/ 02.15.19 / Alan Hernandez

Weekly Cybersecurity Review - Valentine’s Day Ransomware

Share This Post:

Weekly Cybersecurity Review - Valentine’s Day Ransomware

Australian Property Valuation Firm Exposes Client Data

darkreading.com- Author: Kelly Sheridan - Date: February 12th, 2019 

This week we face another unfortunate data breach, this time in Australia. LandmarkWhite a commercial and residential property valuation firm this week was discovered to have exposed thousands of client’s information through an unprotected online service. The data that was exposed contains 57,000 client invoices which include client name, addresses, phone numbers, email addresses, and in some cases banking data.


MacOS Malware Wears Clever Disguise as Windows .EXE FIle

darkreading.com- Author: Curtis Franklin Jr. - Date: February 13th, 2019 

Who would have thought that a windows executable file (.exe) would ever pose itself as a threat on MacOS devices? This new and clever way to deliver MacOS malware has been discovered by security researchers at Trend Micro. The .EXE file that carries the MacOS malware will not execute on a windows machine, however due to the nature of this file being a .EXE file most MacOS anti-malware packages will not scan or block the file. The .EXE file that contains the malware payload returns an error message whenever there is an attempt to run it on a Windows machine.


Bad Actors Use Valentine’s Day As A Method to Infect Computers With Ransomware

darkreading.com- Author: Kelly Sheridan - Date: February 14th, 2019 

Similar to how bad actors use the Christmas holiday to spread malicious files disguised as harmless email attachments by using holiday greetings to get victims to open the email, this year’s Valentine’s Day is no exception. Hackers are using the holiday to spread Gandcrab ransomeware by tricking victims into downloading malicious attachments or clicking bad links. Researches have identified emails delivering the same version of Gandcrab with different subject lines related to romance, some examples include: “This is my love letter to you” or “Wrote my thoughts down about you”. Attached with the email is an attachment named similar to “Love_you_2019” concatenated with some random digits. Running the file downloads and runs the ransomware on the machine.


Toyota Announces Public Release of its Testing Tool

darkreading.com - Author: Kelly Jackson Higgins - Date: February 14th, 2019 

Toyota’s cybersecurity’s lead developer has announced that they will make their cybersecurity testing tool available to the public via Github as early as next month or April. PASTA (Portable Automotive Security Testbed) is an open-source platform created for researched and car hackers. This is a welcomed tool in the security industry which in the past has had to rely on researchers with little to no car engineering knowledge to tinker and discover any security flaws. This release of this tool will hopefully allow researchers to root out exploits and propose patches to fix them.


Chattanooga Police Remove 12 lbs Suspect from Home Break-in


Screencapture of Security Camera Footage of GameStop Burglar

@ChattanoogaPD - Date: February 7th, 2019 

Police in Tennessee responded to a call regarding home break-in of a suspicious 12-pound suspect earlier this month in February.

In a video shared on the Chattanooga Police Department’s Twitter you can see officers attempting to bring down a raccoon from a high shelf in what seems to be the house’s laundry room.

You can watch the hilarious video by clicking on the link below.


Posted by Alan Hernandez