Here are the top cybersecurity stories of recent weeks:
- TrickBot malware has jeopardized up to 250 million email accounts
- Breached Samsung website gains unauthorized access to Sprint customer data
- Fake FaceApp applications install malware on user devices
- Marriott faces a massive fine of $123 Million following Starwood data exposure
- AMCA data breach discovers the exposure of an additional 2.2 million patients
A malware by the name of Trickbot, which first surfaced in 2016, has continued to infect victims, leaving experts to believe that up to 250 million email accounts have already been compromised. DeepInstinct researchers have been keeping up with the malware, as the capabilities of TrickBot have increased through the evolution of the malware. A very effective addition is what DeepInstinct is calling TrickBooster, which allows infected computers to spread spam emails to increase the efficiency and speed of the malware’s infection. DeepInstinct was able to report that the malware has infiltrated emails from Gmail, Yahoo, Hotmail, AOL, and some government agencies.
Sprint customers had their data exposed through a Samsung website that allows customers to add a new line to their cellular plans. The number of affected customers remains undisclosed. Sprint notified customers to change their account pin numbers to prevent further data leakage. Sprint sent out letters that stated personally identifiable information (PII) including phone numbers, device types, account numbers, and first and last names, have been exposed. Sprint also advised those who may have had their accounts breached to place fraud alerts on credit reports to keep their financial information protected.
In the midst of social media’s current trends, ‘Faceapp’ has allowed people to post photos of themselves showcasing what they would look like as they age. As of recent, security researchers are reporting sightings of fake Faceapp applications which are installing malware onto devices. Kaspersky reports that the fake Faceapp application is infecting devices through an adware module called MobiDash. Security researchers state that at least 500 users have been exposed within a couple of days following acknowledgment of the fake applications.
Following a massive data breach in 2018, Marriott is facing a $123 million fine by U.K data protection authorities. The penalty was enforced because Marriott failed to secure an exposed server prior to finalizing the purchase of Starwood Properties. The Starwood guest reservation database was hacked back in 2014, but the breach was not discovered until November 2018. The exposed information includes five million passport numbers and eight million credit card records. The data breach publicized around 30 million European Union residents, which is what persuaded the U.K.’s Information Commissioner’s Office (ICO) to follow through with the financial penalty.
AMCA Data Breach Discovers Exposure of an Additional 2.2 Million PatientsClinical Pathology Laboratories (CPL) recently stated that 2.2 million of their patients may have been a part of the massive data breach that hindered an American Medical Collection Agency (AMCA) server. The compromised data included PII such as names, addresses, phone numbers, balance information, and insurance providers. Credit card and bank information of 34,500 patients were also exposed in the breach. CPL places the blame on the AMCA, which several health labs use to process payments.
To learn about cloud access security brokers (CASBs) and how they can protect your enterprise from data leakage, malware, and more, download the Top CASB Use Cases below.
*** This is a Security Bloggers Network syndicated blog from Bitglass Blog authored by Will Houcheime. Read the original post at: https://www.bitglass.com/blog/bss-trickbot-malware-continues-to-breach-millions-of-emails