<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Hackers &#8211; Cincy Link</title>
	<atom:link href="https://cincylink.com/tag/hackers/feed/" rel="self" type="application/rss+xml" />
	<link>https://cincylink.com</link>
	<description>Explore Cincy</description>
	<lastBuildDate>Fri, 14 Jul 2023 04:07:59 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.1</generator>

<image>
	<url>https://cincylink.com/pub/content/uploads/sites/27/2020/03/apple-touch-icon-precomposed-100x100.png</url>
	<title>Hackers &#8211; Cincy Link</title>
	<link>https://cincylink.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Chinese hackers breached State Dept., other government email</title>
		<link>https://cincylink.com/2023/07/14/chinese-hackers-breached-state-dept-other-government-email/</link>
					<comments>https://cincylink.com/2023/07/14/chinese-hackers-breached-state-dept-other-government-email/#respond</comments>
		
		<dc:creator><![CDATA[cincylink]]></dc:creator>
		<pubDate>Fri, 14 Jul 2023 04:07:59 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Cincinnati]]></category>
		<category><![CDATA[emails]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[jsnd]]></category>
		<category><![CDATA[Recent]]></category>
		<category><![CDATA[Relevant]]></category>
		<category><![CDATA[Trending]]></category>
		<guid isPermaLink="false">https://cincylink.com/?p=211965</guid>

