Kerbs on Security

Trump’s Dumps: ‘Making Dumps Great Again’

3 days 15 hours ago
It's not uncommon for crooks who peddle stolen credit cards to seize on iconic American figures of wealth and power in the digital advertisements for these shops that run continuously on various cybercrime forums. Exhibit A: McDumpals, a hugely popular carding site that borrows the Ronald McDonald character from McDonald's and caters to bulk buyers. Exhibit B: Uncle Sam's dumps shop, which wants YOU! to buy American. Today, we'll look at an up and coming credit card shop called Trump's-Dumps, which invokes 45's likeness and promises to "make credit card fraud great again."
BrianKrebs

MolinaHealthcare.com Exposed Patient Records

4 days 1 hour ago
Earlier this month, KrebsOnSecurity featured a story about a basic security flaw in the Web site of medical diagnostics firm True Health Group that let anyone who was logged in to the site view all other patient records. In that story I mentioned True Health was one of three major healthcare providers with similar website problems, and that the other two providers didn't even require a login to view all patient records. Today we'll examine such a flaw that was just fixed by Molina Healthcare, a Fortune 500 company that until recently was exposing countless patient medical claims to the entire Internet without requiring any authentication.
BrianKrebs

Should SaaS Companies Publish Customers Lists?

6 days 22 hours ago
A few weeks back, HR and financial management firm Workday.com sent a security advisory to customers warning that crooks were sending targeted malware phishing attacks at customers. At the same time, Workday is publishing on its site a list of more than 800 companies that use its services, making it relatively simple for attackers to chose their […]
BrianKrebs

Private Eye Allegedly Used Leaky Goverment Tool in Bid to Find Tax Data on Trump

6 days 23 hours ago
In March 2017, KrebsOnSecurity warned that thieves who perpetrate tax refund fraud with the U.S. Internal Revenue Service were leveraging a widely-used online student loan tool to find critical data on consumers that allows them to claim huge refunds with the IRS in someone else's name. This week, it emerged that a Louisiana-based private investigator is being charged with using the same online tool to glean tax data on then-presidential candidate Donald J. Trump. A story today at Diverseeducation.com points to court filings in the U.S. District Court for the Middle District of Louisiana, in which local private eye Jordan Hamlett is accused by federal prosecutors of abusing an automated tool at the U.S. Department of Education website that is designed to make it easier for families to complete the Education Department’s Free Application for Federal Student Aid (FAFSA) — a lengthy form that serves as the starting point for students seeking federal financial assistance to pay for college or career school.
BrianKrebs

Fraudsters Exploited Lax Security at Equifax’s TALX Payroll Division

1 week 3 days ago
Identity thieves who specialize in tax refund fraud had big help this past tax year from Equifax, one of the nation's largest consumer data brokers and credit bureaus. The trouble stems from TALX, an Equifax subsidiary that provides online payroll, HR and tax services. Equifax says crooks were able to reset the 4-digit PIN given to customer employees as a password and then steal W-2 tax data after successfully answering personal questions about those employees. In a boilerplate text sent to several affected customers, Equifax said the unauthorized access to customers' employee tax records happened between April 17, 2016 and March 29, 2017. Beyond that, the extent of the fraud perpetrated with the help of hacked TALX accounts is unclear, and Equifax refused requests to say how many consumers or payroll service customers may have been impacted by the authentication weaknesses.
BrianKrebs

Breach at DocuSign Led to Targeted Email Malware Campaign

1 week 6 days ago
DocuSign, a major provider of electronic signature technology, acknowledged today that a series of recent malware phishing attacks targeting its customers and users was the result of a data breach at one of its computer systems. The company stresses that the data stolen was limited to customer and user email addresses, but the incident is especially dangerous because it allows attackers to target users who may already be expecting to click on links in emails from DocuSign.
BrianKrebs

