cybercrime

Data theft from millions of Office365 customers

Tags: cybercrime, Datendiebstahl, Office365

A security researcher was able to place his own results at the top of Bing, Microsoft’s search engine, and add malware to them. He could have used it to steal access cookies from logged-in Office365 customers. Azure Active Directory is offered by Microsoft as a cloud service, but is also used for internal identity management services. The security researcher was able to gain access to internal administration tools for the Bing search engine through a misconfiguration.

Continue Reading

Worldwide ransomware attack on thousands of servers

Tags: cybercrime, ransomware

At the beginning of February, the BSI and other media reported that thousands of ESXi servers, which are used for the virtualization of IT processes, were encrypted in a globally widespread ransomware attack. The countries most affected were France, USA, Germany and Canada, but other countries were not spared either. Ransomware, also known as extortion Trojans, denies users access to data or the entire computer system. The data is encrypted or access is prevented and a ransom is demanded for decryption or release, or the data is threatened to be made public.

Continue Reading

ChatGPT as a new weapon of cybercriminals?

Tags: cybercrime, ChatGPT, Chatbot

Cybercriminals have also recognized the potential of OpenAI’s ChatGPT chatbot and have begun using artificial intelligence to quickly develop hacking tools. Cyber security researchers gave this warning earlier this year. Speaking to Forbes, an expert who monitors criminal forums reported that scammers are testing ChatGPT to use it to build other chatbots that pose as young women to ensnare targets. Many of the early ChatGPT users had already expressed the fear that the app, might be capable of coding malicious software that spies on users’ keyboard strokes or creates ransomware.

Continue Reading

Cyberattack on French hospital

Tags: cybercrime, cyberattack, hospital

For the second time, a French hospital has fallen victim to a cyberattack. The hospital of Versailles, near Paris, was attacked in early December. French Health Minister François Braun said that several patients had to be transferred. Two hospital sites and a nursing home were affected by the attack. The attack resulted in limited patient admissions, a shutdown of the EDP system and the deployment of a crisis team. Further, the attack led to the need for more staff in the intensive care unit.

Continue Reading

Cyber attack on Australian health insurance company

Tags: cybercrime, hacking

A major Australian health insurance company has become the target of a hacker attack. According to police sources, a Russian network is behind it. Reece Kershaw, spokesman for the Australian National Police, said: “Our findings points to a group of loosely connected cybercriminals who are likely behind other massive security breaches in countries around the world.” Further, he stated, “Millions of Australians were likely affected by the hacking attack. This cyberattack is an unacceptable attack on Australia and deserves a response commensurate with the malicious and far-reaching consequences this crime causes.

Continue Reading

The biggest security gap are the employees

Tags: cybercrime, password

Each and every one of us poses the greatest risk to the security of our company’s IT system. “If I want to attack someone, I typically do it through employees. It’s much easier than trying to outsmart technology.” says Peter Leppelt, CEO and Co-Founder of Praemandatum. Almost every 2nd hack is due to human error. One popular method is e-mail spoofing. You pretend to be someone else. Another method is to put USB sticks in parking lots which then are plugged into company computers.

Continue Reading

Cybercrime affects us all

Tags: cybercrime, password

What is the most commonly used password in the world? The answer: 123456. Scary, isn’t it? This shows how carelessly people still treat the security of personal data. The danger posed by cybercrime has not yet reached the general public. Yet it is now a global business worth billions, with professionally organized criminals offering their services on the darknet. In Germany alone, the damage to companies from cyberattacks in 2021 was 223 billion, which was twice as high as in 2019 and four times as high as in 2017 (data according to the industry association Bitkom).

Continue Reading

Popular password manager Lastpass: victim of cyber thieves

Tags: cybercrime, password

The free add-on Lastpass for Internet Explorer, Firefox and Google Chrome, is a password manager and generator that stores the user’s passwords encrypted in a list. It can also generate passwords new passwords. The company, which has its core competence in online security, has itself been the victim of a cyberattack. On Thursday, the company announced that its source code had been stolen. An unauthorized party had an access to parts of the development area via a compromised developer account, says the blog post on the company’s site.

Continue Reading

Chambers of Commerce and Industry as Targets of Hacker Attacks

Tags: cybercrime, chamber of industry, chamber of commerce

Following technical problems, websites at chambers of commerce and industry in several German states went down or were deliberately shut down on Thursday. It is possible that this was a cyberattack. Many computers were shut down for security reasons. After a tip-off from Dortmund in the morning about a DDos attack, in which the target systems are bombarded with data by hackers until they give up their service, many chambers went offline as a precaution.

Continue Reading

Security Assessment

Tags: security, cybercrime, network, endpoint, firewall

Information Security Assessment The Information security landscape is ever-evolving and growing in complexity. New technologies for defense and control emerge almost daily and protecting the network alone is no longer enough to keep your data safe. Developing an effective Information Security Strategy requires that data, endpoint and web application security is audited along with the network infrastructure itself. Risk Analysis & Security Assessments Before a successful security strategy can be developed, an assessment of your current environment must take place to identify your security baseline.

Continue Reading

Are you interested in our services or do you have general questions?

Message our team today to receive an initial assessment.

Contact

Contact

SNOKE CONNECT S.L.

 Camino del Morro, 17
 35640, La Oliva, Spain
moc.tcennoc-ekons@tcatnoc