Russia may have hacked several local, state, and federal government agencies this week, according to the NSA and Secretary of State Mike Pompeo. With all the hallmarks of Russian hacking group "Fancy Bear," Leo says that the hack was discovered because the group went too deep and too far and triggered security software designed to detect such attempts.
For the first time ever, 1 in 5 attacks on consumers are ransomware attacks, making them more common than credit card theft.
The latest scam is to convince the phone company to transfer your mobile phone number to a new SIM. Cloud Hopper is the app that does this. Once that's accomplished, the bad guys can gain control of all your apps, including banking apps with 2 factor authentication through a SIMJACKED phone. That's what happened to Twitter founder Jack Dorsey. Leo says that what he recommends is contacting your mobile service and request they use a PIN to verify it's you when seeking to get a new SIM.
A teenage hacker discovered flaws in his school's educational Blackboard software and presented his findings with the eye of improving security. He made a presentation at the Black Hat Hackers convention in Las Vegas. But while he could have changed his grades, he opted not so. But he did break into a college network to change his admissions status to "accepted" to make a point. And while the software company lauded the teen for discovering the flaws, he was suspended at school.
This week, home mortgage company First American Title experienced a security breach, according to Brian Krebs of Krebs on Security. Due to a design flaw in their online interface, hackers could easily have access to all 880 million customer files. The website has been shut down, but nobody knows just how much data was stolen if any.
Rich wants to know if connected cars that have internet can be hacked. Leo says they can indeed, but the hacker needs to be pretty close to the car to make that happen. Car companies also need to put forth more effort to make the car's computer more secure.
Steve was given a Barnes and Noble Nook reader. Can he watch movies on it? Leo says that the Nook had very limited space and used a proprietary format, but he may be able to hack it to give it more options, including watching the movies he wants. He should head over to XDA-Developers to see how to "root" the Nook. His real problem, though, is copy protection. The Nook only supports movies with Cinema Now DRM. But that's part of the fun of hacking old technology like a Nook.
There's a new attack that has been affecting ATMs around the world, and it's called "Jackpotting." It causes ATMs to dispense all of its cash. Hackers are using endoscopes to gain access to the interior of an ATM in order to connect to it and hack into the ATM's Windows XP operating system. Then, the once the malware is installed, a remote command is given to spew out 40 bills every 23 seconds.
Securing your online accounts is vitally important. The consequences of being hacked can be great — someone could lock you out of your email account. If that account is used for password recovery for your other accounts, then a hacker could get access to all of those as well. There are a few basic things that you should make sure you do to protect your email account:
1. Provide a secondary email address for recovery.
2. Provide a phone number for password recovery.
3. Turn on 2 Factor Authentication.
Using basic social engineering skills, hackers have managed to use the data on cell phone bills to get customer service reps to move service to a set up mobile phone, and then use that to get into CoinBase through 2 Factor Authentication. As such, one hacker stole 8,000 BitCoin from a user named Cody. Read the full article here.