Major University In California Pays Large Ransom After Ransomware Attack

The University of San Francisco (UCSF) is the latest organization to fall victim to hackers, running afoul of a group utilizing the Netwalker ransomware strain.

UCSF is a research university whose recent efforts have been focused on health sciences generally and COVID-19-related research specifically. On June 3rd, 2020, Netwalker published a notice on a site they use for data leaks.

It stated they had successfully breached the UCSF network, publishing a sample of the files stolen during their attack. The sample included a number of student applications, complete with social security numbers, and screen shots of folder listings that appeared to contain financial information, medical studies, university employee information and the like. Later the same day that the post and samples appeared on the Netwalker leak site, UCSF confirmed the attack.

Their formal statement on the matter reads in part, as follows:

“As we disclosed on June 3, UCSF IT staff detected a security incident that occurred in a limited part of the UCSF School of Medicine’s IT environment on June 1.

We quarantined several IT systems within the School of Medicine as a safety measure, and we successfully isolated the incident from the core UCSF network. Importantly, this incident did not affect our patient care delivery operations, overall campus network, or COVID-19 work.

The data that was encrypted is important to some of the academic work we pursue as a university serving the public good. We, therefore, made the difficult decision to pay some portion of the ransom, approximately $1.14 million, to the individuals behind the malware attack in exchange for a tool to unlock the encrypted data and the return of the data they obtained.”

It’s a staggering sum that underscores just how serious these kinds of attacks can be. Worse, over the last several months, UCSF is the third university to be successfully attacked. With months to go in 2020, they will almost certainly not be the last.

If 123456 Is Your Password, Change It Immediately

You probably aren’t familiar with the name Ata Hakcil. He’s a computer engineering student who recently conducted one of the largest password security surveys currently available.

To conduct his research, he collected a number of username and password “data dumps” from the Dark Web and analyzed the passwords he found there. Hakcil was able to analyze a massive collection of more than a billion passwords, looking for trends and commonalities.

IT Security Professionals have long known that password security is an area of persistent weakness that leaves companies of all shapes and sizes exposed. Hakcil was able to measure and assess just how bad that problem is. What he found was depressing.

The most commonly used password in the collection he analyzed was simply ‘123456,’ which appeared in his dataset more than seven million times. It is the most widely used password in the world. Put another way, a staggering 1 person in 142 was found to have used that simple password. As you might suspect, that is laughably easy for a hacker to guess using the simplest of techniques.

In addition to that, Hakcil discovered that the average password length is 9.48 characters, which isn’t great. Given the password referenced above, is better than you might have guessed.

Other relevant and intriguing statistics culled from this study include things like:

  • Only 12 percent of passwords include a special character
  • 29 percent of the passwords reviewed used alphabet characters only
  • 13 percent used numbers only
  • Given the above, fully 42 percent of all the passwords in the dataset were vulnerable to quick “dictionary style” attacks that would allow a hacker to gain access with minimal effort.
  • The most common 1000 passwords unearthed by this research accounted for 6.607 percent of the total, which gives hackers a long list of low hanging fruit to work with.
  • With the most common 1 million passwords, the hit rate is 36.28 percent. With the most common 10 million passwords, the hit rate is 54 percent. This makes most networks incredibly easy to breach.

If you’re wondering why we keep reading about so many high profile data breaches month after month, the results of this research go a long way toward explaining it, and that’s unfortunate.

Hackers Used Favicon Website To Steal Credit Card Information

Hackers are constantly on the lookout for new ways of causing mayhem and stealing data.

Recently, researchers have unearthed a new technique to be on guard against. A few hackers have begun embedding credit card stealing scripts inside favicon meta data.

If you’re not familiar with the term, you definitely know what a favicon is.

It’s a custom icon used by websites for branding, associated with a specific URL. Although not universal, they are ubiquitous on the web and most companies have them.

