” the Lifetime TV movie “ A Midsummers Nightmare , ” and a YouTube Red Liza Koshy special . It ’ s worth noting that this list is by no means confirmed . ABC , NBC , Fox , FX , IFC , and NatGeo all declined to comment when contacted by Variety . CBS and E ! did not respond . Netflix acknowledged the breach in a statement earlier this weekend , saying : “ We are aware of the situation . A production vendor used by several major TV studios had its security compromised and the appropriate law enforcement authorities are involved. ” The company hasn ’ t commented on details of the leak . TheDarkOverlord suggested on Twitter earlier this weekend that it might be trying to extortAttack.RansomFox , IFC , Nat Geo , and ABC next , but it is unknown whether they may be in the process of trying to extortAttack.Ransomother studios and networks . The hackers had previously unsuccessfully tried to solicit extortion moneyAttack.Ransomfrom Larson Studios as well as Netflix to not release “ Orange Is the New Black , ” and may have used the release of the entire season this weekend as a way to pressure others to pay upAttack.Ransom.
Over the weekend , a hacker known as TheDarkOverlord resurfaced and released the first episode of season five for `` Orange is the New Black '' a popular show on Netflix that is n't slated to air until June . A short time later , TheDarkOverlord released episodes 2 though 10 , along with a warning to other Hollywood studios – you 're next . The media jumped on the story . Netflix would n't confirm or deny the leakedAttack.Databreachepisodes were legitimate , stating that proper law enforcement had been notified , and that a company used by several TV studios `` had its security compromised . '' The company in question , Larson Studios , does audio post-production work for a number of shows and films , including NCIS Los Angeles , Designated Survivor , and Arrested Development . According to Larson Studios , they 've done work for FOX , Netflix , ABC , NBC , IFC , Showtime , and more . As word of Netflix 's security problem started to spread , news outlets starting comparing the incident to the Sony Pictures hack and the medical hacks over the last few years . While there are some comparisons to be made , they 're not the same type of threat . Netflix did n't have a Ransomware incident , and neither did Larson Studios . Their files were stolenAttack.Databreach, not encrypted . Ransomware encrypts the files on a computer and renders them useless . Victims can recover the files if they pay a fee (ransom)Attack.Ransom, or they can try and recover the files from backups . According to TheDarkOverlord , Larson Studios was targeted because they were a post-production company . Late last year , TheDarkOverlord hackedAttack.DatabreachLarson Studios and downloadedAttack.Databreachan unknown number of files . Plenty of reporters knew TheDarkOverlord had targeted Hollywood , but until this weekend there was never any proof . Fast forward a few months . When Larson Studios did n't comply with the extortion demandsAttack.Ransom, TheDarkOverlord turned their attention to Netflix . When Netflix refused to payAttack.Ransom, season five ( minus three episodes ) of `` Orange is the New Black '' was released for download . `` It did n't have to be this way , Netflix . You 're going to lose a lot more money in all of this than what our modest offer was . We 're quite ashamed to breathe the same air as you . We figured a pragmatic business such as yourselves would see and understand the benefits of cooperating with a reasonable and merciful entity like ourselves , '' TheDarkOverlord wrote in a statement . Netflix surpassed $ 2.5 billion in quarterly streaming revenue in Q1 2017 , and added five million members to their subscriber base . While having one of their popular series leakedAttack.Databreachto the web is n't exactly helpful , it is n't clear if there will be any financial impact from this incident . Once again , extortion and Ransomware are two separate things . Netflix and Larson Studios are (were) being extortedAttack.Ransom, they were not infected with Ransomware and have complete accessAttack.Databreachto their files . However , there is a lesson to be learned . Third-parties are always going to pose a risk to any organization , and this is certainly the case in Hollywood where secrecy and suspense are key to their business model .
The details of more than 100m Indians ’ Aadhaar ID cards have leakedAttack.Databreachfrom four government portals , according to a report from the Centre for Internet and Society ( CIS ) . Based on the numbers available on the websites looked at , [ the ] estimated number of Aadhaar numbers leakedAttack.Databreachthrough these four portals could be around 130-135 million If you ’ re not familiar with the Aadhaar numbers , we ’ ve previously reported on the history of and concerns surrounding this biometric ID card . Now a fundamental part of Indian society , anyone that has not signed up faces being denied access to many government and private-sector services and schemes . As the government presses on with intertwining the card into everyday life , concerns about the security of the vast amounts of personal data being stored and the potential for its misuse by cyber-criminals continue to mount . The disclosures came as part of a report entitled Information Security Practices of Aadhaar ( or lack thereof ) : A Documentation of Public Availability of Aadhaar Numbers with Sensitive Personal Financial Information , which focuses on just four of India ’ s numerous government portals : But it ’ s not just the ID numbers that the report is worried about ; it also claims that the leaksAttack.Databreachcontain “ personally identifiable information of beneficiaries or subjects of the leaked databases ” , putting the estimated number of bank accounts leakedAttack.Databreachat around 100m . The Unique Identification Authority of India ( UIDAI ) , which issues the Aadhaar numbers , claims that there have been no leaksAttack.Databreach, according to The Times of India . The paper also quotes one official as saying something rather different While Aadhaar numbers are available , the biometric information is not … The leaked databases do not pose a real threat … because the Aadhaar number can not be misused without biometrics . And another that another official as saying that the “ Aadhaar number is not confidential just as bank account number which is mentioned in cheque books and shared with lot of people ” . It seems that , despite the official line , Aadhaar numbers are getting outAttack.Databreachinto the public domain . The question has to be whether the personally identifiable information that is being published alongside them is enough for fraudsters to stealAttack.Databreachsomeone ’ s identity . I haven ’ t yet seen any reports of fraud being committed on the back of a stolen Aadhaar number . Only time will tell . While this new , controversial ID system beds itself in , the world will be watching closely to see where the cracks in security are , how fraudsters take advantage and how the government reacts to plugVulnerability-related.PatchVulnerabilityany holes . We ’ ll certainly be keeping a close eye on developments .
The details of more than 100m Indians ’ Aadhaar ID cards have leakedAttack.Databreachfrom four government portals , according to a report from the Centre for Internet and Society ( CIS ) . Based on the numbers available on the websites looked at , [ the ] estimated number of Aadhaar numbers leakedAttack.Databreachthrough these four portals could be around 130-135 million If you ’ re not familiar with the Aadhaar numbers , we ’ ve previously reported on the history of and concerns surrounding this biometric ID card . Now a fundamental part of Indian society , anyone that has not signed up faces being denied access to many government and private-sector services and schemes . As the government presses on with intertwining the card into everyday life , concerns about the security of the vast amounts of personal data being stored and the potential for its misuse by cyber-criminals continue to mount . The disclosures came as part of a report entitled Information Security Practices of Aadhaar ( or lack thereof ) : A Documentation of Public Availability of Aadhaar Numbers with Sensitive Personal Financial Information , which focuses on just four of India ’ s numerous government portals : But it ’ s not just the ID numbers that the report is worried about ; it also claims that the leaksAttack.Databreachcontain “ personally identifiable information of beneficiaries or subjects of the leaked databases ” , putting the estimated number of bank accounts leakedAttack.Databreachat around 100m . The Unique Identification Authority of India ( UIDAI ) , which issues the Aadhaar numbers , claims that there have been no leaksAttack.Databreach, according to The Times of India . The paper also quotes one official as saying something rather different While Aadhaar numbers are available , the biometric information is not … The leaked databases do not pose a real threat … because the Aadhaar number can not be misused without biometrics . And another that another official as saying that the “ Aadhaar number is not confidential just as bank account number which is mentioned in cheque books and shared with lot of people ” . It seems that , despite the official line , Aadhaar numbers are getting outAttack.Databreachinto the public domain . The question has to be whether the personally identifiable information that is being published alongside them is enough for fraudsters to stealAttack.Databreachsomeone ’ s identity . I haven ’ t yet seen any reports of fraud being committed on the back of a stolen Aadhaar number . Only time will tell . While this new , controversial ID system beds itself in , the world will be watching closely to see where the cracks in security are , how fraudsters take advantage and how the government reacts to plugVulnerability-related.PatchVulnerabilityany holes . We ’ ll certainly be keeping a close eye on developments .
