Infosec Round-Up Aug 20th

Play Video

T-Mobile Breach, Watchlist Leaked, Brazil Ransomware

This is the Hut Six InfoSec Round-Up, where we look at some of the most pressing matters, latest trends, and industry news from across the world of information security.

T-Mobile Data Breach

The mobile carrier T-Mobile has announced that the personal information of over 48 million customers has been breached in a major cyber attack.

Occurring last Monday and affecting US customers, the breach came to light following reports that cyber criminals were attempting to sell the large dataset via an online marketplace. Data which the company states is personal information, and not financial.

Containing the records of around 7.8 million current customers, as well as over 40 million records of prospective or former customers, few details regarding the attack have been made public, with the company referring to it only as a “highly sophisticated cyberattack”.

Reportedly taking immediate steps to help protect the individuals at risk, the company is recommending customers change PINs, are offering additional security features, as well as providing two years of free identity protection services.

In a public statement, T-Mobile notes, “We take our customers’ protection very seriously and we will continue to work around the clock on this forensic investigation to ensure we are taking care of our customers in light of this malicious attack.”

No-Fly List Exposed

A secret terrorist watchlist containing 1.9 million records, had been discovered by a security researcher exposed on an Elasticsearch server.

With no password protection, and containing the names, citizenship, date of birth and no-fly statuses, it is uncertain where the records have come from, though its discoverer suspects it may have originated from the Federal Bureau of Investigation’s (FBI) Terrorist Screening Centre (TSC).

With the FBI “no commenting” the matter, the TSC list is used by multiple federal agencies to share counterterrorism information, including the Department of State, Defence, and the Transportation Security Authority (TSA).

Uncovered in mid-July of this year, the database was reported to the U.S Department of Homeland Security (DHS) the same day, with the server being taken down around three weeks later.

The man responsible for the discovery, Bob Diachenko noted, “In the wrong hands, this list could be used to oppress, harass, or persecute people on the list and their families… It could cause any number of personal and professional problems for innocent people whose names are included in the list.”

Brazil Government Ransomware Attack

Brazil’s Ministry of Economy has revealed a ransomware attack that has affected portions of the country’s National Treasury computer systems.

Occurring late last week, the government have stated that the attack was promptly contained following its detection and that the incident did not cause any notable damage.

Noting that they would disclose information regarding the attack in a “timely manner and with “due transparency”, it was only April when Brazil’s court system was forced to shut down due to an attack by the REvil ransomware syndicate.

In July, the Brazilian government had announced the creation of a cyberattack response network, designed to promote coordination between federal bodies and improve response time.

In a statement, the government noted: “It was evaluated that the action did not generate damage to the structuring systems of the National Treasury Secretariat, such as the Integrated System of Financial Administration (SIAFI) and those related to public debt.”

Thank you for reading this edition of Infosec Round-Up. Please be sure to subscribe to the Hut Six YouTube Channel to keep up to date with the latest news and see all our latest information security videos.

Security Awareness for your Organisation

Enjoyed our blog? Learn more about how Hut Six can help improve you security awareness with training and simulated phishing. Start a free trial now, or book a meeting with one of our experts.

Featured

The importance of an email security policy

Why Organisations Need an Email Security Policy

An email security policy is a document describing how an organisation's email system should, and most importantly, should not be used.

Preventing Human Error in Information Security

Human Error in Information Security

When Human Error is found in information security, it is often avoidable errors that allow much larger consequential problems to arise.

Security Awareness - Return on Investment

Investing in Information Security Awareness Training

Investing in Information Security Awareness Training - educating people against cyber threats should be considered essential for any organisation operating in 2021

Microsoft Teams Security

How Secure is Microsoft Teams?

How Secure is Microsoft Teams? Information Security blog by Information Security Awareness solution provider Hut Six Security

Enterprise Data Regulation

Best Ways To Ensure Enterprise Data Regulation

Best Ways To Ensure Enterprise Data Regulation guest blog by technivorz.com and information security awareness solution Hut Six Security.

Disaster Recovery Plan

Writing a Disaster Recovery Plan

Writing a Disaster Recovery Plan: information security planning blog by information security awareness solution provider Hut Six Security.

Security Program Policies for 2021

What Policies Do I Need for a Security Program?

Security program policies blog by information security awareness training provider Hut Six Security.

Security Awareness Training for Cyber Essentials

Preparing for Cyber Essentials with Information Security Awareness Training

Security awareness training for Cyber Essentials blog by information security awareness training provider Hut Six Security.

Security Awareness in 2021 - what has changed?

Information Security Awareness Training in 2021

Information Security Awareness Training in 2021 blog by information security awareness training platform Hut Six Security

Virtual Privacy Networks for Businesses

The Five Best VPNs for Work

What are the best VPNs for work? - VPN review blog by security awareness training provider Hut Six Security.

Speak to us about your Cyber Awareness