{"id":29533,"date":"2019-12-13T06:00:53","date_gmt":"2019-12-13T13:00:53","guid":{"rendered":"https://www.webroot.com/blog/?p=29533"},"modified":"2019-12-12T13:20:39","modified_gmt":"2019-12-12T20:20:39","slug":"cyber-news-rundown-zeppelin-ransomware","status":"publish","type":"post","link":"https://www.webroot.com/blog/2019\/12\/13\/cyber-news-rundown-zeppelin-ransomware\/","title":{"rendered":"Cyber News Rundown: Zeppelin Ransomware"},"content":{"rendered":"\n<h2>Zeppelin Ransomware Spreading<\/h2>\n\n\n\n<p>Over the last month, researchers have been monitoring the\nspread of a new ransomware variant, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/zeppelin-ransomware-targets-healthcare-and-it-companies\/\">Zeppelin<\/a>.\nThis is the latest version of the ransomware-as-a-service that started life as\nVegaLocker\/Buran and has differentiated itself by focusing on healthcare and IT\norganizations in both the U.S. and Europe. This variant is unique in that\nextensions are not appended, but rather a file marker called Zeppelin can be\nfound when viewing encrypted files in a hex editor. <\/p>\n\n\n\n<h2>German ISP Faces Major GDPR Fine<\/h2>\n\n\n\n<p>The German <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/isp-11-hit-with-96-million-gdpr\/\">internet\nservice provider (ISP) 1&amp;1<\/a> was recently fined for failing to protect\nthe identity of customers who were reaching out to their call centers for\nsupport. While the incident took place in 2018, GDPR is clear about imposing\nfines for organizations that haven\u2019t met security standards, even if retroactive\nchanges were made. 1&amp;1 is attempting to appeal the fines and has begun\nimplementing a new authentication process for confirming customers\u2019 identities\nover the phone. <\/p>\n\n\n\n<h2>Turkish Credit Card Dump<\/h2>\n\n\n\n<p>Nearly half a million payment cards belonging to <a href=\"https:\/\/www.zdnet.com\/article\/455000-turkish-card-details-put-up-for-sale-web-skimmers-suspected\/\">Turkish\nresidents<\/a> were found in a data dump on a known illicit card selling site.\nThe cards in question are both credit and debit cards and were issued by a variety\nof banking institutions across Turkey. This likely means that a mediating\npayment handler was the source of the leak, rather than a specific bank. Even\nmore worrisome, the card dump contained full details on the cardholders,\nincluding expiration dates, CVVs, and names; everything a hacker would need to\nmake fraudulent purchases or commit identify theft.<\/p>\n\n\n\n<h2>Pensacola Ransomware Attack<\/h2>\n\n\n\n<p>The city of <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/maze-ransomware-behind-pensacola-cyberattack-1m-ransom-demand\/?fbclid=IwAR0PM3_f0M5RIoYOi87Xfu218wjhSrLQ0utcVdGgcSLspVrW3qOTlFPjdqY\">Pensacola,\nFlorida<\/a> was a recent victim of a ransomware attack that stole, then\nencrypted their entire network before demanding $1 million ransom. In an\nunusual message, the authors of the Maze ransomware used explicitly stated that\nthey had no connection to the recent shootings at the Pensacola Naval Base, nor\nwere they targeting emergency services with their cyberattack. <\/p>\n\n\n\n<h2>Birth Certificate Data Leak<\/h2>\n\n\n\n<p>An unnamed organization that provides <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/data-leak-exposes-750k-birth-cert\/\">birth\ncertificate services<\/a> to U.S. citizens was contacted earlier this week in\nregard to a data leak of nearly 750,000 birth certificate applications. Within\nthe applications was sensitive information for both the child applicant and\ntheir family members, which is highly sought after by scammers because it is\nrelatively easy to open credit accounts for children with no prior credit\nhistory. Researchers are still waiting to hear back from the organization after\nfinding this data dump in an unsecured Amazon Web Services bin. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Zeppelin Ransomware Spreading Over the last month, researchers have been monitoring the spread of a new ransomware variant, Zeppelin. This is the latest version of the ransomware-as-a-service that started life as VegaLocker\/Buran and has differentiated itself by focusing on healthcare and IT organizations in both the U.S. and Europe. This variant is unique in that [&hellip;]<\/p>\n","protected":false},"author":47,"featured_media":29537,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/29533"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=29533"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/29533\/revisions"}],"predecessor-version":[{"id":29535,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/29533\/revisions\/29535"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/29537"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=29533"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=29533"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=29533"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=29533"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}