Earlier this week , private photos and video clip of the famous WWE Divas Lisa Marie Varon known by her WWE name Victoria and Charlotte Flair were leakedAttack.Databreachonline the internet . The photos showed Charlotte taking selfies of herself in front of the mirror using her iPhone while in Lisa ’ s case a video clip in her private moments along with selfies taken from her iPhone have been leakedAttack.Databreach. Her original name being Ashley Fliehr , the WWE woman wrestler is the daughter of Ric Flair , who is again a well-known wrestling legend . She is considered as one of the most popular WWE stars having been the women ’ s champion for up to four times . She began her career by first appearing on NXT in 2013 , and after a year , she managed to win NXT Women ’ s Championship . Later , she won the WWE Divas Championship after being promoted to the main roster in 2015 . She had also been married twice . Her first marriage was in 2010 with Riki Johnson . They later filed for divorce and Flair then married Bram in 2013 . They got divorced in 2015 . Flair also had a brother , Reid , who was found dead in March 2013 , in Charlotte ’ s bed and it was revealed that he died from heroin overdose . Flair tweeted about her photos being leakedAttack.Databreachsaying that her photos were shared online without her consent and demanded that they should be removed immediately . Upon this , there were a plethora of supporters who emerged on Twitter , showing their support for Flair with the hashtag Flair , however , is not the only victim whose photos have been leakedAttack.Databreachso unscrupulously . Alexa Bliss , who currently holds the title of RAW Women ’ s Champion , had her photos leakedAttack.Databreachas well on April 28 . Alexa tweeted that the photos are fake and demanded that they should be taken down immediately . Similarly , Paige , who was WWE Divas Champion , had her private photos hackedAttack.Databreachalong with explicit videos that were made public online . She later wrote that she felt quite bad and wanted to harm herself for days after the leak . Furthermore , private photos of WWE Divas including Maria Kanellis , Melina Perez , Kaitlyn and Summer Rae were also leakedAttack.Databreachon different online platforms . That ’ s not all , it was about two months ago when hackers leakedAttack.Databreachprivate photos of prominent Hollywood celebrities like Amanda Seyfried , Emma Watson . However , It is quite unnerving and yet troubling to see how these WWE stars are being exploited and no attention is being paid to the security standards of mobile communication . It is vital that network operators look into the issue immediately and build proper security features to prevent such infiltrations .
Earlier this week , private photos and video clip of the famous WWE Divas Lisa Marie Varon known by her WWE name Victoria and Charlotte Flair were leakedAttack.Databreachonline the internet . The photos showed Charlotte taking selfies of herself in front of the mirror using her iPhone while in Lisa ’ s case a video clip in her private moments along with selfies taken from her iPhone have been leakedAttack.Databreach. Her original name being Ashley Fliehr , the WWE woman wrestler is the daughter of Ric Flair , who is again a well-known wrestling legend . She is considered as one of the most popular WWE stars having been the women ’ s champion for up to four times . She began her career by first appearing on NXT in 2013 , and after a year , she managed to win NXT Women ’ s Championship . Later , she won the WWE Divas Championship after being promoted to the main roster in 2015 . She had also been married twice . Her first marriage was in 2010 with Riki Johnson . They later filed for divorce and Flair then married Bram in 2013 . They got divorced in 2015 . Flair also had a brother , Reid , who was found dead in March 2013 , in Charlotte ’ s bed and it was revealed that he died from heroin overdose . Flair tweeted about her photos being leakedAttack.Databreachsaying that her photos were shared online without her consent and demanded that they should be removed immediately . Upon this , there were a plethora of supporters who emerged on Twitter , showing their support for Flair with the hashtag Flair , however , is not the only victim whose photos have been leakedAttack.Databreachso unscrupulously . Alexa Bliss , who currently holds the title of RAW Women ’ s Champion , had her photos leakedAttack.Databreachas well on April 28 . Alexa tweeted that the photos are fake and demanded that they should be taken down immediately . Similarly , Paige , who was WWE Divas Champion , had her private photos hackedAttack.Databreachalong with explicit videos that were made public online . She later wrote that she felt quite bad and wanted to harm herself for days after the leak . Furthermore , private photos of WWE Divas including Maria Kanellis , Melina Perez , Kaitlyn and Summer Rae were also leakedAttack.Databreachon different online platforms . That ’ s not all , it was about two months ago when hackers leakedAttack.Databreachprivate photos of prominent Hollywood celebrities like Amanda Seyfried , Emma Watson . However , It is quite unnerving and yet troubling to see how these WWE stars are being exploited and no attention is being paid to the security standards of mobile communication . It is vital that network operators look into the issue immediately and build proper security features to prevent such infiltrations .
Earlier this week , private photos and video clip of the famous WWE Divas Lisa Marie Varon known by her WWE name Victoria and Charlotte Flair were leakedAttack.Databreachonline the internet . The photos showed Charlotte taking selfies of herself in front of the mirror using her iPhone while in Lisa ’ s case a video clip in her private moments along with selfies taken from her iPhone have been leakedAttack.Databreach. Her original name being Ashley Fliehr , the WWE woman wrestler is the daughter of Ric Flair , who is again a well-known wrestling legend . She is considered as one of the most popular WWE stars having been the women ’ s champion for up to four times . She began her career by first appearing on NXT in 2013 , and after a year , she managed to win NXT Women ’ s Championship . Later , she won the WWE Divas Championship after being promoted to the main roster in 2015 . She had also been married twice . Her first marriage was in 2010 with Riki Johnson . They later filed for divorce and Flair then married Bram in 2013 . They got divorced in 2015 . Flair also had a brother , Reid , who was found dead in March 2013 , in Charlotte ’ s bed and it was revealed that he died from heroin overdose . Flair tweeted about her photos being leakedAttack.Databreachsaying that her photos were shared online without her consent and demanded that they should be removed immediately . Upon this , there were a plethora of supporters who emerged on Twitter , showing their support for Flair with the hashtag Flair , however , is not the only victim whose photos have been leakedAttack.Databreachso unscrupulously . Alexa Bliss , who currently holds the title of RAW Women ’ s Champion , had her photos leakedAttack.Databreachas well on April 28 . Alexa tweeted that the photos are fake and demanded that they should be taken down immediately . Similarly , Paige , who was WWE Divas Champion , had her private photos hackedAttack.Databreachalong with explicit videos that were made public online . She later wrote that she felt quite bad and wanted to harm herself for days after the leak . Furthermore , private photos of WWE Divas including Maria Kanellis , Melina Perez , Kaitlyn and Summer Rae were also leakedAttack.Databreachon different online platforms . That ’ s not all , it was about two months ago when hackers leakedAttack.Databreachprivate photos of prominent Hollywood celebrities like Amanda Seyfried , Emma Watson . However , It is quite unnerving and yet troubling to see how these WWE stars are being exploited and no attention is being paid to the security standards of mobile communication . It is vital that network operators look into the issue immediately and build proper security features to prevent such infiltrations .