Global ‘Wana’ Ransomware Outbreak Earned Perpetrators $26,000 So Far

2 weeks 1 day ago
As thousands of organizations work to contain and clean up the mess from this week’s devastating Wana ransomware attack, the fraudsters responsible for releasing the digital contagion are no doubt counting their earnings and congratulating themselves on a job well done. But according to a review of the Bitcoin addresses hard-coded into Wana, it appears the perpetrators of what’s being called the worst ransomware outbreak ever have made little more than USD $26,000 so far from the scam.
BrianKrebs

Microsoft Issues WanaCrypt Patch for Windows 8, XP

2 weeks 2 days ago
Microsoft Corp. today took the unusual step of issuing security updates to address flaws in older, unsupported versions of Windows -- including Windows XP and Windows 8. The move is a bid to slow the spread of the WanaCrypt ransomware strain that infected tens of thousands of Windows computers virtually overnight this week.
BrianKrebs

U.K. Hospitals Hit in Widespread Ransomware Attack

2 weeks 3 days ago
At least 16 hospitals in the United Kingdom are being forced to divert emergency patients today after computer systems there were infected with ransomware, a type of malicious software that encrypts a victim's documents, images, music and other files unless the victim pays for a key to unlock them. It remains unclear exactly how this ransomware strain is being disseminated and why it appears to have spread so quickly, but there are indications the malware may be spreading to vulnerable systems through a security hole in Windows that was recently patched by Microsoft.
BrianKrebs

SSA.GOV To Require Stronger Authentication

2 weeks 5 days ago
The U.S. Social Security Administration will soon require Americans to use stronger authentication when accessing their accounts at ssa.gov. As part of the change, SSA will require all users to enter a username and password in addition to a one-time security code sent their email or phone. In this post, we'll parse this a bit more and look at some additional security options for SSA users.
BrianKrebs

Emergency Fix for Windows Anti-Malware Flaw Leads May’s Patch Tuesday

2 weeks 6 days ago
Adobe and Microsoft both issued updates today to fix critical security vulnerabilities in their software. Microsoft actually issued an emergency update on Monday just hours ahead of today's regularly scheduled "Patch Tuesday" (the 2nd Tuesday of each month) to fix a dangerous flaw present in most of Microsoft's anti-malware technology that's being called the worst Windows bug in recent memory. Separately, Adobe has a new version of its Flash Player software available that squashes at least seven nasty bugs. Last week, Google security researcher Tavis Ormandy reported to Microsoft a flaw in its Malware Protection Engine, a technology that exists in most of Redmond's malware protection offerings -- including Microsoft Forefront, Microsoft Security Essentials and Windows Defender. Rather than worry about their malicious software making it past Microsoft's anti-malware technology, attackers could simply exploit this flaw to run their malware automatically once their suspicious file is scanned.
BrianKrebs

Website Flaw Let True Health Diagnostics Users View All Medical Records

2 weeks 6 days ago
Over the past two weeks readers have pointed KrebsOnSecurity to no fewer than three different healthcare providers that failed to provide the most basic care to protect their patients' records online. Only one of the three companies -- the subject of today's story -- required users to be logged in order to view all patient records. A week ago I heard from Troy Mursch, an IT consultant based in Las Vegas. A big fan of proactive medical testing, Mursch said he's been getting his various lab results reviewed annually for the past two years with the help of a company based in Frisco, Texas called True Health Diagnostics.
BrianKrebs

Breach at Sabre Corp.’s Hospitality Unit

3 weeks 6 days ago
Breaches involving major players in the hospitality industry continue to pile up. Today, travel industry giant Sabre Corp. disclosed what could be a significant breach of payment and customer data tied to bookings processed through a reservations system that serves more than 32,000 hotels and other lodging establishments. In a quarterly filing with the U.S. Securities and Exchange Commission (SEC) today, Southlake, Texas-based Sabre said it was "investigating an incident of unauthorized access to payment information contained in a subset of hotel reservations processed through our Hospitality Solutions SynXis Central Reservations system."
BrianKrebs

