ReportWire

Tag: cyberattack

  • Ransomware crimes netted more than $1 billion last year

    Ransomware crimes netted more than $1 billion last year

    [ad_1]

    Victims of cybercrime shelled out a record $1.2 billion to have their data returned last year as ransomware attacks have grown in size and intensity, according to newly released federal data.

    The Financial Crimes Enforcement Network, or FinCEN, reported that banks processed a billion-plus dollars last year in what were likely ransomware payments. That’s more than double the amount of money from 2020, the report concluded. The top five highest-paid ransomware incidents all came from attackers who were connected to Russia, FinCEN said.

    The report “reminds us that ransomware — including attacks perpetrated by Russian-linked actors — remains a serious threat to our national and economic security,” Himamauli Das, FinCEN’s acting director, said in a statement this week.

    Ransomware is a type of computer hack where an attacker accesses someone’s digital device and locks the owner out of their own files. After the lockout, the hacker contacts the owner and demands a payment before restoring access to the files. If there’s no payment, the hacker threatens to keep the owner locked out or delete the files completely.


    Cybersecurity expert discusses rise in ransomware attacks

    03:53

    FinCEN, which started in 1990, is an arm of the U.S. Department of Treasury charged with tracking international money laundering, terrorist financing and other financial crimes. 

    FinCEN said hackers initially focused ransomware attacks on individuals, but have graduated to targeting large companies and demanding bigger payouts. Hackers in 2019 created a variation of ransomware attacks called double extortion, where they lock owners out of their files and then threaten to publish the data — which is often private or potentially embarrassing — if a payment isn’t made. 

    Nearly double that of 2020

    Indeed, 2021 had some of the biggest ransomware attacks on record aimed at large companies and nonprofits. A Russian hacking group attacked the Colonial Pipeline, one of the largest pipelines in the U.S., in May 2021. The company paid $4.3 million to retrieve its data, but federal authorities later recovered at least $2.3 million of the paid ransom. Hackers also attacked Planned Parenthood, Sinclair Broadcasting, Shutterfly and payroll processing company Kronos last year. 

    All told, organizations reported 1,489 ransomware attacks to FinCEN in 2021, a 188% increase from 2020, the agency said.

    More recently, a ransomware attack last May marked the last straw for Lincoln College, a historically Black college in rural central Illinois that opened in 1865. The school gave hackers a $100,000 ransom, a payout that compounded financial troubles caused by plummeting enrollment in recent years. The 157-year-old institution shuttered in May.

    Ransomware attacks have become more common with the rise in remote work and e-learning, with schools becoming particularly vulnerable.

    The Biden administration brought together three dozen nations, the European Union and a slew of private-sector companies for a two-day summit this week looking at how best to combat the attacks.

    President Biden earlier this year signed a new law that requires owners of factories, banks, nuclear reactors and other critical infrastructure operations to report when their computer systems are hit with ransomware. Reporting is currently optional for ransom victims, making it difficult to calculate the full impact of the crime.

    [ad_2]

    Source link

  • U.S. airport websites knocked offline in apparent pro-Russia hacking attack

    U.S. airport websites knocked offline in apparent pro-Russia hacking attack

    [ad_1]

    An apparently coordinated denial-of-service attack organized by pro-Russia hackers rendered the websites of some major U.S. airports unreachable early Monday, though officials said flights were not affected.

    The attacks — in which participants flood targets with junk data — were orchestrated by a shadowy group that calls itself Killnet. On the eve of the attacks the group published a target list on its Telegram channel.

    While highly visible and aimed at maximum psychological impact, DDoS attacks are mostly a noisy nuisance, different from hacking that involves breaking into networks and can do serious damage.

    “We noticed this morning that the external website was down, and our IT and security people are in the process of investigating,” said Andrew Gobeil, a spokesman for Atlanta’s Hartsfield-Jackson International Airport. “There has been no impact on operations.”

    Portions of the public-facing side of the Los Angeles International Airport website were also disrupted, spokeswoman Victoria Spilabotte said. “No internal airport systems were compromised and there were no operational disruptions.”

    Spilabotte said the airport notified the FBI and the Transportation Security Administration, and the airport’s information-technology team was working to restore all services and investigate the cause.

    Several other airports that were included on Killnet’s target list reported problems with their websites. Orlando International Airport told CBS News that its site was affected but is back online and that airport operations were not impacted.

    The Chicago Department of Aviation said in a statement that websites for O’Hare International and Midway airports went offline early Monday but that no airport operations were affected.

    “Early Monday, FlyChicago.com and related websites for O’Hare and Midway international airports went offline. No airport operations were affected. City of Chicago IT staff worked diligently to restore the website’s functionality shortly after noon CT, and they continue to vigilantly monitor the situation. The City’s Information Security Office at the Department of Assets, Information and Services is investigating the cause of the outage,” the department said in a statement.

    Last week, the same group of hackers claimed responsibility for denial-of-service attacks on state government websites in several states.

    John Hultquist, vice president for threat intelligence at the cybersecurity firm Mandiant, tweeted that denial-of-service attacks like those aimed at the airports and state governments are usually short in duration and “typically superficial.”

    “These are not the serious impacts that have kept us awake,” he said.

    Such attacks instead tend to reveal insufficient attention by webmasters to adequate bulletproofing of sites, which now includes DDoS protection service.

    [ad_2]

    Source link

  • Suffolk clerk’s office to resume title searches | Long Island Business News

    Suffolk clerk’s office to resume title searches | Long Island Business News

    [ad_1]

    After a cyberattack forced a three-week shutdown of much of Suffolk County’s digital infrastructure, its clerk’s office will resume in-person title searches next week. 

    In an email sent to title insurance companies late Thursday, the county clerk’s office said it will open for title searching at 8 a.m. on Monday, Oct. 3.  

    “We will have roughly 120 terminals available throughout the clerk’s office for searches to be conducted. At this point we believe all of the programs you are accustomed to using will be available. There are still some issues we are working out through testing which we hope to resolve over time. There are currently two printers available and we are working towards bringing additional ones online,” read the email. 

    The clerk’s office warned that the system will likely be slower than usual and added that the goal is to increase business hours once it’s confirmed that the “computer environment” can handle the increased volume expected. 

    In addition, the clerk’s office said it is working towards getting its systems up to be able to handle services regarding recordings and other related filings, though the office didn’t offer a timeframe when those functions would be up and running. 

    As for now, there will be no ability to search the county website or for examiners to access the systems from remote computers. 

    The real estate industry is critical to our economy, and last week, I met with various stakeholder groups to discuss contingency plans as the county continues to assess the cyber intrusion,” Suffolk County Executive Steve Bellone said via email. In line with our rolling restoration of services, tomorrow the Suffolk County Clerk’s office will be open for in-person title searches to allow real estate transactions to proceed. I want to thank County Clerk Judy Pascale, for her partnership as we continue to navigate these unprecedented circumstances. Together we are working to ensure services that our residents rely on are restored in a safe and secure way. I also want to thank Governor Kathy Hochul, a former clerk herself, for her support and helping provide the necessary equipment to make this all possible. 

    As LIBN previously reported, the cyberattack has wreaked havoc throughout the Long Island real estate industry because it paralyzed the county clerk’s office, which is responsible for recording documents and assisting with records searches for properties. 

    The attack shut down the county’s online systems earlier this month, and has delayed or cancelled real estate closings, especially on larger commercial deals, as title companies can’t search county databases to accurately ensure that the properties have no liens, judgments or other encumbrances in order to pass title. 

    Suffolk County websites and web-based applications were taken down on Sept. 8, after officials found malware in county systems. Ransomware postings on the website DataBreaches.net showed images of county documents and the hackers claimed to have extracted court records, sheriff’s office records, contracts with the state, and personal data of citizens from the domain of the county clerk. 

    County officials have yet to respond to requests for comment on when its systems will be back online and operating normally. 

    [ad_2]

    David Winzelberg

    Source link

  • Uber dealing with

    Uber dealing with

    [ad_1]

    Uber said Thursday that it reached out to law enforcement after a hacker apparently breached its network. A security engineer said the intruder had provided evidence of obtaining access to crucial cloud systems at the ride-hailing service.

    Uber tweeted Thursday night that it was “currently responding to a cybersecurity incident. We are in touch with law enforcement.” 

    It said it would provide updates on its Uber Comms twitter feed. When reached by CBS News, an Uber spokesperson declined to provide any details. 

    There was no indication that Uber’s fleet of vehicles or its operation was in any way affected.  

    “It seems like they’ve compromised a lot of stuff,” said Sam Curry, an engineer with Yuga Labs who communicated with the hacker. That includes obtaining complete access to the Amazon and Google-hosted cloud environments where Uber stores its source code and customer data, he said.

    Curry said he spoke to several Uber employees who said they were “working to lock down everything internally” to restrict the hacker’s access. That included the company’s Slack internal messaging network, he said.

    He said there was no indication that the hacker had done any damage or was interested in anything more than publicity. “My gut feeling is that it seems like they are out to get as much attention as possible.”

    The hacker had alerted Curry and other security researchers to the intrusion by using and an internal Uber account to comment on vulnerabilities they had previously identified on the company’s network through its bug-bounty program, which pays ethical hackers to identify vulnerabilities.

    The hacker provided a Telegram account address and Curry and other researchers then engaged them in a separate conversation, sharing screenshots of various pages from Uber’s cloud providers to prove they broke in.

    The Associated Press attempted to contact the hacker at the Telegram account where Curry and the other researchers chatted with them. But no one responded.

    One screenshot posted on Twitter and confirmed by researchers shows a chat with the hacker in which they say they obtained the credentials of an administrative user and then used social engineering to access Uber’s internal network.

    In 2016, a massive cybersecurity breach at Uber saw hackers steal the personal data of 57 million Uber customers and drivers.

    As a result, Uber was forced to pay $148 million to settle a lawsuit with all 50 states and the District of Columbia over the breach.  

    [ad_2]

    Source link