					<description><![CDATA[State-backed Chinese hackers foiled Microsoft's cloud-based security in hacking the email accounts of officials at multiple U.S. agencies that deal with China ahead of Secretary of State Antony Blinken's trip to Beijing last month, officials said Wednesday.The surgical, targeted espionage accessed the email of a small number of individuals at an unspecified number of U.S. &#8230;]]></description>
										<content:encoded><![CDATA[<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br /><img decoding="async" src="https://cdn.cincylink.com/pub/content/uploads/sites/27/2023/07/Chinese-hackers-breached-State-Dept-other-government-email.jpg" /></p>
<p>
					 State-backed Chinese hackers foiled Microsoft's cloud-based security in hacking the email accounts of officials at multiple U.S. agencies that deal with China ahead of Secretary of State Antony Blinken's trip to Beijing last month, officials said Wednesday.The surgical, targeted espionage accessed the email of a small number of individuals at an unspecified number of U.S. agencies and was discovered in mid-June by the State Department, U.S. officials said. They said none of the breached systems were classified, nor was any of the stolen data.Related video above: Rossen Reports: How to sign up for dark web monitoringThe hacked officials included Commerce Secretary Gina Raimondo, The Washington Post reported, citing anonymous U.S. officials. Export controls imposed by her agency have stung multiple Chinese companies.One person familiar with the investigation said U.S. military and intelligence agencies were not among the agencies impacted in the monthlong spying campaign, which also affected unnamed foreign governments.The officials spoke on condition they not be further identified.In a technical advisory Wednesday and a call with reporters, the U.S. Cybersecurity and Infrastructure Security Agency and the FBI said Microsoft determined the hackers gained access by impersonating authorized users.Officials did not specify the nature of the stolen data. But one U.S. official said the intrusion was “directly targeted” at diplomats and others who deal with the China portfolio at the State Department and other agencies. The official added that it was not yet clear if there had been any significant compromise of information.The Blinken trip went ahead as planned, although with customary information security procedures in place, which required his delegation to use “burner” phones and computers in China.The hack was disclosed late Tuesday by Microsoft in a blog post. It said it was alerted to the breach, which it blamed on a state-backed, espionage-focused Chinese hacking group “known to target government agencies in Western Europe,” on June 16. Microsoft said the group, which it calls Storm-0558, had gained access to email accounts affecting about 25 organizations, including government agencies, since mid-May as well as to consumer accounts of individuals likely associated with those agencies.Neither Microsoft nor U.S. officials would identify the agencies or governments impacted. A senior CISA official told reporters in a press call that the number of affected organizations in the United States is in the single digits.While the official declined to say whether U.S. officials are displeased with Microsoft over the breach, U.S. National Security Council spokesman Adam Hodge noted that it was “government safeguards” that detected the intrusion and added, “We continue to hold the procurement providers of the U.S. Government to a high security threshold.”In fact, those safeguards consist of a data-logging feature for which Microsoft charges a premium. The CISA official noted that some of the victims lacked the data-logging feature and, unable to detect the breach, learned of it from Microsoft.But of greater concern to cybersecurity experts is that The Storm-0558 hackers broke in using forged authentication tokens — which are used to verify the identity of a user. Microsoft's executive vice president for security, Charlie Bell, said on the company's website that the hackers had done that by acquiring a “consumer signing key.”Cybersecurity researcher Jake Williams, a former National Security Agency offensive hacker, said it remains unclear how the hackers accomplished that. Microsoft did not immediately respond to emailed questions, including whether it was breached by the hackers to obtain the signing key.Williams was concerned the hackers could have forged tokens for wide use to hack any number of non-enterprise Microsoft users. “I can’t imagine China didn’t also use this access to target dissidents on personal subscriptions, too."The head of intelligence for the cybersecurity firm Crowdstrike, Adam Meyers, said in a statement that the incident highlights the systemic risk of relying on a single technology provider in Microsoft. He said “having one monolithic vendor that is responsible for all of your technology, products, services and security - can end in disaster.”A Chinese foreign ministry spokesman, Wang Wenbin, called the U.S. accusation of hacking “disinformation” aimed at diverting attention from U.S. cyberespionage against China.“No matter which agency issued this information, it will never change the fact that the United States is the world’s largest hacker empire conducting the most cyber theft,” Wang said in a routine briefing.U.S. intelligence agencies also use hacking as a critical espionage tool and it is not a violation of international law.Last month, Google-owned cybersecurity firm Mandiant said suspected state-backed Chinese hackers broke into the networks of hundreds of public and private sector organizations globally exploiting a vulnerability in a popular email security tool.Earlier this year, Microsoft said state-backed Chinese hackers were targeting U.S. critical infrastructure and could be laying the technical groundwork to disrupt critical communications between the U.S. and Asia during future crises.____Associated Press writers Aamer Madhani in Washington and Zen Soo in Hong Kong contributed to this report. Bajak reported from Boston.
				</p>
<div>
					<strong class="dateline">Hong Kong —</strong> 											</p>
<p> State-backed Chinese hackers foiled Microsoft's cloud-based security in hacking the email accounts of officials at multiple U.S. agencies that deal with China ahead of Secretary of State Antony Blinken's trip to Beijing last month, officials said Wednesday.</p>
<p>The surgical, targeted espionage accessed the email of a small number of individuals at an unspecified number of U.S. agencies and was discovered in mid-June by the State Department, U.S. officials said. They said none of the breached systems were classified, nor was any of the stolen data.</p>
<p><!-- article/blocks/side-floater --></p>
<p><!-- article/blocks/side-floater --></p>
<p><strong><em>Related video above: Rossen Reports: How to sign up for dark web monitoring</em></strong></p>
<p>The hacked officials included Commerce Secretary Gina Raimondo, The Washington Post reported, citing anonymous U.S. officials. Export controls imposed by her agency have stung multiple Chinese companies.</p>
<p>One person familiar with the investigation said U.S. military and intelligence agencies were not among the agencies impacted in the monthlong spying campaign, which also affected unnamed foreign governments.</p>
<p>The officials spoke on condition they not be further identified.</p>
<p>In a technical advisory Wednesday and a call with reporters, the U.S. Cybersecurity and Infrastructure Security Agency and the FBI <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-193a" rel="nofollow">said Microsoft determined the hackers gained access</a> by impersonating authorized users.</p>
<p>Officials did not specify the nature of the stolen data. But one U.S. official said the intrusion was “directly targeted” at diplomats and others who deal with the China portfolio at the State Department and other agencies. The official added that it was not yet clear if there had been any significant compromise of information.</p>
<p>The Blinken trip went ahead as planned, although with customary information security procedures in place, which required his delegation to use “burner” phones and computers in China.</p>
<p>The hack was disclosed late Tuesday by Microsoft <a href="https://msrc.microsoft.com/blog/2023/07/microsoft-mitigates-china-based-threat-actor-storm-0558-targeting-of-customer-email/" rel="nofollow">in a blog post</a>. It said it was alerted to the breach, which it blamed on a state-backed, espionage-focused Chinese hacking group “known to target government agencies in Western Europe,” on June 16. Microsoft said the group, which it calls Storm-0558, had gained access to email accounts affecting about 25 organizations, including government agencies, since mid-May as well as to consumer accounts of individuals likely associated with those agencies.</p>
<p>Neither Microsoft nor U.S. officials would identify the agencies or governments impacted. A senior CISA official told reporters in a press call that the number of affected organizations in the United States is in the single digits.</p>
<p>While the official declined to say whether U.S. officials are displeased with Microsoft over the breach, U.S. National Security Council spokesman Adam Hodge noted that it was “government safeguards” that detected the intrusion and added, “We continue to hold the procurement providers of the U.S. Government to a high security threshold.”</p>
<p>In fact, those safeguards consist of a data-logging feature for which Microsoft charges a premium. The CISA official noted that some of the victims lacked the data-logging feature and, unable to detect the breach, learned of it from Microsoft.</p>
<p>But of greater concern to cybersecurity experts is that The Storm-0558 hackers broke in using forged authentication tokens — which are used to verify the identity of a user. Microsoft's executive vice president for security, Charlie Bell, said on the company's website that the <a href="https://blogs.microsoft.com/on-the-issues/2023/07/11/mitigation-china-based-threat-actor/" rel="nofollow">hackers had done that by acquiring a “consumer signing key.”</a></p>
<p>Cybersecurity researcher Jake Williams, a former National Security Agency offensive hacker, said it remains unclear how the hackers accomplished that. Microsoft did not immediately respond to emailed questions, including whether it was breached by the hackers to obtain the signing key.</p>
<p>Williams was concerned the hackers could have forged tokens for wide use to hack any number of non-enterprise Microsoft users. “I can’t imagine China didn’t also use this access to target dissidents on personal subscriptions, too."</p>
<p>The head of intelligence for the cybersecurity firm Crowdstrike, Adam Meyers, said in a statement that the incident highlights the systemic risk of relying on a single technology provider in Microsoft. He said “having one monolithic vendor that is responsible for all of your technology, products, services and security - can end in disaster.”</p>
<p>A Chinese foreign ministry spokesman, Wang Wenbin, called the U.S. accusation of hacking “disinformation” aimed at diverting attention from U.S. cyberespionage against China.</p>
<p>“No matter which agency issued this information, it will never change the fact that the United States is the world’s largest hacker empire conducting the most cyber theft,” Wang said in a routine briefing.</p>
<p>U.S. intelligence agencies also use hacking as a critical espionage tool and it is not a violation of international law.</p>
<p>Last month, Google-owned cybersecurity firm Mandiant said <a href="https://apnews.com/article/barracuda-mandiant-cybersecurity-china-hackers-a52d1595c9108d2c58df11e38756600d" rel="nofollow">suspected state-backed Chinese hackers broke into the networks</a> of hundreds of public and private sector organizations globally exploiting a vulnerability in a popular email security tool.</p>
<p>Earlier this year, Microsoft said state-backed Chinese hackers were <a href="https://apnews.com/article/microsoft-china-hacking-us-infrastructure-d4a4faefcc5d4d3c9f72e9acc24a71f9" rel="nofollow">targeting U.S. critical infrastructure</a> and could be laying the technical groundwork to disrupt critical communications between the U.S. and Asia during future crises.</p>
<p>____</p>
<p><em>Associated Press writers Aamer Madhani in Washington and Zen Soo in Hong Kong contributed to this report. Bajak reported from Boston.</em></p>
</p></div>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br /><a href="https://www.wlwt.com/article/china-hackers-breached-email-accounts/44517182">Source link </a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cincylink.com/2023/07/14/chinese-hackers-breached-state-dept-other-government-email/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Treasury Dept. email accounts compromised in hack</title>
		<link>https://cincylink.com/2021/10/13/treasury-dept-email-accounts-compromised-in-hack/</link>
					<comments>https://cincylink.com/2021/10/13/treasury-dept-email-accounts-compromised-in-hack/#respond</comments>
		
