personal information on about 80,000 employees , volunteers and vendors from a CPS database . The former worker , Kristi Sims , was arrested Thursday ; officers recovered the stolen files after executing search warrants , according to CPS and Chicago police officials . Sims , 28 , is a former contractor who handled administrative tasks for the Office of Safety and Security . Sims was ordered released on her own recognizance at a bond hearing Friday at the Leighton Criminal Court Building by Judge Sophia Atcherson ; Sims also was ordered not to access to the internet while the case continues . In a letter to employees Thursday evening , CPS Chief Operating Officer Arnie Rivera said the district learned of the massive data breachAttack.DatabreachWednesday , the day after the information was stolenAttack.Databreach. Among the data stolenAttack.Databreachwere names , employee ID numbers , phone numbers , addresses , dates of birth , criminal arrest histories and DCFS findings . Social Security numbers were not takenAttack.Databreach, Rivera said . “ There was no indication that the information , which was in the individual ’ s possession for approximately 24 hours , was used or disseminated to anyone in any way , ” Rivera added . A CPS spokesman referred questions about the criminal charges to Chicago police , but Rivera said “ CPS will work to ensure the individual is prosecuted to the fullest extent of the law. ” CPD spokesman Anthony Guglielmi said Sims is also suspected of deleting the targeted files from the CPS database after they were stolenAttack.Databreach. The digital equipment seized in the warrant is being analyzed , and a search warrant is underway for Sims ’ s email account , Guglielmi said . Though police say they don ’ t believe anyone other than Sims was in possession of the data , they hope to learn more about what might have been done with the information . This latest CPS data breachAttack.Databreachcomes only a few months after the school district mistakenly sent a mass email that linked to the private information of thousands of students and families . The email invited families to submit supplemental applications to selective enrollment schools . Attached at the bottom of the email was a link to a spreadsheet with the personal data of more than 3,700 students and families . In that incident , CPS apologized for the “ unacceptable breachAttack.Databreachof both student information and your trust ” and asked recipients of the email to delete the sensitive information . The data included children ’ s names , home and cellphone numbers , email addresses and ID numbers .
HONG KONG ( REUTERS ) - Cathay Pacific Airways said on Wednesday ( Oct 24 ) that data of about 9.4 million passengers of Cathay and its unit Hong Kong Dragon Airlines had been accessedAttack.Databreachwithout authorisation . Cathay said 860,000 passport numbers , about 245,000 Hong Kong identity card numbers , 403 expired credit card numbers and 27 credit card numbers with no card verification value ( CVV ) were accessedAttack.Databreachin the breachAttack.Databreach. `` We are very sorry for any concern this data security event may cause our passengers , '' Cathay Pacific chief executive Rupert Hogg said in a statement . `` We acted immediately to contain the event , commence a thorough investigation with the assistance of a leading cyber-security firm , and to further strengthen our IT security measures . '' Mr Hogg said no passwords were compromisedAttack.Databreachin the breachAttack.Databreachand the company was contacting affected passengers to give them information on how to protect themselves . Cathay Pacific was not immediately available for additional comment outside normal business hours . The company said it initially discovered suspicious activity on its network in March this year , and investigations in early May confirmed that certain personal data had been accessedAttack.Databreach. News of Cathay 's passenger data breachAttack.Databreachcomes weeks after British Airways revealed that credit card details of hundreds of thousands of its customers were stolenAttack.Databreachover a two-week period . Cathay said in a statement that accessedAttack.Databreachdata includes names of passengers , their nationalities , dates of birth , telephone numbers , e-mail and physical addresses , passport numbers , identity card numbers and historical travel information . It added that the Hong Kong Police had been notified about the breachAttack.Databreachand that there is no evidence any personal information has been misused .
Hong Kong 's electoral office has apologized after two laptops were stolenAttack.Databreach, containing voter registration records along with the names of members of its Election Committee , which picked a new chief executive for the region last weekend . The REO says the laptops were stored in a locked room at the AsiaWorld Expo , a large conference facility next to Chek Lap Kok International Airport just north of Lantau Island . `` We apologize to the voters for the incident , '' the REO says . `` The REO will inform the affected voters about the incident as soon as possible . '' The data was stored in accordance with the `` relevant security requirements , '' including multiple layers of encryption , the REO says . It did not specific what type of encryption was used . It also did not say how many voters might be affected , but Channel News Asia reported that Hong Kong has 3.7 million registered voters . Hong Kong 's Privacy Commissioner for Personal Data has launched an investigation . On March 26 , the Election Committee picked Carrie Lam as the first female chief executive of Hong Kong , which is formally known as the Hong Kong Special Administrative Region of the People 's Republic of China . The election happens every five years . The laptops were part of a backup system for the election . REO says the room , in Hall 7 of the AsiaWorld Expo , was monitored by closed-circuit television . The South China Morning Post reported that the door to the room was locked and required both a passcode and an access card for entry . It does n't appear the door was forced open . An anonymous source told the SCMP that the computers themselves were not expensive , leading investigators to believe that the equipment may have been intentionally targeted . The laptops were left in the storeroom on March 22 and were still there two days later . The theftAttack.Databreachwas discovered on March 27 . The computers were taken out of their bags , which were left behind , the SCMP reported .
The Intercontinental Hotels Group data breachAttack.Databreachpreviously announced in February as affecting 12 hotels in the chain has proven to have been far more extensive than was first thought . Last week the group announced that the breachAttack.Databreachaffected guests that used their credit cards to pay at franchisee hotels across the United States and in Puerto Rico between September 29 , 2016 and December 29 , 2016 . According to the chain ’ s website , the Intercontinental Hotels Group data breachAttack.Databreachpotentially affected guests who stayed at its Holiday Inn , Holiday Inn Express , Crowne Plaza , Staybridge Suites , Candlewood Suites , Hotel Indigo , and InterContinental Hotels . The full list of hotels that have potentially been affected by the malware incident has been listed on the IHG website . In total , 1,184 of the group ’ s hotels have potentially been affected . The Intercontinental Hotels Group data breachAttack.Databreachinvolved malware that had been downloaded onto its systems , which was capable of monitoring payment card systems and exfiltratingAttack.Databreachpayment card data . It does not appear that any other information other than card details and cardholders ’ names were stolenAttack.Databreachby the attackers . The hotel group does not believe the data breachAttack.Databreachextended past December 29 , 2016 , although that can not be entirely ruled out as it took until February/March for all of the affected hotels to be investigated and for confirmation to be received that the malware had been removed . Prior to the malware being installed , IHG had started installing the OHG Secure Payment Solution ( SPS ) , which provides point to point encryption to prevent incidents such as this from resulting in the theft of clients ’ data . Had the process started sooner , the Intercontinental Hotel Group data breachAttack.Databreachcould have been prevented . Hotels that had implemented the SPS prior to September 29 , 2016 were not affected and those that had implemented the solution between September 29 , 2016 and December 29 , 2016 stopped the malware from being able to locate and stealAttack.Databreachcredit card data . In those cases , only clients that used their credit cards at affected hotels between September 29 , 2016 and when the SPS system was installed were affected . Intercontinental Hotels Group Data Breach One of Many Affecting the Hospitality Sector The Intercontinental Hotels Group data breachAttack.Databreachstands out due to the extent to which the group was affected , with well over 1,100 hotels affected . However , this is far from the only hotel group to have been affected by POS malware . Previous incidents have also been reported by Hard Rock Hotels , Hilton Hotels , Omni Hotels & Resorts and Trump Hotels . Hotels , in particular hotel chains , are big targets for cybercriminals due to the size of the prize . Many hotel guests choose to pay for their rooms and services on credit cards rather than in cash , and each hotel services many thousands – often tens of thousands – of guests each year . Globally , IHG hotels service more than 150 million guests every year , which is a tremendous number of credit and debit cards . Such a widespread malware infection would be highly lucrative for the attackers . Credit card numbers may only sell for a couple of dollars a time , but with that number of guests , an attackAttack.Databreachsuch as this would be a huge pay day for the attackers .
