Google Nigeria: Where you enter your bank account information and search for your inheritance. Speaking of scams, I've got a story for you Credit: Thinkstock Welcome to this week’s edition of Rehashed, your weekly recap of news and other items of note. We’re going to start running these on Friday, mostly because it’s easier to produce this way.This week, a trusted contact Phished me, there were issues with Pornhub, and once again LinkedIn users need to reset their passwords.Before we start this week’s recap, let’s answer a question that came in on Twitter. Namely, how do I determine what goes into Rehashed?The truth, it’s completely random. I look for interesting things or news items on the Web and I include them. Sometimes the source is all CSO, but I’ve no issues with adding things from any other news agency if they hold water. PR agency sends Phishing email to journalism contactsThis was an interesting week, because for the first time in more than 10 years of journalism, I was Phished by a PR agency. The full story explains everything.The TL;DR is that the PR agent fell for a Phishing scam, and the attackers used the stolen credentials to email the same scam to everyone in their address book. The kicker, the agent got the original Phishing email twice, from two different journalists.Really, what this incident did was remind me that some jobs are more vulnerable to social-based attacks than others are. Journalism, HR, PR, recruiting, and sales positions are vulnerable to Phishing schemes, even sloppy ones. Hacker claims to have shelled Pornhub, adult entertainment giant calls it a hoaxA hacker claimed to have uploaded a shell script to Pornhub. They were offering to sell shell or command injection access to the website for $1,000, and later claimed that three people took them up on that offer. The claim came with screenshots showing the shell in action. Twenty-four hours later, Pornhub said the incident was a hoax, but wouldn’t confirm if they paid the hacker for his assistance. TeslaCrypt creators leave the game, release master decryption keyThe creators of TeslaCrypt have stopped developing that family of Ransomware, offering an apology and the master decryption key to the public. Security firms and researchers wasted no time in developing a tool to assist TeslaCrypt victims decrypt their files. LinkedIn issues password reset emails after 100 million+ accounts go up for saleA hacker who goes by the name Peace is offering a list of 167 million LinkedIn accounts, which was obtained after the professional social network was compromised in 2012.On Thursday, less than a day after word of the list hit the news, LinkedIn issued password reset emails to users, warning them of potential problems associated with the list.While most people changed their password after the 2012 incident, the fear is centered on those who didn’t or those who used an easily guessed variation on their previously exposed password. Symantec patches critical flawSymantec patched a flaw this week that could be triggered by simply sending an email with a malicious attachment. If exploited, an attacker would be able to completely compromise the victim’s system.“On Windows, this results in kernel memory corruption, as the scan engine is loaded into the kernel, making this a remote ring0 memory corruption vulnerability — this is about as bad as it can possibly get,” said Tavis Ormandy, the researcher who discovered the flaw. Skimmer malware puts physical ATM skimmers to shameResearchers as Kaspersky have discovered a new version of Skimmer, a family of malware designed to target ATMs running on the Windows platform. The latest developments help the malware avoid detection. As mentioned in the story, Skimmer can record payment cards details after they’re inserted into the ATM, and it can force infected ATMs to dispense cash.Other items of note:CSO’s Taylor Armerding went to SOURCE Boston this week and discovered that it isn’t the name of the threat, but how it behaves that will help defenders stop itPhishLabs discussed the techniques criminals are using to obfuscate the data they’re stealing with Phishing kits, and how to circumvent their protective layers.As always, if you come across a blog post or news item next week, or perhaps just something amusing, and you it should be added to Rehashed, email me a link. General corporate news and product-based items are the only exemptions. There’s no Rehashed next week, due to the holiday. So if you’re in the U.S. (and even if you’re not), have a safe Memorial Day weekend. See you in June! Related content news Gwinnett Medical Center investigating possible data breach After being contacted by Salted Hash, Gwinnett Medical Center has confirmed they're investigating a security incident By Steve Ragan Oct 02, 2018 6 mins Regulation Data Breach Hacking news Facebook: 30 million accounts impacted by security flaw (updated) In a blog post, Facebook’s VP of product management Guy Rosen said the attackers exploited a flaw in the website's 'View As' function By Steve Ragan Sep 28, 2018 4 mins Data Breach Security news Scammers pose as CNN's Wolf Blitzer, target security professionals Did they really think this would work? By Steve Ragan Sep 04, 2018 2 mins Phishing Social Engineering Security news Congress pushes MITRE to fix CVE program, suggests regular reviews and stable funding After a year of investigation into the Common Vulnerabilities and Exposures (CVE) program, the Energy and Commerce Committee has some suggestions as to how it can be improved By Steve Ragan Aug 27, 2018 3 mins Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe