Support our Sponsors


uClip Clipping Path Service



Main Menu
Home
News
Blog
Links
Search
Resources
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions
Login



Syndicate
feed-image Feed Entries

spamNEWS | botnet | phising | virus | spam | mallware
5,100 Patients of Kaiser Permanente Impacted due to Presence of Malware on its Server PDF Print E-mail
Written by Administrator   
Wednesday, 16 April 2014 09:00

Beckershospitalreview.com reported on 3rd April, 2014 stating that 'The Kaiser Permanente Northern California Division of Research' based in Oakland, California, US has started informing its patients that their personal and health data was hijacked due to infiltration of malware in its research server. According to the report, around 5,100 patients were impacted in the security breach.

Notably, Kaiser Permanente Northern California Division of Research conducts research to cover a wide range of topics which include epidemiologic and health service studies, clinical trials and program evaluations.

The malware busted the security barriers of the server in October 2011 but Kaiser came to know of the attack only on 12th February, 2014.

The server enclosed first and last names, DOB (dates of birth), genders, ages, addresses, medical record numbers, ethnicities and lab results of patients. Kaiser says that those patients had taken part in a research-study whose information was available on the server.

However, Kaiser confirmed that neither SSNs (Social Security numbers) nor electronic medical records of Kaiser Permanente were exposed during the unfortunate breach.

SCMagazine.com published a statement on 4th April, 2014 stating an elaboration by Tracy Lieu, Director of Research Division of Kaiser Permanente as "We have no evidence till date confirming that the data on the server was in reality opened, copied or used by any unlawful persons."

Databreachtoday.com published news on 4th April, 2014 quoting a Spokeswoman of Kaiser Permanente as saying "due to human error related to the configuration of the software, AV (anti-virus) software on the impacted server had not been upgraded. Hence, we have instantly removed the server after recognizing the infection and confirmed that the contagion was limited to this one hijacked server. Actually, the hijacked server was the only server of Research Division which did not have the appropriate updated AV software. However, we have taken corrective measures to update and fortify our protocols and electronic security actions to prevent a situation like this in future."

Moreover, this latest incident happens following a settlement between Kaiser Foundation Health Plan and the California Attorney General's office in February 2011 related to a breach in 2011 which compromised personal data of about 30,000 employees of the health plan.

Read more... - 5,100 Patients of Ka...
 
Phishing Email Attack Employees of MSU PDF Print E-mail
Written by Administrator   
Wednesday, 16 April 2014 09:00

Lansingstatejournal.com reported on 4th April, 2014 stating the recent discovery of email attack involving the payroll information of employees of Michigan State University, East Lansing, Michigan, US is the second reported occurrence in the past six-months.

In both incidents, valid credentials like username and password were used.

Last October (2013), it was found that an anonymous person had altered banking information in the payroll system for no less than two employees of MSU.

Lansingstatejournal.com published a report on 4th April, 2014 quoting Sgt. Florene McGlothian-Taylor, Spokeswoman of MSU Police, as saying "It was revealed on Tuesday, 1st April, 2014 that unauthorized changes happened in direct deposit details of around 10 employees."

McGlothian-Taylor said that the assault led to the attempted pilfering of direct deposit payroll incomes and the probe is going on.

There is no clue that a system-wide security breach occured or data of other employee was exposed.

Officials analyzing the current phishing email campaign comment that "Phishing" is an Internet-based sting involving emails appearing to be from a faithful source (like MSU in this case).

Mlive.com published a police statement on 3rd April, 2014 as "Do not respond to emails or link with emails as it is not legitimate message from Michigan State University".

In case you have been already struck by the abovementioned phishing email campaign then forward along with full headers the email to This e-mail address is being protected from spambots. You need JavaScript enabled to view it or report by pasting a copy of full headers onto the contact form. You can report about the unfortunate incident by calling MSU on its helpline number, (517) 432-6200 and then immediately deleting the email.

Moreover, MSU is not the only one that has been targeted by phishers since the beginning of 2014 as during second week of January 2014, University of Florida based in Florida, US also warned its students to be careful about a new "phishing" email scam asking students to give out personal information online. It was discovered that fraudster posing as University of Florida Computing Helpdesk sent an email initiating patrons to follow a link for changing their information for University of Florida webmail account.

Read more... - Phishing Email Attac...
 
Spam Emails Impersonating Major Financial Institutions Spreading Upatre Downloader - Trend Micro PDF Print E-mail
Written by Administrator   
Wednesday, 16 April 2014 09:00

Security experts of security firm Trend Micro reveal that cyber crooks are distributing the infamous downloader namely 'Upatre' with the help of junk emails purporting to be from world-renowned financial firms like Wells Fargo and Lloyds TSB.

