{"id":30205,"date":"2020-07-24T11:47:58","date_gmt":"2020-07-24T17:47:58","guid":{"rendered":"https://www.webroot.com/blog/?p=30205"},"modified":"2020-07-24T11:47:59","modified_gmt":"2020-07-24T17:47:59","slug":"cyber-news-rundown-atm-jackpotting-attacks-rise","status":"publish","type":"post","link":"https://www.webroot.com/blog/2020\/07\/24\/cyber-news-rundown-atm-jackpotting-attacks-rise\/","title":{"rendered":"Cyber News Rundown: ATM Jackpotting Attacks Rise"},"content":{"rendered":"\n<h2>ATM Jackpotting Attacks on the Rise<\/h2>\n\n\n\n<p>ATM manufacturer <a href=\"https:\/\/arstechnica.com\/information-technology\/2020\/07\/crooks-are-using-a-new-way-to-jackpot-atms-made-by-diebold\/\">Diebold\nNixdorf<\/a> has identified a malicious campaign that uses proprietary software to\n\u201cjackpot\u201d the machines. The attack requires malicious actors to breach the ATM\nmanually and then use the software to force the machine to dispense cash at a\nrapid rate, known within the industry as jackpotting. While these attacks don\u2019t\nseem to affect customer data or finances, the company is unsure how the\nattackers obtained the proprietary software used in the scam. <\/p>\n\n\n\n<h2>Ransomware Locks Down Telecom Argentina<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.infosecurity-magazine.com\/news\/telecom-argentina-tuesday-75\/\">Telecom\nArgentina<\/a> is being extorted for over $7.5 million following a ransomware\nattack last week. The hacker group REvil is believed to be behind the attack,\nwhich may mean the stolen data is set to be posted on the group\u2019s auction site.\nOfficials are still unsure of how the intrusion occurred, but it\u2019s likely to\nhave stemmed from a compromised remote access point.<\/p>\n\n\n\n<h2>Maryland Health Services Breach Affects Thousands<\/h2>\n\n\n\n<p>More than 40,000 individuals may have had personal\ninformation leaked after a ransomware attack on <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/lorien-health-services-discloses-ransomware-attack-affecting-nearly-50-000\/\">Lorien\nHealth Services<\/a> in Maryland. The breach was discovered in June, but after\nthe healthcare provider refused to pay the ransom the hackers began publishing\nthe stolen data, which includes Social Security Numbers and other highly\nsensitive information. Lorien was quick to notify affected clients and had\nbegun offering credit monitoring services to those affected within two days of\nthe attack being confirmed.<\/p>\n\n\n\n<h2>University of York Data Breach<\/h2>\n\n\n\n<p>The <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/university-york-investigating\/\">University\nof York<\/a> in the UK has learned of a data breach that occurred in May and\ncould affect a considerable number of students and staff. The breach itself was\nenabled by a third-party service provider and contained personally identifiable\ninformation on an unknown number of victims. While there is little the university\ncan do to contain this type of attack, it comes as another reminder of the\nimportance of supply chain data security and the knock-on effect of such\nattacks. <\/p>\n\n\n\n<h2>Meow Attacks Target Vulnerable Databases<\/h2>\n\n\n\n<p>\n\nDozens of unsecured databases from Elasticsearch\nand MongoDB were wiped in a new malicious campaign that seems to attack\nindiscriminately. Discovered within the last week, the <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-meow-attack-has-wiped-dozens-of-unsecured-databases\/\">Meow<\/a>\nattacks as they\u2019re known appear to use an automated script to overwrite any\ndata in vulnerable databases and destroy any remaining data. This string of\nattacks may encourage stronger security policies among previously lax database\nadministrators, but the lesson is costly for affected businesses.\n\n\n\n<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ATM Jackpotting Attacks on the Rise ATM manufacturer Diebold Nixdorf has identified a malicious campaign that uses proprietary software to \u201cjackpot\u201d the machines. The attack requires malicious actors to breach the ATM manually and then use the software to force the machine to dispense cash at a rapid rate, known within the industry as jackpotting. [&hellip;]<\/p>\n","protected":false},"author":47,"featured_media":30207,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[22457,21944],"yst_prominent_words":[],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/30205"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=30205"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/30205\/revisions"}],"predecessor-version":[{"id":30209,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/30205\/revisions\/30209"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/30207"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=30205"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=30205"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=30205"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=30205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}