Last week HackRead exclusively reported on a vendor sellingAttack.Databreachover 1 million Gmail and Yahoo accounts on a Dark Web marketplace . Now , the same vendor is back with yet another listing and this time the victims are PlayStation users . The vendor who goes by the handle of “ SunTzu583 ” is sellingAttack.Databreach640,000 accounts of PlayStation users in just USD 35.71 ( 0.0292 BTC ) stolenAttack.Databreachfrom an unknown database . These accounts contain emails along with their clear-text passwords . According to SunTzu583 , the database was not directly stolenAttack.Databreachfrom PlayStation servers , but it does contain unique accounts of PlayStation users . SunTzu583 goes on to explain that these accounts may also work on other sites however they can be mainly used for PlayStation-related activities . It must be noted that in 2015 , 2.5 million Xbox ( Xbox 360 ISO ) and Playstation accounts ( PSP ISO ) were stolenAttack.Databreachand leakedAttack.Databreachon the Dark Web marketplaces in February 2017 . Also , about five months ago several PlayStation users were complaining that their accounts have been hackedAttack.Databreachand in some cases , their funds were missing . While the vendor has already announced that the database is not directly stolenAttack.Databreachfrom PlayStation servers , it is quite possible that it was takenAttack.Databreachfrom a third party server . We at HackRead can not confirm the authenticity of this database , but if you have an account on PSN , it is advisable to change its password and also use a different password on other sites .
JobStreet is informing clients by email whether they were caught up in a Malaysia-based data breachAttack.Databreachthat affected 19 different companies . “ We are writing to notify you that we recently identified a post claiming that personal information from the databases of 19 corporations and associations had been made public , including ours , ” the email says . According to website haveibeenpwned.com , 3,883,455 JobStreet accounts were affected by the breachAttack.Databreach. It says the information was freely downloadable on a Tor hidden service . The breachAttack.Databreachalso affected more than 46 million Malaysian users and several telecommunications companies . Telecommunications providers caught by the breachAttack.Databreachinclude Altel , Celcom , DiGi , EnablingAsia , Friendi , Maxis , Merchantrade Asia , PLDT , Redtone , Tunetalk , Umobile and XoX , reports suggest . It also affected organisations such as the Academy of Medicine Malaysia , the Malaysian Dental Association , the Malaysian Medical Association , and the National Specialist Register of Malaysia . Reports speculate that more than 81,000 records were stolenAttack.Databreachfrom these organisations . “ Our investigations established that some personal candidate information pertaining to accounts created before July 2012 has been exposedAttack.Databreach. To help protect our customers , the team is continuously enhancing our security measures for all user information stored with JobStreet.com , ” JobStreet CEO Suresh Thiru says in an email . According to media reports , that personal information includes identity card numbers , addresses , login IDs , passwords , names , emails and phone numbers . Haveibeenpwned.com also notes that on JobStreet , dates of birth , genders , geographic locations , marital statuses , nationalities and usernames were also compromisedAttack.Databreach. The Malaysian Communications and Multimedia Commission ( MCMC ) may have discovered the possible source of the data leaksAttack.Databreach, according to Malaysian Communications Minister Salleh Said Keruak . `` We have identified several potential sources of the leak and we should be able to complete the probe soon , '' he announced .
