Walter Strong reports: The Northwest Territories Power Corporation’s (NTPC) website went down Thursday afternoon, but some pages show what appears to be a ransomware message from unknown hackers. Some visitors to the website myntpc.ntpc.com were greeted with a text page that begins with: “Hi! Your files are encrypted by Netwalker.” Read more on CBC.ca
Category: Non-U.S.
Personal data of thousands of “Figaro” readers exposed on a server
The following is a Google translation of a story in Le Monde by Damien Leloupe: A large volume of data, including personal data of subscribers and subscribers to the Figaro site , remained accessible for several months online without protection, reveals a report by the computer security company Safety Detective , published Thursday, April 30. The Safety Detective team discovered…
UK: Nine million logs of Brits’ road journeys spill onto the internet from password-less number-plate camera dashboard
Gareth Corfield reports: In a blunder described as “astonishing and worrying,” Sheffield City Council’s automatic number-plate recognition (ANPR) system exposed to the internet 8.6 million records of road journeys made by thousands of people, The Register can reveal. Read more on The Register.
China Issues New Measures on Cybersecurity Review of Network Products and Services
Yan Luo and Zhijing Yu of Covington & Burling write: On April 27, 2020, the Cyberspace Administration of China (“CAC”) and other eleven government agencies jointly released the final version of the Measures on Cybersecurity Review (“Measures”) (an official Chinese version of the Measures is available here). These Measures will take effect on June 1, 2020. Under Article…
Massive & Unprecedented Security Breach Takes Usenet Providers Offline
Andy writes: A massive security breach has taken at least one major Usenet provider offline. UseNext says that a “security hole in a partner company” could have revealed names and bank account information, exposing customers to fraud and identity theft. The precise nature of the breach isn’t clear but reports that a Usenet client has…
Huiying Medical Breached; Source Code for AI-assisted COVID-19 Detection, and Experimental Data of COVID-19 on Sale
Cyble reports: Cyble researchers have identified a credible threat actor ‘THE0TIME’ claiming to have gained access to Huiying Medical Technology’s COVID-19 detection’s technology source code and COVID-19 experimental data. As part of the breach, the preparator (sic) claims to have gained access to the COVID-19 detection technology code, as well as COVID-19 experiments data as well. Read more on Medium.