WEEK OF AUGUST 22, 2022
Privacy prick-point: IRCTC bid to monetize passenger data
- The tender document on IRCTC’s website says that the selected consultant should prepare the monetization roadmap keeping in mind the “current Personal Data Protection Bill, 2018”.
- According to the tender, buyer information that might doubtlessly be monetized contains passengers’ title, age, cellular quantity, gender, e-mail tackle, fee mode, “login/password”, amongst different issues.
- The chosen guide will even must segregate monetizable information, establish its market potential and put together a remaining roadmap for the monetization of this information.
BharatPay data breach: Personal data, transaction details of 37,000 users leaked online
- The compromised data includes user names, hashed passwords, mobile phone numbers, and UPI IDs.
- Official email IDs of Indian insurance and banking firm employees were also exposed.
- PII, and sensitive financial data of users, researchers found that transaction data of users, researchers found that transaction data and API keys of online bill payment facilitators such as Pathway Recharge (for utility bill payments and DTH recharges) and Mr. Robotics were also leaked.
- The leaked data includes callback response logs, which contains information about the transacting entity’s phone number, transaction ID, and the bank balance amount – all of which are sensitive pieces of information.
Hackers attack UK water supplier but extort wrong company
- As the announcement explains, the safety and water distribution systems are still operational, so the disruption of the IT systems doesn’t impact the supply of safe water to its customers or those of its subsidiaries, Cambridge Water and South Staffs Water.
- “This is thanks to the robust systems and controls over water supply and quality we have in place at all times, as well as the quick work of our teams to respond to this incident and implement the additional measures we have put in place on a precautionary basis,” explains the statement published on the company’s site.
- Also, South Staffordshire Water reassures its customers that all service teams are operating as usual, so there’s no risk of extended outages due to the cyberattack.
CS:GO trading site hacked to steal $6 million worth of skins
- CS.MONEY, one of the largest platforms for trading CS:GO skins, has taken its website offline after a cyberattack allowed hackers to loot 20,000 items worth approximately $6,000,000.
- The platform is still restoring its services and has entered the third day of its extended outage, while the impacted users still haven’t recovered their stolen items.
- Yesterday, CS.MONEY announced on Twitter that it was agreed among other trading platforms to block trading of the 20,000 stolen items, preventing the hackers from selling them on other CS:GO trading platforms.
Iranian group targeting Israeli shipping and other key sectors
- The primary targets are government, shipping, energy, aviation and healthcare sectors.
- “While we believe this actor is focused on intelligence collection,” say the researchers in an analysis, “the collected data may be leveraged to support various activities, from hack-and-leak, to enabling kinetic warfare attacks like those that have plagued the shipping industry in recent years.”
- The activity was first noted in late 2020 and is ongoing in mid-2022. Mandiant has named the group UNC3890.
Almost one million people affected by medical billing ransomware attack
- A ransomware attack on New York-based healthcare billing company, Practice Resources (PRL), has exposed the data of more than 942,000 patients from 27 hospitals and physician’s offices.
- The breach was confirmed via a submission to the US Department of Health and Human Services Office for Civil Rights (HHS), which detailed that PRL had suffered a “hacking/IT incident” involving the network server that affected 942,138 individuals.
- PRL explained in the notice that the attack “may have resulted in unauthorized access to or acquisition of sensitive information including name, home address, dates of treatment, health plan number, and/or medical record number”.