An unsecured backup drive has exposedAttack.Databreachthousands of US Air Force documents , including highly sensitive personnel files on senior and high-ranking officers . Security researchers found that the gigabytes of files were accessibleAttack.Databreachto anyone because the internet-connected backup drive was not password protected . The files , reviewed by ZDNet , contained a range of personal information , such as names and addresses , ranks , and Social Security numbers of more than 4,000 officers . Another file lists the security clearance levels of hundreds of other officers , some of whom possess `` top secret '' clearance , and access to sensitive compartmented information and codeword-level clearance . Phone numbers and contact information of staff and their spouses , as well as other sensitive and private personal information , were found in several other spreadsheets . The drive is understood to belong to a lieutenant colonel , whose name we are not publishing . ZDNet reached out to the officer by email but did not hear back . The data was secured last week after a notification by MacKeeper security researcher Bob Diachenko . Among the most damaging documents on the drive included the completed applications for renewed national security clearances for two US four-star generals , both of whom recently had top US military and NATO positions . Both of these so-called SF86 applications contain highly sensitive and detailed information , including financial and mental health history , past convictions , relationships with foreign nationals , and other personal information . These completed questionnaires are used to determine a candidate 's eligibility to receive classified material . Several national security experts and former government officials we spoke to for this story described this information as the `` holy grail '' for foreign adversaries and spies , and said that it should not be made public . For that reason , we are not publishing the names of the generals , who have since retired from service . Nevertheless , numerous attempts to contact the generals over the past week went unreturned . `` Some of the questions ask for information that can be very personal , as well as embarrassing , '' said Mark Zaid , a national security attorney , in an email . The form allows prospective applicants to national security positions to disclose arrests , drug and alcohol issues , or mental health concerns , among other things , said Zaid . Completed SF86 forms are n't classified but are closely guarded . These were the same kinds of documents that were stolenAttack.Databreachin a massive theftAttack.Databreachof sensitive files at the Office of Personnel Management , affecting more than 22 million government and military employees . One spreadsheet contained a list of officers under investigation by the military , including allegations of abuses of power and substantiated claims of wrongdoing , such as wrongfully disclosing classified information . Nevertheless , this would be the second breachAttack.Databreachof military data in recent months . of Defense subcontractor , was the source of a large data exposureAttack.Databreachof military personnel files of physical and mental health support staff . Many of the victims involved in the data leakAttack.Databreachare part of the US Special Operations Command ( SOCOM ) , which includes those both formerly employed by US military branches , such as the Army , Navy , and Air Force , and those presumably still on active deployment . It 's not known how long the backup drive was active .
The databases were stolenAttack.Databreachbetween 2011 to 2017 from widely visited forums providing information about Bitcoin mining and trading . The combined number of data stolenAttack.Databreachfrom these forums is more than 12,000,000 including 536,727accounts from MerlinsMagicBitcoin.com which suffered a data breachAttack.Databreachin January 2017 , 514,409 accounts from BitcoinTalk.org forum which was hackedAttack.Databreachin May 2015 , 568,357 stolenAttack.Databreachfrom BTC-E.com back in October 2014 , 21,439 accounts from BTC4Free.com which was hackedAttack.Databreachin January 2014 , 21,439 accounts from BTC4Free.com which was also hackedAttack.Databreachin January 2014 . 3,153 Bitcoin.Lixter.com which was breachedAttack.Databreachin September 2014 , 1,780 BitLeak.net accounts stolenAttack.Databreachback in March 2014 , 28,298 DogeWallet.com accounts stolenAttack.Databreachin January 2014 , 61,011 MtGox.com stolenAttack.Databreachin June 2011 , 34,513 BitsCircle.com ( breachAttack.Databreachdate unknown ) 10,855,376 BitcoinSec from 2014 breachAttack.Databreachand 3,149 accounts from TheBitcoinShop.pixub.com ( breachAttack.Databreachdate unknown ) . In some cases , the passwords have been decrypted while some are using SHA1 hash which is easy to decrypt since Google security researchers have already broken the SHA-1 web security tool last month . The price set for this data is USD 400 ( BTC 0.3817 ) It must be noted that BitcoinTalk.org and BTC-E.com are two of the most important bitcoin related platforms having their data sold on the dark web since 2016 by several other vendors . However , we are not sure about rest of the platforms . Either way , if you have an account on any of the forums mentioned above change your password asap . Also , some of the forums discussed aren ’ t active anymore ; therefore , the relevance of their data is out of the question .
