article thumbnail

Disk-wiping malware Shamoon targets virtual desktop infrastructure

Network World

A cybersabotage program that wiped data from 30,000 computers at Saudi Arabia's national oil company in 2012 has returned and is able to target server-hosted virtual desktops. The malware, known as Shamoon or Disttrack, is part of a family of destructive programs known as disk wipers.

Malware 60
article thumbnail

Man who unlocked nearly 2 million AT&T phones gets 12 years in prison

The Verge

According to a news release from the DOJ , in 2012, Muhammad Fahd, a citizen of Pakistan and Grenada, contacted an AT&T employee via Facebook and offered the employee “significant sums of money” to help him secretly unlock AT&T phones, freeing the customers from any installment agreement payments and from AT&T’s service.

Malware 137
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hacking News Roundup: Even 'Fast Company' Isn't Safe

SecureWorld News

The Yanluowang group is linked to "Evil Corp," the Lapsus$ gang (responsible for a recent Uber attack ), and FiveHands malware. APT28, or "Fancy Bear," is the threat group responsible for deploying the technique for delivering the Graphite malware. Here's one report of the incident. Google Play and Apple Store caught in adware scheme.

Company 70
article thumbnail

Game Change: Three Reasons Why #SonyHack Will Change Security

CTOvision

See the interview here: Tactics Not Malware Are the Story. Most corporate hacks we see are focused on either customer data (credit cards, medical records, social security numbers, passwords, bank account information, email addresses) or company proprietary documents. A defining moment that causes significant change in behavior.

Security 282
article thumbnail

Security attacks and countermeasures

Cloud Musings

million stolen from HSBC Bank A.S. The resulting breaches occur primarily through malware, including Trojan horses, adware, worms, viruses and downloaders [6]. Malware is malicious software created for egregious objectives. Malware is intended to be quiet and hidden as it enters environments and is executed.

Security 159
article thumbnail

Mobile device security: A new frontier for hackers

Cloud Musings

Examples include banking information, confidential work-related items and provocative videos and photos. Mobile malware attacks are increasing, with 2014 exhibiting a 75 percent increase in Android malware attacks on devices. The mobile malware StealthGenie secretly monitors calls, texts and videos on mobile phones.

Mobile 70
article thumbnail

Top 10 Data Breaches of All Time

SecureWorld News

What was compromised: b ank account numbers, bank statements, mortgage and tax records, social security numbers, wire transaction receipts, and driver license images. They then gained access to a customer service database and uploaded malware to capture sensitive information. LinkedIn data breach (2012). Records affected: 21.5

Data 112