{"id":24008,"date":"2018-02-22T16:45:32","date_gmt":"2018-02-22T23:45:32","guid":{"rendered":"http:\/\/blogdev.services.webroot\/?p=24008"},"modified":"2018-02-23T09:35:38","modified_gmt":"2018-02-23T16:35:38","slug":"cyber-news-rundown-edition-2-23-18","status":"publish","type":"post","link":"https://www.webroot.com/blog/2018\/02\/22\/cyber-news-rundown-edition-2-23-18\/","title":{"rendered":"Cyber News Rundown: Linux OS Hacked onto Nintendo Switch"},"content":{"rendered":"<p>The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I\u2019m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for all things security. Any questions? Just ask.<\/p>\n<h3>Hackers Run Linux OS On Nintendo Switch<\/h3>\n<p>When gaming consoles get hacked, it\u2019s usually by someone who wants to play pirated games. Not this time. Recently, <a class=\"inline-twitter-link inline-tweet-click\" href=\"#\" onclick=\"window.open('https:\/\/twitter.com\/intent\/tweet?url=http:\/\/wbrt.io\/q8vrj&amp;text=A group of hackers found an exploit that allowed them to deploy a full Linux OS onto the Nintendo Switch.%E2%80%94via+%40Webroot','mywindow','location=1,status=1,scrollbars=1, width=700,height=500');\" title=\"Tweet This!\">a group of hackers found an exploit that allowed them to deploy a full Linux OS onto the Nintendo Switch.<span class=\"dashicons dashicons-twitter dashicons-inline-tweet-sharer\"><\/span><\/a> The flaw is contained within the <a href=\"https:\/\/www.hackread.com\/hackers-exploiting-tegra-chipset-flaw-run-linux-os-on-nintendo-switch\/\">specific Tegra X1 chips<\/a> used by the Switch for core functionality. These are not easily patched and would likely require a recall if the flaw becomes a major problem.<\/p>\n<h3>California Employee Data Breach<\/h3>\n<p>Employees working in the Department of Fish and Wildlife for California were recently notified that their Social Security numbers had been <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/sensitive-california-state-data\/\">exposed in a data breach<\/a> from late last year. The breach appears to have stemmed from a former employee downloading the data and removing it from the premises, prior to having left the company. This type of breach is extremely common, as many companies don\u2019t enforce more strict data policies for current and former employees.<\/p>\n<h3>Facebook Bug Spams Users With 2FA System<\/h3>\n<p>In the last week or so, several Facebook users have taken to other social media platforms to announce a nearly endless stream of spam being sent to the phone numbers they had used for 2-factor authentication. The spam then <a href=\"https:\/\/nakedsecurity.sophos.com\/2018\/02\/16\/facebook-accused-of-spamming-2fa-phone-numbers\/\">began posting the user\u2019s replies<\/a> to their Facebook wall, even after multiple attempts to stop the messages. While Facebook has since resolved the issue, they have remained vague about when they\u2019ll finally discontinue the program functionality that caused the issue in the first place.<\/p>\n<p><a href=\"http:\/\/wbrt.io\/25g8y\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-22339 alignnone\" src=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2017\/09\/Dont-Get-Hacked_698x232.jpg\" alt=\"Don't Get Hacked\" width=\"698\" height=\"232\" srcset=\"https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2017\/09\/Dont-Get-Hacked_698x232.jpg 698w, https:\/\/blog-en.webroot.com\/wp-content\/uploads\/2017\/09\/Dont-Get-Hacked_698x232-768x255.jpg 768w\" sizes=\"(max-width: 698px) 100vw, 698px\" \/><\/a><\/p>\n<h3>Crypto-miners Found on Tesla Servers<\/h3>\n<p>Following the breach of Tesla\u2019s cloud server last year, company engineers have been discovering cryptocurrency miners on several of their internal servers. The initial breach occurred because their Kubernetes console <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/tesla-internal-servers-infected-with-cryptocurrency-miner\/\">lacked a password<\/a>, and, once in, the hackers set up a complex mining operation that used multiple techniques to avoid detection.<\/p>\n<h3>FedEx Breach Exposes Personal Information<\/h3>\n<p>Over the last few days, officials have confirmed that over <a href=\"https:\/\/www.itworldcanada.com\/article\/scanned-canadian-passports-found-on-open-fedex-amazon-s3-bucket\/402010\">119,000 individual forms<\/a> of scanned identification belonging to Bongo International, an international sales broker that was bought by FedEx in 2014, were left exposed to the public. The data, which was found on an Amazon S3 server, was likely forgotten about amidst the acquisition and was available for an unknown amount of time.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Cyber News Rundown brings you the latest happenings in cybersecurity news weekly. Who am I? I\u2019m Connor Madsen, a Webroot Threat Research Analyst and a guy with a passion for all things security. Any questions? Just ask. Hackers Run Linux OS On Nintendo Switch When gaming consoles get hacked, it\u2019s usually by someone who [&hellip;]<\/p>\n","protected":false},"author":47,"featured_media":24009,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[4965,21888,3769,6465,7913,7909,4497,15553,4469,10247,4463,11883,21887,4801,21889,21886,11167,3479,21105,3777],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/24008"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=24008"}],"version-history":[{"count":4,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/24008\/revisions"}],"predecessor-version":[{"id":24015,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/24008\/revisions\/24015"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/24009"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=24008"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=24008"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=24008"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=24008"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}