<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news September 2021</title>
	<atom:link href="http://www.epanorama.net/blog/2021/09/01/cyber-security-news-september-2021/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2021/09/01/cyber-security-news-september-2021/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Wed, 22 Apr 2026 04:56:12 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/09/01/cyber-security-news-september-2021/comment-page-9/#comment-1726434</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 02 Oct 2021 20:38:33 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189420#comment-1726434</guid>
		<description><![CDATA[New Android trojan malware has infected more than 10 million Android devices
GriftHorse campaign operators made tens of millions of dollars from their victims
https://www.techspot.com/news/91491-new-android-trojan-malware-has-infected-more-than.html]]></description>
		<content:encoded><![CDATA[<p>New Android trojan malware has infected more than 10 million Android devices<br />
GriftHorse campaign operators made tens of millions of dollars from their victims<br />
<a href="https://www.techspot.com/news/91491-new-android-trojan-malware-has-infected-more-than.html" rel="nofollow">https://www.techspot.com/news/91491-new-android-trojan-malware-has-infected-more-than.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/09/01/cyber-security-news-september-2021/comment-page-9/#comment-1726269</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Oct 2021 07:06:56 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189420#comment-1726269</guid>
		<description><![CDATA[Researchers Trick Locked iPhones Into Making $1300 Purchases https://www.forbes.com/sites/leemathews/2021/09/30/researchers-trick-locked-iphones-into-making-1300-purchases/
A team of academics figured out a way to trick the combination of Apple Pay and Visa cards into silently authorizing massive payments.
Even though the iPhones the researchers tested were locked during the transactions they were able to pilfer £1, 000 (about $1340). also:
https://practical_emv.gitlab.io/]]></description>
		<content:encoded><![CDATA[<p>Researchers Trick Locked iPhones Into Making $1300 Purchases <a href="https://www.forbes.com/sites/leemathews/2021/09/30/researchers-trick-locked-iphones-into-making-1300-purchases/" rel="nofollow">https://www.forbes.com/sites/leemathews/2021/09/30/researchers-trick-locked-iphones-into-making-1300-purchases/</a><br />
A team of academics figured out a way to trick the combination of Apple Pay and Visa cards into silently authorizing massive payments.<br />
Even though the iPhones the researchers tested were locked during the transactions they were able to pilfer £1, 000 (about $1340). also:<br />
<a href="https://practical_emv.gitlab.io/" rel="nofollow">https://practical_emv.gitlab.io/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/09/01/cyber-security-news-september-2021/comment-page-9/#comment-1726268</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Oct 2021 07:06:36 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189420#comment-1726268</guid>
		<description><![CDATA[Uusi huijaus kiusaa nettikirppisten käyttäjiä &quot;Kortti niistetään niin tyhjäksi kuin pystytään&quot;, varoittaa asiantuntija
https://yle.fi/uutiset/3-12119203
Verkon vertaiskauppasivustoilla leviää uusi huijaus, jonka tarkoituksena on kalastella käyttäjien luottokorttitietoja.

Huijari on kalastellut henkilökohtaisia tietoja Kelan nimissä https://www.is.fi/digitoday/art-2000008301415.html
Kelan nimissä on kalasteltu puhelimitse muun muassa pankkitietoja.]]></description>
		<content:encoded><![CDATA[<p>Uusi huijaus kiusaa nettikirppisten käyttäjiä &#8220;Kortti niistetään niin tyhjäksi kuin pystytään&#8221;, varoittaa asiantuntija<br />
<a href="https://yle.fi/uutiset/3-12119203" rel="nofollow">https://yle.fi/uutiset/3-12119203</a><br />
Verkon vertaiskauppasivustoilla leviää uusi huijaus, jonka tarkoituksena on kalastella käyttäjien luottokorttitietoja.</p>
<p>Huijari on kalastellut henkilökohtaisia tietoja Kelan nimissä <a href="https://www.is.fi/digitoday/art-2000008301415.html" rel="nofollow">https://www.is.fi/digitoday/art-2000008301415.html</a><br />
Kelan nimissä on kalasteltu puhelimitse muun muassa pankkitietoja.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/09/01/cyber-security-news-september-2021/comment-page-9/#comment-1726265</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Oct 2021 07:05:30 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189420#comment-1726265</guid>
		<description><![CDATA[Turkish national charged for DDoS attacks with the WireX botnet https://therecord.media/turkish-national-charged-for-ddos-attacks-with-the-wirex-botnet/