Around 50 % of the impacted accounts never posted on the forum which leads to the conclusion that they weren ’ t real users but bots . The stolen data contains email addresses , hashed passwords , and salts but none of the usernames were takenAttack.Databreach. However , good news is that all passwords have been reset . Therefore it ’ s too early to assume what happened or how attackers were able to accessAttack.Databreachthe database . Nevertheless , the administrators believe that it could be because of a phishing attackAttack.Phishing. It must be noted that one of the forum ’ s staff members was also impactedAttack.Databreachby the breachAttack.Databreachwhich is not surprising since hackers are successfully cracking passwords from previous data breachesAttack.Databreachand using them for further attacks . More : 21 Million Decrypted Gmail , 5 Million Yahoo Accounts Being Sold on Dark Web The forum is implementing new security measures including site-wide HTTPS support , 2-step authentication requirement for their staff and passwords randomizing of inactive accounts . This is not the first time when Android Forums was security issues . In 2012 , the forum suffered a massive data breachAttack.Databreachin which user credentials of 1 million users were stolenAttack.Databreach. At the time of publishingAttack.Phishingthis article , the Android Forums was down for scheduled maintenance but you can still go through the security notice through Google Cache
Hong Kong might just have experienced its biggest ever data breachAttack.Databreachafter the personal details of the Special Administrative Region ( SAR ) ’ s 3.7 million voters were stolenAttack.Databreachon two laptops . The details are said to have included ID card numbers , addresses and mobile phone numbers . They were stored on two laptops in a locked room at the AsiaWorld-Expo conference center near the airport . The center is said to be the “ back-up venue ” for the region ’ s chief executive elections , which took place over the weekend . The Registration and Electoral Office has reported the theft to police and told the South China Morning Post that the details of voters were encrypted – although it ’ s unclear how strong that encryption is . It ’ s also unclear why the details of 3.7m voters were stored on the laptops when only an Election Committee of 1194 specially chosen business and political leaders is allowed to pick Hong Kong ’ s CEO . The SAR ’ s privacy watchdog said in a statement that it is launching an investigation into the matter . Over a three-year period from 2013 to 2016 , the privacy commissioner ’ s office is said to have received 253 data breachAttack.Databreachnotifications . Eduard Meelhuysen , EMEA boss at Bitglass , argued that public sector breaches stand out as particularly concerning . `` Whether it ’ s the NHS or the Hong Kong Registration and Electoral Office , these organizations need to remember their duty of care , not to mention legal obligations , to protect citizens ' and employees ' data , ” he said . “ This means not only keeping sensitive data encrypted , but also controlling where it goes using tools like access control and data leakage prevention . Is it really a business necessity to store the information of millions of citizens on a laptop ? '' In a separate incident , a laptop was stolenAttack.Databreachfrom Queen Mary Hospital last year , containing the personal details of nearly 4000 patients
TORONTO , April 19 ( Reuters ) - Global hotel chain InterContinental Hotels Group Plc said 1,200 of its franchised hotels in the United States , including Holiday Inn and Crowne Plaza , were victims of a three-month cyber attackAttack.Databreachthat sought to stealAttack.Databreachcustomer payment card data . The company declined to say how many payment cards were stolenAttack.Databreachin the attackAttack.Databreach, the latest in a hacking spreeAttack.Databreachon prominent hospitality companies including Hyatt Hotels Corp , Hilton , and Starwood Hotels , now owned by Marriott International Inc . The breachAttack.Databreachlasted from September 29 to December 29 , InterContinental spokesman Neil Hirsch said on Wednesday . He declined to say if losses were covered by insurance or what financial impact the hackingAttack.Databreachmight have on the hotels that were compromisedAttack.Databreach, which also included Hotel Indigo , Candlewood Suites and Staybridge Suites properties . The malware searched for track dataAttack.Databreachstored on magnetic stripes , which includes name , card number , expiration date and internal verification code , the company said . Hotel operators have become popular targets because they are easier to breachAttack.Databreachthan other businesses that store credit card numbers as they have limited knowledge in defending themselves against hackers , said Itay Glick , chief executive of Israeli cyber-security company Votiro . `` They do n't have massive data centers like banks which have very secure systems to protect themselves , '' said Glick . InterContinental declined to say how many franchised properties it has in the United States , which is part of its business unit in the Americas with 3,633 such properties . In February , InterContinental said it had been victim of a cyber attack , but at that time said that only 12 of its 286 managed properties in the Americas were infected with malware .
