visitors to pay a cryptocurrency ransomAttack.Ransomhas changed its course . Instead of demanding paymentAttack.Ransomvia Bitcoin , Ethereum , Bitcoin Cash or Litecoin in exchange for not leaking your password on the internet , the site now hijacks your computer ’ s processing power to mine cryptocurrency in the background . Designed as a copy of the Have I Been Pwned attack , the site began by asking users to enter their emails to see if their password has been compromisedAttack.Databreach. Unfortunately , if your password was breachedAttack.Databreach, the site demandedAttack.Ransoma “ donation ” of $ 10 by cryptocurrency to not publish your password in plain text on the web . Up to 1.4 billion passwords may have been breachedAttack.Databreach, but it ’ s unclear how accurate that figure is . However , because it may be easier — and safer — to change your password than pay the ransomAttack.Ransom, as The Next Web noted , the site shifted its focus from demanding ransomware paymentsAttack.Ransomto taking over your PC ’ s processing power to mine for cryptocurrency in the background . The publication also confirmed that the malicious site did “ have a database with legitimate passwords , ” but that not all compromised passwords were stored in plain text . The Next Web did not reveal the site ’ s address in its report , citing security reasons , but noted that it doesn ’ t appear that any user had made payment . This is the latest ransomware in recent months that demandAttack.Ransomcryptocurrency as a form of payment . Prior to this incidentAttack.Ransom, Thanatos encrypted files on a user ’ s PC by hijacking it using a brute force method . If you want to regain access to those files , you had to send paymentAttack.Ransomvia cryptocurrency to get a key to decrypt your files . However , at the time , there didn ’ t appear to be a proper decryption key even if you paid . According to a recent Google report , extortionists made out with $ 25 million in just two years , and cryptocurrency was the preferred way to get paidAttack.Ransom. Hackers are also changing the game when it comes to data theftAttack.Databreach. Rather than leakingAttack.Databreachthe information to the dark markets , an IBM X-Force Intelligence Index report revealed that hackers prefer to hold files hostage in exchange for a ransom paymentAttack.Ransom.
As everyone in TV-land knows , established broadcasters have been losing eyeballs to streaming companies such as Netflix and Amazon and their big-budget “ event ” shows . The upstarts look unstoppable but might an obscure hacker called The Dark Overlord , previously connected to health sector data extortionAttack.Ransom, have spotted an important flaw in the model ? Last week , Netflix found itself on the receiving end of a ransom demandAttack.Ransomfrom the individual or group , making unconfirmed demandsAttack.Ransomin return for not releasing the unseen series 5 of the hit Orange Is the New Black , starring Dascha Polanco ( pictured , at Toronto Pride ) to the web . The company , understandably , refused to play ball and on Saturday reports emerged that a number of episodes had appeared on a popular torrenting service , the name of which it behoves us not to mention for reasons including the high risk of encountering malware . Visiting that resource , we managed to find one file with mention of a “ press release ” that has since been expunged , including from web caches . It reportedly read : We ’ ve decided to release Episodes 2-10 of “ Orange Is The New Black ” Season 5 after many lengthy discussions at the office where alcohol was present . Separately , the group ’ s Twitter feed crowed : And so let it be read that the loathsome giants do too fall . Hello Netflix , we ’ ve arrived . The account threatened the release of material stolenAttack.Databreachfrom other media companies , including ABC , National Geographic and Fox . Netflix acknowledged the leakAttack.Databreach, which it said was caused by a breachAttack.Databreachat a “ production vendor ” also used by other TV studios . Netflix is cleverly covering its back by pointing the level of integration – and vulnerability – in the TV industry , but there is no question the breach still lands at its door . It ’ s not clear whether the way streaming services process digital content is that different or less secure from established broadcasters but the minute a show exists in a form that can be copied it becomes vulnerable to theft . The BBC found this out to its cost when an episode of the Russian version of Sherlock found its way on to the internet before it was due to be broadcast . And yet , defying cybersecurity breach orthodoxy , perhaps this particular breach isn ’ t so bad after all : on Monday , Netflix ’ s share price even rose . One reason might be that content breachesAttack.Databreacharen ’ t the same as ones involving customer data . The latter will cost the victim organisation money , court time and , in most countries , regulatory investigation . A few people watching a Netflix show earlier than normal seems minor by comparison as long as it doesn ’ t happen too often . Assuming the company patchesVulnerability-related.PatchVulnerabilitythe hole that let its show be thieved , it ’ s not stretching it to suggest The Dark Overlord ’ s leakingAttack.Databreachcould even have given Orange Is the New Black an unintended publicity jump . Presumably that ’ s not what The Dark Overlord intended although it ’ s also possible this has always been about self-regarding publicity as much as simple extortion for moneyAttack.Ransom. If so , Netflix is starting to look like the winner on that front too .
A California financing company exposedAttack.Databreachup to 1 million records online that contained names , addresses , fragments of Social Security numbers and data related to vehicle loans , according to a researcher 's report . The data comes from Alliance Direct Lending , which is based in Orange , California , writes Bob Diachenko , who works with the security research team at Kromtech Alliance Corp. of Germany . Alliance Direct Lending specializes in refinancing auto loans at a lower interest rate , and it also has partnerships with dealers across the country . `` It is unclear if anyone other than security researchers accessed it or how long the data was exposedAttack.Databreach, '' Diachenko writes in a blog post . Security researchers , as well as hackers , have had a field day lately exposing configuration mistakes organizations have made when setting up databases . Despite a string of well-publicized findings , the errors are still being made , or at least , not being caught . Aside from breachesAttack.Databreach, other organizations have seen their data erased and held for ransomAttack.Ransom, with notes left inside the databases asking for bitcoinsAttack.Ransom( see Database Hijackings : Who 's Next ? ) . Kromtech notified Alliance , which has since taken the data offline , Diachenko writes . Information Security Media Group 's efforts to reach Alliance officials were not immediately successful . Under California 's mandatory data breachAttack.Databreachnotification law , Alliance would be required to report the breachAttack.Databreach. `` The IT administrator claimed that it had only recently been leakedAttack.Databreachand was not was not up for long , '' Diachenko writes . `` He thanked us for the notification and the data was secured very shortly after the notification call . '' Researchers came across the data while looking into Amazon Web Services Simple Storage Service ( S3 ) `` buckets , '' which is the term for storage instances on the popular cloud hosting service . They were specifically hunting for buckets that had been left online but required no authentication . The bucket contained 1,000 items , of which 210 were public . The leaked data included .csv files listed by dealerships located around the country . The number of consumer details leaked ranges between 550,000 up to 1 million , Diachenko writes . A screenshot posted on Kromtech 's blog shows a sampling of the dealerships affected . Kromtech shared with ISMG a data sample pertaining to a dealership in Michigan . It shows full names , addresses , ZIP codes , what appear to be FICO credit scores , an annual percentage rate and the last four digits of Social Security numbers . `` The danger of this information being leakedAttack.Databreachis that cybercriminals would have enough to engage in identity theft , obtainAttack.Databreachcredit cards or even file a false tax return , '' Diachenko writes . While full Social Security numbers weren't exposedAttack.Databreach, there 's still a risk in leakingAttack.Databreachthe last four digits . When trying to verify customers ' identities , companies will sometimes ask for a fragment of data . So for fraudsters compiling dossiers , every bit , however incomplete , helps . Also exposedAttack.Databreachwere 20 phone call recordings with customers who were negotiating auto loan deals . `` These consent calls were the customers agreeing that they understood they were getting an auto loan , confirming that the information was correct and true , '' Diachenko writes . `` They included the customer 's name , date of birth , social security numbers , and phone numbers . '' The bucket was last modified on Dec. 29 , 2016 , Kromtech writes . Amazon has strong security built around S3 storage , so it would appear that whomever created the bucket might have disabled its controls . According to Amazon 's guidance , `` only the bucket and object owners originally have access to Amazon S3 resources they created . '' Amazon also has identity and access management controls that can be used to carefully restrict who can access and change data . Buckets can also be made off-limits based on HTTP referrers and IP addresses . Managing Editor , Security and Technology , ISMG Kirk is a veteran journalist who has reported from more than a dozen countries . Based in Sydney , he is Managing Editor for Security and Technology for Information Security Media Group . Prior to ISMG , he worked from London and Sydney covering computer security and privacy for International Data Group . Further back , he covered military affairs from Seoul , South Korea , and general assignment news for his hometown paper in Illinois .
