{"id":13453,"date":"2024-09-08T02:13:25","date_gmt":"2024-09-08T02:13:25","guid":{"rendered":"http:\/\/thisbiginfluence.com\/?p=13453"},"modified":"2024-09-08T02:13:25","modified_gmt":"2024-09-08T02:13:25","slug":"hackers-threaten-to-leak-planned-parenthood-data","status":"publish","type":"post","link":"https:\/\/thisbiginfluence.com\/?p=13453","title":{"rendered":"Hackers Threaten to Leak Planned Parenthood Data"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p class=\"paywall\">Even these of you who do all the things you may to safe these secrets and techniques can end up weak\u2014particularly if you happen to\u2019re <a href=\"https:\/\/www.wired.com\/story\/yubikey-vulnerability-cloning\/\">using a YubiKey 5 authentication token<\/a>. The multifactor authentication gadgets might be cloned because of a cryptographic flaw that may\u2019t be patched. The corporate has rolled out some mitigation measures\u2014and the assault itself is comparatively tough to drag off. However it could be time to put money into a brand new dongle.<\/p>\n<p class=\"paywall\">That\u2019s not all, people. Every week, we spherical up the privateness and safety information we didn\u2019t cowl in depth ourselves. Click on the headlines to learn the total tales. And keep protected on the market.<\/p>\n<p class=\"paywall\">On the finish of August, cybercriminals from the ransomware group RansomHub seem to have hacked into the techniques of Deliberate Parenthood\u2019s Montana department. The <a data-offer-url=\"https:\/\/therecord.media\/ransomware-hackers-threaten-planned-parenthood-montana\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/therecord.media\/ransomware-hackers-threaten-planned-parenthood-montana&quot;}\" href=\"https:\/\/therecord.media\/ransomware-hackers-threaten-planned-parenthood-montana\" rel=\"nofollow noopener\" target=\"_blank\">organization this week confirmed<\/a> it had suffered from a \u201ccybersecurity incident\u201d on August 28 and mentioned its employees instantly took elements of its community offline, reporting the incident to regulation enforcement.<\/p>\n<p class=\"paywall\">Days after the incident passed off, RansomHub claimed to be behind the assault, posting Deliberate Parenthood on its leak web site. The legal group mentioned it might publish 93 GB of information. It&#8217;s unclear what, if something, the ransomware group has obtained, however Deliberate Parenthood clinics can maintain an enormous array of extremely delicate knowledge about sufferers, together with data on abortion appointments. (Round 400,000 Deliberate Parenthood sufferers in Los Angeles had been impacted following a <a href=\"https:\/\/www.wired.com\/story\/planned-parenthood-la-hack-predictive-policing-ubiquiti\/\">similar ransomware incident in 2021<\/a>.)<\/p>\n<p class=\"paywall\">In latest months, RansomHub has emerged as one of the crucial energetic ransomware-as-a-service teams, following the regulation enforcement <a href=\"https:\/\/www.wired.com\/story\/lockbitsupp-lockbit-ransomware\/\">disruption of LockBit<\/a>. In response to an FBI and Cybersecurity and Infrastructure Safety Company <a data-offer-url=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa24-242a?ref=news.risky.biz\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa24-242a?ref=news.risky.biz&quot;}\" href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa24-242a?ref=news.risky.biz\" rel=\"nofollow noopener\" target=\"_blank\">alert<\/a> on the finish of August, the group is \u201cenvironment friendly and profitable\u201d and has stolen knowledge from at the least 210 victims because it shaped in February. \u201cThe associates leverage a double-extortion mannequin by encrypting techniques and exfiltrating knowledge to extort victims,\u201d the alert mentioned.<\/p>\n<p class=\"paywall\">The Nigeria-based scammers generally known as the <a href=\"https:\/\/www.wired.com\/story\/yahoo-boys-scammers-facebook-telegram-tiktok-youtube\/\">Yahoo Boys<\/a> run nearly each rip-off within the playbook\u2014from <a href=\"https:\/\/www.wired.com\/story\/yahoo-boys-real-time-deepfake-scams\/\">romance scams<\/a> to pretending to be FBI brokers. But there&#8217;s little-more devious than the rise in sextortion circumstances linked to the West African scammers. This week, Nigerian brothers Samuel Ogoshi and Samson Ogoshi had been sentenced to greater than 17 years in US jail for working sextortion scams, following their extradition earlier this 12 months. It&#8217;s the first time Nigerian scammers have been prosecuted for sextortion within the US, the <a href=\"https:\/\/www.bbc.co.uk\/news\/articles\/cr7rxpdyz9yo\">BBC reported<\/a>.<\/p>\n<p class=\"paywall\">The Ogoshi brothers, who pleaded responsible in April, have been linked to the demise of 17-year-old Jordan DeMay, who took his life six hours after he began speaking to the scammers, who posed as a woman, on Instagram. {The teenager} had been duped into sending the brothers express photographs, and after he had completed so, they threatened to put up the photographs on-line until he paid them tons of of {dollars}. US prosecutors mentioned the brothers sexually exploited and extorted greater than 100 victims, with at the least 11 of them being minors. There was a <a href=\"https:\/\/www.theguardian.com\/uk-news\/article\/2024\/aug\/21\/amid-rise-in-financial-sextortion-childline-is-helping-teenagers-fight-back\">huge spike<\/a> <a href=\"https:\/\/www.bloomberg.com\/news\/newsletters\/2024-04-16\/teen-boys-caught-by-sextortion-scams-at-alarming-rate-big-take\">in sextortion cases<\/a> in recent times.