{"id":20633,"date":"2017-01-06T09:58:12","date_gmt":"2017-01-06T16:58:12","guid":{"rendered":"https://www.webroot.com/blog/?p=20633"},"modified":"2018-01-30T10:27:33","modified_gmt":"2018-01-30T17:27:33","slug":"cyber-news-rundown-edition-1617","status":"publish","type":"post","link":"https://www.webroot.com/blog/2017\/01\/06\/cyber-news-rundown-edition-1617\/","title":{"rendered":"Cyber News Rundown: Edition 1\/6\/17"},"content":{"rendered":"<h5>FireCrypt Ransomware Builder Found in Wild<\/h5>\n<p>Researchers have discovered a <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/firecrypt-ransomware-comes-with-a-ddos-component\/\">new ransomware variant<\/a> that uses \u201c.firecrypt\u201d as its amended extension once encryption has taken place. FireCrypt is compiled using a command line builder software that allows varying inputs and outputs to be determined by the author for a unique hash, as this allows for better disguise by enabling the author to change the icon and executable name. Along with the usual encryption, FireCrypt also connects to the Pakistan Telecom Authority website and begins downloading all of the available content, thus filling the victims hard drive with thousands of junk files.<\/p>\n<h5>Los Angeles College Hit with Cyberattack<\/h5>\n<p>While many students are preparing to return to classes after their winter break, employees at Los Angeles Valley College are working to determine the <a href=\"http:\/\/losangeles.cbslocal.com\/2017\/01\/03\/la-valley-college-hit-by-cyber-attack\/\">severity of a cyberattack<\/a>. It is still unclear how the systems were breached or to what extent any sensitive information has been access, though officials are working with law enforcement.<\/p>\n<h5>Philippine Army Website Vandalized By Hackers<\/h5>\n<p>In the past week, the <a href=\"https:\/\/www.hackread.com\/philippine-military-website-hacked-defaced\/\">official Philippine Army website was compromised<\/a> by a hacker going by the alias, Shin0bi H4x0r. The site itself displayed several messages to any visitors, boasting about the weak security and taunting the site admins. Though the site has since been taken offline, it is still undecided how the site was breached.<\/p>\n<h5>Experts Doubtful of Russia\u2019s Part in Recent Hacking<\/h5>\n<p>With so many recent stories surrounding Russia\u2019s involvement with the recent utility grid breach in Vermont and the implied connection to the hacks that took place during the election, many security <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/01\/03\/claims-that-russia-hacked-the-us-election-and-power-grid-are-overblown\/\">researchers are unsure<\/a> how involved Russia actually is. Flaws found in the US utility services are not a secret, and officials have been working to resolve them for quite some time. While public outcry over Russia hacking the election has been very pro-America, it stands as a bit hypocritical, as the US is assuredly involved in similar tactics all across the globe.<\/p>\n<h5>Malicious Super Mario Run Apps Found on Android<\/h5>\n<p>While Super Mario Run was released for iOS in the early part of December, it has yet to hit the official Android app store for sale. Due to the release gap, many <a href=\"http:\/\/www.mobilenapps.com\/articles\/28191\/20170102\/super-mario-run-android-update-security-threats-all-users-should-consider-before-downloading.htm\">cybercriminals have been cashing in<\/a> by creating at least 9,000 known malicious versions of the app and distributing them through third-party app stores. Users are warned to avoid downloading any Super Mario Run-related apps until the official version has been released by Nintendo on the Google Play Store.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>FireCrypt Ransomware Builder Found in Wild Researchers have discovered a new ransomware variant that uses \u201c.firecrypt\u201d as its amended extension once encryption has taken place. FireCrypt is compiled using a command line builder software that allows varying inputs and outputs to be determined by the author for a unique hash, as this allows for better [&hellip;]<\/p>\n","protected":false},"author":47,"featured_media":20143,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[3775,20297,20307,20301,4469,20293,20305,20299,15889,20295,20287,3937,7771,4371,20303,20291,20289,3471,4877,5359],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/20633"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=20633"}],"version-history":[{"count":2,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/20633\/revisions"}],"predecessor-version":[{"id":20685,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/20633\/revisions\/20685"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/20143"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=20633"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=20633"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=20633"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=20633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}