Doxing SWIFT Daesh hackers who need to be infected with Ransomware. This sentence was brought to you by: caffeine, a lack of sleep, and elements from this week's stories Credit: Thinkstock Welcome to the weekend!SWIFT attacks, Ransomware, Daesh hackers, and Doxing are just some of the topics in this week’s report covering news and items of note for the week of April 30, 2016.Today marks the first post for Salted Hash Rehashed, a weekend recap of the week’s news and other items of note in the security world. Clips listed here will include items posted on Salted Hash, CSO Online, or any other website where something interesting turned up. Bangladesh Bank attackers used custom malware that hijacked SWIFT softwareThe crooks who stole $81 million from Bangladesh’s central bank likely did so by using custom malware designed to target SWIFT (Society for Worldwide Interbank Financial Telecommunication) transaction software. The custom malware deleted transaction records and printed out altered SWIFT confirmation messages. SWIFT banking network warns customers about multiple attacksShortly after news of the attacks hit the wire, SWIFT issued a warning this week about “a number of recent cyber incidents in which malicious insiders or external attackers have managed to submit SWIFT messages.”The warning suggests that the Bangladesh Bank incident was just one small part of a much larger problem. To address this, SWIFT pushed a software update to address the custom malware toolkit used during the Bangladesh attack. Pro-Daesh hackers: More bark than bite, lacking in skills and resourcesEarlier this week, a report from Flashpoint singled out the “United Cyber Caliphate” – or rather, the groups of pro-Daesh (al-dowla al-islaamiyya fii-il-i’raaq wa-ash-shaam, a.k.a. ISIS/ISIL) hackers who joined forces to create it.The problem is, together or alone, these groups are fragmented and they operate unofficially with little to no operational funding. Yet, the threat they pose to banking, media, and government entities shouldn’t be dismissed out of hand.On the research front, Dr. Krypt3ia has uncovered two additional Daesh Caliphate websites on the Darknet. If these websites are any indication of skill within the groups, they’re off to a bad start (which is a good thing).In related news, the U.S. Cyber Command has officially started launching network-based attacks against assets maintained by ISIS.“The goal of the new campaign is to disrupt the ability of the Islamic State to spread its message, attract new adherents, circulate orders from commanders and carry out day-to-day functions, like paying its fighters,” the New York Times reported. Malvertising: Exploit Kit pushes Ransomware to Android devicesMalicious ads are to blame for a recent Ransomware attack on Android devices discovered by researchers at Blue Coat Labs. The Ransomware is being delivered thanks in part to the Towelroot exploit, which is sent along with a previously leaked Hacking Team exploit.The attacks are aiming for the 4.x branch of Android. According to stats taken from devices running the latest version of the Google Play app, 59.6 percent of the Android devices in the hands of consumers are running version 4.4 or lower. Website offers Doxing-as-a-Service and customized extortionA website on the Dark Web, Ran$umBin, is offering to store collected Dox and hold it for ransom. If the ransom is paid, the submitter collects most of the payment – minus the website’s cut and a payment-processing fee. In addition, the website will also collect Dox, with service fees depending on the amount of information being collected. Examining the leaked passwords and PINs from Qatar National BankA data breach at Qatar National Bank exposed personal and financial records. Among them were customer passwords and PINs. Salted Hash examined the leaked credentials, and determined that some people have a fondness for certain numbers, and that even those accused of being spies have problems creating secure passwords. Toy maker’s website pushed growing CryptXXX ransomware threatThe website for U.S. toy maker Maisto was hijacked this week and used to push Ransomware. As luck would have it, the Ransomware being delivered (CryptXXX) has a flaw – one that enabled Kaspersky to develop a decryption tool. Georgia husband and wife plead guilty to their role in the Get Transcript data breach at the IRSAccording to the U.S. Department of Justice, a husband and wife team have pled guilty to abusing the Get Transcript application developed by the IRS. The 2015 Get Transcript breach at the IRS compromised more than 700,000 taxpayer records. The couple managed to steal at least $250,000 before being caught. Windows 10 Upgrade nag screen takes over a weather reportThis is just amusing. Earlier this week, a Windows 10 nag screen covered most of the map during a live weather report on KCCI in Des Moines, Iowa. You can watch the video here. All next week, if you come across a blog post or news item, or perhaps just something amusing, and you think should be shared on Rehash, feel free to email me a link. General corporate news and product-based items are the only exemptions. Related content news Gwinnett Medical Center investigating possible data breach After being contacted by Salted Hash, Gwinnett Medical Center has confirmed they're investigating a security incident By Steve Ragan Oct 02, 2018 6 mins Regulation Data Breach Hacking news Facebook: 30 million accounts impacted by security flaw (updated) In a blog post, Facebook’s VP of product management Guy Rosen said the attackers exploited a flaw in the website's 'View As' function By Steve Ragan Sep 28, 2018 4 mins Data Breach Security news Scammers pose as CNN's Wolf Blitzer, target security professionals Did they really think this would work? By Steve Ragan Sep 04, 2018 2 mins Phishing Social Engineering Security news Congress pushes MITRE to fix CVE program, suggests regular reviews and stable funding After a year of investigation into the Common Vulnerabilities and Exposures (CVE) program, the Energy and Commerce Committee has some suggestions as to how it can be improved By Steve Ragan Aug 27, 2018 3 mins Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe