{"id":29593,"date":"2020-01-17T06:00:32","date_gmt":"2020-01-17T13:00:32","guid":{"rendered":"https://www.webroot.com/blog/?p=29593"},"modified":"2020-01-16T14:47:30","modified_gmt":"2020-01-16T21:47:30","slug":"cyber-news-rundown-ryuk-uses-wake-on-lan","status":"publish","type":"post","link":"https://www.webroot.com/blog/2020\/01\/17\/cyber-news-rundown-ryuk-uses-wake-on-lan\/","title":{"rendered":"Cyber News Rundown: Ryuk Uses Wake-on-Lan"},"content":{"rendered":"\n<h2>Ryuk Adds New Features to Increase Devastation<\/h2>\n\n\n\n<p>The latest variant of the devastating <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ryuk-ransomware-uses-wake-on-lan-to-encrypt-offline-devices\/\">Ryuk<\/a>\nransomware has been spotted with a new feature that allows it to turn on\ndevices connected to the infected network. By taking advantage of Wake-on-Lan\nfunctionality, Ryuk can is able to mount additional remote devices to further\nits encryption protocols. While it\u2019s possible to only allow such commands from\nan administrator\u2019s machine, those are also the most likely to be compromised\nsince they have the largest access base. <\/p>\n\n\n\n<p style=\"text-align:center\"><a href=\"https:\/\/www.webroot.com\/us\/en\/resources\/glossary\/what-is-ransomware\"><strong>Learn more about ransomware infections and how to protect your data from cybercrime.<\/strong><\/a><\/p>\n\n\n\n<h2>Bank Hackers Arrested Outside London<\/h2>\n\n\n\n<p>Over the course of six years, two individuals were able to\nsuccessfully hack into many hundreds of bank and phone accounts with the intent\nto <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/dagenham-duo-jailed-for-hacking\/\">commit\nfraud<\/a>. With the information they gathered, the two were also able to open\nnew credit accounts and take out significant loans to purchase extra tech\nhardware. Officials for the London Metropolitan Police have made it known that\ncybercrime is taken just as seriously as any other crime.<\/p>\n\n\n\n<h2>Cryptominer Found After Multiple BSODs<\/h2>\n\n\n\n<p>Following a series of \u201cblue screens of death\u201d (BSoDs) on a\nmedical company\u2019s network, researchers identified a <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/windows-bsod-betrays-cryptominer-hidden-in-wav-file\/\">cryptominer<\/a>\nthat spread to more than 800 machines in just a couple months. The payload, a\nMonero miner, was hidden within a WAV file that was able to migrate undetected\nto various systems before executing the payload itself. To spread efficiently,\nthe infection used the long-patched EternalBlue exploit that had not yet been\nupdated on the network in question, thus leaving them fully susceptible to\nattack.<\/p>\n\n\n\n<h2>Consulting Firm Exposes Professional Data<\/h2>\n\n\n\n<p>Thousands of business professionals from the UK have\npotentially fallen victim to a data leak by the major <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/uk-consultancies-leak-data\/\">consulting\nfirm<\/a> CHS. A server belonging to the company was found to contain passports,\ntax info, and other sensitive information that could have been archived from\nbackground checks within an unsecured Amazon Web Services bucket. While it is\nstill unclear how long the data was available, researchers who discovered the\nleak quickly contacted both CERT-UK and Amazon directly, which promptly secured\nthe server. <\/p>\n\n\n\n<h2>Western Australian Bank Breached<\/h2>\n\n\n\n<p>Over the last week officials for <a href=\"https:\/\/www.zdnet.com\/article\/p-n-bank-discloses-data-breach-customer-pii-account-information-stolen\/\">P&amp;N\nBank<\/a> in Australia have been contacting their customers concerning a data\nbreach that occurred during a server upgrade in early December. Though personally\nidentifiable information has been exposed, it doesn\u2019t appear that any accounts\nhave been illicitly accessed and relates more to a customer\u2019s contact\ninformation. A total number of affected customers has yet to be confirmed.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ryuk Adds New Features to Increase Devastation The latest variant of the devastating Ryuk ransomware has been spotted with a new feature that allows it to turn on devices connected to the infected network. By taking advantage of Wake-on-Lan functionality, Ryuk can is able to mount additional remote devices to further its encryption protocols. While [&hellip;]<\/p>\n","protected":false},"author":47,"featured_media":29595,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[21944],"yst_prominent_words":[],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/29593"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=29593"}],"version-history":[{"count":2,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/29593\/revisions"}],"predecessor-version":[{"id":29599,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/29593\/revisions\/29599"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/29595"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=29593"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=29593"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=29593"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=29593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}