		<dc:creator><![CDATA[cincylink]]></dc:creator>
		<pubDate>Wed, 13 Oct 2021 04:48:51 +0000</pubDate>
				<category><![CDATA[Cincy News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Cincinnati]]></category>
		<category><![CDATA[Cincy]]></category>
		<category><![CDATA[emails]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Local]]></category>
		<category><![CDATA[Recent]]></category>
		<category><![CDATA[Relevant]]></category>
		<category><![CDATA[russia]]></category>
		<category><![CDATA[treasury]]></category>
		<category><![CDATA[Trending]]></category>
		<category><![CDATA[what did they get]]></category>
		<guid isPermaLink="false">https://cincylink.com/?p=23346</guid>

					<description><![CDATA[WASHINGTON (AP) — Dozens of email accounts at the Treasury Department were compromised in the massive breach of U.S. government agencies being blamed on Russia. That's according to an Oregon Democrat, Sen. Ron Wyden, who says hackers broke into systems used by the department’s highest-ranking officials. Wyden issued a statement Monday after he and other &#8230;]]></description>
										<content:encoded><![CDATA[<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
</p>
<div>
<p>WASHINGTON (AP) — Dozens of email accounts at the Treasury Department were compromised in the massive breach of U.S. government agencies being blamed on Russia. </p>
<p>That's according to an Oregon Democrat, Sen. Ron Wyden, who says hackers broke into systems used by the department’s highest-ranking officials. </p>
<p>Wyden issued a statement Monday after he and other members of the Senate Finance Committee were briefed by the IRS and the Treasury Department. </p>
<p>Wyden <a class="Link" href="https://apnews.com/article/technology-politics-ron-wyden-russia-hacking-572ac201e8f365cf6ec218b478742aa0">says that </a>though there is no indication that taxpayer data was compromised, the hack “appears to be significant." In addition, the breach appears to involve the theft of encryption keys from U.S. government servers, Wyden said.</p>
<p>“Treasury still does not know all of the actions taken by hackers, or precisely what information was stolen,” Wyden said <a class="Link" href="https://apnews.com/article/technology-politics-ron-wyden-russia-hacking-572ac201e8f365cf6ec218b478742aa0">in a statement</a>.</p>
<p>It is also not clear what Russian hackers intend to do with any emails they may have accessed.</p>
<p>A Treasury Department spokeswoman declined to comment on Wyden’s statement.</p>
<p>Treasury was among the earliest known agencies reported to have been affected in a breach that now encompasses a broad spectrum of departments. The effects and consequences of the hack are still being assessed, though the Department of Homeland Security’s cybersecurity arm said in a statement last week that the intrusion posed a “grave” risk to government and private networks.</p>
<p>In the Treasury Department’s case, Wyden said, the breach began in July. But experts believe the overall hacking operation began months earlier when malicious code was slipped into updates to popular software that monitors computer networks of businesses and governments.</p>
</div>
<p><script>
    window.fbAsyncInit = function() {
    FB.init({
        appId : '1374721116083644',
    xfbml : true,
    version : 'v2.9'
    });
    };
    (function(d, s, id){
    var js, fjs = d.getElementsByTagName(s)[0];
    if (d.getElementById(id)) {return;}
    js = d.createElement(s); js.id = id;
    js.src = "https://connect.facebook.net/en_US/sdk.js";
    fjs.parentNode.insertBefore(js, fjs);
    }(document, 'script', 'facebook-jssdk'));
</script><script>  !function(f,b,e,v,n,t,s)
  {if(f.fbq)return;n=f.fbq=function(){n.callMethod?
  n.callMethod.apply(n,arguments):n.queue.push(arguments)};
  if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0';
  n.queue=[];t=b.createElement(e);t.async=!0;
  t.src=v;s=b.getElementsByTagName(e)[0];
  s.parentNode.insertBefore(t,s)}(window, document,'script',
  'https://connect.facebook.net/en_US/fbevents.js');
  fbq('init', '1080457095324430');
  fbq('track', 'PageView');</script><br />
<br /><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br /><a href="https://www.wcpo.com/news/national/senator-treasury-dept-email-accounts-compromised-in-hack">Source link </a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cincylink.com/2021/10/13/treasury-dept-email-accounts-compromised-in-hack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hackers can steal money off gift cards before you have a chance to use them</title>
		<link>https://cincylink.com/2021/10/04/hackers-can-steal-money-off-gift-cards-before-you-have-a-chance-to-use-them/</link>
					<comments>https://cincylink.com/2021/10/04/hackers-can-steal-money-off-gift-cards-before-you-have-a-chance-to-use-them/#respond</comments>
		
		<dc:creator><![CDATA[cincylink]]></dc:creator>
		<pubDate>Mon, 04 Oct 2021 04:39:40 +0000</pubDate>
				<category><![CDATA[Cincy News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Cincinnati]]></category>
		<category><![CDATA[Cincy]]></category>
		<category><![CDATA[consumer alert]]></category>
		<category><![CDATA[gift card activation code]]></category>
		<category><![CDATA[gift card hack]]></category>
		<category><![CDATA[gift card hackers]]></category>
		<category><![CDATA[gift card scam]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[hackers steal money off gift cards]]></category>
		<category><![CDATA[Local]]></category>
		<category><![CDATA[Recent]]></category>
		<category><![CDATA[Relevant]]></category>
		<category><![CDATA[scam alert]]></category>
		<category><![CDATA[Taking Action For You]]></category>
		<category><![CDATA[Trending]]></category>
		<guid isPermaLink="false">https://cincylink.com/?p=25074</guid>

