Adam Roberts reports: The Carroll County Sheriff’s Office paid the equivalent of $2,400 in ransom money to hackers, the county announced at a press conference Monday afternoon. […] The files in question were all decrypted after the ransom was paid, the sheriff’s office said. Read more on 40/29 TV.
Category: Malware
Henry County residents’ information is exposed in hacking
The Toledo Blade reports: Henry County was targeted by a “ransomware” attack that may have exposed more than 17,000 county voters’ personal information, Henry County Commission President Glenn Miller said Tuesday. The county last week sent a letter to 17,841 voters to notify them of the computer hacking incident that occurred Oct. 31. County officials…
Online mall Interpark fined 4.5 bln won ($3.8 million) over data leak
Yonhap News reports: South Korea’s telecommunications watchdog said Tuesday that it has decided to impose a fine of 4.5 billion won (US$3.8 million) on major online shopping mall Interpark Corp. for its failure to protect information of customers in a hacking attack blamed on North Korea. The Korea Communications Commission made the decision at its…
US State Prosecutor Paid Off Ransomware Hackers with Bitcoin
Avi Mizrahi reports on an interesting revelation in the Avalanche case: Reports of individuals, corporations, banks and even hospitals falling victim to ransomware are nothing new these days, but now we learn that the office of a US state attorney has also been blackmailed for bitcoin. The Allegheny County district attorney, Stephen Zappala Jr., has confirmed…
Ransomware Author “Pornopoker” Arrested in Russia
Catalin Cimpanu reports: Russian authorities have arrested a man suspected of writing and distributing ransomware. The suspect, whose name hasn’t been released yet, goes by the nickname of Pornopoker. […] According to police, Pornopoker had created ransomware that locks users’ computers with a message perpetrating to be from Russian authorities, such as the police (MIA),…
In Break From Usual, Threat Actors Use RAT To Steal POS Data
Jai Vijayan reports: Memory-scraping tools that surreptitiously copy and export data from running processes have pretty much been the only malware that threat actors have used in recent years to steal credit and debit card data from Point-of-Sale (POS) systems. But that doesn’t mean that other options don’t exist. Security vendor SecureWorks this week said…