US authorities have indicted today a Turkish national for using a now-defunct malware botnet to launch distributed denial-of-service
(DDoS) attacks against a Chicago-based multinational hospitality company.]]></description>
		<content:encoded><![CDATA[<p>Turkish national charged for DDoS attacks with the WireX botnet <a href="https://therecord.media/turkish-national-charged-for-ddos-attacks-with-the-wirex-botnet/" rel="nofollow">https://therecord.media/turkish-national-charged-for-ddos-attacks-with-the-wirex-botnet/</a><br />
US authorities have indicted today a Turkish national for using a now-defunct malware botnet to launch distributed denial-of-service<br />
(DDoS) attacks against a Chicago-based multinational hospitality company.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/09/01/cyber-security-news-september-2021/comment-page-9/#comment-1726264</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Oct 2021 07:05:08 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189420#comment-1726264</guid>
		<description><![CDATA[German IT security watchdog examines Xiaomi mobile phone https://www.reuters.com/article/germany-security-china-idUSKBN2GP1BQ
Germany&#039;s federal cybersecurity watchdog, the BSI, is conducting a technical examination of a mobile phone manufactured by China&#039;s Xiaomi Corp, a spokesperson for the interior ministry told Reuters on Wednesday.]]></description>
		<content:encoded><![CDATA[<p>German IT security watchdog examines Xiaomi mobile phone <a href="https://www.reuters.com/article/germany-security-china-idUSKBN2GP1BQ" rel="nofollow">https://www.reuters.com/article/germany-security-china-idUSKBN2GP1BQ</a><br />
Germany&#8217;s federal cybersecurity watchdog, the BSI, is conducting a technical examination of a mobile phone manufactured by China&#8217;s Xiaomi Corp, a spokesperson for the interior ministry told Reuters on Wednesday.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/09/01/cyber-security-news-september-2021/comment-page-9/#comment-1726261</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Oct 2021 07:04:00 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189420#comment-1726261</guid>
		<description><![CDATA[Undetected Azure Active Directory Brute-Force Attacks https://www.secureworks.com/research/undetected-azure-active-directory-brute-force-attacks]]></description>
		<content:encoded><![CDATA[<p>Undetected Azure Active Directory Brute-Force Attacks <a href="https://www.secureworks.com/research/undetected-azure-active-directory-brute-force-attacks" rel="nofollow">https://www.secureworks.com/research/undetected-azure-active-directory-brute-force-attacks</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/09/01/cyber-security-news-september-2021/comment-page-9/#comment-1726260</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Oct 2021 07:03:41 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189420#comment-1726260</guid>
		<description><![CDATA[JVCKenwood hit by Conti ransomware claiming theft of 1.5TB data https://www.bleepingcomputer.com/news/security/jvckenwood-hit-by-conti-ransomware-claiming-theft-of-15tb-data/
JVCKenwood has suffered a Conti ransomware attack where the threat actors claim to have stolen 1.7 TB of data and are demanding a $7 million ransom.]]></description>
		<content:encoded><![CDATA[<p>JVCKenwood hit by Conti ransomware claiming theft of 1.5TB data <a href="https://www.bleepingcomputer.com/news/security/jvckenwood-hit-by-conti-ransomware-claiming-theft-of-15tb-data/" rel="nofollow">https://www.bleepingcomputer.com/news/security/jvckenwood-hit-by-conti-ransomware-claiming-theft-of-15tb-data/</a><br />
JVCKenwood has suffered a Conti ransomware attack where the threat actors claim to have stolen 1.7 TB of data and are demanding a $7 million ransom.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/09/01/cyber-security-news-september-2021/comment-page-9/#comment-1726259</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Oct 2021 07:03:11 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189420#comment-1726259</guid>
		<description><![CDATA[Ransomware attack disrupts hundreds of bookstores across France, Belgium, and the Netherlands https://therecord.media/ransomware-attack-disrupts-hundreds-of-bookstores-across-france-belgium-and-the-netherlands/
Hundreds of bookstores across France, Belgium, and the Netherlands have had their operations disrupted this week after a ransomware attack crippled the IT systems of TiteLive, a French company that operates a SaaS platform for book sales and inventory management.]]></description>