					<description><![CDATA[HILLSBOROUGH COUNTY, Fla. — Gift cards are a billion-dollar business during the holidays, but you may have bought a worthless stolen card without even realizing it. Thieves are stealing the activation codes and other data from the card. They are then monitoring those cards for activation and wiping out the balances seconds after they are &#8230;]]></description>
										<content:encoded><![CDATA[<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
</p>
<div>
<p>HILLSBOROUGH COUNTY, Fla. — Gift cards are a billion-dollar business during the holidays, but you may have bought a worthless stolen card without even realizing it.</p>
<p>Thieves are stealing the activation codes and other data from the card. They are then monitoring those cards for activation and wiping out the balances seconds after they are purchased.</p>
<p>Jack Garthwaite says he and his mom purchased six $100 iTunes gift cards at Target.</p>
<p>Garthwaite says he took advantage of a Black Friday deal where Target offered a $20 gift card for every $100 spent on iTunes cards. Several days later, Garthwaite, a college student, says he attempted to use the cards to buy his dad a new phone.</p>
<p>“I tried to redeem the first one, and Apple was saying it had already been used. So, I tried the next one same thing, next one same thing,” he said. “My heart sank. I was like, this is bad.”</p>
<p>Garthwaite contacted both Target and Apple about his worthless gift cards.</p>
<p>“Apple was able to confirm it was not on my account; that I did not redeem them,” he said.</p>
<p>According to an email from Apple to Garthwaite, the cards were redeemed minutes after purchase. But Garthwaite said Target did not refund his money.</p>
<p>“Tried to talk to the manager, and he pretty much shut us down,” Garthwaite said. Adding that the manager told him there were “no refunds on gift cards. ”</p>
<p><a class="Link" href="https://www.abcactionnews.com/money/consumer/taking-action-for-you/beware-hackers-can-steal-money-off-gift-cards-before-you-have-a-chance-to-use-them">ABC Action News</a> reached out to Target to ask about Garthwaite’s claim. Days later, a spokesperson responded in an email:</p>
<p><i>“After looking into the information provided, our guest relations team reached out to Mr. Garthwaite and provided a full refund for the gift cards purchased."</i></p>
<p>“I was very happy about that,” Garthwaite said.</p>
<p>Gift cards hanging on racks out-in-the-open may be vulnerable to tampering, so you should buy gift cards online whenever possible.</p>
<p><i>This story originally reported <a class="Link" href="https://www.abcactionnews.com/money/consumer/taking-action-for-you/beware-hackers-can-steal-money-off-gift-cards-before-you-have-a-chance-to-use-them">by Jackie Callaway on abcactionnews.com. </a></i></p>
</div>
<p><script>
    window.fbAsyncInit = function() {
    FB.init({
        appId : '1374721116083644',
    xfbml : true,
    version : 'v2.9'
    });
    };
    (function(d, s, id){
    var js, fjs = d.getElementsByTagName(s)[0];
    if (d.getElementById(id)) {return;}
    js = d.createElement(s); js.id = id;
    js.src = "https://connect.facebook.net/en_US/sdk.js";
    fjs.parentNode.insertBefore(js, fjs);
    }(document, 'script', 'facebook-jssdk'));
</script><script>  !function(f,b,e,v,n,t,s)
  {if(f.fbq)return;n=f.fbq=function(){n.callMethod?
  n.callMethod.apply(n,arguments):n.queue.push(arguments)};
  if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0';
  n.queue=[];t=b.createElement(e);t.async=!0;
  t.src=v;s=b.getElementsByTagName(e)[0];
  s.parentNode.insertBefore(t,s)}(window, document,'script',
  'https://connect.facebook.net/en_US/fbevents.js');
  fbq('init', '1080457095324430');
  fbq('track', 'PageView');</script><br />
<br /><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br /><a href="https://www.wcpo.com/news/national/beware-hackers-can-steal-money-off-gift-cards-before-you-have-a-chance-to-use-them">Source link </a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cincylink.com/2021/10/04/hackers-can-steal-money-off-gift-cards-before-you-have-a-chance-to-use-them/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>FBI issues PSA about offenders targeting smart home devices for &#8216;swatting&#8217; incidents</title>
		<link>https://cincylink.com/2021/10/02/fbi-issues-psa-about-offenders-targeting-smart-home-devices-for-swatting-incidents/</link>
					<comments>https://cincylink.com/2021/10/02/fbi-issues-psa-about-offenders-targeting-smart-home-devices-for-swatting-incidents/#respond</comments>
		
		<dc:creator><![CDATA[cincylink]]></dc:creator>
		<pubDate>Sat, 02 Oct 2021 04:57:46 +0000</pubDate>
				<category><![CDATA[Cincy News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Cincinnati]]></category>
		<category><![CDATA[Cincy]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[hacking smart home devices]]></category>
		<category><![CDATA[Local]]></category>
		<category><![CDATA[Recent]]></category>
		<category><![CDATA[Relevant]]></category>
		<category><![CDATA[swatting]]></category>
		<category><![CDATA[swatting incidents]]></category>
		<category><![CDATA[Trending]]></category>
		<guid isPermaLink="false">https://cincylink.com/?p=25424</guid>

