India's largest container port disrupted after Petya ransomware cyber attack

The Ministry of Shipping has confirmed on Wednesday that the operations at India's one of the three largest port, Jawaharlal Nehru Port Trust (JNPT), have been partially halted due to the global cyber attack 'Petya'.

The cyber attack also partially disrupted the operations of a private port operator APM Terminals Pipavav, which reportedly took place at late Tuesday night.

“We have been informed that the operations at GTI have come to a standstill because their systems are down (due to the malware attack). They are trying to work manually,” a senior JNPT official said.

To reduce the impact of the cyber attack, IT Ministry has sent National Cyber Security Advisor Gulshan Rai to assess the situation. While the government's cyber security unit worked overtime to send out advisories to all critical infrastructure.

"The ICT infrastructure installed, managed and operated by government authorities, central and state, are functioning efficiently," Rai told.

In a statement issued by the Shipping Ministry, it said: “An unforeseen situation has developed at Jawaharlal Nehru Port Trust (JNPT), Sheva owing to disruption in the operations of one of the private terminal operator, APM Maersk at JNPT. It has been informed by the private Terminal Operator that this disruption is a consequence of a worldwide disruption being faced by them because of a cyber attack.”

JNPT has the capacity of 1.8 million standard container units, is located near Mumbai. As per the reports of Bloomberg,  the private terminal owners are not able to load or unload material, as it is hard for the officials to identify the owners of the shipments.


(pc-Google Images)
The digital criminal group invests a considerable measure of energy creating scams to ensure their target succumbs to them. In the most recent scam, a state Supreme Court judge was deceived into an email she accepted originated from a legitimate source land legal advisor. Resultantly she lost more than $1 million.

The judge in the talk is Lori Sattler, a 51-year-old Acting State Supreme Court Justice who was pitching her flat to purchase another. Be that as it may, what she didn't expect was getting defrauded in such a basic circumstance. As reported by NYDailyNews report, Sattler approached the law enforcement experts and informed about the fraud mail. She told police that on Friday, June seventh, she got an email from somebody putting on a show to be her legal advisor requesting that she send cash to a bank account.

Following the guideline, she wired $1,057,500 to the account however instead of her legal counsellor the cash was sent to a bank in China, allegedly Commerce Bank of China. Regardless of how prominent your occupation is whether you don't know about online tricks you may wind up losing your life savings. This is not the first run through when an email trick has effectively deceived clients into wiring cash. In 2016, an organisation's CFO was deceived into transferring $44.6 million to the wrong financial balance. Facebook and Google were targeted by a phishing trick by a man in Lithuania who deceived the tech monsters into paying him over a $100 million.


(pc-Google Images)
The WCry ransomware worm has struck once more, this time inciting Honda Company to stop generation in one of its Japan-based industrial facilities in the wake of discovering infections in an expansive swath of its PC systems, as per media reports. The automaker closed down its Sayama plant north-west of Tokyo on Monday in the wake of finding that WCry had impacts on networks all over Japan, North America, Europe, China, and different areas, Reuters revealed Wednesday.

The episode was immediately contained through a noteworthy stroke of good luck. A security scientist largely acting out of curiosity enlisted a strange area name contained in the WCry code that gone about as a worldwide off button that quickly ended the self-repeating assault. Honda authorities didn't clarify why engineers discovered WCry in their systems 37 days after the off button was enacted. One plausibility is that architects had erroneously blocked access to the off button area. That would have caused the WCry adventure to continue as typical, as it did in the 12 hours before space was enrolled.

WCry repackaged a weaponized misuse created, utilised, and in the end stolen from the National Security Agency. A still-obscure gathering calling itself the Shadow Brokers discharged the adventure, code-named EternalBlue, in April, in what was the most harmful attack the gathering has made since it opened up to the world last August. Very quickly, WCry closed down PCs around the globe, constraining hospitals to dismiss patients and briefly closing down banks and Fortune 500 organisations.

In May, it was difficult to pardon such a large number of organisations not yet applying a two-month-old fix to basic frameworks that were defenceless against cutting edge NSA misuse code put into people in general area. The disappointment is considerably harder to forgive five weeks after the fact, now that WCry's wake of obliteration has come into full view.


(pc-Google Images)
No one's data is secure in a time of enormous information. Americans learnt it the most difficult way possible on Monday after a showcasing organisation working for the Republican National Committee traded off sensitive individual data of the greater part the nation's populace.

