Tux Machines

Security Leftovers

Posted by Roy Schestowitz on Jun 25, 2023

=> Games: Godot, x86, and BattleBit | howtos for the evening

An Overview of the Different Versions of the Trigona Ransomware [Ed: This is primarily a Windows issue]

=> ↺ An Overview of the Different Versions of the Trigona Ransomware

The Trigona ransomware is a relatively new ransomware family that began activities around late October 2022 — although samples of it existed as early as June 2022. Since then, Trigona’s operators have remained highly active, and in fact have been continuously updating their ransomware binaries. By April 2023, Trigona began targeting compromised MSSQL servers by stealing credentials via brute force methods. In May 2023, we found a Linux version of Trigona that shared similarities with its Windows counterpart.

OpenSSH Trojan Campaign Targets IoT and Linux Systems [Ed: The issue here is neither SSH nor Linux. This is Microsoft and another company openly defaming OpenSSH and Linux, which they claim to be working with. The issue here is bad passwords.]

=> ↺ OpenSSH Trojan Campaign Targets IoT and Linux Systems | ↺ The issue here is bad passwords

MOVEit breach also impacted major pension systems and insurers [Ed: Windows TCO]

=> ↺ MOVEit breach also impacted major pension systems and insurers

The third-party vendor involved was PBI Research Services + Berwyn Group, who notified these clients on June 4 and June 6. CalPer’s notification can be found on CalPer’s website.
The insurance sector was also affected by the MOVEit breach. Bill Toulas reports that a third PBI Research Services + BerwynGroup client, Genworth Financial, is a life insurance provider in Virginia affected by the MOVEit breach. They reported that between 2.5 and 2.7 million insurance members or employees were affected.

Linux systems Hacked with OpenSSH Malware [Ed: Helping Microsoft spread anti-SSH and anti-Linux FUD]

=> ↺ Linux systems Hacked with OpenSSH Malware

Discover the implications of OpenSSH Malware on Linux systems. Learn about the security risks and the importance of proactive measures to safeguard against unauthorized access.

Another data breach at NYC schools exposes student and staff information [Ed: Windows TCO]

=> ↺ Another data breach at NYC schools exposes student and staff information

The New York City Department of Education estimates that the personal data of some 45,000 students was compromised as part of a breach involving the file transfer software MOVEit.
Officials said the compromised data includes social security numbers, birth dates and certain student evaluations, though the specific types of data breached varies per student. Employees’ information was also affected, officials said, but they did not identify how many staff members were involved. No education department data has been published as a result of the breach so far, officials said, and the department will begin notifying those affected this summer.

Four senior residences in Pennsylvania disclose a data security breach in April

=> ↺ Four senior residences in Pennsylvania disclose a data security breach in April

Four senior residences have disclosed that they were the victims of a network intrusion in April that may have compromised residents’ personal and protected health information.

Former Highmark employee accused of misusing customer info to steal money from their health savings accounts

=> ↺ Former Highmark employee accused of misusing customer info to steal money from their health savings accounts

Allegheny County District Attorney’s office charged Zakayah Scott who worked remotely from South Carolina for Highmark Health.
Authorities said Scott had access to customers’ personal information including birthdays, addresses and phone numbers.
They said she called Highmark’s customer service department, claiming to be one of the victims, change their password to their health savings account, log in, then withdrew and transferred money. The amount stolen totals more than $50,000

Prosecution of tracing agent for illegally obtaining personal information

=> ↺ Prosecution of tracing agent for illegally obtaining personal information

An enforcement action and prosecution was announced by the U.K. Information Commissioner’s Office this week:
A former tracing agent pleaded guilty and was fined for illegally obtaining personal information to check if customers of a high street bank could repay their debts.
Michael Isaacs, 80, from Epsom, Surrey was the sole director of Datasearch Services Limited (DSS). DSS is a tracing agent company, previously used by the Royal Bank of Scotland (RBS) to locate people who owed money to RBS and to determine their assets and ability to repay the debts.

Four Nigerian Nationals Extradited To The United States To Face Charges In Wire Fraud And Identity Theft Conspiracy

=> ↺ Four Nigerian Nationals Extradited To The United States To Face Charges In Wire Fraud And Identity Theft Conspiracy

On June 22, United States Attorney Roger Handberg announced the successful extraditions of Akinola Taylor of the United Kingdom, Olayemi Adafin of the United Kingdom, Olakunle Oyebanjo of the United Kingdom, and Kazeem Olanrewaju Runsewe of Sweden. These individuals have been charged in the Middle District of Florida with conspiracy to commit wire fraud, filing false claims with the United States, theft of public money or property, and aggravated identity theft. Taylor, Adafin, and Runsewe were arrested on November 30, 2022, and Oyebanjo was arrested on December 2, 2022. Taylor, Adafin, and Oyebanjo were apprehended in London, United Kingdom at the request of the United States, and Runswewe was apprehended in Malmo, Sweden at the request of the United States. In connection with the arrests, foreign authorities conducted searches of the residences of Taylor and Runsewe. These individuals first appeared in the Middle District of Florida in May and June 2023. Another related defendant, Ogunlana Oluwarotimi of Texas, was arrested in Texas in January 2023 and is currently pending trial.

Email Spam with Attachment Modiloader, (Sat, Jun 24th)

=> ↺ Email Spam with Attachment Modiloader, (Sat, Jun 24th)

This week (2023-06-21) I found 2 emails attachment in quarantine that had different text with the same attachment. The first one had an Office 365 indicating the admin had setup a custom rule to block the message and could not be delivered to the recipients and what to do to fix it.

=> gemini.tuxmachines.org

Proxy Information
Original URL
gemini://gemini.tuxmachines.org/n/2023/06/25/Security_Leftovers.1.gmi
Status Code
Success (20)
Meta
text/gemini;lang=en-GB
Capsule Response Time
139.859727 milliseconds
Gemini-to-HTML Time
1.810771 milliseconds

This content has been proxied by September (ba2dc).