Tag Archive for: Employee

Children among 26,000 people impacted by Dallas ransomware attack, city employee says


DALLAS (CBSNewsTexas.com) — On Tuesday, the City of Dallas disclosed that over 26,000 people were affected by a ransomware attack that occurred three months ago.

In early May, hackers accessed names, addresses, medical data and other information through city government servers. 

A group called “Royal” later claimed they encrypted the city’s critical data and threatened to post sensitive information online. Their alleged cyber intrusion also impacted 911 dispatch services for police and fire departments, municipal courts, water utilities and other services.

An image of the ransomware note obtained by J.D. Miles

City of Dallas


As a whole, 26,212 people were affected. And CBS News Texas has since learned that some city employees are already reporting identity theft. What’s more is that some of their children have also had their personal information stolen.

“Unfortunately, it was what I expected,” said Dallas Fire Fighters Association President Jim McDade. “That’s why I took out the identity theft protection back in May.”

McDade—whose personal information was also compromised—said his 1,500 members have been outraged at what they believe has been a sluggish response by the city.

On top of that, he said his 10-year-old son and the children and spouses of other city employees have had their information stolen, too.

Cyber security expert Andrew Sternke said if children have been victimized, it can haunt them into adulthood.

“This information is released out onto the dark web to be sold,” Sternke said. “When that kid turns 18, it’s a free-for-all and that’s another concerning aspect: that it’s not just the adults we have to worry about.”

Those concerns prompted the city to release a statement defending the time it took to report its findings…

Source…

Google’s new security pilot program will ban employee Internet access


A large Google logo is displayed amidst foliage.

The Internet is dangerous, so what if you just didn’t use it? That’s the somewhat ironic recommendation Google, one of the world’s largest Internet companies, is making to its employees. CNBC’s Jennifer Elias reports that Google is “starting a new pilot program where some employees will be restricted to Internet-free desktop PCs” while they work. An internal memo seen by CNBC notes that “Googlers are frequent targets of attacks” by criminals, and a great way to combat that is to not be on the Internet.

Employees that work at major tech companies are a much richer target for criminals compared to normal people. Tech company employees have all sorts of access to sensitive data, and compromising a single employee could lead to exploiting sensitive infrastructure. Just last week, Microsoft was targeted by a Chinese espionage hacking group that somehow stole a cryptographic key to bypass Microsoft’s authentication systems, giving it access to 25 organizations, including multiple government agencies.

The report says Google’s new pilot program “will disable Internet access on the select desktops, with the exception of internal web-based tools and Google-owned websites like Google Drive and Gmail.” This was originally mandatory for the 2,500 employees that were selected, but after “receiving feedback”—we’re going to assume that was very enthusiastic feedback—Google is letting employees opt out of the program. The company also wants some employees to work without root access, which is common sense for a lot of computer roles, but not really for developers, which are used to being able to install new programs and tools.

Being banned from the entire Internet would be tough, but Googlers in the high-security program will still get access to “Google-owned websites,” which is actually quite a bit of the Internet. Google Search would be useless, but you could probably live a pretty good Internet life, writing documents, sending emails, taking notes, chatting with people, and watching YouTube.

It would presumably still be possible to be emailed a virus attachment, but…

Source…

Former Contractor Employee Charged for Hacking California Water Treatment Facility


A 53-year-old man from Tracy, California, has been charged for allegedly hacking into the systems of a water treatment facility in an attempt to delete critical software.

The suspect, Rambler Gallo, has been charged with “transmitting a program, information, code, and command to cause damage to a protected computer”, but this is a case of unauthorized access rather than actual hacking. 

Gallo worked for a company contracted by the town of Discovery Bay in California to operate its water treatment facility, which serves 15,000 residents. 

He worked at the company between 2016 and the end of 2020, and during this time he allegedly installed software that allowed him to access the facility’s systems from his personal computer. 

After he resigned in January 2021, he used that remote access software to enter the water facility’s systems and “transmitted a command to uninstall software that was the main hub of the facility’s computer network and that protected the entire water treatment system, including water pressure, filtration, and chemical levels,” according to a press release from authorities in the Northern District of California. 

Gallo faces up to 10 years in prison and a $250,000 fine. 

It’s not uncommon for water facilities to be targeted, including by former employees. One of the most well-known incidents involves the water plant in Oldsmar, Florida. While initially it was believed that malicious hackers had tried to poison the water supply, recent reports said the incident did not involve any hacking and it may have actually been the result of human error. 

Advertisement. Scroll to continue reading.

Related: US Says National Water Supply ‘Absolutely’ Vulnerable to Hackers

Related: Former Ubiquiti Employee Who Posed as Hacker Sentenced to Prison

Related: Former Cisco Employee Sentenced to Prison for Webex Hack

Related: Bipartisan Bill Proposes Cybersecurity Funds for Rural Water Systems

Source…