{"id":28579,"date":"2019-06-14T09:18:39","date_gmt":"2019-06-14T15:18:39","guid":{"rendered":"https://www.webroot.com/blog/?p=28579"},"modified":"2019-06-14T09:18:41","modified_gmt":"2019-06-14T15:18:41","slug":"cyber-news-rundown-radiohead-hit-by-ransomware-hack","status":"publish","type":"post","link":"https://www.webroot.com/blog/2019\/06\/14\/cyber-news-rundown-radiohead-hit-by-ransomware-hack\/","title":{"rendered":"Cyber News Rundown: Radiohead Hit by Ransomware Hack"},"content":{"rendered":"\n<h2>Radiohead Refuses Ransom, Releases Stolen Tracks<\/h2>\n\n\n\n<p>The band <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/radiohead-releases-ok-computer-sessions-after-hack-wont-pay-ransom\/\">Radiohead<\/a>\nrecently fell victim to a hack in which 18 hours of previously unreleased\nsessions were ransomed for $150,000. Rather than pay the ludicrous fee, the\nband instead opted to release the tracks through Bandcamp for a donation to\ncharity. The unreleased sessions were stored as archived mini discs the band\ncreated during the years surrounding their third album, \u201cOK Computer.\u201d <\/p>\n\n\n\n<h2>US Border Protection Breached by Contractor<\/h2>\n\n\n\n<p>A <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/us-customs-contractor-hack-1\/\">subcontractor<\/a>\nfor the US Customs and Border Protection (CBP) agency is under scrutiny after\nit was revealed that they had illicitly transferred thousands of images of both\nlicense plates and travelers that had crossed the US\/Mexico border in the last\nmonth. In doing so, the subcontractor broke several mandatory security policies\nwritten into a legal contract. While there is no sign of the images leaking\nonto the dark web, there is very little redress for the exposed travelers without\nproving actual harm.<\/p>\n\n\n\n<h2>Billions of Spam Emails Sent Everyday<\/h2>\n\n\n\n<p>The latest industry report on <a href=\"https:\/\/www.helpnetsecurity.com\/2019\/06\/12\/fake-emails\/\">spam emails<\/a> revealed\nthat around 3.4 billion fake\/spam emails are distributed across the globe each\nday. More worrisome is that the majority of these emails originate in the US\nand regularly target US-based industries. While many industries have improved security\nmeasures, larger enterprises have struggled to implement strong protection for\ntheir entire staff. <\/p>\n\n\n\n<h2>Ransomware Hits Washington Food Bank<\/h2>\n\n\n\n<p>The <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/food-bank-hit-by-ransomware-needs-your-charity-to-rebuild\/\">Auburn Food Bank<\/a> in the State of Washington   recently fell victim to a ransomware attack that encrypted all but one of their computers, which was isolated from the internal network. Instead of paying the ransom, the nonprofit chose to wipe all computers, including their email server, and begin rebuilding from scratch. The ransomware variant has been claimed to be GlobeImposter 2.0, which requires the victim to contact the attacker to determine the ransom demanded.<\/p>\n\n\n\n<h2>Retro Game Site Breached<\/h2>\n\n\n\n<p>The account information was leaked for over 1 million users\nof <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/data-of-1m-users-lost-in-1-1\/\">EmuParadise<\/a>,\na retro gaming site that hosts all things gaming related. The breach, which\ntook place in April of 2018, affected 1.1 million IP and email addresses, many\nof which were found in previous data breaches. It is still unclear how the\nbreach actually took place, though given the use of salted MD5 hashes for\nstoring user data it\u2019s clear EmuParadise could have done more to properly\nsecure their users information. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Radiohead Refuses Ransom, Releases Stolen Tracks The band Radiohead recently fell victim to a hack in which 18 hours of previously unreleased sessions were ransomed for $150,000. Rather than pay the ludicrous fee, the band instead opted to release the tracks through Bandcamp for a donation to charity. The unreleased sessions were stored as archived [&hellip;]<\/p>\n","protected":false},"author":47,"featured_media":28581,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[22457,21940,21943,21944],"yst_prominent_words":[],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/28579"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=28579"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/28579\/revisions"}],"predecessor-version":[{"id":28583,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/28579\/revisions\/28583"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/28581"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=28579"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=28579"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=28579"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=28579"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}