attack

Thu
02
Aug
John Lister's picture

Gov't Staff Revert to Typewriters After Ransomware Attack

Staff of a local government in Alaska have switched to typewriters after a ransomware attack crippled their computer network. Officials are currently rebuilding the system from scratch. The attack hit Matanuska-Susitna Borough, which covers the ... region just north of Anchorage. The problems began on July 24, though officials believe the malware may have been on the system for several weeks before activating. IT staff spotted the ransomware attack thanks to antivirus software , but had to start manually removing some of the more sophisticated elements. They also reset all passwords as a security ... (view more)

Mon
11
Jun
Dennis Faas's picture

How to Fix: Computer / Network Infected with Ransomware (10 Steps)

Infopackets Reader Robert S. writes: " Dear Dennis, I have a network of computers I use for accounting purposes. Suddenly, many of my desktop icons started appearing to have strange names, such as ... '1HjgN1BdTZE3OIqorcj2E5b6CXIE=gdFae89IWgo0RrVfPbCHt851oogccs.ssimpotashka[at]gmail.com'. When I try to open these files, Windows warns me the file may be malicious. When I look in my Documents folder, I see more files similarly named to the one I just mentioned. Some of my .PDF files won't even open. On the desktop there is a text document that says ' HOW TO DECRYPT YOUR FILES.TXT ' - when I open ... (view more)

Mon
09
Apr
Dennis Faas's picture

How to Fix: Remove JSCoinMiner Browser Malware (Step By Step)

Infopackets Reader Bob S. writes: " Dear Dennis, Thanks for the article on Browser Cryptomining scams . I have a related problem. I use Firefox browser and Norton keeps telling me that I'm infected with ' JSCoinminer ' for every single web page I ... visit - for example, eBay.com, Amazon.com and even Infopackets.com! I have tried to remove the infection using Norton, Malwarebytes and also Norton's 'Power Eraser' but the infection persists. The error message reads: Norton blocked an attack by: Web Attack: JSCoinminer Website / An intrusion attempt by thrillingos.herokuapp.com was blocked ... Web ... (view more)

Thu
14
Dec
John Lister's picture

Trio Admits Hijacking Home Devices

Three Americans have plead guilty to hijacking more than 100,000 internet-connected devices. The group of infected machines (known as a "botnet") was then used to attack websites using a distributed denial of service attack (DDoS) to make websites ... unavailable. While most DDoS attacks are carried out on PCs, this attack in particular targeted weaknesses in smaller devices that use the Internet. This included routers, digital video recorders and wireless cameras. That's a significant point, as the tech security community has generally treated security flaws in such devices as a lower ... (view more)

Wed
13
Sep
John Lister's picture

Billions of Bluetooth Devices at Risk of Malware Infection

The majority of Bluetooth devices could be vulnerable to a malware attack. The attack, dubbed BlueBorne, can reportedly spread to devices without needing any action from the victim. The attack takes advantage of a bug in the Bluetooth technology ... itself rather than a specific operating system. At one point this summer an estimated 5.3 billion devices were at risk, running Windows, Android or Linux, as well as Apple devices running systems before the current iOS 10. Fixing the problem will require patches for specific devices and operating systems. Microsoft has patched the issue already, ... (view more)

Wed
28
Jun
John Lister's picture

Windows Bug Exploited Again by Ransomware

Businesses around the world are reporting computer problems that appear to be another rapidly-spreading ransomware attack. It appears likely to be exploiting the same Windows flaw as the recent WannaCry attack. Details were still emerging at the ... time of writing, but high profile businesses including drug giant Merck, a British advertising agency and a Danish shipping company are known to have been compromised. Ukraine's government network also appears to have been hit. (Source: nytimes.com ) File Index Compromised As with WannaCry, the malware appears to be designed to lock up and encrypt ... (view more)

Tue
13
Jun
John Lister's picture

Malware Threatens Power Grids

Russian-backed hackers appear to have the ability to remotely shut down power stations, researchers claim. However, the cyber weapon appears to only have been successfully deployed once so far. Two companies, Dragos Inc and ESET, have revealed their ... analysis of malware that was used in an attack on a transmission station in Kiev, the Ukrainian capital, last December. The outage lasted for an hour and blacked out buildings that normally use 20 percent of the city's electricity. (Source: washingtonpost.com ) Malware Easily Customized The researchers say the malware, which they've dubbed ... (view more)

Tue
09
May
John Lister's picture

Phishing Scammers Try New Twist

An estimated one million people around the world received a recent phishing email, though it only posed a risk for around an hour before Google stepped in to stop the scam in its tracks. Victims of the scam may have inadvertently given attackers ... control of their email accounts. The attack involved a bogus email claiming that a contact tried to share a document with the recipient using Google Docs. While only a small proportion of people use Google Docs, the attackers appear to have been playing the numbers game. Attackers Accessed Emails and Contacts Unlike most phishing scams, the attackers ... (view more)

Thu
24
Nov
John Lister's picture

Report: Earphones Could Be Hijacked By Hackers

Security researchers say hackers could turn people's headphones into a microphone for surreptitious remote listening. However, the method has enough limitations that it shouldn't be a major concern for most users. The method, shown off by ... researchers at Ben Guiron University in Israel, takes advantage of a very simple element of engineering. That is that the process by which a microphone turns speech into an electronic signal is effectively the same as that by which earphones turn a speaker into sound, just with the process reversed. According to the researchers, that's a security ... (view more)

Wed
17
Feb
John Lister's picture

Hackers Demand $3.6M To Restore Hospital Computers

A California hospital has been unable to use its computer system for more than a week thanks to a ransomware attack. The hackers are said to be demanding more than $3 million in return for returning access. The Hollywood Presbytarian Medical Center ... has confirmed the attack but is keeping many of the details quiet. Local news outlets say it doesn't appear any personal data has been compromised and no patients have been put at medical risk. However, the attack has been highly disruptive. Staff are having to register new patients and update medical records on paper. Some patients and family ... (view more)

Pages

Subscribe to RSS - attack