logo

Search the Web for News on Computer Security Breaches

7 Pages2118 Words43 Views
   

Added on  2020-03-01

Search the Web for News on Computer Security Breaches

   Added on 2020-03-01

ShareRelated Documents
Task 1 - Search the web for news on computer security breaches that occurred during April-August 2017. Research one such reported incident (Excluding the May 2017 ransomwarecyber-attack). Prepare a report focusing on what the problem was, how and why it occurredand what are the workable solutions.Answer-1.a News on computer security breaches are list down below:Petya Malware grounds interruption beyond the Globe, Europe Worst HitBotezatu said a new program arose near about identic to GoldenEye, an alternative of anaccepted family of captive-considering programs accepted as “Petya.” It usually demanded $300 inBitcoin.Verizon (July 13, 2017)According to report near about 14 million Version subscribers might have been affectedbecause of a data breach. And maybe you are one of the candidate from then if you ever contactedwith Verizon customer care service in the last 6 months. All the records were adhered on a serverthat was under control of Israel placed Nice systems. Chris Vickery, with security firm UpGrad haddiscovered this data breach. In late June, he apprized and it hold more than q week to secure thedata. Log files which come into actual data develop the when any customer contacted the Verizoncompany via phone. OneLogin (May 31, 2017)It is a company which allows multiple users to administer number of sites and applicationwith the help of a cloud based platform, it is San Francisco based company and noticed an issue ofdata breach. The attack on OneLogin started on 31st May at 2AM and shut down at 9AM. Becauseof this attack all the customers data were negotiated as this time, along with the capability todecrypt encrypted data. And, the investigation is still going ahead and the complete duration of thebreach is still unknown. This app manages 2,000 companies in total 44 countries, more than 300app vendors and more than 70 SAAS providers.1
Search the Web for News on Computer Security Breaches_1
Gmail (May 3, 2017)A phishing scam was planned against Gmail users, which were planned for gaining theaccess to user’s account with the help of some third-party application. The email was looks similaras they are from user’s list of trusted contact and alert the each and individual that they are lookinglike they want you to share some Google Doc with them. But when user clicked on the email toopen it, it loads at the actual Google’s security page on which that person could manage fake googleDocs. But this scam stops in an hour only still 1 million users got affected.1.b For this assignment, I have gone through with many computer security news and done myresearch on “Petya ransomware”.What is “Petya Ransomware”?It is a ransomware which belongs to the encryption ransomware family. It was first detectedin 2016 and then again in June 2017 for cyberattack. It basically infects the Microsoft Windowsbased systems, infect the master boot record of the system so that it can execute a payload whichcan encrypts a hard drive’s file system. Like WannaCry ransomware it also asks to user for bitcointo gain the access and decryption of data. In Europe and the US large firms were effected muchrather than others with some Russian steel and oil firms and French construction material etc. But itonly tried to transmit only internally in reach of the same network but not externally. This reasoncan cause of decrease in transmission of new infections overnight. How it occurred?“Petya” ransomware takes control over the computers and then counterclaim for $300which needs to be paid in Bitcoin. This ransomware spread within network only internally, so itspreads all over the organization and once a computer machine is infected with the help ofEternalBlue vulnerability in Microsoft Windows system or you can also say with the help of twowindows administrative tools. While comparing Petya with WannaCry, it has better contrivance tospread all over the organization as it tries for another option if one does not work said RyanKalember, of cyber security company Proof Point.It infects the master boot record with overwriting the windows boot loader and then try tobring about restart. When the system restarts, payload will execute at that time Master File Table ofNTFS file system will get encrypted. After encryption, it will show some ransom message whichdemands for some money in bitcoin. The first version of petya changes its payload with a PDF file2
Search the Web for News on Computer Security Breaches_2
which is attached to an email. National Cyber security and Communication Integration Center(NCCIC) and the US Computer Emergency Response Team (US-CERT) released Malware InitialFindings Report (MIFR) about “Petya” on 30th June 2017.Protection against “Petya” RansomwareThe largest considerable activity antivirus companies now a day’s claims that detection andprotection across “Petya” infections have updated software. Products of Symantec acceptingdefinition version of 20170627.009 consider for occurrence. Then Kaspersky also says that nowspotting the malware is possible by security software’s. It also keeps windows up to with theappropriate bottom with installing March’s demanding patch which preserving across theEternalBlue vulnerability.3
Search the Web for News on Computer Security Breaches_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment on Information Security
|13
|2568
|146

Information Security : Assignment
|11
|2578
|35

Computer Security Breach in Notpetya Cyber Attack
|10
|2248
|160

ITC595 - Information Security | Cyber attack
|13
|2565
|126

Computer Security Breaches (2017) Name of the University Author
|10
|2520
|395

Information Security in an Organization
|12
|2808
|45