Over the weekend , a hacker known as TheDarkOverlord resurfaced and released the first episode of season five for `` Orange is the New Black '' a popular show on Netflix that is n't slated to air until June . A short time later , TheDarkOverlord released episodes 2 though 10 , along with a warning to other Hollywood studios – you 're next . The media jumped on the story . Netflix would n't confirm or deny the leakedAttack.Databreachepisodes were legitimate , stating that proper law enforcement had been notified , and that a company used by several TV studios `` had its security compromised . '' The company in question , Larson Studios , does audio post-production work for a number of shows and films , including NCIS Los Angeles , Designated Survivor , and Arrested Development . According to Larson Studios , they 've done work for FOX , Netflix , ABC , NBC , IFC , Showtime , and more . As word of Netflix 's security problem started to spread , news outlets starting comparing the incident to the Sony Pictures hack and the medical hacks over the last few years . While there are some comparisons to be made , they 're not the same type of threat . Netflix did n't have a Ransomware incident , and neither did Larson Studios . Their files were stolenAttack.Databreach, not encrypted . Ransomware encrypts the files on a computer and renders them useless . Victims can recover the files if they pay a fee (ransom)Attack.Ransom, or they can try and recover the files from backups . According to TheDarkOverlord , Larson Studios was targeted because they were a post-production company . Late last year , TheDarkOverlord hackedAttack.DatabreachLarson Studios and downloadedAttack.Databreachan unknown number of files . Plenty of reporters knew TheDarkOverlord had targeted Hollywood , but until this weekend there was never any proof . Fast forward a few months . When Larson Studios did n't comply with the extortion demandsAttack.Ransom, TheDarkOverlord turned their attention to Netflix . When Netflix refused to payAttack.Ransom, season five ( minus three episodes ) of `` Orange is the New Black '' was released for download . `` It did n't have to be this way , Netflix . You 're going to lose a lot more money in all of this than what our modest offer was . We 're quite ashamed to breathe the same air as you . We figured a pragmatic business such as yourselves would see and understand the benefits of cooperating with a reasonable and merciful entity like ourselves , '' TheDarkOverlord wrote in a statement . Netflix surpassed $ 2.5 billion in quarterly streaming revenue in Q1 2017 , and added five million members to their subscriber base . While having one of their popular series leakedAttack.Databreachto the web is n't exactly helpful , it is n't clear if there will be any financial impact from this incident . Once again , extortion and Ransomware are two separate things . Netflix and Larson Studios are (were) being extortedAttack.Ransom, they were not infected with Ransomware and have complete accessAttack.Databreachto their files . However , there is a lesson to be learned . Third-parties are always going to pose a risk to any organization , and this is certainly the case in Hollywood where secrecy and suspense are key to their business model .