Blind Trust in Email Could Cost You Your Home

1 month ago
The process of buying or selling a home can be extremely stressful and complex, but imagine the stress that would boil up if -- at settlement -- your money was wired to scammers in another country instead of to the settlement firm or escrow company. Here's the story about a phishing email that cost a couple their home and left them scrambling for months to recover hundreds of thousands in cash that went missing. It was late November 2016, and Jon and Dorthy Little were all set to close on a $200,000 home in Hendersonville, North Carolina. Just prior to the closing date on Dec. 2 their realtor sent an email to the Little's and to the law firm handling the closing, asking the settlement firm for instructions on wiring the money to an escrow account.
BrianKrebs

UK Man Gets Two Years in Jail for Running ‘Titanium Stresser’ Attack-for-Hire Service

1 month ago
A 20-year-old man from the United Kingdom was sentenced to two years in prison today after admitting to operating and selling access to "Titanium Stresser," a simple-to-use service that let paying customers launch crippling online attacks against Web sites and individual Internet users. Adam Mudd of Herfordshire, U.K. admitted to three counts of computer misuse connected with his creating and operating the attack service, also known as a "stresser" or "booter" tool. Services like Titanium Stresser coordinate so-called "distributed denial-of-service" or DDoS attacks that hurl huge barrages of junk data at a site in a bid to make it crash or become otherwise unreachable to legitimate visitors.
BrianKrebs

The Backstory Behind Carder Kingpin Roman Seleznev’s Record 27 Year Prison Sentence

1 month ago
Roman Seleznev, a 32-year-old Russian cybercriminal and prolific credit card thief, was sentenced Friday to 27 years in federal prison. That is a record punishment for hacking violations in the United States and by all accounts one designed to send a message to criminal hackers everywhere. But a close review of the case suggests that Seleznev's record sentence was severe in large part because the evidence against him was substantial and yet he declined to cooperate with prosecutors prior to his trial. The son of an influential Russian politician, Seleznev made international headlines in 2014 after he was captured while vacationing in The Maldives, a popular vacation spot for Russians and one that many Russian cybercriminals previously considered to be out of reach for western law enforcement agencies. He was whisked away to Guam briefly before being transported to Washington state to stand trial for computer hacking charges.
BrianKrebs

How Cybercrooks Put the Beatdown on My Beats

1 month 1 week ago
Last month Yours Truly got snookered by a too-good-to-be-true online scam in which some dirtball hijacked an Amazon merchant's account and used it to pimp steeply discounted electronics that he never intended to sell. Amazon refunded my money, and the legitimate seller never did figure out how his account was hacked. But such attacks are becoming more prevalent of late as crooks increasingly turn to online crimeware services that make it a cakewalk to cash out stolen passwords.
BrianKrebs

Tracing Spam: Diet Pills from Beltway Bandits

1 month 1 week ago
Reading junk spam messages isn't exactly my idea of a good time, but sometimes fun can be had when you take a moment to check who really sent the email. Here's the simple story of how a recent spam email advertising celebrity "diet pills" was traced back to a Washington, D.C.-area defense contractor that builds tactical communications systems for the U.S. military and intelligence communities.
BrianKrebs

InterContinental Hotel Chain Breach Expands

1 month 1 week ago
In December 2016, KrebsOnSecurity broke the news that fraud experts at various banks were seeing a pattern suggesting a widespread credit card breach across a large number of the 5,000 hotels worldwide owned by InterContinental Hotels Group (IHG). In February, IHG acknowledged a breach but said it appeared to involve only a dozen properties. Now, IHG has released data showing that cash registers at more than 1,000 of its properties were compromised with malicious software designed to siphon customer debit and credit card data.
BrianKrebs

Shoney’s Hit By Apparent Credit Card Breach

1 month 2 weeks ago
It's Friday, which means it's time for another episode of "Which Restaurant Chain Got Hacked?" Multiple sources in the financial industry say they've traced a pattern of fraud on customer cards indicating that the latest victim may be Shoney's, a 70-year-old restaurant chain that operates primarily in the southern United States.
BrianKrebs
Checked
31 minutes 58 seconds ago
In-depth security news and investigation
Subscribe to Kerbs on Security feed