Users of the Guardian ’ s Soulmates dating site have been getting spammed with smut after the site leakedAttack.Databreachtheir contact information . The UK-based Guardian newspaper ’ s publisher , which runs the service , is blaming “ human error ” and a third-party technology provider for the leak , which has now been fixed . According to the BBC , the site — which charges users up to £32 ( $ 41.50 ) per month — said that only email addresses and user IDs had been exposedAttack.Databreachdirectly . But that information can be used to dig out more from public profiles , said the company , including photos , relationship preferences and physical descriptions . Here ’ s a statement the publisher sent to The Register : We can confirm we have received 27 enquiries from our members which show evidence of their email addresses used for their Soulmates account having been exposedAttack.Databreach. We take matters of data security extremely seriously and have conducted thorough audits of all our internal systems and are confident that no outside party breached any of these systems . Our ongoing investigations point to a human error by one of our third party technology providers , which led to an exposureAttack.Databreachof an extractAttack.Databreachof data . This extractAttack.Databreachcontained only members ’ email addresses and user ID which can be used to find members ’ publicly available online profiles . We have taken appropriate measures to ensure this does not happen again , and we continue to review our processes and third party suppliers . Nonetheless , we apologise to our members who were affected . If any of our members are concerned we encourage them to contact us on support @ guardiansoulmates.com . One user who contacted the BBC said they ’ d starting receiving sexually explicit spam , laced with information from their Soulmates profile , in November . The user , who works in IT , said they weren ’ t completely surprised . Things like this can happen with online services . But they were still a bit taken aback , given that they hadn ’ t used the site for several years and they were no longer paying the membership fee . That user told the BBC that they had contacted Soulmates six months ago , concerned about what other information might have been breachedAttack.Databreach. Another user who reached out to the BBC said that in spite of the breached information being public , it still felt “ creepy ” to see it lifted from the confines of the dating site : It ’ s all information that I was happy to put online at one point anyway , but when it ’ s used outside of context like that it does feel a lot more creepy . We don ’ t have details on the identity of the third-party tech provider , or where , exactly , in the setup the door was left open . At any rate , if it is indeed the fault of a third party , this is just the latest example of how contractors can be the weak link in your security chain . It doesn ’ t matter how strict your own cybersecurity is if one of your contractors isn ’ t up to scratch . As we ’ ve noted before , everyone we do business with , share data with , outsource operations to , sell things to or buy things from forms a part of our own security chain . A breach at any point in the chain can have an impact on the privacy and integrity of our data . As for those Soulmates users now afflicted with sexually explicit spam , our sympathies . It ’ s hard enough to find true love . Who needs the heartache of trying , and failing , to keep your data out of the hands of e-jerks ? We ’ ve passed out plenty of advice to avoid online dating fraud , but none of that applies here , given that you ’ re certainly not at fault in this one . Do be careful of that spam , though . Be it lascivious or as pure as a spring lamb , it ’ s still spam , and that stuff often goes hand in hand with malware . Don ’ t click !
Insecure backend databases and mobile apps are making for a dangerous combination , exposingAttack.Databreachan estimated 280 million records that include a treasure-trove of private user data . According to a report by Appthority , more than 1,000 apps it looked at on mobile devices leakedAttack.Databreachpersonally identifiable information that included passwords , location , VPN PINs , emails and phone numbers . Appthority Mobile Threat Team calledVulnerability-related.DiscoverVulnerabilitythe vulnerability HospitalGown and saidVulnerability-related.DiscoverVulnerabilitythe culprit behind the threat are misconfigured backend storage platforms including Elasticsearch , Redis , MongoDB and MySQL . “ HospitalGown is a vulnerability to data exposure caused , not by any code in the app , but by the app developers ’ failure to properly secure the backend servers with which the app communicates , ” wrote the authors of the report releasedVulnerability-related.DiscoverVulnerabilityWednesday . According to Seth Hardy , director of security research , the problem is a byproduct of insecure database instillations that made headlinesVulnerability-related.DiscoverVulnerabilityin February . That ’ s when misconfigured and insecure MongoDB , Hadoop and CouchDB installations became popular extortionAttack.Ransomtargets for hackers who were scanning for vulnerable servers to attack . The weak link in the chain when it comes to HospitalGown are the insecure servers that apps connect to , Hardy said . During the course of Appthority ’ s investigation , it foundVulnerability-related.DiscoverVulnerability21,000 open Elasticsearch servers , revealing more than 43 terabytes of exposed data . In one scenario , the attacker looks for vulnerabilities in the space between the vendor ’ s mobile application and the app ’ s server side components , according to researchers . “ The servers for most mobile applications are cloud based and accessible via the Internet , this allows a bad actor to skip the long and potentially many-layered ‘ compromise ’ stage of an attack , accessingAttack.Databreachcompany data directly from a database that is impossible for the enterprise to see or secure , ” they wrote . Researchers saidVulnerability-related.DiscoverVulnerabilityvulnerable mobile apps it foundVulnerability-related.DiscoverVulnerabilityran the gamut , from office productivity , enterprise access management , games , dating to travel , flight and hotel applications . Any personal identifiable data a user shared with the app was vulnerableVulnerability-related.DiscoverVulnerabilityto possible exfiltrationAttack.Databreachby a hacker . “ These servers were accessible from the Internet , lacked any means of authentication to prevent unwanted accessAttack.Databreachto the data they contained , and failed to secure transport of data , including PII , using HTTPS : conventions , ” according to the report . While this is a strictly a data security issue , Appthority saidVulnerability-related.DiscoverVulnerability, attacks can quickly escalate and personal information could easily be leveraged in a spear phishing attackAttack.Phishingor brute force attack . In its report , AppThority showed how a mobile VPN app called Pulse Workspace , used by enterprises , government agencies and service providers , leakedAttack.Databreachdata . While Pulse Workspace created an API to secure front-end Elasticsearch access , the backend , and all of the app ’ s data records , were exposed and leakedAttack.DatabreachPulse customer data . AppThority notifiedVulnerability-related.DiscoverVulnerabilityPulse Workspace and its customers of the vulnerability , which have since been fixedVulnerability-related.PatchVulnerability. Appthority is careful to point out that of the platforms it examined – Elasticsearch , Redis , MongoDB , and MySQL – each had plugins to allow for proper public exposure on the internet . “ Best practices on secure data stores is just not being adopted in too many cases , ” Hardy said . Elasticsearch , for example , has a bevy of security and data protection capabilities , such as being able to encrypt all the data that ’ s on the platform . Increasing the risk of HospitalGown type-attacks is that fact that many apps Appthority looked at seemed benign in terms of shared user data . But , increasingly apps have advertising components that collectAttack.Databreachpersonal identifiable data that can be mined by hackers for phishingAttack.Phishingor ransomware attacksAttack.Ransom. App developers and system administrators need to know where their data is stored and make sure it is secured , Hardy told Threatpost .