A report released on Monday by The Centre for Internet and Society reveals that over 135 million records from India 's Aadhaar national ID systems have already leakedAttack.Databreachonline . The leaksAttack.Databreachdid n't take place because of a flaw in the national Aadhaar system , but through government agencies that handle Aadhar data . According to the report , just four government programs are responsible for leakingAttack.Databreacha whopping number of 135 million records . The programs mentioned in the report are India 's National Social Assistance Programme ( NSAP ) , the National Rural Employment Guarantee Scheme ( NREGA ) , the Govt . of Andhra Pradesh 's Chandranna Bima Scheme , and the Govt . of Andhra Pradesh 's Daily Online Payment Reports of NREGA . The prevalence of Aadhaar data is how The Centre for Internet and Society has discovered the leakAttack.Databreach. Improperly configured systems exposedAttack.Databreachthe details of program participants on the Internet . While the full Aadhaar database was never exposedAttack.Databreach, details in the government program databases allow a fraudster to tie a person 's leaked details ( names , addresses , phone numbers ) to an Aadhaar 12-digit ID . If enough of these details leakAttack.Databreachin different places , fraudster can build comprehensive profiles on Indian citizens , even recreating the Aadhaar database themselves . For its part , the Indian government has admitted that some of the Aadhaar database has leakedAttack.Databreachonline through its ministries , said it started investigations , and is already preparing changes to Aadhaa'rs security policies . Right now , because of the massive leakAttack.Databreachof 135 million details , including Aadhaar IDs , Indians stand to become victims of financial fraud . In the future , as other government programs leakAttack.Databreachmore data , including biometrics , the problem will pass the point where the government could do anything to fixVulnerability-related.PatchVulnerabilityit .
The hackers left a deface page along with a brief message explaining the reason for defacing the site and criticizing the role of “ political elite ” for the problems faced by “ common people ” . The message also criticized the role of Bilderberg group for planning wars for personal interests . The hackers also warned the group members to start working for human beings and their benefits rather than personal interests or expect more hacks since “ they ” the hackers will be watching them . “ Dear Bilderberg members , from now , each one of you has 1 year ( 365 days ) to truly work in favor of humans and not your private interests . Each TopIc you discuss or work you achieve through Your uber private meetings should from now benefit world population and not X or Y group of people otherwise , we will find you and we will hack you , ” according to the message . Here is a full preview of the deface page left by Anonymous and HackBack movement : If you are not aware of the HackBack hacker and their movement then HackBack also goes by the online handle of “ Phineas Phisher ” “ Hack Back ! ” and “ @ GammaGroupPR ” who came in the news some months ago after donating around €10,000 ( about £8,000 ) Bitcoin to a Kurdish anticapitalist group “ Rojava Plan ” that is based in Rojava . The hacker then hackedAttack.Databreachthe Catalan Police Union server and leakedAttack.Databreachhighly sensitive data against police brutality . The same hacker then hackedAttack.DatabreachSpanish Police server and ended up leakingAttack.Databreachpersonal details of police officers against the infamous Gag Law . Remember , it was the same law that forced a woman to pay a fine of 800 euros/ $ 889 for uploading a picture on Facebook showing a police car parked in a disabled spot
INDIANAPOLIS , Ind.– Officials at Scotty ’ s Brewhouse are working to inform thousands of employees across the company about an email data breachAttack.Databreach, leakingAttack.Databreachemployees ’ W-2 forms to an unknown suspect . Company officials called IMPD Monday afternoon to report the breachAttack.Databreach, which apparently resulted from an email phishing scamAttack.Phishing. According to the police report , an individual posing asAttack.Phishingcompany CEO Scott Wise sentAttack.Phishingan email to a payroll account employee . The email requested the employee to send all 4,000 employees W-2 forms in PDF form . Chris Martin , director of HR/Payroll for the company , told police the email did not really come from Wise . However , the payroll account employee did email all 4,000 W-2 forms to the unknown individual . The report says Martin contacted the IRS to inform the agency of the breach . The IRS recommended Martin also file a report with IMPD . Scotty ’ s Brewhouse officials are now in the process of informing all employees , and providing them with precautionary measures to take in order to protect their financial and personal information . The company says it will offer one year of credit monitoring at no cost to employees , in addition to providing information regarding available resources for its employees to monitor their credit . Scotty ’ s says no customer information was obtainedAttack.Databreachduring the phishing scamAttack.Phishing. The company is working with law enforcement and the credit bureaus to limit any potential misuse of the information that was obtainedAttack.Databreachand to identify and apprehend the scammers . Scott Wise , CEO of Scotty ’ s Holdings , LLC , issued the following statement : “ Unfortunately , Scotty ’ s was the target of and fell victim to scammers , as so many other companies have , ” said Wise . “ Scotty ’ s employees and customers are of tremendous importance to the company and Scotty ’ s regrets any inconvenience to its employees that may result from this scamming incident . Scotty ’ s will continue to work with federal and local law enforcement , the Internal Revenue Service and credit bureaus to bring the responsible party or parties to justice ” . The incident appears to match the description of an email phishingAttack.Phishingscheme the IRS issued warnings about last year . This scheme involves scammers posing asAttack.Phishingcompany executives to request financial and personal information on employees . The IRS has online tutorials on the proper steps to take if you have become the victim of identity theft or your personal information has been leakedAttack.Databreach