fbpx
Open post

Man attempts to sue T-mobile because of cryptocurrency

The Fall of a Crypto Exchanger

Cryptocurrencies have been gaining momentum in the last few years as an alternative means of currency. However due to the means by which cryptocurrencies exist, they are susceptible to abuse and have been many time en-counting.

Many news posts and articles lately involve the same old story of hackers gaining control of computers and demand a ransom in cryptocurrencies using ransomware, or hackers have stolen online crypto wallets, or really anything you could probably come up with. It seems like hackers and crypto have been a match made in heaven, and sadly a certain perturbed man would probably agree.

Carlos Tapang of Washington state blames T-mobile for it’s lack of responsibility when his account was hacked and his cryptocoins stolen. The hackers had hacked Carlos’ phone and then altered the password on a crypto account and transfered his coin into the BitCoin and cashed out, netting a probable $20,000. After the hackers had hacked the phone, they also cancelled his number and transferred to AT&T in which T-mobile was not able to recover for over a day.

The suit points the finger to T-mobile for being at fault because apparently T-mobile had stated they would be adding PIN codes to Tapang’s account but they never did. Not only that, but Carlos states that through multiple attempts hackers can gain access to accounts through calling T-mobile’s support line and that his leaves him still vulnerable, as well as many others. To support his claims, Carlos had brought statements of anonymous users online about similar breaches they had occur with their T-mobile accounts.

Carlos is suing under the allegations that the event has caused “emotional distress” and a lot of “time, energy and expense”, so he is seeking  damages and injunctive relief, which may result in additive security measures by T-mobile.

Crypto in all forms is a risky endeavor, and hackers are always on the watch for a new trick to play and coin to pull.

Keep up to date on your technology and it’s vulnerabilities and solutions with RE2Tech. We make I.T. easy!

give us a call or send us an email and let’s take a look at your system and its defenses!

Phone: 952-223-4422

helpdesk@re2tech.com

Open post

Hackers Beware

I know you are all tired of seeing the word “hacker” everywhere. But to be honest, i’m certain it will only become more relevant as we move forward. Due to hackers playing such a prominent role in the modern world, our constant efforts to fight hackers and the ransomware and malware they bring forth will for the foreseeable future be a relevant topic.

This is where the wonderful news comes into play.  A program involved in the pursuit of technological advancements and it’s uses for human safety has taken the initiative in pursuing hackers before they can attack. The latest project from Alphabet’s X moonshot program has started a venture called “Chronicle”. Chronicle is tasked with locating hackers at a speed faster than any human currently can.

Alphabet is the parent company of Google, and stated on Wednesday that Chronicle would branch off and become it’s own company, and finding hackers, it’s main objective. The Chronicle company will develop hacker locating tools and machine learning tools to enhance the locating programs, to increase hacker localization.

Now I know what your thinking “There are plenty of cybersecurity firms already out there, so how is this any different?”. Well, Chronicle claims it may have an advantage above the currently live cybersecurity firms. The head of the Chronicle initiative stated, that by giving organizations a higher resolution of their security situation with the combination of machine learning, large amounts of computing power and storage, they believe they will be able to root out the false alarms that arise in cybersecurity due to the overwhelming amount of data. By preventing these false alarms, and being able to sift through the data of a network at a faster rate, they will be able to identify vulnerabilities and provide stronger security, that may be able to locate hackers before they have a chance to even attempt a deep hack.

This news is very exciting to an optimist like myself. Seeing news on a group that is fighting back against the online terrors and possibly providing a solution to smaller organizations and homes would be a fantastic accomplishment! Can you imagine a day when “hackers” become a term of the past and malicious malware activity becomes extinct? Ok maybe that is too optimistic. Anyway, in the meantime, we need to stay vigilant and on top of our networks! We at Re2tech have the luxuries of a small business, but the experience and work ethic of the bigger businesses! Give us a call today and let’s make I.T. happen!

Keep up to date on your technology and it’s vulnerabilities and solutions with RE2Tech. We make I.T. easy!

Have you taken precautions? Is your sensitive information at risk?

Give us a call or send us an email for all your I.T needs! We at Re2tech make I.T. happen!

Phone: 952-223-4422

helpdesk@re2tech.com

Open post

Hackers, and their modern day affect

The government has always had a side of it that is less than reputable, usually when it involves the interference of other countries and governments under the guise of “for our own good”. However as of late, it seems the government isn’t what we need to worry about when it comes to interference in others’ business. Hackers are taking the lead when it comes to invading others business, via the internet and the tools associated with that technology.