Insecure backend databases and mobile apps are making for a dangerous combination , exposingAttack.Databreachan estimated 280 million records that include a treasure-trove of private user data . According to a report by Appthority , more than 1,000 apps it looked at on mobile devices leakedAttack.Databreachpersonally identifiable information that included passwords , location , VPN PINs , emails and phone numbers . Appthority Mobile Threat Team calledVulnerability-related.DiscoverVulnerabilitythe vulnerability HospitalGown and saidVulnerability-related.DiscoverVulnerabilitythe culprit behind the threat are misconfigured backend storage platforms including Elasticsearch , Redis , MongoDB and MySQL . “ HospitalGown is a vulnerability to data exposure caused , not by any code in the app , but by the app developers ’ failure to properly secure the backend servers with which the app communicates , ” wrote the authors of the report releasedVulnerability-related.DiscoverVulnerabilityWednesday . According to Seth Hardy , director of security research , the problem is a byproduct of insecure database instillations that made headlinesVulnerability-related.DiscoverVulnerabilityin February . That ’ s when misconfigured and insecure MongoDB , Hadoop and CouchDB installations became popular extortionAttack.Ransomtargets for hackers who were scanning for vulnerable servers to attack . The weak link in the chain when it comes to HospitalGown are the insecure servers that apps connect to , Hardy said . During the course of Appthority ’ s investigation , it foundVulnerability-related.DiscoverVulnerability21,000 open Elasticsearch servers , revealing more than 43 terabytes of exposed data . In one scenario , the attacker looks for vulnerabilities in the space between the vendor ’ s mobile application and the app ’ s server side components , according to researchers . “ The servers for most mobile applications are cloud based and accessible via the Internet , this allows a bad actor to skip the long and potentially many-layered ‘ compromise ’ stage of an attack , accessingAttack.Databreachcompany data directly from a database that is impossible for the enterprise to see or secure , ” they wrote . Researchers saidVulnerability-related.DiscoverVulnerabilityvulnerable mobile apps it foundVulnerability-related.DiscoverVulnerabilityran the gamut , from office productivity , enterprise access management , games , dating to travel , flight and hotel applications . Any personal identifiable data a user shared with the app was vulnerableVulnerability-related.DiscoverVulnerabilityto possible exfiltrationAttack.Databreachby a hacker . “ These servers were accessible from the Internet , lacked any means of authentication to prevent unwanted accessAttack.Databreachto the data they contained , and failed to secure transport of data , including PII , using HTTPS : conventions , ” according to the report . While this is a strictly a data security issue , Appthority saidVulnerability-related.DiscoverVulnerability, attacks can quickly escalate and personal information could easily be leveraged in a spear phishing attackAttack.Phishingor brute force attack . In its report , AppThority showed how a mobile VPN app called Pulse Workspace , used by enterprises , government agencies and service providers , leakedAttack.Databreachdata . While Pulse Workspace created an API to secure front-end Elasticsearch access , the backend , and all of the app ’ s data records , were exposed and leakedAttack.DatabreachPulse customer data . AppThority notifiedVulnerability-related.DiscoverVulnerabilityPulse Workspace and its customers of the vulnerability , which have since been fixedVulnerability-related.PatchVulnerability. Appthority is careful to point out that of the platforms it examined – Elasticsearch , Redis , MongoDB , and MySQL – each had plugins to allow for proper public exposure on the internet . “ Best practices on secure data stores is just not being adopted in too many cases , ” Hardy said . Elasticsearch , for example , has a bevy of security and data protection capabilities , such as being able to encrypt all the data that ’ s on the platform . Increasing the risk of HospitalGown type-attacks is that fact that many apps Appthority looked at seemed benign in terms of shared user data . But , increasingly apps have advertising components that collectAttack.Databreachpersonal identifiable data that can be mined by hackers for phishingAttack.Phishingor ransomware attacksAttack.Ransom. App developers and system administrators need to know where their data is stored and make sure it is secured , Hardy told Threatpost .
Developers are once again being blamedVulnerability-related.DiscoverVulnerabilityfor cloud back-end security vulnerabilities , this time in a new reportVulnerability-related.DiscoverVulnerabilityfrom Appthority . The company published investigation results that found nearly 43 TB of enterprise data was exposedAttack.Databreachon cloud back-ends , including personally identifiable information ( PII ) . This comes just shortly after a similar report from a different security company . In the new `` 2017 Q2 Enterprise Mobile Threat Report '' report ( free upon providing registration info ) , Appthority found `` data leakageAttack.Databreach`` from mobile apps that send data to unsecured cloud back-ends . While security concerns typically focus on a triad of other factors -- apps , device threats and network threats -- this data leakageAttack.Databreachon the back-end was dubbed the `` HospitalGown '' threat because of that garment 's open back-end . `` In total , we foundVulnerability-related.DiscoverVulnerabilityalmost 43 TB of data exposedAttack.Databreachand 1,000 apps affectedVulnerability-related.DiscoverVulnerabilityby the HospitalGown vulnerability , '' Appthority saidVulnerability-related.DiscoverVulnerabilityin a blog post last week . `` Looking at a subset of 39 apps , we still found 280 million records exposedAttack.Databreach, a total of about 163 GB of data . This is a staggering amount of leaked information , and in some cases represents the entirety of customer or operational data for an enterprise . '' The reportVulnerability-related.DiscoverVulnerabilityechoes the findings of an earlier reportVulnerability-related.DiscoverVulnerabilityby RedLock Inc. , which revealedVulnerability-related.DiscoverVulnerabilitymany security issues primarily caused by user misconfigurations on public cloud platforms . RedLock claimed it found 82 percent of hosted databases remain unencrypted , among many other problems . As with the RedLock reportVulnerability-related.DiscoverVulnerability, developers were blamedVulnerability-related.DiscoverVulnerabilityfor the HospitalGown vulnerabilities. `` HospitalGown is a vulnerability to data exposure caused , not by any code in the app , but by the app developers ' failure to properly secure the back-end ( hence its name ) servers with which the app communicates and where sensitive data is stored , '' Appthority said . Unsecured Elasticsearch servers and MongoDB databases were prime targets of a series of ransomware attacksAttack.Ransomearlier this year that generated widespread publicity in the security field . However , that publicity apparently was n't enough to significantly alleviate the issue . `` As our findings show , weakly secured back-ends in apps used by employees , partners and customers create a range of security risks including extensive data leaksAttack.Databreachof personally identifiable information ( PII ) and other sensitive data , '' the report states . `` They also significantly increase the risk of spear phishingAttack.Phishing, brute force login , social engineering , data ransomAttack.Ransom, and other attacks . And , HospitalGown makes data accessAttack.Databreachand exfiltrationAttack.Databreachfar easier than other types of attacks . '' Key findings of the report as listed by the company include : Affected apps are connecting to unsecured data stores on popular enterprise services , such as Elasticsearch and MySQL , which are leakingAttack.Databreachlarge amounts of sensitive data . Apps using just one of these services revealed almost 43TB of exposed data . Multiple affected apps leakedAttack.Databreachsome form of PII , including passwords , location , travel and payment details , corporate profile data ( including employees ' VPN PINs , emails , phone numbers ) , and retail customer data . Enterprise security teams do not have visibility into the risk due to the risk 's location in the mobile app vendor 's architecture stack . In multiple cases , data has already been accessedAttack.Databreachby unauthorized individuals and ransomedAttack.Ransom. Even apps that have been removed from devices and the app stores still pose an exposureAttack.Databreachrisk due to the sensitive data that remains stored on unsecured servers . The company saidVulnerability-related.DiscoverVulnerabilityits Mobile Threat Team identifiedVulnerability-related.DiscoverVulnerabilitythe HospitalGown vulnerabilities with a combination of its dynamic app analysis tool and a new back-end scanning method , looking at the network traffic on more than 1 million enterprise mobile apps , both iOS and Android . As with the misconfiguration problems identifiedVulnerability-related.DiscoverVulnerabilityin the RedLock reportVulnerability-related.DiscoverVulnerability, Appthority emphasizedVulnerability-related.DiscoverVulnerabilitythat all cases of HospitalGown vulnerabilities were caused by human errors , not malicious intent or inherent infrastructure problems . That human error was especially prevalent in two app implementations investigated by Appthority : Pulse Workspace ( for accessing enterprise network and Web applications ) and Jacto apps ( from an agricultural machinery company ) .
The hacker group known as The Dark Overlord ( TDO ) leakedAttack.Databreachtoday the first eight episodes of an upcoming TV game show , set to premiere on ABC on Sunday , June 11 . The show 's name is Steve Harvey 's Funderdome , a seed-funding competition reality series where two budding entrepreneurs go head-to-head to win over a live studio audience to fund their ideas , products or companies . According to ABC , the first season of Funderdome will have 13 episodes . The first eight of these episodes are now available on The Pirate Bay . At the end of April , the same hacker group leakedAttack.Databreachthe first ten episodes of season 5 of Netflix 's `` Orange Is The New Black '' series . When they leakedAttack.Databreachthe Netflix show , the hackers said they were also in possession of content from other networks . The named FOX , IFC , NAT GEO , and ABC . In an interview , TDO said they got their hands on the content after they found an unprotected online database belonging to Larson Studios , Inc. , an audio post-production company that works with many US television channels and Hollywood movie studios . The hackers were n't able to extract a payment from either Larson Studios or Netflix . Last Friday , on June 2 , the hackers teased that an ABC leak was coming , when they tweeted : `` American Broadcasting Company may be up next , ladies and gentlemen . '' Early Monday morning ( European timezones ) , the hackers made good on their promise when they tweeted out the following statement in a Pastebin post . Moments later , they tweeted a link to The Pirate Bay page where users could download the episodes . At the time of writing , only three people are attempting to download the episodes . The lack of interest is justified by this being a new game show , rather than an established brand . I think it 's better to censor links and infohashes of the torrent ... this website may get sued for promoting piracy . People who need 'em will go to pirate bay anyway , no need to link it here Surprised anyone would risk jail to steal something as stupid as `` Funderdome . '' Could these leaks actually be promotional since the show is a boring `` been done before '' affair that no one would get excited over ? It 's been proven top torrents get top dollar billing too . The hacker probably did n't care about the show ... he cared about the money . I think ABC paid ransomAttack.Ransomfor other shows which might have been stolenAttack.Databreachby this hacker but decided to not payAttack.Ransomfor this one ...
The hacker group known as The Dark Overlord ( TDO ) leakedAttack.Databreachtoday the first eight episodes of an upcoming TV game show , set to premiere on ABC on Sunday , June 11 . The show 's name is Steve Harvey 's Funderdome , a seed-funding competition reality series where two budding entrepreneurs go head-to-head to win over a live studio audience to fund their ideas , products or companies . According to ABC , the first season of Funderdome will have 13 episodes . The first eight of these episodes are now available on The Pirate Bay . At the end of April , the same hacker group leakedAttack.Databreachthe first ten episodes of season 5 of Netflix 's `` Orange Is The New Black '' series . When they leakedAttack.Databreachthe Netflix show , the hackers said they were also in possession of content from other networks . The named FOX , IFC , NAT GEO , and ABC . In an interview , TDO said they got their hands on the content after they found an unprotected online database belonging to Larson Studios , Inc. , an audio post-production company that works with many US television channels and Hollywood movie studios . The hackers were n't able to extract a payment from either Larson Studios or Netflix . Last Friday , on June 2 , the hackers teased that an ABC leak was coming , when they tweeted : `` American Broadcasting Company may be up next , ladies and gentlemen . '' Early Monday morning ( European timezones ) , the hackers made good on their promise when they tweeted out the following statement in a Pastebin post . Moments later , they tweeted a link to The Pirate Bay page where users could download the episodes . At the time of writing , only three people are attempting to download the episodes . The lack of interest is justified by this being a new game show , rather than an established brand . I think it 's better to censor links and infohashes of the torrent ... this website may get sued for promoting piracy . People who need 'em will go to pirate bay anyway , no need to link it here Surprised anyone would risk jail to steal something as stupid as `` Funderdome . '' Could these leaks actually be promotional since the show is a boring `` been done before '' affair that no one would get excited over ? It 's been proven top torrents get top dollar billing too . The hacker probably did n't care about the show ... he cared about the money . I think ABC paid ransomAttack.Ransomfor other shows which might have been stolenAttack.Databreachby this hacker but decided to not payAttack.Ransomfor this one ...
The hacker group known as The Dark Overlord ( TDO ) leakedAttack.Databreachtoday the first eight episodes of an upcoming TV game show , set to premiere on ABC on Sunday , June 11 . The show 's name is Steve Harvey 's Funderdome , a seed-funding competition reality series where two budding entrepreneurs go head-to-head to win over a live studio audience to fund their ideas , products or companies . According to ABC , the first season of Funderdome will have 13 episodes . The first eight of these episodes are now available on The Pirate Bay . At the end of April , the same hacker group leakedAttack.Databreachthe first ten episodes of season 5 of Netflix 's `` Orange Is The New Black '' series . When they leakedAttack.Databreachthe Netflix show , the hackers said they were also in possession of content from other networks . The named FOX , IFC , NAT GEO , and ABC . In an interview , TDO said they got their hands on the content after they found an unprotected online database belonging to Larson Studios , Inc. , an audio post-production company that works with many US television channels and Hollywood movie studios . The hackers were n't able to extract a payment from either Larson Studios or Netflix . Last Friday , on June 2 , the hackers teased that an ABC leak was coming , when they tweeted : `` American Broadcasting Company may be up next , ladies and gentlemen . '' Early Monday morning ( European timezones ) , the hackers made good on their promise when they tweeted out the following statement in a Pastebin post . Moments later , they tweeted a link to The Pirate Bay page where users could download the episodes . At the time of writing , only three people are attempting to download the episodes . The lack of interest is justified by this being a new game show , rather than an established brand . I think it 's better to censor links and infohashes of the torrent ... this website may get sued for promoting piracy . People who need 'em will go to pirate bay anyway , no need to link it here Surprised anyone would risk jail to steal something as stupid as `` Funderdome . '' Could these leaks actually be promotional since the show is a boring `` been done before '' affair that no one would get excited over ? It 's been proven top torrents get top dollar billing too . The hacker probably did n't care about the show ... he cared about the money . I think ABC paid ransomAttack.Ransomfor other shows which might have been stolenAttack.Databreachby this hacker but decided to not payAttack.Ransomfor this one ...
Are you such a video game fanatic that you simply can ’ t wait to get your paws on sneak previews of upcoming hit titles ? If so , your fervour may be fuelling the criminal activities of an unnamed group of who have targeted a developer of highly popular video games . Best known for developing The Witcher series of role-playing video games , CD Projekt Red took to Twitter to announce that it had been approached by extortionists who claimed to have stolenAttack.Databreachfiles from the company , including “ documents connected to early designs for the upcoming game , Cyberpunk 2077. ” CD Projekt Red says it will not pay the ransom being demandedAttack.Ransomby the thieves , who are threatening to release the stolen files to the general public : “ We will not be giving in to the demandsAttack.Ransomof the individual or individuals that have contacted us , which might eventually lead to the files being published online . The appropriate legal authorities will be informed about the situation. ” “ The documents are old and largely unrepresentative of the current vision for the game . Still , if you ’ re looking forward to playing Cyberpunk 2077 , it would be best for you to avoid any information not coming directly from CD PROJEKT RED. ” I applaud CD Projekt Red ’ s refusal to pay a ransomAttack.Ransom. PayingAttack.Ransomextortionists always runs the risk of encouraging blackmailers to strike again , putting not just your own company but others at further risk . No release date has yet been announced by the Polish game studio for Cyberpunk 2077 , which has been in development for years and is keenly anticipated by the game maker ’ s fans . For CD Projekt RED , the danger is not just whether assets belonging to the game leakingAttack.Databreachinto the public domain mess up its marketing strategy . There is also the risk that the gaming community will be unimpressed with any sneak previews of early versions of the game stolenAttack.Databreachby the hackers , and puncture the hype machine . Recent months have seen a rise in attacksAttack.Ransomwhere hackers have threatened to release a company ’ s intellectual property onto the net unless a ransom is paidAttack.Ransom. A month ago , for instance , The Dark Overlord hacking group attempted to blackmail moneyAttack.Ransomout of Netflix , before deciding to leak as-yet unaired episodes of hit TV show “ Orange is the New Black. ” The same hacking group has previously publishedAttack.Databreach180,000 medical records – including insurance and social security numbers , dates of birth , and payment information – after healthcare firms refused to give in to their demandsAttack.Ransom. Most recently , a chain of cosmetic surgeries in Lithuania warned that hackers were threatening to release the personal details of clients , including photographs . Readers with longer memories may recall that in September 2003 , a German hacker leakedAttack.Databreachthe source code of the game Half-Life 2 onto the internet , much to the delight of internet users who had become fed up with waiting for the long-awaited video game . It doesn ’ t matter that it ’ s not credit card data or passwords that are being stolenAttack.Databreach– theft is theftAttack.Databreach. Just because it ’ s a video game ’ s plans and designs that are being held for ransomAttack.Ransomby the hackers doesn ’ t make any difference . The threat is real – and could have a commercial impact on the game ’ s producer . CD Projekt Red should be applauded for being so transparent about what has happened , as it ’ s easy to imagine many firms would rather sweep bad news like this under the carpet . What we need now is for game fanatics to exercise some patience and self-control , and resist the urge to hunt out a game before the manufacturer is ready to release it officially themselves .
FireEye has identified a set of financially motivated intrusion operations being carried out by a threat actor we have dubbed FIN10 . FIN10 is known for compromisingAttack.Databreachnetworks , stealingAttack.Databreachsensitive data , and directly engaging victim executives and board members in an attempt to extortAttack.Ransomthem into payingAttack.Ransombetween 100 and 500 bitcoins ( valued at between $ 125,000 and $ 620,000 as of mid April 2017 ) . For some victims that did not give into the demandAttack.Ransom, FIN10 escalated their operation and destroyed critical production systems and leakedAttack.Databreachstolen data to journalists in an attempt to increase visibility of the compromise and coerce victims into paying upAttack.Ransom. The first known FIN10 operation was in 2013 and their operations have continued until at least 2016 . To date , we are primarily aware of Canadian victims – specifically casinos and mining organizations . Given the release of sensitive victim data , extortionAttack.Ransom, and destruction of systems , FireEye considers FIN10 to be one of the most disruptive threat actors observed in the region so far .
In an email sent to users on 26th December , the site explainedVulnerability-related.DiscoverVulnerabilitythat hackers were able to conduct this breach by exploitingVulnerability-related.DiscoverVulnerabilitya known vulnerability in outdated vBulletin forum software . Although PakWheels didn ’ t reveal the number of affected users , we at HackRead have inside details on this breachAttack.Databreachaccording to which the number of targeted users impacted by this breachAttack.Databreachgoes over 674,775 users including names , emails , encrypted passwords , mobile number and Facebook sessions . PakWheels was started back in 2003 to fill the missing space between automotive enthusiasts and absence of a platform that discusses automotive industry related topics in the country . In May 2016 , Pakistan ’ s real estate giant Zameen was hackedAttack.Databreachby a Bangladeshi hacker who leakedAttack.Databreachits entire database after being ignored by Zameen ’ s administration . As far as vBulletin forum software , the year 2016 , has been a bad year for anyone using vBulletin and not updating it to its latest version . Until now , the forums hackedAttack.Databreachdue to vulnerability in outdated vBulletin forum software include Clash of Kings forum with 1.6 million data stolen , Epic games forum with 800,000 accounts stolen , Grand Theft Auto ( GTA ) forum , Russia ’ s Mail.ru with 27 million accounts stolen , LifeBoat forum with 7 million accounts stolen and Exile Mod gaming forum with 12,000 accounts stolen .
Hackers are reportedly sellingAttack.Databreachstolen data from the Qatar National Bank ( QNB ) and UAE InvestBank on the dark web . Both the banks suffered major data breachesAttack.Databreachin 2016 and the data of thousands of customers was later leakedAttack.Databreachonline by hackers . Now , even as tensions escalate between the two Middle Eastern nations , cybercriminals appear to be cashing in on the underground cybercrime community . Hackers hitAttack.Databreachthe QNB in April 2016 and the UAE InvestBank in May 2016 . The Sharjah-based InvestBank 's stolen data was leakedAttack.Databreachonline by a hacker going by the pseudonym `` Buba '' , who demandedAttack.Ransoma $ 3m ransomAttack.Ransomfrom the bank . The stolen data , including customers ' financial details as well as personal details such as full names , addresses , passport numbers , phone numbers , account numbers , credit card numbers along with their CVV codes and more was leakedAttack.Databreachonline by the hacker after the bank refused to pay up the ransomAttack.Ransom. In the case of the QNB , a hacker group going by the pseudonym `` Bozkurt Hackers '' claimed responsibility for the data breachAttack.Databreach. Hackers leakedAttack.Databreach1.4GB data , which included customers ' financial records , credit card numbers and PIN codes as well as banking details pertaining to the Al-Thani Qatar Royal Family and Al Jazeera journalists . The stolen data from the QNB hackAttack.Databreachas well as the InvestBank data breachAttack.Databreachis now up for sale on an unspecified yet popular dark web marketplace , HackRead reported . This has not been independently verified by IBTimes UK . InvestBank 's data is allegedly being sold for a mere 0.0071 bitcoins ( $ 18.86 , £14.91 ) . The data on sale includes bank accounts , card details , customer IDs , branch codes as well as account holders ' full names . The stolen and leaked data from the QNB , which the bank later acknowledged may have been accurate , is also on sale for 0.0071 bitcoins . The data listed for sale includes the previously leaked QNB records such as bank accounts as well as card and personal details of customers . Dark web data sales from major breachesAttack.Databreachare not uncommon . In 2016 , a series of major breachesAttack.Databreachaffecting several leading tech firms including LinkedIn and Dropbox , eventually saw hackers sellingAttack.Databreachhacked and stolen databases on the dark web .