As indicated by a report conveyed by Tech news site Gizmodo, personal information of just about 62 percent of the US populace was "incidentally left uncovered" by an advertising organisation. This is allegedly the biggest rupture of discretionary information in the US up until now.

The bargain of information in the US - whose tech ability has been a wellspring of motivation for aspiring Indians - comes when challenges have spiked back home against the administration's interesting Unique Identification Scheme, a.k.a the Aadhaar card. A few State and Union government sites, including the Swachh Bharat Mission, leaked information of subjects who have subscribed to the Aadhaar. Points of interest released incorporated the Aadhaar number, address and sometimes, even the LPG connection numbers and telephone numbers.

Back in the US, the detail of natives traded off by the organisation incorporate locations, birthdates, telephone numbers, political perspectives, suppositions on weapon control, immature microorganism research and premature birth. The information was freely accessible on Amazon cloud server and could be accessed by any individual who had the link. The US scene is a lesson for India where the administration is pushing forward with the Aadhaar program, making it compulsory for exchanges with practically every administration division and select private administrations.


(pc-Google Images)
Webcams which are utilised for numerous applications both at individual and organisational levels have transformed into new cybersecurity dangers, another report said on Tuesday. As indicated by a report titled "Vulnerabilities in Foscam IP Cameras" by Finland-based digital security firm F-Secure, different vulnerabilities are tormenting a huge number of web-associated cameras around the world. 

The scientists found an aggregate of 18 vulnerabilities in these webcams and expressed that an aggressor can see the video sustain, control the camera operation and transfer and download records from the inherent FTP server.

"Foscam-made IP cameras have multiple vulnerabilities that can lead to full device compromise," the report claimed.

"An unauthenticated attacker can persistently compromise these cameras by employing a number of different methods leading to full loss of confidentiality, integrity and availability, depending on the actions of the attacker," it added.

F-secure informed Foscam about the vulnerabilities, however, got no reaction. As indicated by F-secure, Foscam has purportedly a background marked by bugs enabling access to video nourishes from IP cameras and infant screens.


(pc-Google Images)
Linux, BSD, Solaris and other open source frameworks are defenceless against a nearby benefit acceleration vulnerability known as Stack Clash that enables an attacker to execute code at the root. Significant Linux and open source merchants have made patches accessible today, and frameworks running Linux, OpenBSD, NetBSD, FreeBSD or Solaris on i386 or amd64 equipment ought to be refreshed soon.

The hazard introduced by this defect, CVE-2017-1000364, winds up noticeably particularly if attackers are as of now show on a powerless framework. They would now have the capacity to chain this weakness with other basic issues, including the as of late tended to Sudo vulnerability, and afterwards run subjective code with the most noteworthy benefits, said specialists at Qualys who found the vulnerability. The vulnerability was found in the stack, a memory administration locale on these frameworks. The attack sidesteps the stack protect page moderation presented in Linux in 2010 after attacks in 2005 and 2010 focused on the stack.

Qualys prescribes in its consultative expanding the span of the stack monitor page to 1MB at the very least as a transient arrangement until the point when an update can be linked. It additionally prescribes recompiling all userland code with the –fstack-check choice which would keep the stack pointer from moving into other memory locales. Qualys surrenders, notwithstanding, this is a costly arrangement, however one that can't be crushed unless there is an obscure vulnerability in the –fstack-check alternative.

New Global Ransomware attack creates turmoil across the Globe

Computer systems across the world are attacked by a ransomware, which bore similarities to a recent assault that crippled millions of network.

Many companies in Russia, United States, and across the globe are reporting that their It systems are being disrupted as a result of the cyber attack.

British advertising agency WPP, Ukrainian firms, including the state power company and Kiev's main airport, were among the first to report about the issue.

The Ukrainian's Nuclear Power Plant, Chernobyl, had to switch manual checking of radiation level after its Window-based sensors were affected by a cyber attack.

According to the Experts, the malware is exploiting the same weaknesses that were used by the WannaCry ransomware attack last month.

"It initially appeared to be a variant of a piece of ransomware that emerged last year," said computer scientist Prof Alan Woodward.

"The ransomware was called Petya and the updated version Petrwrap.

"However, now that's not so clear."

The Russian cyber security firm Kaspersky Lab said that the malware was a "new ransomware that has not been seen before," but it resembles Petya, an old malware.

