Burrito buyers beware | This week in cybersecurity
Chipotle may have been the target of a data breach. Chipotle is investigating credit card transactions made from March 24 through April 18 with cyber security firms, law enforcement and its payment processor, and said it believes it has stopped the unauthorized activity. Read more.
Locky, the ransomware that drove last year's boom in file-encrypting malware is back, and this time it's even harder to detect. The Locky campaign is borrowing an infection technique associated with the Dridex botnet, in an effort to boost the chance of compromising targets. Read more.
A security researcher has come up with a free tool that can tell if you’re computer has been infected with NSA spyware. Luke Jennings of security firm Countercept wrote a script designed to detect an implant called Doublepulsar, which is delivered by many of the Windows-based exploits found in the leak on NSA cyber weapons and can be used to load other malware. Read more.
Leading French presidential candidate Emmanuel Macron's campaign reportedly was hit with cyberattacks from Pawn Storm, an alleged group of cyber spies with ties to Russian military intelligence agency. Read more.
Nearly 9,000 computer servers based in southeast Asia are infected with or currently dispensing malware, according to a newly unveiled Interpol-led operation.Interpol revealed to ZDNet that, “8,800 of the servers across eight countries were found to be infected with various malware codes including those targeting financial institutions and used to launch DDoS (distributed denial-of-service) attacks.” In addition, 270 websites were infected. Read more.
Fortune revealed in 2013, a 40-something Lithuanian named Evaldas Rimasauskas allegedly hatched an elaborate scheme to defraud U.S. tech companies by forging email addresses, invoices, and corporate stamps in order to impersonate a large Asian-based manufacturer with whom the tech firms regularly did business. Read more.
An estimated 2 million Android users have now fallen victim to malware mistakenly downloaded from Google Play, which was initially reported to have affected approximately 600,000 users. Read more.