{"id":29701,"date":"2020-03-20T06:00:48","date_gmt":"2020-03-20T12:00:48","guid":{"rendered":"https://www.webroot.com/blog/?p=29701"},"modified":"2020-03-19T16:52:45","modified_gmt":"2020-03-19T22:52:45","slug":"cyber-news-rundown-ddos-strikes-u-s-health-department","status":"publish","type":"post","link":"https://www.webroot.com/blog/2020\/03\/20\/cyber-news-rundown-ddos-strikes-u-s-health-department\/","title":{"rendered":"Cyber News Rundown: DDoS Strikes U.S. Health Department"},"content":{"rendered":"\n<h2>DDoS Attack Strikes U.S. Health Department<\/h2>\n\n\n\n<p>Amidst the panic caused by the novel coronavirus, millions\nof people began navigating to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/us-health-department-site-hit-with-ddos-cyber-attack\/\">the\nU.S. Department of Health<\/a>\u2019s website to find more information on the\nillness, but instead found the site to be offline after a DDoS attack\noverwhelmed its servers. This comes as only one of many unfortunate attacks\nthat are being used to spread disinformation and panic, as well as delay\nhealthcare workers from assisting patients or working towards slowing the\noverall spread of the illness. <\/p>\n\n\n\n<h2>Netfilim Ransomware Uses Old Code but New Tactics<\/h2>\n\n\n\n<p>Researchers have been tracking the spread of a new\nransomware variant known as \u2018<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-nefilim-ransomware-threatens-to-release-victims-data\/\">Netfilim,\u2019<\/a>\nwhich has been on a steady rise since February. By utilizing a large portion of\ncode from another ransomware variant, Nemty, it has a quick distribution rate\nand keeps with the promised threat of releasing all stolen data within a week\nof encryption. It does differ from Nemty in its payment process, however, relying\nsolely on email communication rather than directing the victim to a payment\nsite that is only accessible through a Tor browser, leaving .NETFILIM as the\nappended extension for all encrypted files. <\/p>\n\n\n\n<h2>US Loan Database Exposed<\/h2>\n\n\n\n<p>A database containing millions of <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/cloud-leak-exposes-425gb-financial\/\">financial\ndocuments<\/a> and other highly sensitive information was found freely\naccessible through an unsecured Amazon web service bucket. Contained within the\n425GB of data were credit reports, Social Security numbers, and personally\nidentifiable information for thousands of individuals and small businesses. The\ndatabase itself is connected with a loan app that was developed by two major\nNew York funding firms, Advantage Capital and Argus Capital. &nbsp;<\/p>\n\n\n\n<h2>Malicious Coronavirus Mapping Apps Spreading More than Misinformation<\/h2>\n\n\n\n<p>Many malware authors have been capitalizing on the recent <a href=\"https:\/\/www.helpnetsecurity.com\/2020\/03\/16\/fake-covid-19-tracker\/\">coronavirus<\/a>\n(COVID-19) epidemic by way of phishing campaigns and newly renamed ransomware\nvariants. Their latest endeavor is an app used to reportedly \u201ctrack\u201d the spread\nof coronavirus across the globe, but has instead been dropping malicious\npayloads on unsuspecting victims\u2019 devices. Some of these apps can lock devices\nand demand a ransom to unlock it, while others deliver full ransomware payloads\nthat can encrypt and upload any files to another remote server. Fortunately,\nresearchers worked quickly to engineer up a decryption key for victims. <\/p>\n\n\n\n<h2>Magecart Group Targets NutriBullet Website<\/h2>\n\n\n\n<p>Following a network breach in late February, Magecart\nscripts were found to be actively stealing payment card information from <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/nutribullet-magecart-skimmer\/\">NutriBullet<\/a>\nwebsites up to present. The specific organization, known as Group 8, has been\nusing similar Magecart scripts for over two years and have claimed over 200\nunique victim domains. Despite several contact attempts from the researchers\nwho found the skimmers, no changes have been made to the affected sites,\nleaving current and new customers vulnerable.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DDoS Attack Strikes U.S. Health Department Amidst the panic caused by the novel coronavirus, millions of people began navigating to the U.S. Department of Health\u2019s website to find more information on the illness, but instead found the site to be offline after a DDoS attack overwhelmed its servers. This comes as only one of many [&hellip;]<\/p>\n","protected":false},"author":47,"featured_media":29703,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[22457,21940],"yst_prominent_words":[],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/29701"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=29701"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/29701\/revisions"}],"predecessor-version":[{"id":29705,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/29701\/revisions\/29705"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/29703"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=29701"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=29701"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=29701"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=29701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}