Data Security News Headlines 20th May 2017

  1. German firm in Bengaluru loses Rs 15 lakh in online fraud

BENGALURU: A German company lost Rs 15 lakh after an email was intercepted by hackers. Bengaluru-based HP Instruments (HPI) which manufactures scientific instruments was to receive Rs 15 lakh from the German Company. According to police sources, HPI sent an email to the firm with its bank account details. However, hackers intercepted the email and sent a fake email to the German firm asking it to transfer the money to another bank account. The fraud came to light when HPI got calls from its other clients who said they received emails from it (HPI) seeking transfer of money. When checked, it was found out that the German firm had transferred the money to somebody else according to news published by Indian Express.

Cyber Security Tips:  To prevent such fraud make sure that you are transferring the amount to the authentic person and if you received any emails saying that transfer the amount to another bank, immediately confirm it from your client or concern person.

  1. WikiLeaks Reveals ‘Athena’ CIA Spying Program Targeting All Versions of Windows

Athena/Hera, the spyware has been designed to take full control over the infected Windows PCs remotely, allowing the agency to perform all sorts of things on the target machine, including deleting data or uploading malicious software, and stealing data and send them to CIA server. According to the whistleblower organization, Athena has the ability to allow the CIA agents to modify its configuration in real time, while the implant is on target “to customize it to an operation. According to leaked documents, one document also suggests that the CIA agents have been advised to make sure that the spyware should not get caught by antivirus software programs, especially Kaspersky AV software.

  1. WannaCry Ransomware Decryption Tool Released

Many systems are infected due to WannaCry Ransomware once a system is infected with WannaCry ransomware it asks to pay the ransom. The WannaCry’s encryption scheme works by generating a pair of keys on the victim’s computer that rely on prime numbers, a “public” key and a “private” key for encrypting and decrypting the system’s files respectively. Once WannaCry infects your system to prevent the victim from accessing the private key and decrypting locked files himself, WannaCry erases the key from the system, leaving no choice for the victims to retrieve the decryption key except paying the ransom to the attacker. WannaCry ransomware decryption tool, named WannaKey that basically tries to retrieve the two prime numbers, used in the formula to generate encryption keys from memory, and works on Windows XP only. The tool works only if affected computer has not been rebooted after being infected and associated memory has not been allocated and erased by some other process.

Cyber Security Tips: The tool won’t work for every user due to its dependencies, so users wait until any solution release by researcher and be aware of a fake tools for WannaCry.

  1. WordPress 4.7.5 Patches Six Vulnerabilities

WordPress is a free and open-source content management system (CMS) based on PHP and MySQL. WordPress is installed on a web server that is either part of an Internet hosting service or a network host in its own right. According to report WordPress has just patched six critical vulnerabilities. The security hole was discovered in the summer of 2016 but it was patched only now. This vulnerability can be used to overwrite the FTP or SSH connection settings of the affected WordPress site. An attacker can use this issue to trick an Administrator into logging into the attacker’s FTP or SSH server, disclosing his/her login credentials to the attacker. According to report the vulnerabilities are cross-site scripting (XSS), cross-site request forgery (CSRF), and server-side request forgery (SSRF) flaws.

Cyber Security Tips:  Users and administrators are strongly recommended that apply the patches as soon as possible.


Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Blog at

Up ↑

%d bloggers like this: