Bitdefender Completes Acquisition of Horangi Cyber Security
logo

EN

Products +

Services +

Customers +

Partners +

Resources +

All in it, Hamburger News - July 2018

Have no time to read multiple cybersecurity articles? Yes, we have prepared the perfect sauce source for you.

Have no time to read multiple security articles? Yes, we have prepared the perfect sauce source for you.

Cryptocurrency Malware doubled from 2017

image source: sputnik international

Malware has always been a prevalent issue in technology. However, not only normal malware but recently, crypto-mining malware has been increasingly concerning. Compared to 2017, the number of crypto-mining malwares have doubled in the first six months of this 2018. The top three most common malwares discovered in 2018 are also cryptocurrency mining malwares.

 

Worse than Equifax data breach

image source : https://securereading.com/personal-records-of-340-million-people-exposed-in-exactis-breach/

You may think that Equifax was phenomenal, but here is an even worse scenario. Last year, Hackers stole personal information of over 143 million Americans. Exactis, a Florida based marketing firm revealed that over 340 million credentials have been leaked. This is considered one of the largest data leaks in history, with approximately 2 terabytes worth of data. Regardless of size, exposing credentials to the public seems to be happening more frequently.

 

Massive cyber attacks happened during Putin-Trump summit

image source : https://www.reuters.com/article/us-usa-russia-backlash-analysis/for-russian-business-putins-summit-win-over-trump-turns-sour-idUSKBN1KF2LD

Similar to US-NK summit, massive cyber attacks targeting IoT devices happened while President Donald Trump’s meeting with Russian counterpart Vladmir Putin.

These attacks appeared in Finland were mainly attempted to break IoT Devices to be used to spy. It targeted ports and protocols used by IoT devices, such as SIP port 5060. This port is associated with VoIP phones and video conferencing systems. Also, for gaining remote administration of IoT devices, SQL port 1433 and Telnet port 23 were targeted.

 

This issue shows how it is important for enterprises and organisations to secure all internet connected infrastructure from rack-mounted servers. Once any vulnerabilities are detected by criminals, it will be easily targeted to approach to security cameras, wireless access points, phone and so on.

Don’t forget changing your default vendor passwords and regularly patching! Easy things make you be more secure.

 

Who is stealing coins from cryptocurrency exchange website?

image source : https://technojudge.com/bitcoin-breach-64m-in-cryptocurrency-stolen/

You may know that Cryptocurrency exchange website Bithumb has been hacked and lost more than 30 M coins. However, some cyber experts said this might be caused by North Korea cyber criminals Lazarus. Researcher suspected there is connection between the most recent Lazarus Group’s attempts. These criminals are also believed to be responsible for the attempted theft of USD 1 Billion from the Bank of Bangladesh. Common accidents caused by Lazarus usually based on phishing emails, so please be aware of clicking any suspicious emails.

 

Jiyeon Kong
Jiyeon Kong

Customer Success Manager | Horangi

Subscribe to the Horangi Newsletter.

Be the first to hear about Horangi's upcoming webinars and events, up-and-coming cyber threats, new solutions, and the future of cybersecurity from our tech experts.