The executive director of the Nishna Valley Family Y.M.C.A. in Atlantic says the organization has lost nearly $50,000 in a cyber attack. Y.M.C.A. executive director, Dan Haynes, told reporters this morning during a news conference, that their computer systems were recently infected by a virus that targeted what are called ACH or Automated Clearing…
Category: Malware
Restaurant Depot/Jetro Cash & Carry Customers’ Credit Cards Hacked (update2)
Gawker.com is not one of my usual sources for news on data breaches, but they managed to uncover a breach that we would not have known about had it not appeared on a firearms discussion forum (yes, really): If you used a credit card between the dates of Sept. 21 and Nov. 18th at national…
101Domain.com Suffers Securty Breach
Michael H. Berkens reports: 101Domain.com has apparently suffered a security breach which “may have resulted in unauthorized access to your personal information and possibly payment information.” According to Webhosting.info, 101domain.com has around 10,000 domain names under management. Read more on TheDomains.com. From the notification letter: We are writing to you as a primary contact on your account with…
Cycling star Floyd Landis prosecuted in absentia for alleged role in hacking anti-doping lab via malware
John E. Dunn reports: Disgraced former Tour de France cyclist Floyd Landis should be given an 18-month suspended prison sentence for his part in an alleged plot to hack the French national anti-doping laboratory (LNDD) using Trojans, a prosecutor has said. The planting of computer Trojans for the purposes of data theft is usually seen…
Breaches have consequences: Watchdog penalizes Hyundai Capital after data leak
A follow-up to the Hyundai Capital breach first disclosed in April. At the time, Hyundai reported that approximately 420,000 of its 1.8 million customers had their names, resident registration numbers, mobile phone numbers and email addresses compromised by hackers. Now Yonhap News reports: South Korea’s financial watchdog on Thursday decided to issue an institutional warning…
Hiding in Plain Sight: Post-Breach
Gunter Ollmann writes: The majority of network breaches begin and end with the installation of malware upon a vulnerable device. For the rest, once that initial malware beachhead has been achieved, the story is only just beginning. The breach disclosures that make the news are often confusing as they’re frequently compiled from third-hand reports, opinions…