Hackers are reportedly sellingAttack.Databreachstolen data from the Qatar National Bank ( QNB ) and UAE InvestBank on the dark web . Both the banks suffered major data breachesAttack.Databreachin 2016 and the data of thousands of customers was later leakedAttack.Databreachonline by hackers . Now , even as tensions escalate between the two Middle Eastern nations , cybercriminals appear to be cashing in on the underground cybercrime community . Hackers hitAttack.Databreachthe QNB in April 2016 and the UAE InvestBank in May 2016 . The Sharjah-based InvestBank 's stolen data was leakedAttack.Databreachonline by a hacker going by the pseudonym `` Buba '' , who demandedAttack.Ransoma $ 3m ransomAttack.Ransomfrom the bank . The stolen data , including customers ' financial details as well as personal details such as full names , addresses , passport numbers , phone numbers , account numbers , credit card numbers along with their CVV codes and more was leakedAttack.Databreachonline by the hacker after the bank refused to pay up the ransomAttack.Ransom. In the case of the QNB , a hacker group going by the pseudonym `` Bozkurt Hackers '' claimed responsibility for the data breachAttack.Databreach. Hackers leakedAttack.Databreach1.4GB data , which included customers ' financial records , credit card numbers and PIN codes as well as banking details pertaining to the Al-Thani Qatar Royal Family and Al Jazeera journalists . The stolen data from the QNB hackAttack.Databreachas well as the InvestBank data breachAttack.Databreachis now up for sale on an unspecified yet popular dark web marketplace , HackRead reported . This has not been independently verified by IBTimes UK . InvestBank 's data is allegedly being sold for a mere 0.0071 bitcoins ( $ 18.86 , £14.91 ) . The data on sale includes bank accounts , card details , customer IDs , branch codes as well as account holders ' full names . The stolen and leaked data from the QNB , which the bank later acknowledged may have been accurate , is also on sale for 0.0071 bitcoins . The data listed for sale includes the previously leaked QNB records such as bank accounts as well as card and personal details of customers . Dark web data sales from major breachesAttack.Databreachare not uncommon . In 2016 , a series of major breachesAttack.Databreachaffecting several leading tech firms including LinkedIn and Dropbox , eventually saw hackers sellingAttack.Databreachhacked and stolen databases on the dark web .
The hackers left a deface page along with a brief message explaining the reason for defacing the site and criticizing the role of “ political elite ” for the problems faced by “ common people ” . The message also criticized the role of Bilderberg group for planning wars for personal interests . The hackers also warned the group members to start working for human beings and their benefits rather than personal interests or expect more hacks since “ they ” the hackers will be watching them . “ Dear Bilderberg members , from now , each one of you has 1 year ( 365 days ) to truly work in favor of humans and not your private interests . Each TopIc you discuss or work you achieve through Your uber private meetings should from now benefit world population and not X or Y group of people otherwise , we will find you and we will hack you , ” according to the message . Here is a full preview of the deface page left by Anonymous and HackBack movement : If you are not aware of the HackBack hacker and their movement then HackBack also goes by the online handle of “ Phineas Phisher ” “ Hack Back ! ” and “ @ GammaGroupPR ” who came in the news some months ago after donating around €10,000 ( about £8,000 ) Bitcoin to a Kurdish anticapitalist group “ Rojava Plan ” that is based in Rojava . The hacker then hackedAttack.Databreachthe Catalan Police Union server and leakedAttack.Databreachhighly sensitive data against police brutality . The same hacker then hackedAttack.DatabreachSpanish Police server and ended up leakingAttack.Databreachpersonal details of police officers against the infamous Gag Law . Remember , it was the same law that forced a woman to pay a fine of 800 euros/ $ 889 for uploading a picture on Facebook showing a police car parked in a disabled spot
The hacker leakedAttack.Databreachthe FBI.GOV accounts that he found in several backup files ( acc_102016.bck , acc_112016.bck , old_acc16.bck , etc ) . Leaked records contain accounts data , including names , SHA1 Encrypted Passwords , SHA1 salts , and emails . The intrusion occurred on December 22 , 2016 , the hacker revealedVulnerability-related.DiscoverVulnerabilityto have exploitedVulnerability-related.DiscoverVulnerabilitya zero-day vulnerability in the Plone Content Management System Going back to 22nd December 2016 , I tweeted aboutVulnerability-related.DiscoverVulnerabilitya 0day vulnerability in Plone CMS which is considered as the most secure CMS till date . The vulnerability resides inVulnerability-related.DiscoverVulnerabilitysome python modules of the CMS . The hacker noticed that while media from Germany and Russia published the news about the hack , but US based publishers ignored it . According to CyberZeist , the FBI contacted him to pass on the leaks . `` I was contacted by various sources to pass on the leaks to them that I obtained after hacking FBI.GOV but I denied all of them . just because I was waiting for FBI to react on time . They didn ’ t directly react and I don ’ t know yet what are they up to , but at the time I was extracting my finds after hacking FBI.GOV , '' he wrote . The expert added further info on the attack , while experts at the FBI were working to fixVulnerability-related.PatchVulnerabilitythe issue , he noticedVulnerability-related.DiscoverVulnerabilitythat the Plone 0day exploit was still working against the CMS backend . ) , but I was able to recon that they were runningVulnerability-related.PatchVulnerabilityFreeBSD ver 6.2-RELEASE that dates back to 2007 with their own custom configurations . Their last reboot time was 15th December 2016 at 6:32 PM in the evening . `` While exploiting FBI.GOV , it was clearly evident that their webmaster had a very lazy attitude as he/she had kept the backup files ( .bck extension ) on that same folder where the site root was placed ( Thank you Webmaster ! ) , but still I didn ’ t leak outAttack.Databreachthe whole contents of the backup files , instead I tweeted outVulnerability-related.DiscoverVulnerabilitymy findings and thought to wait for FBI ’ s response '' Now let ’ s sit and wait for the FBI ’ s response . I obviously can not publishVulnerability-related.DiscoverVulnerabilitythe 0day attack vector myself . The hacker confirmedVulnerability-related.DiscoverVulnerabilitythat the 0-day is offered for sale on Tor by a hacker that goes by the moniker “ lo4fer ” . Once this 0day is no longer being sold , I will tweet outVulnerability-related.DiscoverVulnerabilitythe Plone CMS 0day attack vector myself . Let ’ s close with a curiosity … CyberZeist is asking you to chose the next target . The hacker is very popular , among his victims , there are Barclays , Tesco Bank and the MI5 .
