Wow. As far as a physical security FAIL goes, this is a contender. The Ahmedabad Mirror reports: Officials of the Directorate General of GST Intelligence (DGGI) in Gujarat on Sunday lodged a complaint of theft of record files from their storage unit in Ahmedabad. The DGGI storage unit is housed in an old and decrepit…
Category: Government Sector
FL: Stuart’s city hall ransomware attack “more than likely” caused by phishing email scam
Melissa E. Holsman reports: The city is still recovering from an April 13 ransomware virus attack that most likely came from a phishing email scam on an employee’s desktop computer, the city manager said Monday. A computer virus dubbed Ryuk attacked the city’s servers in a ransomware demand that City Manager David Dyess said forced…
ME: City of Augusta hit by computer virus, City Center closed
Keith Edwards reports: A malicious computer virus that hit the city overnight and froze the city’s computer network forced the closure of Augusta City Center Thursday. The virus, which officials said was intentionally inflicted upon the city’s servers, also shut down computers used by public safety dispatchers — but not the city’s phone system or…
Hacktivists attack UK police sites to protest arrest of Julian Assange
Hacktivism is seeing a resurgence recently, in no small part fueled by the arrest of Julian Assange. #Op hashtags for the UK, Sweden, and Ecuador signal the intent of the attackers. #Anonymous #FreeAssange #OpEcuador #OpAssange #OpSweden #OpUK #OpUS @your_anon_net @LorianSynaro and @Pryzraky took #Offline UK Police website. Sweden its also our target! You will be…
Source code of Iranian cyber-espionage tools leaked on Telegram
Hell hath no fury like a vengeful insider, Wednesday edition. Catalin Cimpanu reports: In an incident reminiscent of the Shadow Brokers leak that exposed the NSA’s hacking tools, someone has now published similar hacking tools belonging to one of Iran’s elite cyber-espionage units, known as APT34, Oilrig, or HelixKitten. The hacking tools are nowhere near…
Spear Phishing Campaign Targets Ukraine Government and Military; Infrastructure Reveals Potential Link to So-Called Luhansk People’s Republic
John Hultquist, Ben Read, Oleg Bondarenko, and Chi-en Shen of FireEye explain: In early 2019, FireEye Threat Intelligence identified a spear phishing email targeting government entities in Ukraine. The spear phishing email included a malicious LNK file with PowerShell script to download the second-stage payload from the command and control (C&C) server. The email was…