Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.
Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for highlights of the goings-on each week!
As we close out 2016 and prepare to ring in the New Year we must look back at the past 11 months before we can predict what lies ahead. In the realm of cybersecurity, that means evaluating how the threat landscape has changed to accurately assess how it will continue to evolve.
Cybercriminals are now able to download a simple ransomware toolkit to begin stealing hundreds or thousands of dollars from people in other countries, all from the comfort of their home office – or parents’ basement.
A new in-development ransomware was discovered called Popcorn Time that intends to give victims a very unusual way of getting a free decryption key for their files. With Popcorn Time, a victim can pay or they can try to infect two other people to have them pay the ransom to get a free key.
The United States Air Force has awarded an $18.8 million contract for digital defense software. In an era increasingly marked by cyberwarfare, the Air Force’s purchase reflects the U.S. military’s ongoing efforts to equip its forces with the latest technology to defend against a host of adversaries.
Dirty COW is a Linux vulnerability that was first disclosed to the public in October 2016. It was a serious privilege escalation flaw that allowed an attacker to gain root access on the targeted system. It was described as an “ancient bug” by Linus Torvalds and was quickly patched once it was disclosed.
The vulnerability in Windows was being used in zero-day attacks, including those carried out by the Pawn Storm espionage group. Microsoft was able to release a patch by the next Patch Tuesday, November 8. This entry provides a complete analysis of the vulnerability based on samples acquired in the wild.
The company has confirmed that hackers targeted ThyssenKrupp’s Industrial Solutions division, specifically the unit that specializes in the construction of large industrial plants. Branches in the U.S., Europe, Asia, and Argentina were all impacted by the breach.
In certain areas, mobile ransomware accounts for up to 22% of mobile malware overall! It closely mirrors the path paved by traditional ransomware: like other ransomware types, mobile ransomware is constantly evolving and growing.
In May 2015 hackers infiltrated the German Parliament’s computer network. It took a year to conclude that the attack was most likely the work of Russia. Last week, 900,000 Germans lost access to internet and telephone services and it only took a few hours before politicians began pointing fingers at Moscow.
Hackers have targeted the website of Ghana’s electoral commission as votes are counted after tightly contested elections. The commission says the website is up again, and an attempt to put up “fake results” failed.
On December 1, an international law enforcement operation involving Europol, FBI, German law enforcement and others resulted in the dismantling of an international criminal infrastructure platform called ‘Avalanche.’
Please add your thoughts in the comments below or follow me on Twitter; @JonLClay.