					<description><![CDATA[The Federal Bureau of Investigation issued a public service announcement Tuesday warning users of smart home devices of being hacked for "swatting" incidents. In the PSA, the FBI asked users to use "complex and unique passwords and enable two-factor authentication" to protect against the attacks after they were notified of hackers using stolen email passwords &#8230;]]></description>
										<content:encoded><![CDATA[<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
</p>
<div>
<p>The Federal Bureau of Investigation issued a public service announcement Tuesday warning users of smart home devices of being hacked for "swatting" incidents.</p>
<p>In the <a class="Link" href="https://www.ic3.gov/Media/Y2020/PSA201229" target="_blank" rel="noopener">PSA</a>, the FBI asked users to use "complex and unique passwords and enable two-factor authentication" to protect against the attacks after they were notified of hackers using stolen email passwords to access them.</p>
<p>"Offenders have been using victims’ smart devices, including video and audio capable home surveillance devices, to carry out swatting attacks," the PSA read. "To gain access to smart devices, offenders are likely taking advantage of customers who re-use their email passwords for their smart devices. The offenders use stolen email passwords to log into the smart device and hijack features, including the live-stream camera and device speakers."</p>
<p>According to the FBI, swatting is when a hoax call is made to 911 to report an immediate threat to human life that leads to a response from law enforcement and the S.W.A.T. team.</p>
<p>The FBI said these incidents are motivated by revenge or a prank.</p>
<p>"They then call emergency services to report a crime at the victims’ residence," the PSA stated. "As law enforcement responds to the residence, the offender watches the live stream footage and engages with the responding police through the camera and speakers. In some cases, the offender also live streams the incident on shared online community platforms."</p>
<p>The FBI also advised users not to duplicate passwords between different online accounts to protect themselves better.</p>
</div>
<p><script>
    window.fbAsyncInit = function() {
    FB.init({
        appId : '1374721116083644',
    xfbml : true,
    version : 'v2.9'
    });
    };
    (function(d, s, id){
    var js, fjs = d.getElementsByTagName(s)[0];
    if (d.getElementById(id)) {return;}
    js = d.createElement(s); js.id = id;
    js.src = "https://connect.facebook.net/en_US/sdk.js";
    fjs.parentNode.insertBefore(js, fjs);
    }(document, 'script', 'facebook-jssdk'));
</script><script>  !function(f,b,e,v,n,t,s)
  {if(f.fbq)return;n=f.fbq=function(){n.callMethod?
  n.callMethod.apply(n,arguments):n.queue.push(arguments)};
  if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0';
  n.queue=[];t=b.createElement(e);t.async=!0;
  t.src=v;s=b.getElementsByTagName(e)[0];
  s.parentNode.insertBefore(t,s)}(window, document,'script',
  'https://connect.facebook.net/en_US/fbevents.js');
  fbq('init', '1080457095324430');
  fbq('track', 'PageView');</script><br />
<br /><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br /><a href="https://www.wcpo.com/news/national/fbi-issues-psa-about-offenders-targeting-smart-home-devices-for-swatting-incidents">Source link </a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cincylink.com/2021/10/02/fbi-issues-psa-about-offenders-targeting-smart-home-devices-for-swatting-incidents/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Microsoft admits hackers were able to see some of its source code</title>
		<link>https://cincylink.com/2021/10/01/microsoft-admits-hackers-were-able-to-see-some-of-its-source-code/</link>
					<comments>https://cincylink.com/2021/10/01/microsoft-admits-hackers-were-able-to-see-some-of-its-source-code/#respond</comments>
		
		<dc:creator><![CDATA[cincylink]]></dc:creator>
		<pubDate>Fri, 01 Oct 2021 05:19:24 +0000</pubDate>
				<category><![CDATA[Cincy News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[access]]></category>
		<category><![CDATA[Cincinnati]]></category>
		<category><![CDATA[Cincy]]></category>
		<category><![CDATA[compromise]]></category>
		<category><![CDATA[government]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Local]]></category>
		<category><![CDATA[microsoft]]></category>
		<category><![CDATA[Recent]]></category>
		<category><![CDATA[Relevant]]></category>
		<category><![CDATA[Russian]]></category>
		<category><![CDATA[SolarWinds Orion]]></category>
		<category><![CDATA[Trending]]></category>
		<guid isPermaLink="false">https://cincylink.com/?p=25530</guid>

					<description><![CDATA[Microsoft now says suspected Russian hackers behind a massive campaign that impacted government agencies, local municipalities and companies were also able to view some of the company’s source code. In a blog post Thursday, Microsoft says the unauthorized access “has not put at risk the security of our services or any customer data.” "We detected &#8230;]]></description>
										<content:encoded><![CDATA[<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
</p>
<div>
<p>Microsoft now says suspected Russian hackers behind a massive campaign that impacted government agencies, local municipalities and companies were also able to view some of the company’s source code.</p>
<p>In a <u><a class="Link" href="https://msrc-blog.microsoft.com/2020/12/31/microsoft-internal-solorigate-investigation-update/">blog post </a></u>Thursday, Microsoft says the unauthorized access “has not put at risk the security of our services or any customer data.”</p>
<p>"We detected unusual activity with a small number of internal accounts and upon review, we discovered one account had been used to view source code in a number of source code repositories," Microsoft <u><a class="Link" href="https://msrc-blog.microsoft.com/2020/12/31/microsoft-internal-solorigate-investigation-update/">stated</a></u>. "The account did not have permissions to modify any code or engineering systems and our investigation further confirmed no changes were made. These accounts were investigated and remediated."</p>
<p>Source code is the basic building blocks of computer programs, like the instructions.</p>
<p>Last month, as news of the hacking campaign surfaced, Microsoft acknowledged using the IT management software SolarWinds Orion, which is how the attackers gained access to thousands of government, public, and private organizations.</p>
<p>Microsoft has said in earlier blog posts they were aware of clients they serviced who were compromised, Thursday’s update is the first time the company has confirmed the attackers compromised them.</p>
<p>Microsoft says they operate with a philosophy of making source code viewable, and do not rely on secrecy of this code for security. “So viewing source code isn’t tied to elevation of risk,” they stated.</p>
</div>
<p><script>
    window.fbAsyncInit = function() {
    FB.init({
        appId : '1374721116083644',
    xfbml : true,
    version : 'v2.9'
    });
    };
    (function(d, s, id){
    var js, fjs = d.getElementsByTagName(s)[0];
    if (d.getElementById(id)) {return;}
    js = d.createElement(s); js.id = id;
    js.src = "https://connect.facebook.net/en_US/sdk.js";
    fjs.parentNode.insertBefore(js, fjs);
    }(document, 'script', 'facebook-jssdk'));
</script><script>  !function(f,b,e,v,n,t,s)
  {if(f.fbq)return;n=f.fbq=function(){n.callMethod?
  n.callMethod.apply(n,arguments):n.queue.push(arguments)};
  if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0';
  n.queue=[];t=b.createElement(e);t.async=!0;
  t.src=v;s=b.getElementsByTagName(e)[0];
  s.parentNode.insertBefore(t,s)}(window, document,'script',
  'https://connect.facebook.net/en_US/fbevents.js');
  fbq('init', '1080457095324430');
  fbq('track', 'PageView');</script><br />
<br /><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br /><a href="https://www.wcpo.com/news/national/microsoft-admits-hackers-were-able-to-see-some-of-its-source-code">Source link </a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cincylink.com/2021/10/01/microsoft-admits-hackers-were-able-to-see-some-of-its-source-code/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>In crosshairs of ransomware crooks, cyber insurers struggle</title>
		<link>https://cincylink.com/2021/07/06/in-crosshairs-of-ransomware-crooks-cyber-insurers-struggle/</link>
					<comments>https://cincylink.com/2021/07/06/in-crosshairs-of-ransomware-crooks-cyber-insurers-struggle/#respond</comments>
		
		<dc:creator><![CDATA[cincylink]]></dc:creator>
		<pubDate>Tue, 06 Jul 2021 04:07:20 +0000</pubDate>
				<category><![CDATA[Cincy News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Cincinnati]]></category>
		<category><![CDATA[Cincy]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Local]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Recent]]></category>
		<category><![CDATA[Relevant]]></category>
		<category><![CDATA[Trending]]></category>
		<guid isPermaLink="false">https://cincylink.com/?p=67379</guid>

					<description><![CDATA[The cyber insurance industry, once a profitable niche, is now in the crosshairs of ransomware criminals. They have hacked brokerages and major insurers. Determining who has coverage and how much can help them pick targets and negotiate payments. Skyrocketing extortion demands and a rise in ransomware attacks has the industry teetering on the edge of &#8230;]]></description>
										<content:encoded><![CDATA[<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
</p>
<div>
<p>The cyber insurance industry, once a profitable niche, is now in the crosshairs of ransomware criminals. </p>
<p>They have hacked brokerages and major insurers. </p>
<p>Determining who has coverage and how much can help them pick targets and negotiate payments. </p>
<p>Skyrocketing extortion demands and a rise in ransomware attacks has the industry teetering on the edge of profitability. </p>
<p>Pressure is building on the industry to stop reimbursing for ransoms, but so far only one major cyber insurer, AXA, is doing so — and only with new policies in France. </p>
<p>To try to absorb the growing onslaught and stay profitable, insurers are retooling coverage, demanding clients up their security.</p>
</div>
<p><script>
    window.fbAsyncInit = function() {
    FB.init({
        appId : '1374721116083644',
    xfbml : true,
    version : 'v2.9'
    });
    };
    (function(d, s, id){
    var js, fjs = d.getElementsByTagName(s)[0];
    if (d.getElementById(id)) {return;}
    js = d.createElement(s); js.id = id;
    js.src = "https://connect.facebook.net/en_US/sdk.js";
    js.async = true;
    fjs.parentNode.insertBefore(js, fjs);
    }(document, 'script', 'facebook-jssdk'));
</script><script>  !function(f,b,e,v,n,t,s)
  {if(f.fbq)return;n=f.fbq=function(){n.callMethod?
  n.callMethod.apply(n,arguments):n.queue.push(arguments)};
  if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0';
  n.queue=[];t=b.createElement(e);t.async=!0;
  t.src=v;s=b.getElementsByTagName(e)[0];
  s.parentNode.insertBefore(t,s)}(window, document,'script',
  'https://connect.facebook.net/en_US/fbevents.js');
  fbq('init', '1080457095324430');
  fbq('track', 'PageView');</script><br />
<br /><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br /><a href="https://www.wcpo.com/news/national/in-crosshairs-of-ransomware-crooks-cyber-insurers-struggle">Source link </a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cincylink.com/2021/07/06/in-crosshairs-of-ransomware-crooks-cyber-insurers-struggle/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Colonial Pipeline paid $4.4 million to hackers after cyber attack</title>
		<link>https://cincylink.com/2021/05/21/colonial-pipeline-paid-4-4-million-to-hackers-after-cyber-attack/</link>
					<comments>https://cincylink.com/2021/05/21/colonial-pipeline-paid-4-4-million-to-hackers-after-cyber-attack/#respond</comments>
		
		<dc:creator><![CDATA[cincylink]]></dc:creator>
		<pubDate>Fri, 21 May 2021 04:28:15 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Cincinnati]]></category>
		<category><![CDATA[colonial pipeline]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[darkside]]></category>
		<category><![CDATA[dhnd]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Recent]]></category>
		<category><![CDATA[Relevant]]></category>
		<category><![CDATA[Trending]]></category>
		<guid isPermaLink="false">https://cincylink.com/?p=50764</guid>

					<description><![CDATA[The operator of the nation’s largest fuel pipeline confirmed it paid $4.4 million to a gang of hackers who broke into its computer systems.Colonial Pipeline said Wednesday that after it learned of the May 7 ransomware attack, the company took its pipeline system offline and needed to do everything in its power to restart it &#8230;]]></description>
										<content:encoded><![CDATA[<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br /><img decoding="async" src="https://cdn.cincylink.com/pub/content/uploads/sites/27/2021/05/Colonial-Pipeline-paid-44-million-to-hackers-after-cyber-attack.jpg" /></p>
<p>
					The operator of the nation’s largest fuel pipeline confirmed it paid $4.4 million to a gang of hackers who broke into its computer systems.Colonial Pipeline said Wednesday that after it learned of the May 7 ransomware attack, the company took its pipeline system offline and needed to do everything in its power to restart it quickly and safely, and made the decision then to pay the ransom."This decision was not made lightly," but it was one that had to be made, a company spokesman said. "Tens of millions of Americans rely on Colonial – hospitals, emergency medical services, law enforcement agencies, fire departments, airports, truck drivers and the traveling public."Colonial Pipeline's CEO, Joseph Blount, told The Wall Street Journal he authorized the payment because the company didn't know the extent of the damage and wasn't sure how long it would take to bring the pipeline's systems back.The FBI discourages making ransom payments to ransomware attackers, because paying encourages criminal networks around the globe who have hit thousands of businesses and health care systems in the U.S. in the past year alone. But many victims of ransomware attacks, where hackers demand large sums of money to decrypt stolen data or to prevent it from being leaked online, opt to pay."I know that’s a highly controversial decision," Blount told the Journal. "But it was the right thing to do for the country."Blount said Colonial paid the ransom in consultation with experts who previously dealt with the group behind the attacks, DarkSide, which rents out its ransomware to partners to carry out the actual attacks.Multiple sources had confirmed to The Associated Press that Colonial Pipeline had paid the criminals who committed the cyberattack a ransom of nearly $5 million in cryptocurrency for the software decryption key required to unscramble their data network.A ransom payment of 75 Bitcoin was paid the day after the criminals locked up Colonial’s corporate network, according to Tom Robinson, co-founder of the cryptocurrency-tracking firm Elliptic. Prior to Robinson’s blog post, two people briefed on the case had confirmed the payment amount to AP.Blount told the Journal the attack was discovered around 5:30 a.m. on May 7. It took Colonial about an hour to shut down the pipeline, which has 260 delivery points across 13 states and Washington, D.C., Blount said. That helped prevent the infection from potentially migrating to the pipeline's operational controls. But there are lingering issues. Blount said Colonial is still unable to bill customers following an outage of that system.The pipeline system delivers about 45% of the gasoline consumed on the East Coast, and Colonial, which is based in Alpharetta, Georgia, halted fuel supplies for nearly a week. That led to panic-buying and shortages at gas stations from Washington, D.C. to Florida.Colonial restarted its pipeline a week ago, but it took time to resume a full delivery schedule, and the panic-buying led to gasoline shortages. More than 9,500 gas stations were out of fuel on Wednesday, including half of the gas stations in D.C. and 40% of stations in North Carolina, according to Gasbuddy.com, which tracks fuel prices and station outages.___Associated Press Writer Frank Bajak contributed to this report from Boston.
				</p>
<div>
					<strong class="dateline">NEW YORK —</strong> 											</p>
<p>The operator of the nation’s largest fuel pipeline confirmed it paid $4.4 million to a gang of hackers who broke into its computer systems.</p>
<p>Colonial Pipeline said Wednesday that after it learned of the May 7 ransomware attack, the company took its pipeline system offline and needed to do everything in its power to restart it quickly and safely, and made the decision then to pay the ransom.</p>
<p>"This decision was not made lightly," but it was one that had to be made, a company spokesman said. "Tens of millions of Americans rely on Colonial – hospitals, emergency medical services, law enforcement agencies, fire departments, airports, truck drivers and the traveling public."</p>
<p>Colonial Pipeline's CEO, Joseph Blount, <a href="https://www.wsj.com/articles/colonial-pipeline-ceo-tells-why-he-paid-hackers-a-4-4-million-ransom-11621435636" rel="nofollow">told The Wall Street Journal</a> he authorized the payment because the company didn't know the extent of the damage and wasn't sure how long it would take to bring the pipeline's systems back.</p>
<p>The FBI discourages making ransom payments to ransomware attackers, because paying encourages criminal networks around the globe who have hit thousands of businesses and health care systems in the U.S. in the past year alone. But many victims of ransomware attacks, where hackers demand large sums of money to decrypt stolen data or to prevent it from being leaked online, opt to pay.</p>
<p>"I know that’s a highly controversial decision," Blount told the Journal. "But it was the right thing to do for the country."</p>
<p>Blount said Colonial paid the ransom in consultation with experts who previously dealt with the group behind the attacks, DarkSide, which rents out its ransomware to partners to carry out the actual attacks.</p>
<p>Multiple sources had confirmed to The Associated Press that Colonial Pipeline had paid the criminals who committed the cyberattack a ransom of nearly $5 million in cryptocurrency for the software decryption key required to unscramble their data network.</p>
<p>A ransom payment of 75 Bitcoin was paid the day after the criminals locked up Colonial’s corporate network, according to Tom Robinson, co-founder of the cryptocurrency-tracking firm Elliptic. Prior to Robinson’s blog post, two people briefed on the case had confirmed the payment amount to AP.</p>
<p>Blount told the Journal the attack was discovered around 5:30 a.m. on May 7. It took Colonial about an hour to shut down the pipeline, which has 260 delivery points across 13 states and Washington, D.C., Blount said. That helped prevent the infection from potentially migrating to the pipeline's operational controls. But there are lingering issues. Blount said Colonial is still unable to bill customers following an outage of that system.</p>
<p>The pipeline system delivers about 45% of the gasoline consumed on the East Coast, and Colonial, which is based in Alpharetta, Georgia, halted fuel supplies for nearly a week. That led to panic-buying and shortages at gas stations from Washington, D.C. to Florida.</p>
<p>Colonial restarted its pipeline a week ago, but it took time to resume a full delivery schedule, and the panic-buying led to gasoline shortages. More than 9,500 gas stations were out of fuel on Wednesday, including half of the gas stations in D.C. and 40% of stations in North Carolina, according to Gasbuddy.com, which tracks fuel prices and station outages.</p>
<p>___</p>
<p><em>Associated Press Writer Frank Bajak contributed to this report from Boston.</em></p>
</p></div>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br /><a href="https://www.wlwt.com/article/colonial-pipeline-hackers/36486505">Source link </a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cincylink.com/2021/05/21/colonial-pipeline-paid-4-4-million-to-hackers-after-cyber-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>FBI warns of &#8216;Zoom-bombing,&#8217; where teleconferences and online classrooms are hijacked</title>
		<link>https://cincylink.com/2020/03/31/fbi-warns-of-zoom-bombing-where-teleconferences-and-online-classrooms-are-hijacked/</link>
					<comments>https://cincylink.com/2020/03/31/fbi-warns-of-zoom-bombing-where-teleconferences-and-online-classrooms-are-hijacked/#respond</comments>
		