While the idea of embedding malicious scripts on websites to steal credit card information is not new, the notion of hiding those scripts in the EXIF files of a company’s favicon to avoid detection is both new and innovative. The new technique was spotted by researchers at Malwarebytes. They discovered the script embedded as described above, and designed to steal credit card data from sites making use of a popular WordPress ecommerce plugin called WooCommerce.

Of course, the script could be modified to attack any other ecommerce platform, so this isn’t a threat that’s unique to those making use of WooCommerce. If you do use that plugin, you should have your IT staff perform a careful check of your system to ensure that you haven’t been compromised. The value of embedding the script here is that most scans don’t include favicon meta data by default. Fortunately, that’s easily fixed. So going forward, as long as you be sure to include it, then your risks should be minimal.

This is by no means the first time hackers have found an unusual point of insertion for the scripts they rely on to cause harm, and it certainly won’t be the last. Just be sure that your IT staff is aware of the issue and stay vigilant.

Credit Card Data Breach Affects Popular Jewelry And Accessory Store

Claire’s Jewelry and Accessories is the latest company to fall victim to hackers.

According to a recent disclosure made by the company, both the retail giant’s main website, and the website of their subsidiary, Icing, were compromised.

They were hit by what appears to be a Magecart attack.

The company’s disclosure reads in part as follows:

“On Friday, we identified an issue related to our e-commerce platform and took immediate action to investigate and address it. Our investigation identified the unauthorized insertion of code to our e-commerce platform designed to obtain payment card data entered by customers during the checkout process. We removed that code and have taken additional measures to reinforce the security of our platform.

We are working diligently to determine the transactions that were involved so that we can notify those individuals. Cards used in our retail stores were not affected by this issue. We have also notified the payment card networks and law enforcement. It is always advisable for cardholders to monitor their account statements for unauthorized charges.

The payment card network rules generally provide that cardholders are not responsible for unauthorized charges that are timely reported. We regret that this occurred and apologize to our customers for any inconvenience caused”

The attack apparently came just one day after the retailer closed down all of their brick and mortar shops worldwide as a result of the COVID-19 pandemic. Based on the investigation to this point, the hackers were actively trying to steal customer credit card data between April 30th and June 13th, 2020.

If you or any member of your family has made a purchase on either the Claire’s website or their subsidiary site Icing, be aware that your payment card information may have been compromised. Be sure to alert your credit card issuing company right away, and be on the alert for any suspicious charges that may appear on the card or cards used to make those purchases.

Nintendo Switch User Information Breach Affected Over 300,000 Users

A couple of months ago, Nintendo announced that their Switch gaming and live streaming service had been hacked, and as a result, some 160,000 user accounts had been compromised. As the company has continued their investigation into the incident, however, they’ve updated their disclosure, revealing that an additional 140,000 accounts were compromised, bringing the total to just over 300,000.

The information gained as a result of the hack includes screen names, dates of birth, the email addresses associated with each account, location, and gender data. If there’s a silver lining to be found in the incident, it is the fact that credit card information does not appear to have been accessed.

Also note that based on information provided by Nintendo, it appears that the hackers used brute force and other methods to access accounts, as opposed to taking advantage of some type of security flaw. The company also reports that although the total number of compromised accounts has increased markedly, it still represents less than 1 percent of the total accounts on the platform.

If anything, these types of attacks are only increasing in their frequency, so the usual recommendations still apply. Change your passwords on a regular basis. Use a different password on each of the websites you frequent. If you are in the habit of using the same password on multiple web properties, it’s long past time to break that habit. If a hacker gets into one account, you’ve just handed him the keys to large swaths of your digital kingdom.

Also, anytime it’s offered, enable and use two-factor authentication, which provides an added layer of security. If you want to be extra cautious, it wouldn’t hurt to make use of a VPN on top of that. Even if you don’t have the funds to use a paid service, there are a number of decent quality free ones available. Stay safe out there.