Warns
now browsing by tag
Beware of fake calls from COVID-19 scammers, Metro Health warns | #coronavirus | #scams | #covid19
SAN ANTONIO – The Metropolitan Health District is warning people in an Antonio to be aware of scammers who are posing as contact tracers for the city and trying to […] View full post on National Cyber Security
Ministry warns against movie over ‘child abuse’ content | #childabuse | #children | #kids | #parenting | #parenting | #kids
ANKARA Turkey’s Family, Labor and Social Services Ministry has applied to Turkey’s television watchdog to carry out a thorough evaluation of the movie “Cuties,” which has been at the center […] View full post on National Cyber Security
#romancescams | FBI warns people stuck at home could be more vulnerable to online romance scams | romancescams | #scams
They send flowers. They spend months chatting online. They share poems expressing their love. For people forced to stay home during the pandemic, an online connection can offer solace and […] View full post on National Cyber Security
Scammers using fake antibody test to steal information, FBI warns | #coronavirus | #scams | #covid19
Scammers have found yet another way to take advantage of the COVID-19 pandemic, by selling fake antibody tests. A real antibody test will screen your blood for antibodies made when […] View full post on National Cyber Security
Health Department Warns Parents of the Virus’ Impact on Children | #covid19 | #kids | #childern | #parenting | #parenting | #kids
The L.A. County Department of Public Health today has confirmed 2,885 new COVID-19 infections and 62 deaths related to the virus. To date, the Health Department has identified 150,319 COVID-19 […] View full post on National Cyber Security
#nationalcybersecuritymonth | DNC warns campaigns about cybersecurity after attempted scam
Source: National Cyber Security – Produced By Gregory Evans
An online “impersonator” of a Democratic National Committee (DNC) staffer tried to contact presidential campaigns, including Sen. Bernie SandersBernie SandersWinners and losers from the South Carolina debate Five takeaways from the Democratic debate Sanders most searched, most tweeted about candidate during Democratic debate MORE’s (I-Vt.) campaign, the committee said in a statement to the candidates Wednesday.
Bob Lord, the DNC’s chief security officer, wrote in an email to the campaigns that “adversaries will often try to impersonate real people on a campaign,” The Associated Press reported.
He added that the “adversaries” could try to get campaign workers to “download suspicious files, or click on a link to a phishing site” or set up calls or in-person meetings to record and release.
Lord warned that the “impersonator” contacted the Sanders campaign and at least two others and had a domain registered overseas. But he acknowledged that anyone can register a domain name in any country.
“Attribution is notoriously hard,” he wrote. “The appropriate authorities have been alerted.”
“If you are using an alternate domain, please refrain from doing so and let us know if you are operating from a domain that others have not corresponded with before,” Lord added. “Do not use your personal mail account for official business.”
Sanders campaign spokesman Mike Casca confirmed the incident with the AP and said the domain was registered in Russia.
“It’s clear the efforts and investments made by the DNC and all the campaigns to shore up our cybersecurity systems are working,” Casca said, according to the AP. “We will remain vigilant and continue to learn from each incident.”
The Hill reached out to the DNC and the Sanders campaign for confirmation.
The Vermont senator said on Friday that he was briefed about a month ago that Russia was attempting to boost support for his campaign.
Democratic campaigns have been cautious about cybersecurity since Hillary ClintonHillary Diane Rodham ClintonDemocratic insiders stay on the sidelines in 2020 race Hillicon Valley: Twitter falling short on pledge to verify primary candidates | Barr vows to make surveillance reforms after watchdog report | DHS cyber chief focused on 2020 The Hill’s Campaign Report: High stakes at last Democratic debate before Super Tuesday MORE campaign chairman John Podesta’s emails were hacked and published after he received an email seemingly from Google directing him to change his account.
The post #nationalcybersecuritymonth | DNC warns campaigns about cybersecurity after attempted scam appeared first on National Cyber Security.
View full post on National Cyber Security
#cyberfraud | #cybercriminals | Safeonweb warns of new scam involving second-hand sites
Source: National Cyber Security – Produced By Gregory Evans Saturday, 08 February 2020 The online consumer protection organisation Safeonweb has warned of the latest technique used by fraudsters to steal the data of unsuspecting users of second-hand sites like 2dehands.be. The issue was highlighted by VRT presenter Sven Pichal on his Facebook page De Inspecteur. […] View full post on AmIHackerProof.com
#hacking | Malaysia warns of Chinese hacking campaign targeting government projects
Source: National Cyber Security – Produced By Gregory Evans
Image:Azlan Baharudin
A Chinese state-sponsored hacking group has been targeting Malaysian government officials, computer experts with the Malaysian government said on Wednesday.
The purpose of the attacks has been to infect computers of government officials with malware and then steal confidential documents from government networks, Malaysia’s Computer Emergency Response Team (MyCERT) said in a security advisory.
Attacks pattern
The attacks against government officials consist of highly-targeted spear-phishing emails.
MyCERT says the attackers have been pretending to be a journalist, an individual from a trade publication, and representatives for a military organization and non-governmental organization (NGO).
The emails contained links to documents stored on Google Drive. The documents, when opened, asked recipients to enable macros.
The malicious macros used two Office exploits (CVE-2014-6352 and CVE-2017-0199) to execute malicious code on the victim’s system to download and install malware.
“The group’s operations tend to target government-sponsored projects and take large amounts of information specific to such projects, including proposals, meetings, financial data, shipping information, plans and drawings, and raw data,” MyCERT said.
MyCERT officials didn’t say if government officials were compromised in these attacks.
Indirectly pointing the finger at China
However, while MyCERT didn’t accuse the Chinese government directly, their advisory included links to research from the cyber-security community.
The write-ups [1, 2, 3, 4] describe the hacking tools and modus operandi of a cyber-espionage group known as APT40, known for its hacking activity alligned with the interests of the Chinese government.
In an exposé published last month, an online group of cyber-security analysts calling themselves Intrusion Truth have claimed that APT40 are contractors hired and operating under the supervision of the Hainan department of the Chinese Ministry of State Security.
According to FireEye, besides Malaysia, the group has also targeted Cambodia, Belgium, Germany, Hong Kong, Philippines, Norway, Saudi Arabia, Switzerland, the United States, and the United Kingdom.
The group has been primarily focused on “engineering, transportation, and the defense industry, especially where these sectors overlap with maritime technologies.”
The APT40 group is also tracked by other security firms, but under other names, such as TEMP.Periscope, TEMP.Jumper, Leviathan, BRONZE MOHAWK, GADOLINIUM. The group has been active since 2014, according to multiple reports.
The post #hacking | Malaysia warns of Chinese hacking campaign targeting government projects appeared first on National Cyber Security.
View full post on National Cyber Security