Tag Archives: fancy bear

Security Never Sleeps- Google Apps, Fancy Bear

Google Kicks 500 Apps Off Online Store Over Spyware Concerns

“Developers likely unaware of flaws”

The decision to remove over 500 apps from the Google Play online app store comes after researchers raised spyware concerns. Cyber security firm Lookout have disclosed that they have found apps that contain and spread spyware programs. Certain software used in the apps had the ability to covertly siphon people’s personal data on their devices without alerting the app makers, Lookout said.

Potential Data Breach of Oceanside Online Utility Payment System

“Residents report abnormalities”

City of Oceanside officials said Tuesday that the internet payment systems where Oceanside residents can pay their utility bills have possibly been breached. Authorities first learned of the potential issue when several residents alerted the municipal institutions, saying the cards they used to pay utility bills had charges to their accounts that had not been authorized. At least two victims used the affected accounts only to pay their utility bill and no other purpose. Though Oceanside officials have not confirmed the utility payment is necessarily the source of the breach, the reports raised the concern and speculation of vulnerability.

Russia-Linked Hackers Leak Football Doping Files

“Fancy Bear claims to be associated with the hacking attacks”

The infamous Fancy Bear, a group of hackers commonly believed to be operating out of Russia has leaked emails and medical records related to football (or soccer, to us Americans) players who have used illegal substances. Fancy Bears has made assertions before to be associated with the broader Anonymous hacktivist movement previously. Their members have constructed a website, fancybears.net, where they leaked numerous files as part of a campaign dubbed “OpOlympics.”

The hackers released a statement in which they comment on their operations: “Today Fancy Bears’ hack team is publishing the material leaked from various sources related to football. Football players and officials unanimously affirm that this kind of sport is free of doping. Our team perceived these numerous claims as a challenge and now we will prove they are lying.”

Enjoy your read? Check out our other content here.

10Fold Security Never Sleeps- Fancy Bear, IoT Security

RUSSIA’S ‘FANCY BEAR’ HACKERS USED LEAKED NSA TOOL TO TARGET HOTEL GUESTS

“Russian espionage campaign used WiFi networks to spy on guests”

High profile customers have been targeted by Russia’s ‘Fancy Bear’malware, now with upgraded NSA hacking tool EternalBlue leaked out to the public on the internet. According to FireEye, the attacks are are hitting victims through minimal security hotel WiFi routers. The security firm has also stated that they suspect the group is working with Russian Intelligence agency GRU.

8 Critical IoT Security Technologies

“Necessary as prevalence grows”

Gartner has recently reported a prediction of nearly 20.4 billion connected IoT devices in just the next three years. That’s a rate of about 5.5 million new ‘Things’ per day! These metrics suggest that standard security practices will be insufficient in the very near future to counter the cyber threats that face IoT devices.

Report: SMBs Better Prepared For IoT Security Threats Than Large Enterprises

“SMB prioritize cyber threats more effectively”

IoT security firm Pwine Express has found that SMB’s are far more equipped to handle and identify threats to their workplace networks than larger competitive businesses. About 41% of IT security pro’s at large firms did not know what types of attacks had actually occurred on their devices last year, compared to 25% at SMB-based companies.

Hackers Say Humans Most Responsible for Security Breaches

“Hackers asked about methods and practices”

About 250 hackers at Black Hat 2017 were polled on the processes they use in hacking systems. Thycotic surveyed many of these individuals, finding that 51% identify as ‘white hats,’ 34% as ‘grey hats,’ and 15% as ‘black hats.’ Defenders can use this data to understand better how to safeguard their own systems.

Enjoy your read? Check out our other content here.