{"id":30059,"date":"2020-06-19T06:00:11","date_gmt":"2020-06-19T12:00:11","guid":{"rendered":"https://www.webroot.com/blog/?p=30059"},"modified":"2020-06-18T09:58:38","modified_gmt":"2020-06-18T15:58:38","slug":"cyber-news-rundown-knoxville-rocked-by-ransomware","status":"publish","type":"post","link":"https://www.webroot.com/blog/2020\/06\/19\/cyber-news-rundown-knoxville-rocked-by-ransomware\/","title":{"rendered":"Cyber News Rundown: Knoxville Rocked by Ransomware"},"content":{"rendered":"\n<h2>Ransomware Knocks Out Knoxville, TN<\/h2>\n\n\n\n<p><a href=\"https:\/\/arstechnica.com\/information-technology\/2020\/06\/knoxville-shuts-down-parts-of-its-network-after-being-hit-by-ransomware\/\">Knoxville,\nTennessee<\/a> officials have been working over the past week to secure systems\nand determine if any sensitive information was stolen after a ransomware attack\nwas identified. Fortunately, city IT staff were able to quickly implement security\nprotocols and shut down critical systems before the infection could spread.\nWithin the day, many of the targeted city domains were redirected to new sites,\nallowing city services to operate normally. <\/p>\n\n\n\n<h2>Magecart Attacks Multiple Online Retailers <\/h2>\n\n\n\n<p>Malicious <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/magecart-attackers-target-retail\/\">Magecart<\/a>\nscripts have been identified in recent months on multiple domains belonging to\nonline retailers. Following the registration of a fake domain related to\nClaire\u2019s in March, several weeks of inactivity passed before code was again spotted\non Claire\u2019s websites being used to intercept payment card transactions. It was\nfinally removed from the company\u2019s domains in the second week of June, but not\nbefore leaving thousands of customers potentially compromised. <\/p>\n\n\n\n<h2>Maze Ransomware Infiltrates US Chipmaker<\/h2>\n\n\n\n<p>The computer systems of <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/chipmaker-maxlinear-reports-data-breach-after-maze-ransomware-attack\/\">MaxLinear<\/a>,\na U.S. computer chip maker suffered a Maze ransomware attack that forced them\nto take their remaining systems offline. Officials discovered that for more\nthan a month there was unauthorized access resulting in the leak of over 10GB\nof stolen data from an alleged trove of over 1TB of total data. MaxLinear has\nsince refused to pay the ransom and been in contact with affected customers.\nThe manufacturer does not believe future operations will be delayed. <\/p>\n\n\n\n<h2>Over 100 NHS Email Accounts Compromised<\/h2>\n\n\n\n<p>Within the last two weeks a phishing campaign hit the <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/nhs-100-email-accounts-hijacked\/\">National\nHealth Service<\/a> (NHS), successfully accessing over 100 internal email\naccounts. The affected accounts make up an extremely small portion of total NHS\nemail accounts, of which there are nearly 1.4 million in total. The hacked accounts\nwere used to distribute a malicious spam campaign designed to steal credentials\nthrough a fake login page.<\/p>\n\n\n\n<h2>DraftKings Announces Ransomware Attack Amidst Merger<\/h2>\n\n\n\n<p>Following the multi-way merger that resulted in the\nformation of <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/draftkings-discloses-sbtech-ransomware-attack-in-sec-filing\/\">DraftKings\nInc.<\/a>, DraftKings revealed that one of the subsidiaries, SBTech, suffered a\nransomware attack within weeks of the merger being finalized. While it is still\nnot known what variant of ransomware was used in the cyberattack, officials\nhave determined that no information was compromised. Rather, the attack was\nfocused on taking their online systems down. Though SBTech was required to\ncreate a significant emergency fund preceding the merger, the deal seems to\nhave been unaffected by the attack.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware Knocks Out Knoxville, TN Knoxville, Tennessee officials have been working over the past week to secure systems and determine if any sensitive information was stolen after a ransomware attack was identified. Fortunately, city IT staff were able to quickly implement security protocols and shut down critical systems before the infection could spread. Within the [&hellip;]<\/p>\n","protected":false},"author":47,"featured_media":30061,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[21944],"yst_prominent_words":[],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/30059"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=30059"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/30059\/revisions"}],"predecessor-version":[{"id":30063,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/30059\/revisions\/30063"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/30061"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=30059"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=30059"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=30059"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=30059"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}