• Home
  • About Us
  • Authors
  • Submit News
  • Contact Us
  • Privacy Policy
  • Sitemap
The Hack Post
  • Hacking News
    • Cyber Crime
  • Cyber Security
  • Technology
    • Internet
  • Entertainment
    • Gaming
  • Business
  • Science / Health
No Result
View All Result
The Hack Post
No Result
View All Result

4 Biggest Cybersecurity Crises of 2019 to Date

Sofia Peterson by Sofia Peterson
September 5, 2019
4 Biggest Cybersecurity Crises of 2019 to Date
Share on FacebookShare on Twitter

Perhaps, it is like the worst is yet to come.  The half-year of 2019 is on the books already, and there have, for the most part, been six months harbingers of cyberwar, supply chain manipulations, data breaches, state back hacking campaigns to show for it.

Corporate and U.S. government security is in confU.S.ion, geopolitical issues are rising worldwide, and ransomware is an increasing, progressing threat. Here are the lists of some of the major cybersecurity incidents this year.

Border Protection and customs Contractor Perception

Hackers stole photos of travelers and license plates linked to about 100,000 people in May of this year because of a breach in the surveillance contractor for U.S. Customs and Border Protection. The Perceptics, a Tennessee based contractor and Customs and Border Protection (CBP) affiliate, also lost circumstantial info about its surveillance hardware and how Customs and Border Protection oversees it at several U.S. airports and seaports.

The first Perceptics’ breach was reported by The Register and officials of the CBP. They later revealed the incident to The Washington Post. The CBP was doubtful to admit that Perceptics was the contractor that suffered the breach. Thus, the agency sent a Microsoft Word document to the Post named “CBP Perceptics Public Statement” in its first reply. Later, hackers posted the stolen information to the dark web. Then the Customs and Border Protection omitted Perceptics from federal contracting, though no specific reason.

Two decades past and CBP spent building up its use of border surveillance technologies, and there appears to no end of it. For instance, CBP wants facial recognition scans to get standardized in airports in the U.S. by 2021. However, privacy advocates and civil rights say that these hostile initiatives put danger to U.S. citizens and the global community.

The Perceptics breach is regarded as a vivid example of those threats.  According to Jeramie Scott, a senior counsel at the EPIC (Electronic Privacy Information Center), the CBP merely shouldn’t get this confidential info if it can’t protect it.

Supply Chain Attack

A reliable software maker provides to users legitimate software updates. However, it is undoubtedly a lethal tool of cyberwar, which causes the supply chain attack. The most known was the NotPetya attack in 2017 when Russian hackers sent catastrophic malware, jeopardizing the Ukranian accounting application’s update mechanism. To date, this kind of destructive hacking has been a unique and significant signature in 2019.

A research report in March from Kaspersky, states that  Asus, a computer maker, revealed a supply chain attack in 2018’s second half that destroyed the Live Update tool of the company, sending malware its customers. Asus devices accepted the infected software since the hackers installed it with an authentic, original Asus certificate.

Although the hackers jeopardized multiple machines, specifically victimizing about 600 computers, attacking with a second malware attack.  Experts called the group ShadowPad or Barium. There is hardly any information about the group. However, it’s known to be Chinese-speaking.

This group was closely associated with another popular and renowned supply chain hack of the computer cleanup tool CCleaner in 2017.  The researchers in Kaspersky also found out indications that Barium utilized a supply chain attack to the development tool visual studio of Microsoft days after the Asus attack.

As a result, planted openings into the products of three videogame companies that utilize Microsoft’s Visual Studio in their codes, enabling hackers to send malicious content in some games and eventually infecting more.

Ransomware

Attacks are nothing new at this point, but 2019 Ransomware attacks is a year for them. Criminal groups keep targeting local governments, health care providers, and businesses with these hacks, wherein malware are used to encrypt data in a system and then demand a great amount of money to decrypt it, deceiving individuals of billions of dollars annually in the process.

According to the FBI in an interview with WIRED, there is an increase in targeted malware attacks. Cybercriminals will get money from any network in any means.

