Reversing the Cyber-Crime Paradigm: The “Cyber-Robin Hood”

CRH

ID THIEF HACKS INTO FAMILY’S NETFLIX, AT&T ACCOUNTS TO PAY OFF THEIR BILLS

STOLEN CREDENTIALS; USER ACCOUNTS COMPROMISED

An Orange County, Fla. family says a hacker breached their phone and Netflix accounts to pay off the family’s bills.

The Hennigs discovered the sorta well-meaning hack when AT&T alerted Kathy Hennig that she owed $1,300 because the card listed for her account was a stolen credit card.

Kathy learned that the same card was being used on her Netflix account when she received an alert indicating the card had expired. When she asked to know the last four digits of the card, Netflix gave her the exact sequence of the stolen card used for the phone account.

“There’s no other person in my situation where somebody compromised my account changed the credit cards and started paying my bills, there’s no such thing,” Hennig said.

Hennig says the only other information she has about what went down is that the two hacked accounts are linked to the same email and the accounts were switched at about the same time.

When Hennig called AT&T to try to clear up the switcheroo, she was banned from using a credit card to pay off her cellphone account ever again.

“It blows my mind,” she says. “It makes me look like such a liar because why would someone hack into an account just to get a stranger to pay the bill?”

Hennig has a long history with the phone company and a pristine credit history.

News 6 investigator Mike Holfeld contacted AT&T spokeswoman Rosie Montalvo and in less than 24 hours, the company agreed to remove the credit card ban.

Montalvo says AT&T has never seen a case like this before.

Read the Original Article at NextGov

Ransomware: Pay Us or your Data Dies

hospital

This is the new era of crime folks, Hackers (and Tech Companies) holding data hostage. Ultimately, like always, it is the average person, in this case, the sick people in these hospitals, who suffers. Crime is Crime, I don’t care how it is facilitated.

The Hollywood Presbyterian Medical Center in Los Angeles has announced that it paid hackers 40 bitcoins ($17,000 USD). The criminals had used malicious software to encrypt the hospital’s records, and held the key to decrypt the files for ransom.

The hospital was infected with the software, commonly called “ransomware,” on Feb. 5. Presumably, someone on the hospital network opened an email attachment or clicked a link they shouldn’t have. From there, a message typically appears on the infected computers, demanding payment to restore access. There’s usually a deadline.

Once infected, the hospital reportedly had to send some patients to other hospitals, and go back to paper to process visits.

A ransomware attack at this scale, which could potentially put lives at risk, has so far been uncommon. The targets have largely been individuals and small organizations, and the payments demanded are usually under $1,000. And the Federal Bureau of Investigation, at least according to one agent, often advises victims to just pay the ransom if they want their files back.

Indeed, this was the case for Hollywood Presbyterian. The hospital’s CEO said in a statement Wednesday night (Feb. 18) that paying the criminals was “the quickest and most efficient way to restore our systems and administrative functions.”

And now, everything is back to normal. “HPMC has restored its electronic medical record system (“EMR”) on Monday, February 15th,” the CEO said in the statement. “All systems currently in use were cleared of the malware and thoroughly tested.”

 Read the Original Article at QZ

Cyber Crime Update: Cyber Criminals Getting Smarter, More Sophisticated and More Organized

nigerian

Just this morning alone I have received two specially crafted scam emails from cyber criminals targeting unsuspecting Nigerians (mostly those that have bank accounts). I must say I am impressed!

I almost fell for this scam email even with my years of Information Security Research and Ethical Hacking. The reasons I almost fell for this scam are simply because.

  1. I am a UBA customer and I use their prepaid card for online transactions.
  2. The from name is no-reply@udirect.com ( not the actual email address but the name of the sender).
  3. The email is properly formatted.
  4. The real Url is masked under http://www.ibank.ubagroup.com/BVN(Here is the real URL masked http://ow.ly/XUJAM).
  5. The User interface is almost like the real one.

When I clicked on the URL It took me to this fake website below.

To See the Website and Read the Remainder go to Medium

Can China be Deterred in Cyber-Space?

sgutter

Deterring state actors from attacks that do not reach the level of force is difficult.

If we look at the cyber realm, the effectiveness of deterrence depends on who (state or non-state) one tries to deter and which of their behaviors.  Ironically, deterring major states like China from acts of force may be easier than deterring non-state actors from actions that do not rise to the level of force. The threat of a bolt from the blue attack by a major state may have been exaggerated. Major state actors are more likely to be entangled in interdependence than are many non-state actors, and American declaratory policy has made clear that deterrence is not limited to cyber against cyber but can be cross domain with any weapons of our choice.

Along with punishment and denial, entanglement is an important means of making an actor perceive that the costs of an action will exceed the benefits.  Entanglement refers to the existence of  interdependences which makes a successful attack simultaneously impose serious costs on the attacker as well as the victim. This is not unique to cyber. For example, in 2009, when the People’s Liberation Army urged the Chinese government to dump some of China’s massive holdings of dollar reserves to punish the United States for selling arms to Taiwan, the Central Bank pointed out that this would impose large costs on China as well and the government decided against it.

Similarly, in scenarios which envisage a Chinese cyber attack on the American electric grid imposing great costs on the American economy, the economic interdependence would mean costly damage to China as well. Precision targeting of less sweeping targets might not produce much blowback, but the increasing importance of the Internet to economic growth may increase general incentives for self restraint. At the same time,  entanglement might not create significant costs for a state like North Korea which has a low degree of interdependence with the international economic system.

Read the Remainder at The Diplomat