Hackers have been making headlines almost everyday this year thus far for their interference in things from hospital functioning to government elections. Hackers are becoming a force of their own, almost like a rampaging, no law country, doing what they feel like, when they feel like it. At times, hackers can be great vigilantes that help shine the spotlight that is the worlds population onto topics that have been hiding in the dark, forcing a necessary change. However as of late, it seems countries have begun recruiting this form of technological tool and using it as another means of persuasion and confusion.

Hackers are now being used by governments and country leaders to disrupt events like the Winter Olympics, and elections. A recent example is the hacking of a former sheriff’s Twitter account, to cause havoc and persuade people to see the former sheriff in a different, not so great light.

Former sheriff  David Clarke, a known right-wing, has become the target of Turkish hackers, attempting to smear Clarke’s name for decisions he has backed. Clarke is a known supporter of Donald Drumpf. It seems the hackers, known as “Ayyildiz Tim” which translates to “Star and Crescent team”, an obvious connection to the Turkish flag, use the hacked accounts they get, to send direct messages to Drumpf, which seem to hold Islamic sentiments and support for the Turkish president Erdogan. This comes as a surprise seeing as Drumpf has recently declared that Jerusalem is the capital of Israel, a large disrespect to those of the Islamic faith.

This very instance of hackers using technology to influence or bend people to their will or persuasion is truly a terrifying idea, but makes you question in what way this differs from the governments past actions.

No matter your view on the issue, what im sure everyone can agree on, is the displeasing realization that your account on any site or program has been altered and is being used by an outside party! Ensure your online security is strong and secure! Give Re2tech a call and let us help you learn about your network and the possible vulnerabilities that are present! Don’t wait until your hit by hackers and ransomware and make the next hacking news article!

Keep up to date on your technology and it’s vulnerabilities and solutions with RE2Tech. We make I.T. easy!

Have you taken precautions? Is your sensitive information at risk?

Give us a call or send us an email for all your I.T needs! We at Re2tech make I.T. happen!

Phone: 952-223-4422

helpdesk@re2tech.com

 

 

Open post

Hackers backed by Lebanese government affect thousands

Once again, hackers have made the headline! Supposedly, some hackers backed by the Lebanese government have had a phishing scam in progress for several years.

Recently, a group of security researchers have discovered a simple but obviously effective hacking method, that has been linked to affecting thousands of people. The location of the hacks have been tracked back to a specific building in Beirut Lebanon.

The amount of data stolen over the several years of phishing that has been amassed is well into hundreds of gigabytes. So how is it this had gone on for so long and no one was the wiser? Apparently the phishing method was created through a recycled infrastructure and really no special means.

The security researchers from Electronic Frontier Foundation along with the security firm Lookout, accomplished a backtrack of the phishing malware and were able to gain insight into the database that had been amassed in Lebanon. The singular building that was housing the server for this phishing malware was Lebanon’s Intelligence agency. The researchers were able to asses that years worth of espionage took place not only in the US, but also more than 21 other countries. This news can be terrifying, considering the plausible outcomes from such actions, like the recent US presidential election and Russia’s involvement, as well as recent headlines involving hackers rooting from North Korea and attempting to gain cyber access to the upcoming Winter  Olympics.

It seems as time goes by, the ability to hack into other countries and gain information is becoming increasingly easy for everyone. Even hackers in the US that attack businesses and other such places have become so common and part of the norm, we don’t bat an eye now. There are many indications that our presence online can and at some point will be accessed by outside parties, and we need to ensure the strongest cyber defenses we can for our private securities sake, among other things like financial security.

don’t wait until you make the headline of a news article to understand the important of a secure online presence. Call Re2tech today and let us help you learn about your home or business network, and improve its security abilities.

Stay safe and careful what you post.

Keep up to date on your technology and it’s vulnerabilities and solutions with RE2Tech. We make I.T. easy!

Have you taken precautions? Is your sensitive information at risk?

Give us a call or send us an email for all your I.T needs! We at Re2tech make I.T. happen!

Phone: 952-223-4422

helpdesk@re2tech.com

Open post

Hospital in Greenfield held hostage to hackers

Late last Thursday, Jan 11th, a hospital in Greenfield had become the victim to a hackers malware. The malware was ransomware that had locked up their computer systems, preventing access to patient information and other necessary medical records.

Part of the Greenfield health network became locked down due to ransomware, preventing further medical action for more than 1,400 patients, who’s files were changed to the name “im sorry”. The hacker or hackers had given the hospital seven days to pay the ransom or the files would be encrypted permanently, causing huge issues for the potential safety of the patients who’s files had been locked.

An analysis since the attack was conducted and confirmed that no patient data had been stolen. The location of the hackers are believed to be somewhere in eastern Europe, stated Steve Long, the CEO of Hancock Health. The files affected by the ransomware could have been retrieved from a back up location, however the time it would have taken to recover that information would have been costly, so the ransom was paid.

The ransom amount was $55,000, through the currency known as Bitcoin, a cryptocurrency that is almost untraceable. Four bitcoins would be sufficient for the payment and would unlock the hospital records. Once the payment was received the hackers had released the documents and stayed true to their word. There is expectation that some of the technology will be a little off as a result from the outside hack, and there had been reports of a couple screens flashing the ransomware again, however it was only momentary and did not reactivate.

It was learned that the hackers had gained access through the hospitals remote-access portal, logging in with an outside vendors credentials. Initially it was believed that an employee had opened an email that contained the ransomware on accident.

As a response to the recent invasion, the hospital enlisted some help and knowledge from the FBI and cyber-security companies to ensure there is no residual affects, and inquire about other actions that could have been taken, as well as way to prevent the same problem from occurring again. As an added security measure, hospital leaders asked employees to alter their passwords  and implemented new software that can detect patterns indicating a similar attack may be on the horizon.

Luckily this hacker group or person had stayed true to their word, otherwise the files of patients would have been missing for a few days, possibly causing complications for patients and hospital employees alike. 2018 is turning out to be rough, and we are only 16 days in. Let’s all pull together and ensure our tomorrows are brighter than our yesterdays! Have a great week everyone!

Keep up to date on your technology and it’s vulnerabilities and solutions with RE2Tech. We make I.T. easy!

Have you taken precautions? Is your sensitive information at risk?

Give us a call or send us an email for all your I.T needs! We at Re2tech make I.T. happen!

Phone: 952-223-4422

helpdesk@re2tech.com

Open post

Hackers hit Lumen cryptocurrency wallets

January 13th, all was right, until a sneaky little hacker came crawling in the night. To steal and plunder, wallets oh wonder, riches they desire watch them set fire. So basically, hackers have stolen crypto wallets from the Stellar Lumen currency.

Thus far there has been no claim as to who has stolen the wallets of Lumen crypto users, but we do know how they got access. The hacker or hackers, hijacked the DNS server for a web-based wallet application known as BlackWallet.co. Once inside, the malicious force redirected the activity from BlackWallet to their own server. Through this endeavour they have claimed about $400,000 from those who stored XLM coins in their wallets.

A security researcher analyzed the code of the site before BlackWallet regained control, and found that the DNS hijack would move the wallets that had 20 or more Lumens towards the hackers server, efficiently racking up Lumens to cash out on. Apparently the BlackWallet team and other XLM owners had attempted to inform the community that the server had been hacked using social media sites, but to no avail. People still logged into their accounts and watched as their money disappeared like magic. An estimated 669,920 Lumens were stolen.

BlackWallet has posted the address of the hackers wallet online to keep track of it. The hackers have attempted to exchange their coins for a different currency to hide their tracks. The hackers are using the Bittrex currency exchange to do so, and BlackWallet is attempting to get into contact with Bittrex in order to stop the specified account and return the specific funds back to the related accounts.

Thus far, there is no new news as to the transpiring events.

I’ve said it before, and will say it again, cryptocurrency is a risky business. Be careful what you invest into and be sure to watch for any relating news to it!

 

Keep up to date on your technology and it’s vulnerabilities and solutions with RE2Tech. We make I.T. easy!

Have you taken precautions? Is your sensitive information at risk?

Give us a call or send us an email for all your I.T needs! We at Re2tech make I.T. happen!

Phone: 952-223-4422

helpdesk@re2tech.com

Open post

Russia inbound, hackers take a crack at Senate email

Recently announced, a Russian hacker group known as “Pawn Storm” has taken to the web for a bold attack on the Senate. In an attempt to gain email access, tensions rise in the US governments management of the continual Russian online invasions from hackers abound.

This hacking group has been known for its penetration of the Democratic National Committee and has been known to make many brazen attacks on US networks over the past eight months. One of the main focuses of the group is the Senates internal email system. This news is following the report of another Russian affiliated hacker group known as “Fancy Bear” attempting to hack into accounts dealing with the Winter Olympics.

Trend Micro. Inc. was responsible for bringing forth news of this recent hacking attempt and states that Pawn Storm’s attacks that began in 2017 has since set phishing sites that mimic active government directory services, causing issues for accountability. It was made clear however that despite the hackers attempts, the U.S. Senate ADFS server is not reachable on the open internet.

The hacking group has been making false identity accounts and emailing personnel that their password has expired, and since they take the guise of Microsoft Exchange, it’s harder to discern the real from the fake. There has been talk that Pawn Storm has been on the radar for four years, due to their involvement in phishing activity against political organizations in Iran, France, Germany, Montenegro, Turkey and Ukraine. It is believed that Pawn Storm wants to influence the public in some manner, and are searching for leak worthy information.

Cozy Bear, Pawn Storm and Fancy Bear are the three main hacking groups from Russia right now causing a ruckus in the online world. There is belief that Pawn Storm is linked to Russia’s military intelligence service. Other security firms who have had run-in’s with the other hacking groups, have made comments that they believe Cozy Bear and Fancy Bear are also sponsored by the Russian government.

Tensions rise online just 12 days into the new year. Hopefully there will be some cooling time before the next barrage of bad bear news! That’s all for today folks!

 

Keep up to date on your technology and it’s vulnerabilities and solutions with RE2Tech. We make I.T. easy!

Have you taken precautions? Is your sensitive information at risk?

Give us a call or send us an email for all your I.T needs! We at Re2tech make I.T. happen!

Phone: 952-223-4422

helpdesk@re2tech.com

Open post

Russia has been banned from the 2018 Olympics, possibly connected to Olympic hacking

Recently we had a post involving some hacking attempts against those in cooperation with the 2018 Winter Olympics. The hacking attempts involved sending malware-full emails from spoof accounts to those with information on the progression and supervising of the 2018 Winter Olympics in Pyeonchang.

Russia had been banned from the Olympics a little over a month ago due to the conclusion of the International Olympic Committee in response to Russia’s exposure of systematic doping. Now, as of recent, hackers involved with the Russian government has released emails pertaining to stolen information from the International Olympic Committee.

The hackers have claimed the name “Fancy Bears” which is a reference to the games’ mascots. The cybersecurity firm ThreatConnect stated that an earlier hack involving the Olympics, was the work of a Russian military intelligence. The hackers had gone live and published the email on Wednesday the 10th, through the means of a website that was relevant in 2016 in relation to Russia’s doping exposure.

The origins of the emails are still unknown. The emails spanned all the way back to 2016 to spring of 2017 and involved messages between IOC employees and the third parties that discussed the Russian doping conspiracy. Fancy Bear had posted a comment along with the release of the emails, stating “Europeans and Anglo-Saxons are fighting for power and cash in the sports world.”

Despite the public attention to the emails, there has been no confirmation or denial of any of the stated information by IOC members.

Crazy is the things that come about when hackers are involved. The Winter 2018 Olympics will surely be something eventful, if not for the sport achievements alone.

Keep up to date on your technology and it’s vulnerabilities and solutions with RE2Tech. We make I.T. easy!

Have you taken precautions? Is your sensitive information at risk?

Give us a call or send us an email for all your I.T needs! We at Re2tech make I.T. happen!

Phone: 952-223-4422

helpdesk@re2tech.com

Open post

McAfee twitter account hacked, cryptocurrencies may be next

Everyone knows of the virus security program McAfee, so that will make this information a little funny, but the cyber security expert John McAfee’s twitter account had been hacked.

This curious turn of events had occurred in order to promote specific alternative cryptocurrencies to invest in. Last week, McAfee’t twitter account had been hacked and abused to recommend cryptocurrencies, in the assumption that the hacker had invested in the same stock and was trying to cause a surge in the stock pricing to make some money.

McAfee  had posted a tweet clarifying that the twitter posts called “Coin of the day” was not made by him, and that his account was hacked. McAfee warns others of the potential danger in new hacking methods that had been used on him to attain his twitter account. The hackers had apparently changed the accounts linked phone number in order to attain the password with the “lost password” function. McAfee stated that this form of hacking has not been seen before, and that everyone else should be weary as well.

The hackers who posted tweets on McAfee’s behalf induced a rise in certain stocks of the cryptocurrency world, probably producing a nice lump sum of money for the hackers. There is speculation that AT&T had someone from the inside causing the problems, and that would explain the new phenomenon involving the phone number change on the account. McAfee regained control of his account three days after the incident and attempted to defend himself from the ridicule that followed.

There is further speculation that another large hack will occur in the cryptocurrency market, and that those who are investing should move their earnings to a private online wallet. Due to cryptocurrencies being a million dollar market, the target is big and red all over and in the cross-hairs of probably every hacker out there.

Keep yourselves safe everyone, and if you are in the crypto game, move that money before you lose it, like those involved in the Nicehash hit.

contact_us_button

Posts navigation

1 2 3 4
Scroll to top