Ransomware is not just attacking small businesses and hospitals in 2019. In fact, a lethal strain called LockerGoga has particularly been targeting manufacturing and industrial firms, at times, pushing manufacturing plants to go to manual control creating extensive damage in systems.

As of the moment, LockerGoga is used only by money-motivated criminals. It is straightforward to visualize how this kind of attack could be  used by hackers that are state-sponsored on crucial infrastructure, specifically how the geopolitical agenda created both Russia’s NotPetya and North Korea’s Wanna Cry.

First American

For the most part, not all data security incidents are data breaches. Sometimes data is poorly stored and publicly accessible; it can be exposed but not stolen. First American, the huge title insurance and real estate company, serves as a warning of how treacherous information exposures can be.

Security journalist Brian  Krebs discovered in May the incident that exposed 885 million sensitive customer financial information dating back to 2003. This information was accessible to everyone using the website of First American. However, it is not recognized whether anybody actually discovered and obtained the data prior to the lockdown of the company. However, it was tremendously uncomplicated to obtain. Wire transaction receipts,  mortgage and tax documents, bank account numbers and statement, driver’s license images, and Social Security numbers from millions of U.S citizens were all in the trove.

First American as an insurance provider in both the lender and buyer sides of real estate deals, thus, if anyone steals this info, they would have access to critical data for financial scams, spying, and identity theft.

Take away

Cyber attacks are a huge problem because it affects the global community in terms of medical records, bank history, and even espionage. We must always take extra care in using websites for it may bring destruction not only to ourselves but to the world we are living. Thus, using a vpn is one of the many solutions to protect yourself and your personal information against malicious threats.

Author’s Bio:

Tyler Pack is a real estate consultant and journalist, with a passion for smart homes technology. He is keen on writing about home and property security, and cybersecurity.

Sofia Peterson

Sofia Peterson

Sofia is a contributor at The Hack Post who loves to write about Technology. She also enjoys reading books and swims during her free time.

Next Post
4 Brilliant Ideas for Home Improvement

4 Brilliant Ideas for Home Improvement

Latest Articles

6 Tips for Creating a Kid-Safe Condo
news

6 Tips for Creating a Kid-Safe Condo

June 4, 2025
5 Benefits of Outdoor Time for Kids
Entertainment

5 Benefits of Outdoor Time for Kids

May 26, 2025
Is App Design and Development Necessary for Your Company?
Technology

Is App Design and Development Necessary for Your Company?

May 26, 2025
Simple Chores for Kids to Do In Your Condo
news

Simple Chores for Kids to Do In Your Condo

May 22, 2025
Home Meditation Mindful Moments and Modern Tech
news

Home Meditation: Mindful Moments and Modern Tech

May 17, 2025
Why Living in a Condo is Ideal for Families
news

Why Living in a Condo is Ideal for Families

May 12, 2025
Zen Your Condo Tips for a Tranquil Space
Business

Zen Your Condo: Tips for a Tranquil Space

May 8, 2025
4 Hobbies for Introverts
news

4 Hobbies for Introverts

May 3, 2025
5 Benefits of Living in a Condo for Professionals
news

5 Benefits of Living in a Condo for Professionals

April 22, 2025
Are German Proxies Legal? The Complete 2025 Guide
Technology

Are German Proxies Legal? The Complete 2025 Guide

April 16, 2025
5 Ideas for Your Condo Console Gaming Setup
news

5 Ideas for Your Condo Console Gaming Setup

April 11, 2025
5 Creative Ideas to Level Up Your Condo Gaming Room
news

5 Creative Ideas to Level Up Your Condo Gaming Room

March 30, 2025
  • Home
  • About Us
  • Authors
  • Submit News
  • Contact Us
  • Privacy Policy
  • Sitemap

The Hack Post © 2019

No Result
View All Result
  • Hacking News
    • Cyber Crime
  • Cyber Security
  • Technology
    • Internet
  • Entertainment
    • Gaming
  • Business
  • Science / Health

The Hack Post © 2019