Here is the weekly roundup :
|
DDoS Extortionists Make $100,000 Without DDoS Attacks
|
In a clear indicator of the no-compromising lengths to which companies will venture to protect themselves from service outages via DDoS attacks, it has been revealed that extortionists have made over $100,000 by simply blackmailing organizations with the threat of DDoS attacks, without actually carrying them out.
|
|
Bangladesh Bank Hackers Used Malware on SWIFT Software
|
Brussels-based SWIFT (Society for Worldwide Interbank Financial Telecommunication), a cooperative at the center of the global financial system and owned by some 3,000 financial institutions and banks around the world may have been hacked during the Bangladesh Central bank’s NY Fed Reserve heist, according to a new report.
|
|
FBI’s Payment to Hackers to Crack iPhone: $1.3 Million+
|
The Federal Bureau of Investigation Director James Comey said yesterday that the agency paid hackers more than he would make in the remaining tenure of his job, which totals over $1.34 million.
|
|
Cyberheist Target Bangladesh Central Bank Had No Firewalls
|
The Bangladesh central bank at the center of one of the largest cyber-heists of all time was vulnerable to hackers from the beginning – it did not even have a firewall, according to an investigator looking into the incident.
|
Interesting Reading From Around the Web
|
BeautifulPeople.com Leaks Very Private Data of 1.1 Million 'Elite' Daters - And It's All For Sale
|
Sexual preference. Relationship status. Income. Address. These are just some details applicants for the controversial dating site BeautifulPeople.com are asked to supply before their physical appeal is judged by the existing user base, who vote on who is allowed in to the “elite” club based on looks alone. All of this, of course, is supposed to remain confidential. But much of that supposedly-private information is now public, thanks to the leak of a database containing sensitive data of 1.1 million BeautifulPeople.com users. The leak, according to one researcher, also included 15 million private messages between users. Another said the data is now being sold by traders lurking in the murky corners of the web.
|
|
All About Fraud: How Crooks Get the CVV
|
A longtime reader recently asked: “How do online fraudsters get the 3-digit card verification value (CVV or CVV2) code printed on the back of customer cards if merchants are forbidden from storing this information? The answer: If not via phishing, probably by installing a Web-based keylogger at an online merchant so that all data that customers submit to the site is copied and sent to the attacker’s server.
|
|
Prince’s Death Spawns New Scams
|
People looking to scam the general public are often more than willing to capitalize on the death of a celebrity – such as Prince, who passed away Thursday – by deploying emails, social media posts, and text messages carrying malicious links and attachments.
|
|
Upcomming Events
LIFARS & Partners CISO Wine Tasting
New York, NY, April 28
More information
Internet Week Panel
New York, NY, May 17
More information
ASIS NYC
New York, NY, April 27-28
More information
Secure Computing Forum
Dublin, IE, May 12
More information
EnFuse 2016
Las Vegas, NV, May 24-26
More information
Featured Guide:
Data Breach Readiness Guide: Part 1
With cybersecurity threats on the rise, the adage of “not if, but when” holds truer than ever. Businesses of all types, including financial service companies, should take significant steps now to mitigate risk and protect their stakeholders, their reputations, and possibly their very existence. In this first of three reports,LIFARS LLC and FORTRESS STRATEGIC COMMUNICATIONS LLC look at ways companies can prepare themselves to identify, address, and recover from data breaches.
Featured Article
The Global Cyber Crime Underground (Part 2): Russia and Eastern Europe
This is the second blog in a three-part series co-written by LookingGlass Cyber Threat Intelligence Group and LIFARS. The series provides a high level overview of the global cyber crime underground and the biggest players in this space. Today we'll take a look at the Russian and Eastern European underground.
|