		<dc:creator><![CDATA[cincylink]]></dc:creator>
		<pubDate>Tue, 31 Mar 2020 20:00:17 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Cincinnati]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Federal Bureau of Investigation]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Hijack]]></category>
		<category><![CDATA[Recent]]></category>
		<category><![CDATA[Relevant]]></category>
		<category><![CDATA[Remote conferencing]]></category>
		<category><![CDATA[Trending]]></category>
		<category><![CDATA[Video]]></category>
		<category><![CDATA[Warn]]></category>
		<category><![CDATA[Warning]]></category>
		<category><![CDATA[Zoom]]></category>
		<category><![CDATA[Zoom-bombing]]></category>
		<guid isPermaLink="false">https://cincylink.com/?p=1750</guid>

					<description><![CDATA[BOSTON, Mass. – The Federal Bureau of Investigation (FBI) is warning people of “Zoom-bombing,” where hackers hijack teleconferences and online classrooms on the popular remote conferencing platform. FBI Boston said Monday that reports of “Zoom-bombing” are emerging nationwide as a growing number of people use Zoom to stay connected with colleagues and loved ones. The &#8230;]]></description>
										<content:encoded><![CDATA[<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
</p>
<div>
<p>BOSTON, Mass. – The Federal Bureau of Investigation (FBI) is warning people of “Zoom-bombing,” where hackers hijack teleconferences and online classrooms on the popular remote conferencing platform. </p>
<p>FBI Boston <span class="Enhancement"></p>
<p>                <span class="Enhancement-item"><a class="Link" href="https://www.fbi.gov/contact-us/field-offices/boston/news/press-releases/fbi-warns-of-teleconferencing-and-online-classroom-hijacking-during-covid-19-pandemic">said Monday</a></span></p>
<p>        </span></p>
<p> that reports of “Zoom-bombing” are emerging nationwide as a growing number of people use Zoom to stay connected with colleagues and loved ones. </p>
<p>The FBI says it has received multiple reports of conferences being disrupted by pornographic and/or hate images and threatening language. Two incidents were recently reported at Massachusetts schools. </p>
<p>In one instance, a high school reported that a teacher was conducting an online class using Zoom when an unidentified person dialed into the classroom. The individual reportedly yelled profanity and then shouted the teacher’s home address in the middle of instruction.</p>
<p>In the second instance, The FBI says a school reported that a Zoom meeting was accessed by an unidentified individual who was visible on the video camera and displayed swastika tattoos. </p>
<p>When using platforms like Zoom, the FBI recommends exercising due diligence and caution in your cybersecurity efforts. Investigators say to follow these steps to mitigate teleconference hijacking threats: </p>
<ul>
<li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;&#13;&#10;     mso-list:l0 level1 lfo1;tab-stops:list .5in;background:white">Do not make meetings or classrooms public. In Zoom, there are two options to make a meeting private: require a meeting password or use the waiting room feature and control the admittance of guests.</li>
</ul>
<ul>
<li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;&#13;&#10;     mso-list:l0 level1 lfo1;tab-stops:list .5in;background:white;box-sizing: border-box">Do not share a link to a teleconference or classroom on an unrestricted publicly available social media post. Provide the link directly to specific people.</li>
</ul>
<ul>
<li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;&#13;&#10;     mso-list:l0 level1 lfo1;tab-stops:list .5in;background:white;box-sizing: border-box">Manage screensharing options. In Zoom, change screensharing to “Host Only.”</li>
</ul>
<ul>
<li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;&#13;&#10;     mso-list:l0 level1 lfo1;tab-stops:list .5in;background:white;box-sizing: border-box">Ensure users are using the updated version of remote access/meeting applications. In January 2020, Zoom updated its software. In the security update, the teleconference software provider added passwords by default for meetings and disabled the ability to randomly scan for meetings to join.</li>
</ul>
<ul>
<li class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;&#13;&#10;     mso-list:l0 level1 lfo1;tab-stops:list .5in;background:white;box-sizing: border-box">Lastly, ensure that your organization’s telework policy or guide addresses requirements for physical and information security.</li>
</ul>
<p>If you were a victim of a teleconference hijacking, or any cyber-crime for that matter, report it to the FBI’s Internet Crime Complaint Center at <span class="Enhancement"></p>
<p>                <span class="Enhancement-item"><a class="Link" href="https://www.ic3.gov/" target="_blank" rel="noopener noreferrer">ic3.gov</a></span></p>
<p>        </span></p>
<p>. </p>
<p>Additionally, if you receive a specific threat during a teleconference, please report it at <span class="Enhancement"></p>
<p>                <span class="Enhancement-item"><a class="Link" href="https://tips.fbi.gov/" target="_blank" rel="noopener noreferrer">tips.fbi.gov</a></span></p>
<p>        </span></p>
<p> or call the FBI Boston Division at (857) 386-2000.</p>
</div>
<p><script>
  !function(f,b,e,v,n,t,s)
  {if(f.fbq)return;n=f.fbq=function(){n.callMethod?
  n.callMethod.apply(n,arguments):n.queue.push(arguments)};
  if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0';
  n.queue=[];t=b.createElement(e);t.async=!0;
  t.src=v;s=b.getElementsByTagName(e)[0];
  s.parentNode.insertBefore(t,s)}(window, document,'script',
  'https://connect.facebook.net/en_US/fbevents.js');
  fbq('init', '1080457095324430');
  fbq('track', 'PageView');
</script><script>
  window.fbAsyncInit = function() {
      FB.init({
              appId : '1374721116083644',
          xfbml : true,
          version : 'v2.9'
      });
  };
  (function(d, s, id){
     var js, fjs = d.getElementsByTagName(s)[0];
     if (d.getElementById(id)) {return;}
     js = d.createElement(s); js.id = id;
     js.src = "https://connect.facebook.net/en_US/sdk.js";
     fjs.parentNode.insertBefore(js, fjs);
   }(document, 'script', 'facebook-jssdk'));
</script><br />
<br /><script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Homepage Mid -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-3589745434615936"
     data-ad-slot="3681180123"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
<br /><a href="https://www.wcpo.com/news/national/fbi-warns-of-zoom-bombing-where-teleconferences-and-online-classrooms-are-hijacked">Source link </a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://cincylink.com/2020/03/31/fbi-warns-of-zoom-bombing-where-teleconferences-and-online-classrooms-are-hijacked/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