		<content:encoded><![CDATA[<p>Ransomware attack disrupts hundreds of bookstores across France, Belgium, and the Netherlands <a href="https://therecord.media/ransomware-attack-disrupts-hundreds-of-bookstores-across-france-belgium-and-the-netherlands/" rel="nofollow">https://therecord.media/ransomware-attack-disrupts-hundreds-of-bookstores-across-france-belgium-and-the-netherlands/</a><br />
Hundreds of bookstores across France, Belgium, and the Netherlands have had their operations disrupted this week after a ransomware attack crippled the IT systems of TiteLive, a French company that operates a SaaS platform for book sales and inventory management.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/09/01/cyber-security-news-september-2021/comment-page-9/#comment-1726256</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Oct 2021 07:02:01 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189420#comment-1726256</guid>
		<description><![CDATA[GhostEmperor: From ProxyLogon to kernel mode https://securelist.com/ghostemperor-from-proxylogon-to-kernel-mode/104407/
While investigating a recent rise of attacks against Exchange servers, we noticed a recurring cluster of activity that appeared in several distinct compromised networks. This cluster stood out for its usage of a formerly unknown Windows kernel mode rootkit that we dubbed Demodex, and a sophisticated multi-stage malware framework aimed at providing remote control over the attacked servers. With a long-standing operation, high profile victims, advanced toolset and no affinity to a known threat actor, we decided to dub the underlying cluster GhostEmperor. Our investigation into this activity leads us to believe that the underlying actor is highly skilled and accomplished in their craft, both of which are evident through the use of a broad set of unusual and sophisticated anti-forensic and anti-analysis techniques.
also:
https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2021/09/30094337/GhostEmperor_technical-details_PDF_eng.pdf]]></description>
		<content:encoded><![CDATA[<p>GhostEmperor: From ProxyLogon to kernel mode <a href="https://securelist.com/ghostemperor-from-proxylogon-to-kernel-mode/104407/" rel="nofollow">https://securelist.com/ghostemperor-from-proxylogon-to-kernel-mode/104407/</a><br />
While investigating a recent rise of attacks against Exchange servers, we noticed a recurring cluster of activity that appeared in several distinct compromised networks. This cluster stood out for its usage of a formerly unknown Windows kernel mode rootkit that we dubbed Demodex, and a sophisticated multi-stage malware framework aimed at providing remote control over the attacked servers. With a long-standing operation, high profile victims, advanced toolset and no affinity to a known threat actor, we decided to dub the underlying cluster GhostEmperor. Our investigation into this activity leads us to believe that the underlying actor is highly skilled and accomplished in their craft, both of which are evident through the use of a broad set of unusual and sophisticated anti-forensic and anti-analysis techniques.<br />
also:<br />
<a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2021/09/30094337/GhostEmperor_technical-details_PDF_eng.pdf" rel="nofollow">https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2021/09/30094337/GhostEmperor_technical-details_PDF_eng.pdf</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/09/01/cyber-security-news-september-2021/comment-page-9/#comment-1726255</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 01 Oct 2021 07:01:26 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=189420#comment-1726255</guid>
		<description><![CDATA[Rikolliset urkkivat suomalaisten pankkitunnuksia ota talteen vinkit turvalliseen asiointiin https://www.kyberturvallisuuskeskus.fi/fi/ajankohtaista/rikolliset-urkkivat-suomalaisten-pankkitunnuksia
Kela, Keskusrikospoliisi ja Kyberturvallisuuskeskus kehottavat huolellisuuteen verkkopalveluihin kirjautumisessa. Rikolliset kalastelevat pankkitunnuksia suomalaisten pankkien ja Omakanta-palvelun nimissä. Asioithan verkossa turvallisesti ja tunnista huijaukset. Kerro huijauksista myös läheisillesi.]]></description>
		<content:encoded><![CDATA[<p>Rikolliset urkkivat suomalaisten pankkitunnuksia ota talteen vinkit turvalliseen asiointiin <a href="https://www.kyberturvallisuuskeskus.fi/fi/ajankohtaista/rikolliset-urkkivat-suomalaisten-pankkitunnuksia" rel="nofollow">https://www.kyberturvallisuuskeskus.fi/fi/ajankohtaista/rikolliset-urkkivat-suomalaisten-pankkitunnuksia</a><br />
Kela, Keskusrikospoliisi ja Kyberturvallisuuskeskus kehottavat huolellisuuteen verkkopalveluihin kirjautumisessa. Rikolliset kalastelevat pankkitunnuksia suomalaisten pankkien ja Omakanta-palvelun nimissä. Asioithan verkossa turvallisesti ja tunnista huijaukset. Kerro huijauksista myös läheisillesi.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