A cyber attack has compromisedAttack.Databreachthe personal data of up to 26,000 Debenhams customers . The breachAttack.Databreach, which is understood to have been malware-based , targeted the online portal for the retailer 's florist arm , Debenhams Flowers . Debenhams has stressed that the site is operated by Ecomnova , a third-party supplier , and that customers of other services have not been affected . Ecomnova also operates Debenhams ' websites for hampers , personalised gifts and wines . While all four sites have been suspended , the retailer has not announced whether the others were also breached . Debenhams confirmed to Sky News that customer payment details , names and addresses were accessed or stolenAttack.Databreachduring the attackAttack.Databreach. In a statement the company stressed that it was only the Ecomnova-run site that had been compromisedAttack.Databreach, and that customers of its main website Debenhams.com `` can be confident they are unaffected by this attack '' . `` All affected customers have been contacted by Debenhams to inform them of the incident , '' the firm told Sky News . `` We are working with Ecomnova to ask the banks of those affected to block payment cards of those customers affected and issue customers with new cards . '' Debenhams said the incident had been reported to the Information Commissioner 's Office ( ICO ) , the UK 's independent body for upholding the Data Protection Act . Following a cyber attack in October 2015 , the ICO fined TalkTalk a record £400,000 after 15,656 individuals ' bank account details and sort codes were stolenAttack.Databreach. An ICO spokesperson said it was aware of the `` potential incident '' involving Debenhams Flowers and that enquiries were being made . `` Businesses and organisations are required under the Data Protection Act to keep people 's personal data safe and secure , '' the spokesperson said . Debenhams chief executive Sergio Bucher said : `` As soon as we were informed that there had been a cyber attack , we suspended the Debenhams Flowers website and commenced a full investigation . `` We are very sorry that customers have been affected by this incident and we are doing everything we can to provide advice to affected customers and reduce their risk . '' Ecomnova did not immediately respond to Sky News for comment .
Hackers have been trying to blackmailAttack.Ransompatients of a Lithuanian plastic surgery clinic , by threatening to publish their nude “ before and after ” photos online . The photos were stolenAttack.Databreachearlier this year , along with other sensitive data – passport scans , national insurance numbers , etc – from the servers of Grozio Chirurgija , which has clinics in Vilnius and Kaunas . According to The Guardian , the stolen data was first offered for sale in March . At that time , the hackers , who call themselves “ Tsar Team , ” released a small portion of the database to prove the veracity of their claims and to entice buyers . They asked forAttack.Ransom300 bitcoin for the entire lot , and at the same time contacted some of the affected patients directly , offering to delete the sensitive data for a sum that varied between €50 and €2,000 ( in bitcoin ) . Apparently , among the patients of the clinic were also celebrities , both Lithuanian and not , and individuals from various European countries , including 1,500 from the UK . It is unknown if any of them paid the ransomAttack.Ransom, but the clinic did not try to buy back the stolen data . Instead , they called in the Lithuanian police , CERT and other authorities to help them prevent the spread of the data online , and to find the culprits . They ’ ve also asked the affected patients to notify the police if they got a ransom requestAttack.Ransomfrom the hackers ; to notify news portals , forums or social networking sites of any links to the stolen data that may have been published in the comments on their sites and ask them to remove them ; and do the same if they find a link through Google Search . In the meantime , the hackers decided to leakAttack.Databreachonline over 25,000 of the private photos they have stolenAttack.Databreach, more than likely in an attempt to force the affected patients ’ hand and get at least some money . It ’ s interesting to note that the name of the hacker group – Tsar Team – is also a name that has been associate with the Pawn Storm attackers ( aka APT28 , aka Sofacy ) , a Russian cyberespionage group that has targeted a wide variety of high-profile targets , including the NATO , European governments , the White House , and so on . It is unclear , though , if this is the same group . Given that it is a very unusual target for APT28 , it ’ s possible that these attackers have simply used the name to add weight to their demands .
