the intrusion came in the form of a spear-phishing email sent to lab employees on April 7. The e-mail, purportedly sent from the human resources department, discussed employee benefits and included a link to a malicious web page, where malware exploited the IE vulnerability to download additional code to users’ machines
target data breach - Krebs on Security - 0 views
Third Party Vendor Source of Breach at Home Depot - 0 views
FBI makes easy catch of alleged LulzSec hacker 'Recursion' for Sony data breach | ITworld - 0 views
Top Federal Lab Hacked in Spear-Phishing Attack | Threat Level | Wired.com - 0 views
-
-
About 530 employees received the e-mail — out of about 5,000 workers — but only 57 people clicked on the malicious link in the correspondence. Out of this, only two machines got infected with the malware.
-
April 11, administrators discovered a server had been breached when data began leaving the network. Workers cleaned up the infected system, but early Friday evening “a number of other servers suddenly [went] active with the malware,” Zacharia said. The malware had apparently laid dormant for a week before it awoke on those systems. That’s when the lab blocked internet access. Zacharia said the malware “masked itself” on systems and was designed to erase itself if it tried to compromise a system and was unsuccessful.
- ...1 more annotation...
2016 Data Breaches - 0 views
1 - 8 of 8
Showing 20▼ items per page