{"id":30005,"date":"2020-06-03T10:37:11","date_gmt":"2020-06-03T16:37:11","guid":{"rendered":"https://www.webroot.com/blog/?p=30005"},"modified":"2020-06-03T10:37:14","modified_gmt":"2020-06-03T16:37:14","slug":"cyber-news-rundown-bank-of-america-breach-reveals-ppp-info","status":"publish","type":"post","link":"https://www.webroot.com/blog/2020\/06\/03\/cyber-news-rundown-bank-of-america-breach-reveals-ppp-info\/","title":{"rendered":"Cyber News Rundown: Bank of America Breach Reveals PPP Info"},"content":{"rendered":"\n<h2>Bank of America Breach Reveals PPP Information<\/h2>\n\n\n\n<p>After processing over 300,000 Paycheck Protection Program\napplications, <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/data-breach-at-bank-of-america\/\">Bank\nof America<\/a> has revealed that a data breach occurred within the U.S. Small\nBusiness Administration\u2019s program that allowed all other SBA-authorized lenders\nto view highly sensitive data. The data includes tax information and social\nsecurity numbers relating to both businesses and their owners and could have\nextremely devastating effects in the wrong hands. Fortunately, the SBA secured\nthe compromised data within a day of being notified and Bank of America has\nreached out to affected customers offering of two years of identity theft\nprotection. null<\/p>\n\n\n\n<h2>Bank of Costa Rica Suffers Data Breach<\/h2>\n\n\n\n<p>Threat actors working for the Maze group recently claimed to\nhave belonging to millions of <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-leak-credit-card-info-from-costa-ricas-state-bank\/\">Bank\nof Costa Rica<\/a> customer accounts, a claim that was quickly refuted by the\nbank itself. Within a week, Maze began publishing proof of their bounty and\npromised to continue posting records if the bank fails to improve their current\nsecurity. Maze also claimed to have accessed the bank\u2019s systems on multiple\noccasions to determine if security had improved but chose not to encrypt their\nsystems as the second breach occurred during the COVID-19 pandemic. <\/p>\n\n\n\n<h2>Old LiveJournal Breach Data Re-emerges<\/h2>\n\n\n\n<p>Researchers have been looking into a recent data dump that\nappears to have originated from the 2014 <a href=\"https:\/\/www.helpnetsecurity.com\/2020\/05\/27\/livejournal-data-dump\/\">LiveJournal<\/a>\nbreach and contains over 33 million records up to 2017. It is hard to precisely\ndate the breach, as LiveJournal is a Russian-owned journaling service and never\nreported it, though many LiveJournal users were targeted in a past spam\nextortion email campaign. More recently, users of Dreamwidth, which shares the\nLiveJournal codebase, has seen reports of compromised accounts. <\/p>\n\n\n\n<h2>Turla Hackers Grabbing Antivirus Logs to Check for Detection<\/h2>\n\n\n\n<p>One of the largest state-sponsored hacker groups, <a href=\"https:\/\/www.zdnet.com\/article\/turla-hacker-group-steals-antivirus-logs-to-see-if-its-malware-was-detected\/\">Turla<\/a>,\nhas turned their attention to accessing antivirus logs on infected systems to\ndetermine if their malicious activity has been discovered. With the use of\nComRAT V1 (and later versions), Turla has been gaining highly sensitive\ninformation from major national organizations for over a decade and continues\nto improve on their methods. By viewing the logs created by local antivirus\nsoftware, the attackers can adjust more quickly to avoid future detections. <\/p>\n\n\n\n<h2>New COVID-19 Tracker Drops [F]Unicorn Ransomware<\/h2>\n\n\n\n<p>The latest to capitalize on the public\u2019s pandemic fears, a\nnew fake COVID-19 tracing app has been targeting systems in Italy by dropping a\nnew ransomware variant dubbed <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-f-unicorn-ransomware-hits-italy-via-fake-covid-19-infection-map\/#.Xs1UQOQQsv8.twitter\">[F]Unicorn<\/a>.\nThe malicious payload comes disguised as a file from the Italian Pharmacist\nFederation. It then directs the victim to a beta version of the\nyet-to-be-released Immuni tracing app, showing a fake tracing dashboard as the\nencryption process begins. The ransomware demands a 300-Euro payment but displays\nan invalid email address, so users would be unable to prove payment to the\nattackers even if they choose to pay. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bank of America Breach Reveals PPP Information After processing over 300,000 Paycheck Protection Program applications, Bank of America has revealed that a data breach occurred within the U.S. Small Business Administration\u2019s program that allowed all other SBA-authorized lenders to view highly sensitive data. The data includes tax information and social security numbers relating to both [&hellip;]<\/p>\n","protected":false},"author":47,"featured_media":30007,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[22457],"yst_prominent_words":[],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/30005"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=30005"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/30005\/revisions"}],"predecessor-version":[{"id":30009,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/30005\/revisions\/30009"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/30007"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=30005"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=30005"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=30005"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=30005"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}