Organizations use them regardless of their size ; from MetLife , LinkedIn , City of Chicago , Expedia , BuzzFeed to KMPG and The Guardian there are several other high-profile platforms that are currently taking advantage of MongoDB . At the same time , having a high-profile customer doesn ’ t mean that platform is completely secure . That ’ s why in 2016 , in two different incidentsAttack.Databreach, hackers leakedAttack.Databreachmore than 36 million and 58 million accounts respectively from unsecured MongoDB . More : LG Smart TV Screen Bricked After Android Ransomware Infection Now , unsecured MongoDB databases are being hijacked by a hacker , who is not only wiping out these databases but also storing copies of them and asking for a ransomAttack.Ransomof 0.2 bitcoins ( roughly US $ 211 ) from admins in exchange of the lost data . Those admins who haven ’ t created backups of these databases are seriously helpless because the rate of Bitcoin is also increasing and the latest rate is 1 Bitcoin = USD1063.93 . The hacking campaign was discovered by security researcher Victor Gevers , co-founder of GDI Foundation , a non-profit organization . Gevers notified owners about the presence of vulnerable , non-password-protected MongoDB databases and also informed that around 200 of these installations have been wiped out by the hacker . Gevers believes that the hacker ( s ) might be utilizing an automation tool but they manually select their target databases . Hacker seems to be interested in databases that contain important information/data or he chooses companies that are most likely in a position to pay the ransomAttack.Ransomto get their data back . In a conversation with SecurityWeek , Gevers said that “ They use some sort of automation tool , but they also do some of the work manually . If they used a fully automated tool , we might have seen all exposed MongoDB databases being hijacked in one swift move ” . But that was old news ; as per recent tweet by Shodan founder John Matherly , approx . It must be noted that Shodan is the platform where a majority of MongoDB instances can be located . As of now , 16 admins/organizations have already paid the ransomAttack.Ransomto obtain the lost data . The attacksAttack.Ransomon MongoDB databases have been going on for more than a week and servers from across the globe have been targeted . Researchers believe that the attacker , who uses the alias “ harak1r1 ” does not encrypt the stolen data but runs a script , which replaces the database content with the ransom note .
A Boeing employee inadvertently leakedAttack.Databreachthe personal information of 36,000 of his co-workers late last year when he emailed a company spreadsheet to his non-Boeing spouse . Forty-seven states , including Washington , have legislation on the books that requires companies or government entities to disclose whenever there ’ s been a breachAttack.Databreachof personally identifiable information . Under Washington law , companies are required to notify the Attorney General ’ s office if the incident affects more than 500 of the state ’ s residents . In this instance Boeing claims the information of 7,288 Washington residents may have been impacted . According to the letter , the breachAttack.Databreachoccurred on Nov. 21 , 2016 after a Boeing employee encountered a formatting issue and emailed a spreadsheet to his spouse who didn ’ t work at the company . The file contained sensitive , personally identifiable information of 36,000 of the aircraft manufacturer ’ s employees . The file included the names , places of birth , BEMSID , or employee ID numbers , and accounting department codes . The spreadsheet also included Social security numbers and dates of birth , albeit in “ hidden columns , ” according to Olson . Spreadsheet software , such as Microsoft ’ s Excel , usually allows authors to make select information hidden , usually to prevent that data from being seen , changed , or deleted . According to Olson ’ s letter , the breachAttack.Databreachwas discovered earlier this year , on Jan. 9 , but the company didn ’ t begin to inform employees until a month later , Feb. 8 . In the letter to Ferguson , Boeing claims it destroyed copies of the spreadsheet and carried out a “ forensic examination ” of both the Boeing employee ’ s computer and his spouse ’ s to ensure it was deleted . “ Both the employee and his spouse have confirmed to us that they have not distributed or used any of the information , ” Olson writes . For its part , Boeing , the second largest defense contractor in the world after Lockheed Martin , said it doesn ’ t believe its employee ’ s data has been or will be used inappropriately .
It 's been quiet since 2015 , but TorrentLocker has suddenly returned . And this time it wants to stealAttack.Databreachyour passwords too . Cybercriminals are always adding new malicious tricks to ransomware . A ransomware variant which has been relatively inactive for almost two years is back , and this time it 's stealingAttack.Databreachuser credentials from victims in addition to demanding a ransomAttack.Ransomto unencrypt locked files . TorrentLocker -- also known as Cryptolocker -- started targeting Windows users in 2014 before dropping off by the summer of 2015 . Like the majority of ransomware schemes , TorrentLocker spreads via spam email messages containing malicious attachments . Rising Bitcoin prices force Cryptolocker ransomware scammers to drop asking priceAttack.RansomBitcoin 's wild fluctuations have forced a price update to the Cryptolocker ransomware . If the victim enables the macros by choosing to 'Enable Editing ' , a PowerShell code is executed and the ransomware is downloaded , encrypting the victims ' files until they pay a ransomAttack.Ransom. But that is n't where the malicious activity ends , because as noted by cybersecurity researchers at Heimdal Security , this incarnation of TorrentLocker has new features , including the ability to spread itself to other computers via shared files ; something which could see the ransomware taking over a whole network in a very short space of time . In addition to holding networks to ransomAttack.Ransom, the new version of TorrentLocker also harvestsAttack.Databreachusernames and passwords from infected computers , putting businesses at risk of cyberespionage and data breachesAttack.Databreach, while users could see their personal or financial information leakedAttack.Databreachand sold to cybercriminals on the dark web . The researchers warn that the revived TorrentLocker campaign is `` very aggressive '' and that many well known antivirus software products have n't been updated to protect against it , even days after the campaign began . Heimdal Security warns users in its native Denmark that they 're being highly targeted by TorrentLocker . Indeed , it appears that European internet users are the main target for those behind the campaign , as Microsoft told BleepingComputer that Italy is by far the most targeted by the perpetrators .
Anonymous also leakedAttack.Databreacha majority of data from Freedom Hosting II , which included over 380,000 user records . Now we have learned that after the abovementioned cyber-attack , the number of hidden services on the Dark Web has lowered significantly . This revelation was made after an analysis was carried out using OnionScan . According to the OnionScan report , out of over 30,000 Tor-based hidden services , only 4,400 are active on the Dark Web currently . It is much lower in comparison to previous such scans , stated the OnionScan project operator Sarah Jamie Lewis . This is why , noted Lewis , the number of hidden services has reduced so much including the secure email platform Sigaint , which went offline unannounced in mid-February . Apart from the absence of such a huge number of hidden services , the scan report also detected 4,000 HTTP services , 250 TLS services , 270 SSH services , 100 SMTP services , 220 Bitcoin nodes and some FTP and VNC services too on the Dark Web . Here the question arises , why Tor-based services have been removed ? The reason could be that a majority of users have started to perceive Dark Web as a platform dedicated to criminality oriented or illegal activities . Furthermore , it is a fact that just like maintaining anonymity on Tor is difficult in the same manner hosting a hidden service on the Dark Web is daunting as it required high-level skills and technical abilities .