All those affected are being offered one year of free access to identity theft protection services from CSID . BBC News notes that security researcher Chris Vickery uncoveredVulnerability-related.DiscoverVulnerabilityvulnerabilities in Topps databases back in December of 2015 and June of 2016 , but he was n't able to get a response from the company by email . It 's not clear whether the credit card breachAttack.Databreachwas related to the flaws Vickery foundVulnerability-related.DiscoverVulnerability. A recent Thales e-Security survey of 1,016 U.S. adults found that fully 88 percent of respondents said they would stop using digital payments if they fell victim to cybercrime as a result of a data breach . Seventy percent said they would stop using digital payments if money was stolen from a linked bank account , 68 percent said they would do so if unauthorized charges appeared on a linked credit card account , and 59 percent said they would do so if their user name and password were stolenAttack.Databreach. `` The mobile payments industry needs to take note that their future success is based on trust , '' Thales e-Security director of payment strategy Jose Diaz said in a statement . `` And that trust can easily fail if they do not provide the strong protection of their infrastructure , transactions and data that customers expect . '' A separate Thales survey of 1,000 adults in the U.S. and the U.K. recently found that 55 percent of respondents would switch to only using cash at a retailer if they learned that credit card data had been stolenAttack.Databreachfrom its systems -- and 20 percent would stop shopping at that retailer altogether
The targeted server secure2.donaldjtrump.com was defaced Sunday evening when Ars Technica noted that the home page for the server was displaying a deface page along with a message left by a defacer from Iraq . The deface message was simple than expected since Iraq is among those seven countries whose citizens have been banned by Trump from entering the United States . According to the message : Where 's Rudy 'Cyber ' Giuliani when you need him ? Trump ’ s hotels have also been targeted several times in the last couple of years starting from a credit card breach incidentAttack.Databreachwhere personal and financial information of guests were stolenAttack.Databreach. However , it should not surprise the readers since Trump is still using an old Android phone to Tweet from his official account and one of the congressmen has already requested an investigation on the use of an old phone since Android is one of the most vulnerable and targeted mobile operating systems in the world
Attributing hacking attacks to the correct perpetrators is notoriously difficult . Even the U.S. government , for all its technical resources and expertise , took warranted criticism for trying to pin a high-profile 2014 cyberattack on North Korea , and more recently faced skepticism when it blamed Russia for hacks against top Democrats during the 2016 election . In those cases , government officials said they based their attribution in part on software tools the hackers employed , which had been used in other cyberattacks linked to North Korea and Russia . But that sort of evidence is not conclusive ; hackers have been known to intentionally use or leave behind software and other distinctive material linked to other groups as part of so-called false flag operations intended to falsely implicate other parties . Researchers at Russian digital security firm Kaspersky Lab have documented such cases . On Tuesday , WikiLeaks published a large cache of CIA documents that it said showed the agency had equipped itself to run its own false-flag hacking operations . The documents describe an internal CIA group called UMBRAGE that WikiLeaks said was stealingAttack.Databreachthe techniques of other nation-state hackers to trick forensic investigators into falsely attributing CIA attacks to those actors . According to WikiLeaks , among those from whom the CIA has stolenAttack.Databreachtechniques is the Russian Federation , suggesting the CIA is conducting attacks to intentionally mislead investigators into attributing them to Vladimir Putin . “ With UMBRAGE and related projects , the CIA can not only increase its total number of attack types , but also misdirect attribution by leaving behind the ‘ fingerprints ’ of the groups that the attack techniques were stolenAttack.Databreachfrom , ” WikiLeaks writes in a summary of its CIA document dump . It ’ s a claim that seems intended to shed doubt on the U.S. government ’ s attribution of Russia in the DNC hack ; the Russian Federation was the only nation specifically named by WikiLeaks as a potential victim of misdirected attribution . It ’ s also a claim that some media outlets have accepted and repeated without question . “ WikiLeaks said there ’ s an entire department within the CIA whose job it is to ‘ misdirect attribution by leaving behind the fingerprints ’ of others , such as hackers in Russia , ” CNN reported without caveats . It would be possible to leave such fingerprints if the CIA were reusing unique source code written by other actors to intentionally implicate them in CIA hacks , but the published CIA documents don ’ t say this . Instead , they indicate the UMBRAGE group is doing something much less nefarious . They say UMBRAGE is borrowing hacking “ techniques ” developed or used by other actors to use in CIA hacking projects . This is intended to save the CIA time and energy by copying methods already proven successful .