The Most Comprehensive Data Protection Solution
Discover, classify, and protect your data from all threats with the only Gartner Magic Quadrant DLP and Forrester Wave EDR Leader.
First and Only Solution to Converge:
- Data Loss Prevention
- Endpoint Detection and Response
- User and Entity Behavior Analytics
Nearly 1 million routers were infected by a cyberattack on Deutsche Telekom, Germany’s largest telecom company. This IoT attack spanned globally and caused internet outages to as many as 900K Deutsche Telekom users. The hackers responsible used IoT botnet Mirai, which was responsible for bringing down Krebs on Security earlier this fall and whose source code was released. This attack once again fuels concerns over the vulnerability of widely used IoT devices such as routers, webcams, video recorders, etc. For more info, read the full article.
New Android malware, going by the name of Gooligan, has stolen access to over 1 million Google accounts. Older versions of Android, from 4.1 to 5.1 are at risk. The malware disguises itself as legitimate looking apps just like the malware in the fake Pokemon Go apps and attempts to root the device to gain complete access to the device. Gooligan exploits well-known vulnerabilities in these older Android versions that either don’t have available patches or have patches that were never installed by the user. The majority of victims are located in Asia. Needless to say, don’t download apps from third party sites. Head to Computer World for more info.
Changes to Rule 41 of the Federal Rules of Criminal Procedure by the U.S. Department of Justice came into effect on Thursday, December 1 after efforts to block them failed. The FBI now has expanded powers to hack into any computer within the country with just one warrant authorized by any US judge (even if it is outside their jurisdiction). The changes were initially approved in April; however, Senator Ron Wyden attempted to block the changes. Privacy advocates say that these changes could allow the FBI to carry out international hacking operations with less barriers or hack innocent users. The DOJ argues that it’ll allow the FBI to more easily carry out investigations against hackers using Tor or VPN to hide their locations. Either way, the expansion of powers could be a first step down a dangerous road. Read the full article on The Hacker News.
The healthcare sector continues to be a prime target for hackers. Hacks on IT infrastructures of hospitals, insurance firms, and other healthcare providers happen all too often. To tack on additional worry, a research team examined implantable medical devices such as pacemakers to see if they could hack them and found exploits that would allow wireless remote attackers to kill the user. In addition, hackers could gain access to location history, treatments, as well as the patient’s current state of health. Their findings show a gaping security hole in these medical devices that needs to be repaired. For more, read the full article on The Register.
Since 2009, the Avalanche botnet has been responsible for ransomware, RATs, and banking Trojans, involving up to 500,000 active infected devices on a daily basis. It has cost German banks $6.4 million and hosted 17 of the worst malware families. But starting this past Wednesday, law enforcement around the world collaborated in a successful international takedown of Avalanche. 800,000 domains were seized, sinkholed or blocked and five people were arrested. Over 130 TB of data were captured and German officials were able to identify the server structure of the botnet. For more info, head to Dark Reading.