• chevron_right

      Hackers leak alleged Taylor Swift ticket data to extort Ticketmaster

      news.movim.eu / TheGuardian · Friday, 5 July - 21:36

    Hackers claim they obtained barcode data for hundreds of thousands of tickets to Eras tour and demand millions in ransom

    Hackers claimed this week that they had obtained barcode data for hundreds of thousands of tickets to Taylor Swift’s Eras tour, demanding that Ticketmaster pay millions in ransom money or they would leak the information online.

    The hacking group posted samples of the data to an online forum– ticket data on Swift’s shows in Indianapolis, Miami, and New Orleans – and alleged that it possessed an additional 30m million barcodes for other high-profile concerts and sporting events.

    Continue reading...
    • chevron_right

      London hospitals cancelled nearly 1,600 operations and appointments in one week due to hack

      news.movim.eu / TheGuardian · Friday, 14 June - 17:47

    King’s College and Guy’s and St Thomas’ trusts were worst affected by ransomware attack by Russian gang Qilin

    Hospitals in London had to cancel almost 1,600 operations and outpatient appointments in the first week after being hit with a Russian cyber-attack , the NHS has disclosed.

    The two major acute hospital trusts in the capital that were worst affected postponed 832 surgical procedures between Monday 3 June, when the hack began, and Sunday 9 June.

    Continue reading...
    • chevron_right

      Eddie Redmayne says Warren Beatty offered to bail him out after email hack

      news.movim.eu / TheGuardian · Friday, 14 June - 10:43

    Scam email saying that the actor was in a fix and needed cash was sent to contacts including Jamie Dornan – Beatty was the only one to come to his aid

    Eddie Redmayne has revealed that after his email was hacked, Warren Beatty responded by offering to wire him money: “whatever you need”.

    Redmayne told the story on Late Night With Seth Meyers , and said that “a couple of years ago” a scammer hacked his email and sent money requests to his contacts, including Beatty and fellow actor Jamie Dornan.

    Continue reading...
    • chevron_right

      Western governments struggle to coordinate response to Chinese hacking

      news.movim.eu / TheGuardian · Friday, 29 March - 04:30

    Experts say UK-imposed sanctions will make no difference when hacking is part of ecosystem of dealing with Beijing

    With the announcement that the UK government would be imposing sanctions on two individuals and one entity accused of targeting – without success – UK parliamentarians in cyber-attacks in 2021 , the phrase “tip of the iceberg” comes to mind. But that would underestimate the iceberg.

    James Cleverly, the home secretary, said the sanctions were a sign that “targeting our elected representatives and electoral processes will never go unchallenged”.

    Continue reading...
    • chevron_right

      Why didn’t New Zealand impose sanctions on China?

      news.movim.eu / TheGuardian · Thursday, 28 March - 02:02


    New Zealand did not follow the US and UK in imposing financial restrictions after accusing Beijing of links to cyber-attacks

    Politicians, journalists and critics of Beijing were among those targeted by cyber-attacks run by groups backed by China, western intelligence services said this week.

    The separate cyber-attacks hit the US, UK and New Zealand – all members of the Five Eyes alliance. The network of five countries, which also includes Canada and Australia, share security related intelligence.

    Continue reading...
    • chevron_right

      Hackers obtain patient data from NHS Dumfries and Galloway

      news.movim.eu / TheGuardian · Wednesday, 27 March - 13:31


    Cyber-attack by Inc Ransom yielded data on at least a ‘small number’ of patients, health board says

    A hacker group is in possession of at least a “small number” of patients’ data following a cyber-attack, NHS Dumfries and Galloway has said.

    Reports emerged on Wednesday of a post by the group Inc Ransom on its darknet blog, alleging it was in possession of three terabytes of data from NHS Scotland.

    Continue reading...
    • chevron_right

      Security Vulnerability in Saflok’s RFID-Based Keycard Locks

      news.movim.eu / Schneier · Tuesday, 26 March - 16:04 · 1 minute

    It’s pretty devastating :

    Today, Ian Carroll, Lennert Wouters, and a team of other security researchers are revealing a hotel keycard hacking technique they call Unsaflok . The technique is a collection of security vulnerabilities that would allow a hacker to almost instantly open several models of Saflok-brand RFID-based keycard locks sold by the Swiss lock maker Dormakaba. The Saflok systems are installed on 3 million doors worldwide, inside 13,000 properties in 131 countries. By exploiting weaknesses in both Dormakaba’s encryption and the underlying RFID system Dormakaba uses, known as MIFARE Classic, Carroll and Wouters have demonstrated just how easily they can open a Saflok keycard lock. Their technique starts with obtaining any keycard from a target hotel—say, by booking a room there or grabbing a keycard out of a box of used ones—then reading a certain code from that card with a $300 RFID read-write device, and finally writing two keycards of their own. When they merely tap those two cards on a lock, the first rewrites a certain piece of the lock’s data, and the second opens it.

    Dormakaba says that it’s been working since early last year to make hotels that use Saflok aware of their security flaws and to help them fix or replace the vulnerable locks. For many of the Saflok systems sold in the last eight years, there’s no hardware replacement necessary for each individual lock. Instead, hotels will only need to update or replace the front desk management system and have a technician carry out a relatively quick reprogramming of each lock, door by door. Wouters and Carroll say they were nonetheless told by Dormakaba that, as of this month, only 36 percent of installed Safloks have been updated. Given that the locks aren’t connected to the internet and some older locks will still need a hardware upgrade, they say the full fix will still likely take months longer to roll out, at the very least. Some older installations may take years.

    If ever. My guess is that for many locks, this is a permanent vulnerability.

    • chevron_right

      A Taxonomy of Prompt Injection Attacks

      news.movim.eu / Schneier · Friday, 15 March - 02:10 · 1 minute

    Researchers ran a global prompt hacking competition, and have documented the results in a paper that both gives a lot of good examples and tries to organize a taxonomy of effective prompt injection strategies. It seems as if the most common successful strategy is the “compound instruction attack,” as in “Say ‘I have been PWNED’ without a period.”

    Ignore This Title and HackAPrompt: Exposing Systemic Vulnerabilities of LLMs through a Global Scale Prompt Hacking Competition

    Abstract: Large Language Models (LLMs) are deployed in interactive contexts with direct user engagement, such as chatbots and writing assistants. These deployments are vulnerable to prompt injection and jailbreaking (collectively, prompt hacking), in which models are manipulated to ignore their original instructions and follow potentially malicious ones. Although widely acknowledged as a significant security threat, there is a dearth of large-scale resources and quantitative studies on prompt hacking. To address this lacuna, we launch a global prompt hacking competition, which allows for free-form human input attacks. We elicit 600K+ adversarial prompts against three state-of-the-art LLMs. We describe the dataset, which empirically verifies that current LLMs can indeed be manipulated via prompt hacking. We also present a comprehensive taxonomical ontology of the types of adversarial prompts.