Trend Micro security experts observe that hoax emails notify recipients about a fresh secure message and they are directed to undo the .msg file in the attachment to witness the message.

The .msg file encloses another .msg file which conceals Upatre (TROY_UPATRE.YYKE) and this method probably is used to guarantee that the malware is not instantly detected by AV solutions.

The malware begins downloading additional threats the moment it infects a device, experts from Trend Micro highlight.

The sample studied by Trend Micro downloads a Zeus Trojan variant, TSPY_ZBOT.YYKE, which sequentially downloads a Necurs version, RTKT_NECURS.RBC.

Read more... - Spam Emails Imperson...
 
18 Million E-mail Accounts Compromised in Germany which Worst in History of Germany PDF Print E-mail
Written by Administrator   
Monday, 14 April 2014 07:00

ZDNet reported on 4th April, 2014 stating that authorities of Verden city of Germany apparently discovered one of the country's largest cases of identity theft consisting 18 million email addresses with their stolen passwords.

The public prosecutor of the city has asked Federal Office for Information Security (BSI), which is country's IT watchdog, to help in notifying the affected users about the breach.

According to BSI, stolen identities were discovered in context to an investigation into a botnet which is being used to send spam emails from stolen email addresses. BSI issued a statement confirming that the botnet is still in operation and stolen identities are being actively exploited.

Out of 18 million affected email users, it is initially estimated that around 3 million accounts contain the .de German country extension and the balanced 15 million accounts belong to users around the world.

Ann7.com published news on 4th April, 2014 quoting Harald Neymanns, Spokesman of Interior Ministry, as saying "providers of German email should straightforwardly warn clients whose accounts have been breached."

He said that prosecutors discovered the list on 27th March, 2014.

BSI launched a website in German language only in January 2014 where email users could verify if their addresses had been hijacked after an earlier robbery of 16 million passwords which happened in January 2014.

Its server was almost beleaguered in January 2014 when millions of clients tried to find if they were sufferers of the unscrupulous attack. The Spiegel Online news website or www.spiegel.de, one of Germany's top news website, suspected the involvement of the same gang of hackers in both thefts in January 2014 and latest one. In January 2014, it was suggested that cybercriminals were stationed in a Baltic state.

Although reports have not clarified whether this attack was used to spread malware but there is always a possibility of it. For example, an attacker could log on to a compromised account and send malicious attachment or link to all contacts in mailing list of the hijacked account. Users should be careful and should use well updated anti-virus software to protect against such attack.

Read more... - 18 Million E-mail Ac...
 
Hackers Hold Seven Year Old Family Photos for Ransom PDF Print E-mail
Written by Administrator   
Monday, 14 April 2014 07:00

Wnct.com reported on 7th April, 2014 stating that computer hacker trapped seven years old photos of Loretta Barbee, resident of Spring Hill, Florida, US inside her computer for ransom.

Initially hackers sent a message demanding $500 and after four days, the ransom was increased to $1000. The hackers threaten to destroy the encryption code in case she does not pay soon.

Wnct.com reported on 4th April, 2014 quoting Barbee as saying "they don't want to pay money to scammers because they are not sure that crooks would return them their photos even after getting money."

Tom Perricone, President of Shield Watch, a company that removes computer viruses, analyzed the situation of Barbee.

Wnct.com reported on 4th April, 2014 quoting Perricone as saying "the computer of Barbee is infected with CryptoLocker and there is remote chance of getting the photos back."

Perricone said that CryptoLocker runs like a business and they are not interested to keep your data as they want only cash. Actually they are willing to destroy your data to prove a point.

Perricone said that if you pay money then CryptoLocker normally releases your data and interestingly installs virus protection on your computer.

Kduz.com published news on 1st April, 2014 which states that Loretta Barbee is not the only one to be struck by the CryptoLocker in last few days but RD Machine Inc., a business house located in Michigan, US also reported data theft of worth around $240,000 after being hit by the same nasty virus.

The business house filed a police complaint according to which a message from "CryptoLocker" ransomware popped-up on their workplace computer demanding a hefty ransom of $400.

Jeff Laway, President, RD Machine Inc. said that he bought a green dot card and paid 400 USD for the data that was taken from the system for ransom. They said that they would release the data to the company only on receipt of the money. Kduz.com published news on 1st April, 2014 quoting Laway as saying that the information was not released even after giving with the ransom money.

Read more... - Hackers Hold Seven Y...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1130
Polls
The Spamproblem is
 
Who's online
We have 12 guests online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us