As a result, the firm named it NotPetya. They reported that it attacks had been detected in Poland, Italy, Germany, France and the US in addition to the UK, Russia, and Ukraine.


(pc-Google Images)
Virgin Media has cautioned 800,000 clients using its Super Hub 2 switch to change their passwords in light of the fact that a security helplessness could open their passwords to programmers, empowering aggressors to pick up control of other brilliant gadgets on the system. The organisation says that the danger of trade off is just negligible, however, clients who haven't changed the default watchword shown on a sticker connected to the switch to change both that and their system secret key with a specific end goal to ensure against potential assaults.

Virgin has exhorted Super Hub 2 clients to change to a "one of a kind" secret word which ought to contain no less than 12 characters utilising a blend of upper and lower case letters and numbers. The notice comes after an examination by moral programmers at SureCloud who discovered they could invade Super Hub 2 and utilise it to access to other family unit associated gadgets including youngsters' toys, web associated IP cameras, smartlocks and that's only the tip of the iceberg. Indeed, even Amazon Echo was found to have a defenselessness with respect to voice requesting, yet it was difficult to break.

An aggregate of 15 gadgets were associated with a testing domain and scientists discovered vulnerabilities in eight of them, including the Super Hub 2 switch, the passage to every one of the gadgets inside the earth. Moral programmers say they could rupture it inside days. In any case, Virgin Media, while noticing the helplessness, have indicated this being an issue which exists of all switches of this age, however that the organization, and also issuing exhortation to change passwords, will be overhauling clients to a more up to date form of the switch.

"The security of our system and of our clients is of principal significance to us. We consistently overhaul our frameworks and hardware to guarantee that we meet all present industry gauges," said a Virgin Media representative told ZDNet.

Honda forced to shut down production at Japan plant after WannaCry cyberattack

Honda had halted production at its Sayama plant in northwest of Japan for a day after finding out that the  WannaCry virus has hit its computer network.

The plant  produces approximately 1,000 vehicles per day which includes the Accord sedan, Odyssey Minivan and Step Wagon compact multipurpose vehicle.

The company noticed the affect of virus for the first time on Sunday. It had affected  Honda’s global computer networks across Japan, North America, Europe, China and other regions,  a spokeswoman said.

Luckily, production at no other Honda plants had not been affected, and regular operations had resumed at the Sayama plant on Tuesday, she said.

Honda is not the first car manufacturer who was forced yo shut down after WannaCry attack, rival car manufacturers Renault and Nissan were also aforced to shut down their production for a few days at plants in Japan, Britain, France, Romania and India.

21 US election systems hacked by Russia

US intelligence agencies have concluded that Russia orchestrated wide-ranging influence operation that included email hacking and online propaganda to discredit Democratic presidential candidate Hillary Clinton and help Donald Trump, a Republican, win the White House in November. The state-sponsored hackers targeted 21 U.S. election systems in the 2016 presidential race but Feds didn’t reveal the name of hacked state systems to protect their confidentiality.

Jeh Johnson, who led the Homeland Security Department until the end of the Obama administration, said his department had issued warnings about hacking into voter registration databases.

A current Homeland Security Department official confirmed in front of the Congress on Wednesday that a small number of state election systems were breached but added that there was no evidence any votes were manipulated. Jeanette Manfra, the department's acting deputy undersecretary of cybersecurity, testified before the Senate Intelligence Committee.

The Russia issue has cast a shadow over Trump's first five months in office. Trump has variously said Russia may or may not have been responsible for hacking but has dismissed allegations his associates colluded with Moscow as "fake news." Kremlin too has repeatedly denied responsibility for any cyber attacks during the election.

Reported Russia has hacked up to 39 states’ systems, and Illinois and Arizona declared their systems were among those affected, but this marks the first time that federal officials themselves have publicly described the number of states that were penetrated successfully by Russian hacking.

In August of 2016, DHS started getting reports of “cyber-related scanning and probing” of U.S. election infrastructure, testified Samuel Liles, another DHS official. At this point, he said, the agency began analysing and sharing this information with federal, state, and local partners.

Johnson testified that a 2005 video of Donald Trump bragging of sexual conquests distracted attention from Washington's warnings.

Manfra and other officials said U.S. elections are resilient to hacking in part because they are decentralised and largely operated on the state and local level.