Hacker Tracker: Shadow Brokers 0-day Subscription

Shadow Brokers, the notorious group behind the WannaCry viral attack that plagued millions of computers and major networks worldwide, is back.

This time, the group is offering a unique subscription to 0-day bugs. To subscribe, hackers must pay 100 ZEC ($21,000). For those who aren’t familiar with the digital currency, Zcash is – like bitcoin – an altcoin used for anonymous online transactions.

In an encrypted message, Shadow Brokers announced the timely delivery of crippling exploits, such as Windows 10 bugs, ransomware, malware and internal info about international nuclear missile programs. The exploit dump will be released to subscribers between July 1 and 17.

David Yablonski, founder and chief executive of PCAttend, a company that specializes in solutions for patching and removing ransomware and malware from networks, believes now is the time for people and businesses to take such threats seriously.

“For years now, ransomware has plagued the systems of both residential and business end users alike,” said Yablonski in an interview with PYMNTS.

“Now speaking of severity of a future attack with no kill switch in play, it is very real. We cannot assume these accusations are false, but instead should plan ahead and beyond that. Every person with unpatched systems and end-of-life systems, need to update and upgrade now.”

According to Yablonski, most groups that are affected by crippling exploits don’t have a backup or downtime plan.

He also provided several tips for users and companies that are concerned about falling victim to the upcoming Shadow Brokers exploit dump.

“The most important way to avoid these exploits, is to update, upgrade and change usage habits. By changing a few bad habits, such as not allowing updates to install and not scanning the operating system regularly, the user can greatly decrease their chances of getting malware or ransomware,” Yablonski said.

­­­­—-

Here are other top cybersecurity stories that made headlines this week:

Hackers Target Outsourced Companies Closely Working with Major Hollywood Producers

Cybercriminal groups have found a way around the secure networks of popular movie production houses. Instead of targeting the companies directly, hackers have set their sights on their outsourced partners.

This was the case during two online attacks involving Walt Disney Co. and Netflix. The compromise of unreleased footage from the TV series “Orange Is the New Black” took place at a third-party production vendor.

Ransomware Exploits Reason for Surge in Insurance Claims

Insurance companies are currently dealing with an increase in insurance claims related to cyberattacks. Businesses are relying on K&R coverage, which is designed for protection in locations where threats to oil and mining operations are widespread, to cover losses related to the recent WannaCry attack.

Insurance coverage for data breaches is uncommon for businesses outside of the U.S. According to an insurer, $100,000 of cyber insurance is suitable for $10 million of sensitive data.

Blockchain Tech Could Be Used to Protect City Infrastructure from Cyberattacks

An increase in hackers compromising massive power grids worldwide has forced security experts to look to the blockchain for reliable, secure solutions. Blockchain technology could be used to make data tamper-proof and readily available without a centralized network, reducing downtime caused by a single point of failure.

According to Jesse Morris, principal at Rocky Mountain Institute, a nonprofit organization dedicated to global sustainability and green energy practices, key management must be fully secure when applying the blockchain to grid security.

Hackers Responsible for WannaCry NHS Attack Earned $70,000

The cybercriminal group that launched WannaCry raised $70,000 for their efforts. Researchers have been monitoring the team’s bitcoin wallet, which is currently where the group is receiving payouts.

The group demanded between $386 and $772 for access to exploited systems. New information about the attacks points to a “Chinese native or at least someone fluent” in the local language. Researchers were able to make this connection, as only Chinese versions of the messages contained proper grammar. The other 27 versions of the message were likely machine translated.

Anti-Hijab Campaign from Iran Falls Victim to Government-backed Cyberattack

A campaign standing up to Iran’s “modesty laws” was recently targeted by state operatives. The country enforces strict regulations for women, forcing them to wear hijabs in public. It is unclear how the movement, which is currently led by Masih Alinejad, an Iranian journalist and human rights activist, was disrupted by local government cyber groups.