screenshots on Twitter of the purported stolen data . Austal says the material is neither sensitive nor classified and that it has taken steps to secure its data systems. `` The data breachAttack.Databreachhas had no impact on Austal 's ongoing operations , '' the company says . Austal 's business in the United States is unaffected by this issue , as the computer systems are not linked . A spokesman for Austal contacted on Friday says he could n't offer further information on the incident . The breachAttack.DatabreachexposedAttack.Databreachship design drawings that are distributed to customers , fabrication subcontractors and suppliers , Austal says . It also exposedAttack.Databreach`` some staff email addresses and mobile phone numbers . '' Those individuals have been informed as well as a `` small number '' of other stakeholders directly impacted by the breach , the company reports . Austal has contacted the Australian Cyber Security Center and the Australian Federal Police . The Office of the Australian Information Commissioner , which enforces the country 's data protection regulations `` will be involved as required , '' Austal says . Companies are increasingly being subjected to ransomsAttack.Ransomby hackers after their networks have been breachedAttack.Databreach. RansomsAttack.Ransomput companies in tough positions : risk public exposure of potentially embarrassing data , or risk paying a ransomAttack.Ransomand still face a chance the data could be released anyway . Security experts and law enforcement generally advise against paying ransomsAttack.Ransom, even after incidents of file-encrypting malware . But some companies have viewed the situation as either a cost of doing business or a shorter route to recovery . Late last month in the U.S , the city of West Haven , Connecticut , paidAttack.Ransom$ 2,000 to unlock 23 servers that had been infected with ransomware ( see : Connecticut City Pays RansomAttack.RansomAfter Crypto-Locking Attack ) . The city 's attorney , Lee Tiernan , was quoted by the Associated Press as saying `` research showed it was the best course of action . '' If the city did n't have a backup file , it may have had little choice .
Updated WhatsApp ’ s end-to-end encryption can be potentially exploitedVulnerability-related.DiscoverVulnerabilityby determined snoops to intercept and read encrypted messages , it was claimedVulnerability-related.DiscoverVulnerabilitytoday . Essentially , if an attacker can reroute a redelivered encrypted message , it is possible to decrypt the text . Facebook-owned WhatsApp stressesVulnerability-related.DiscoverVulnerabilitythis is not a serious flaw nor a deliberate backdoor in its code . Users can detect and stop the surveillance , if it happens , by activating security notifications in the application 's settings . At the heart of the matter is the exchange of cryptographic keys when two people start chatting to each other : their public keys are sent through Facebook 's servers , and ideally the two people need to verify outside of WhatsApp that their keys have n't been tampered with during the handover . If it 's not possible to verify the keys , or there is n't an opportunity to verify the keys , you 're potentially open to man-in-the-middle surveillance . For example , a snooper could stop a WhatsApp message from being sent , take over the recipient 's phone number , trigger a public key exchange between the sender and the snooper 's handset that 's now using the recipient 's hijacked number , receive the redelivered text before the sender has a chance to verify the new public key , and decrypt the message they 're not supposed to read . This is non-trivial to exploit and rather easy to detect when it happens , rendering it pointless . The problem – which is `` endemic to public key cryptography '' – was raised in April last year , and at the time WhatsApp said it was n't a serious enough design flaw to spend time fixing . Now allegations that WhatsApp deliberate knackered its security have flared up again , this time reported in The Guardian . In response , the Facebook-owned messaging service said it designed its app to redeliver messages as described above to allow texts to be sent in parts of the world where people frequently swap devices and SIM cards . At WhatsApp , we ’ ve always believed that people ’ s conversations should be secure and private . Last year , we gave all our users a better level of security by making every message , photo , video , file and call end-to-end encrypted by default . As we introduce features like end-to-end encryption , we focus on keeping the product simple and take into consideration how it 's used every day around the world . In WhatsApp 's implementation of the Signal Protocol , we have a “ Show Security Notifications ” setting ( option under Settings > Account > Security ) that notifies you when a contact 's security code has changed . We know the most common reasons this happens are because someone has switched phones or reinstalled WhatsApp . This is because in many parts of the world , people frequently change devices and SIM cards . In these situations , we want to make sure people 's messages are delivered , not lost in transit . The alleged weakness in WhatsApp ’ s encryption system was documentedVulnerability-related.DiscoverVulnerabilityby Tobias Boelter , a cryptography and security researcher at the University of California , and brandedVulnerability-related.DiscoverVulnerabilitya `` backdoor '' today in The Grauniad . The paper fears governments can abuse the messenger app 's design , which is based on Open Whisper 's Signal protocol , to snoop on people 's conversations . Some infosec bods are critical of Facebook ’ s design decisions in rolling out its end-to-end encryption in WhatsApp . Neil Cook , chief security architect at Open-Xchange , commented : “ WhatsApp has already broken their promise not to share user data with Facebook , and now it seems that their promise of end-to-end encrypted messaging isn ’ t quite as secure as everyone had hoped , particularly given the involvement of Open Whisper Systems . It ’ s worth noting that this error in the encryption protocol is not present in Signal , so the team at WhatsApp have made the change intentionally ” . Matthew Aldridge , solutions architect at Webroot , added : “ This flaw allows Facebook/WhatsApp to intercept messages if they choose to , by having the sender ’ s software automatically flip across to a second encryption key . The functionality is designed to create a seamless user experience for users who have connectivity issues or drop offline for a time during a conversation , but it has resulted in a situation where it could be used to intercept messages by WhatsApp . For those sending highly sensitive messages , or simply looking to avoid this , you should switch on the key change warnings in settings , and always check that the two ticks appear after sending messages in an active conversation ” . Others fault Facebook for failing to respond quickly enough . Jacob Ginsberg , senior director at Echoworx , an expert in end-to-end messaging encryption , saidVulnerability-related.DiscoverVulnerability: “ The fact that Facebook has knownVulnerability-related.DiscoverVulnerabilityabout this vulnerability since April is doubly damming . Not only could this be seen by many as supporting on-going government data collection interventions , it means their talk of encryption and privacy has been nothing more than lip service . The company needs to actively address its security measures ” . ® In a follow-up statement , WhatsApp deniedVulnerability-related.DiscoverVulnerabilityaccusations that it had insertedVulnerability-related.DiscoverVulnerabilitywhat amounted to a backdoor in its messaging code : The Guardian postedVulnerability-related.DiscoverVulnerabilitya story this morning claimingVulnerability-related.DiscoverVulnerabilitythat an intentional design decision in WhatsApp that prevents people from losing millions of messages is a “ backdoor ” allowing governments to force WhatsApp to decrypt message streams . WhatsApp does not give governments a “ backdoor ” into its systems and would fight any government request to create a backdoor . The design decision referenced in the Guardian story prevents millions of messages from being lost , and WhatsApp offers people security notifications to alert them to potential security risks . WhatsApp published a technical white paper on its encryption design , and has been transparent about the government requests it receives , publishing data about those requests in the Facebook Government Requests Report .
A popular horse racing website ( Racingpulse.in ) that operates out of Bangalore , India was reportedly hacked on Tuesday . The hackers postedAttack.Ransoma statement on the home page informing that the entire data on the website has been encrypted . As is the norm , they also informed about what they expected as ransomAttack.Ransom. The ransom note suggested that they were expectingAttack.Ransomransom amountAttack.Ransomin Bitcoins while the amount to be paid was not disclosed clearly . The message also included an email address for further communication , which was registered at india.com . The hackers offered Racingpulse.in an unimaginable favor by providing decryption key of a maximum of three files which should not be more than 10mb in size for free . This was probably done to prove that they did hack all the files on the site . The note read : “ All your files have been encrypted : All your files have been encrypted due to a security problem with your PC . If you want to restore them , write us to the e-mail mkgoro @ india.com , You have to payAttack.Ransomfor decryption in Bitcoins . After payment , we will send you the decryption tool that will decrypt all your files . “ Free decryption as a guarantee : Before paying you can send to us up to 3 files for free decryption . The message contained a link to the beginners ’ guide to Bitcoins too . “ How to obtain Bitcoins : The easiest way to buy bitcoins is LocalBitcoins site . You have to register , click ‘ Buy bitcoins ’ , and select the seller by payment method and price . The ransomware used in this attackAttack.Ransomis a new version of Dharma Ransomware Trojan . In the ransom note , hackers have provided the email address mkgoro @ india.com , which is a contact email for the victims to facilitate communication with them . According to security researchers , this new version of Dharma works just like the older version using unsolicited emails . These emails contain social network logos , bank information , payment portals and an option to download and open a file . The previous two attacks were countered by using backup files , said Kumar . “ We have now decided to move to another server in the hope of better security , it may take a day for the site to be up and running , ” revealed Kumar .
In March 2014 , Boston Children ’ s Hospital learned the worst possible security news—from a third-party vendor with no formal relationship to the facility . That vendor told the pediatric facility that it had seen online documents threatening the hospital , as well as postedAttack.Databreachdocuments with information on physicians such as cell phone numbers , addresses and work locations . And the information also included details of Boston Children ’ s infrastructure , such as the main IP address of its organizational web site . Any kid could find this stuff easily online , but it was clear someone was trying to damage the reputation of Boston Children ’ s , said Daniel Nigrin , MD , senior vice president and CIO in the division of endocrinology , during the Cybersecurity Forum at HIMSS17 . Then came a video from the activist hacking organization Anonymous , accusing the hospital of having tortured a child . “ I ’ ve been a CISO for 16 years ; this was a new one me , ” Nigrin recalled . In particular , the charge from Anonymous centered on a teenage girl that the hospital determined was suffering from malnutrition . The case went to court , where a judge ’ s ruling removed the child from parental custody . The family fought the decision , and the controversy found its way to Anonymous , which decided that Boston Children ’ s needed to be taught a lesson . “ We wondered if it was the real Anonymous ; thankfully , the decision was to take the threat seriously , ” Nigrin said . The hospital convened an incident response team and starting forming contingency plans for an expected attack , which included “ going dark ” and cutting itself off from the Internet while assessing the systems and processes still necessary to keep the facility running . In the meantime , Boston Children ’ s contacted local police and the FBI , who were reluctant to step in proactively , and told hospital executives to get back to them if anything happened . Three weeks went by without incident , and the facility was hit with low-value distributed denial of service attacks that were handled . But then , tactics started to change as attacks increased in volume . One week later on a Saturday night , the cat-and-mouse game ended with a dramatic uptick in attacks and a third party was engaged to help the hospital defend itself . The concerted Anonymous cyber attack started April 14 and ended on April 27 . At its peak , the hackers were sending 30-day levels of malicious traffic in very short periods of time .