<\/p>\n<p class=\"paywall\">In June, the US Commerce Division <a href=\"https:\/\/www.wired.com\/story\/us-bans-kaspersky-software\/\">banned the sale of Kaspersky\u2019s antivirus tools<\/a> over nationwide safety considerations about its hyperlinks to the Russian authorities. (Kaspersky has, for years, denied connections). The agency later fired its employees and <a data-offer-url=\"https:\/\/www.zetter-zeroday.com\/kaspersky-lab-closing-u-s-division-laying-off-workers-2\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.zetter-zeroday.com\/kaspersky-lab-closing-u-s-division-laying-off-workers-2\/&quot;}\" href=\"https:\/\/www.zetter-zeroday.com\/kaspersky-lab-closing-u-s-division-laying-off-workers-2\/\" rel=\"nofollow noopener\" target=\"_blank\">said it was closing its US business<\/a>. This week, cybersecurity firm Pango Group introduced it&#8217;s buying Kaspersky Lab\u2019s US antivirus clients, in response to <a href=\"https:\/\/www.axios.com\/2024\/09\/05\/kaspersky-pango-group-antivirus-deal\">Axios<\/a>. This equates to round 1 million clients, who shall be transitioned to Pango\u2019s antivirus software program Extremely AV. Forward of the Kaspersky deal, father or mother firm Aura additionally introduced it was spinning out Pango Group into its personal enterprise. Pango\u2019s president mentioned clients wouldn&#8217;t have to take any motion and that it might enable subscribers to proceed to obtain updates after September 29, when Kaspersky updates will cease.<\/p>\n<p class=\"paywall\">For years, the EU has been <a href=\"https:\/\/www.wired.com\/story\/europe-csam-scanning-law-chat-encryption\/\">trying to introduce<\/a> new youngster safety legal guidelines that may require non-public chats to be scanned for youngster sexual abuse materials\u2014one thing that may doubtlessly <a href=\"https:\/\/www.wired.com\/story\/europe-break-encryption-leaked-document-csa-law\/\">undermine encrypted messaging apps<\/a> that present on a regular basis privateness to billions of individuals. The plans have been <a href=\"https:\/\/www.wired.com\/story\/csar-chat-scan-proposal-european-commission-ads\/\">highly controversial<\/a> and had been <a href=\"https:\/\/www.engadget.com\/eu-delays-decision-over-scanning-encrypted-messages-for-csam-142208548.html?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&amp;guce_referrer_sig=AQAAAHvvXI7rqIyjwc_s5l6iqMtDj8HZFH7I658WEtQx_UH34KigizaZ9ew--nXpDSMSRnWRuYYqb5GXjQZR6qv4-4HiEJCm2ei3Uf6cAvDpRK6ZtSWvwJHt0eu4EcwjH3UcNl1Wo2tUjBSiU0kZh-xTxJS_fuCUWt5tPCuSYHILhMLy\">shelved<\/a> earlier this 12 months. Nonetheless, the proposed regulation, which has been dubbed \u201cchat management,\u201d <a data-offer-url=\"https:\/\/www.brusselstimes.com\/1209673\/controversial-chat-control-back-on-eu-agenda-this-week\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.brusselstimes.com\/1209673\/controversial-chat-control-back-on-eu-agenda-this-week&quot;}\" href=\"https:\/\/www.brusselstimes.com\/1209673\/controversial-chat-control-back-on-eu-agenda-this-week\" rel=\"nofollow noopener\" target=\"_blank\">reappeared<\/a> in legislators\u2019 in-trays this week. The Council of the EU, which is presently chaired by Hungary, needs to go laws by October, however experiences say <a data-offer-url=\"https:\/\/www.euractiv.com\/section\/law-enforcement\/news\/resistance-lingers-to-hungarian-presidencys-new-push-for-child-sexual-abuse-prevention-regulation\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.euractiv.com\/section\/law-enforcement\/news\/resistance-lingers-to-hungarian-presidencys-new-push-for-child-sexual-abuse-prevention-regulation\/&quot;}\" href=\"https:\/\/www.euractiv.com\/section\/law-enforcement\/news\/resistance-lingers-to-hungarian-presidencys-new-push-for-child-sexual-abuse-prevention-regulation\/\" rel=\"nofollow noopener\" target=\"_blank\">strong resistance to the plans still remain<\/a>.<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.wired.com\/story\/hackers-threaten-to-leak-planned-parenthood-data\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Even these of you who do all the things you may to safe these secrets and techniques can end up weak\u2014particularly if you happen to\u2019re using a YubiKey 5 authentication token. The multifactor authentication gadgets might be cloned because of a cryptographic flaw that may\u2019t be patched. The corporate has rolled out some mitigation measures\u2014and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":13455,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[2282,5048,5460,10527,2530,2102],"class_list":["post-13453","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","tag-data","tag-hackers","tag-leak","tag-parenthood","tag-planned","tag-threaten"],"_links":{"self":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/13453","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13453"}],"version-history":[{"count":0,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/13453\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/media\/13455"}],"wp:attachment":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13453"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13453"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13453"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}