{"id":28637,"date":"2019-06-21T09:27:48","date_gmt":"2019-06-21T15:27:48","guid":{"rendered":"https://www.webroot.com/blog/?p=28637"},"modified":"2019-06-21T09:27:49","modified_gmt":"2019-06-21T15:27:49","slug":"cyber-news-rundown-gps-vulnerabilities-in-tesla-vehicles","status":"publish","type":"post","link":"https://www.webroot.com/blog/2019\/06\/21\/cyber-news-rundown-gps-vulnerabilities-in-tesla-vehicles\/","title":{"rendered":"Cyber News Rundown: GPS Vulnerabilities in Tesla Vehicles"},"content":{"rendered":"\n<h2>Multiple Tesla Models Vulnerable to GPS Attacks<\/h2>\n\n\n\n<p>Though it\u2019s not the only manufacturer to offer <a href=\"https:\/\/www.helpnetsecurity.com\/2019\/06\/19\/tesla-gps-spoofing-attacks\/\">GPS\nnavigation<\/a> in their vehicles, Tesla has once again suffered an attack on\ntheir GPS autopilot features. These attacks were able to trick the car into\nthinking it had arrived at an off-ramp more than two miles early, causing it to\nstart to merge and eventually turn off the road entirely, even with a driver\nattempting to stop the action. Using off-the-shelf products, the test\nconductors were able to gain control of Tesla\u2019s GPS in less than a minute. <\/p>\n\n\n\n<h2>Oregon DHS Successfully Phished<\/h2>\n\n\n\n<p>The personally identifiable information for at least 645,000\n<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/phishing-attack-exposes-data-of-645-000-oregon-dhs-clients\/\">Oregon\nDepartment of Human Services<\/a> (DHS) patients was illicitly accessed after a\nsuccessful phishing attack on nine DHS employees. The attack allowed the\nhackers to obtain 2 million emails from the accounts, which contained\neverything from names and birthdates to social security numbers and\nconfidential health information. Fortunately, the DHS issued a password reset\nshortly after the initial breach that stopped the attackers from getting any\nfurther and began contacting potential victims of the attack.<\/p>\n\n\n\n<h2>IP and Computer Blacklisting in New Ryuk Variant<\/h2>\n\n\n\n<p>The latest variant of the <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ryuk-ransomware-adds-ip-and-computer-name-blacklisting\/\">Ryuk\nransomware<\/a> includes an IP blacklist and a computer name check prior to\nbeginning encryption. The IPs and computer name strings were likely implemented\nto stop any encryption of Russian computer systems. After these checks, the\nransomware continues as normal using .RYK as the appended file extension and a\nransom note that points victims to make payments to one of two proton mail\naccounts. <\/p>\n\n\n\n<h2>EatStreet Ordering Services Breached<\/h2>\n\n\n\n<p>A data breach is affecting the food ordering service <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/hackers-gobble-data-eatstreet-1\/\">EatStreet<\/a>\nand possibly all of its 15,000 partnered restaurants. Payment card information\nfor millions of customers using the app, along with some banking information\nfor the 15,000 business partners, is believed to have been compromised in the\nbreach. Though EatStreet quickly began improving their security and\nimplementing multi-factor authentication following the breach, the damage was\nalready done.<\/p>\n\n\n\n<h2>Fake System Cleaners on the Rise<\/h2>\n\n\n\n<p>While&nbsp;<a href=\"https:\/\/www.infosecurity-magazine.com\/news\/millions-fall-victim-to-system-1\/\">phony\nsystem cleaner apps<\/a> have been common for many years, a recent study shows\nthat user numbers for these apps has doubled from the same time last year to\nnearly 1.5 million. These apps often appear innocent and helpful at the outset,\nwhile others have begun taking an outright malicious approach. To make matters\nworse, these apps are commonly installed to fix the very issues they later\ncreate by slowing the computer down and causing annoying popups.&nbsp; <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Multiple Tesla Models Vulnerable to GPS Attacks Though it\u2019s not the only manufacturer to offer GPS navigation in their vehicles, Tesla has once again suffered an attack on their GPS autopilot features. These attacks were able to trick the car into thinking it had arrived at an off-ramp more than two miles early, causing it [&hellip;]<\/p>\n","protected":false},"author":47,"featured_media":28639,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[22457,21940,21943],"yst_prominent_words":[],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/28637"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=28637"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/28637\/revisions"}],"predecessor-version":[{"id":28641,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/28637\/revisions\/28641"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/28639"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=28637"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=28637"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=28637"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=28637"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}