UCSF pays ransomware gang. Kashmir utility recovers from cyberattack. Hacktivism on the Nile. Unsecured e-learning database. | #ramsonware | #comptiaplus | #government

The University of California has decided to pay a gang that infected “a limited number of servers” at its University of California San Francisco (USCF) unit with Netwalker ransomware, Computer Business Review reports. The university said the encrypted data were “important to some of the academic work we pursue as a university serving the public good.” That appeared to suggest COVID-19 research was affected, but Bloomberg, which put the ransom paid at $1.4 million, says the university’s work on the virus was unimpeded. The BBC’s account of UCSF’s negotiations with the gang reports that the extortionists threatened to release stolen student information.

Business systems were affected by an unspecified cyberattack against the Jammu and Kashmir Power Development Department, but the Kashmir Observer says the utility is well on its way to recovery.

In an update on last week’s hacktivism against Ethiopian targets during an ongoing dispute between Cairo and Addis Ababa over Ethiopia’s construction of a Nile dam, Quartz says there’s no sign of any connection between the hacktivists and the Egyptian government.

vpnMentor discovered an exposed AWS database belonging to OneClass, a Toronto-based e-learning platform widely used in North America. vpnMentor says the database held “27 GB of data, totaling 8.9 million records, and exposed over 1 million individual OneClass users.” OneClass, which secured the database upon notification, says the data were on a test server and bore no relation to actual individuals. vpnMentor believes to the contrary that that database did indeed hold information on students and lecturers.

Click here to go to the original Source of this story.


Get your CompTIA A+, Network+ White Hat-Hacker, Certified Web Intelligence Analyst and more starting at $35 a month. Click here for more details.

.  .  .  .  .  .  . .  .  .  .  .  .  .  .  .  .   .   .   .    .    .   .   .   .   .   .  .   .   .   .  .  .   .  .

Leave a Reply