More stories

  • in

    Shangri-La hotel data breach likely had 'minimal' impact at Singapore ministerial summit

    A recent data breach that hit eight Shangri-La hotels is unlikely to have a large impact on foreign government delegates who attended a high-level defence summit in Singapore, which was held at the hotel. Hackers claiming to have instigated the attack apparently have made contact with the hotel chain. Shangi-La Group said Friday it received an email from senders who claimed responsibility for the data security breach that it announced on September 30. As a precaution, the hotel group said it informed the relevant law enforcement and regulators about the email. It added that more details would be provided when it had more to share. The data breach had affected eight of its hotels, including in Singapore, Taipei, Tokyo, Hong Kong, and Chiang Mai. In an email the hotel chain sent to affected guests, Shangri-La Group’s senior vice president of operations and process transformation Brian Yu said a “sophisticated threat actor” had bypassed the company’s cybersecurity monitoring systems undetected and “illegally accessed the guest databases”. Its investigation determined that the breach had occured between May and July this year, Yu said. The affected databases had contained personal information such as names, phone numbers, and email addresses as well as membership numbers and reservation dates. According to Yu, data such as passport numbers, identification numbers, dates of birth, and credit card numbers were encrypted. ZDNET emailed Shangri-La with questions on how the breach occurred, why it was undetected for four months, and what the hackers had asked for it their email. This article will be updated when the hotel responds. In a statement following the incident, Hong Kong’s Office of the Privacy Commissioner for Personal Data (PCPD) said it was notified about the breach in the evening of September 29. It said personal data of more than 290,000 customers in Hong Kong might have have been compromised in the breach, which affected three local hotels including Kowloon Shangri-La.Expressing disappointment that customers as well as PCPD were only informed more than two months after Shangri-La was aware of the incident, the Hong Kong privacy commissioner said it had commenced a compliance check on the breach.Singapore on Monday said it also was working with the hotel group to improve safeguards. Defence ministers from around the globe, including the US, Japan, and Australia, had gathered at a defence summit held at Shangri-La Singapore in June, during which the hotel’s database already had been infiltrated and the breach undetected. The impact on guests, though, was likely to be “minimal”, said Singapore’s Ministry of Communications and Information (MCI) in a written parliamentary response. “The majority of the Shangri-La hotel guests who attended the 19th Shangri-La Dialogue, especially dignitaries, registered in groups through their embassies without submitting their personal details,” MCI said, adding that some hotel guests who provided their personal particulars had been contacted by the hotel group about the breach. While the impact on the summit was “likely to be minimal”, MCI said Singapore’s Defence Ministry was taking further steps with the summit organiser as well as Shangri-La to “enhance safeguards”.  RELATED COVERAGE More

  • in

    Password-hacking attacks are on the rise. Here's how to stop your accounts from being stolen

    Image: Getty/MoMo Productions Cyber crooks are making almost 1,000 attempts to hack account passwords every single second – and they’re more determined that ever, with the number of attacks on the rise. The figures come from Microsoft’s Digital Defense Report 2022 and are based on analysis of trillions of alerts and signals collected from the […] More

  • in

    Cloud computing is booming, but these are the challenges that lie ahead

    Image: Hinterhaus Productions/GETTY Cloud adoption is not slowing down, but that doesn’t mean 2023 is going to be an easy year for users of on-demand computing services. According to a recent report by tech analyst Gartner, worldwide consumer spending on public cloud services is forecast to grow 20.7% to $591.8 billion in 2023, up from […] More

  • in

    The 12 best holiday gift ideas for hackers in 2022

    There is a misconception that all hacking is illegal. However, hacking is simply identifying weaknesses in a device — whether it is a PC, smartphone, or another physical object — and software, including apps, and attempting to exploit them.This could include a computer network, old tech equipment, or a website’s backend control system. Hacking, in itself, doesn’t automatically mean unauthorized entry. There are companies out there that ask for ethical hackers to test their software for weaknesses and will reward them financially for their findings.It is only when a hacker uses their skills for unauthorized and criminal purposes, theft, or destruction that it becomes illegal. This could include breaking into a network to deploy malware or stealing confidential information. More

  • in

    How to export your Bitwarden vault for safekeeping

    iStockphoto/Getty Images At this point in the game, if you’re not using a password manager, you run the risk of your accounts getting hacked. Why? Because without a password manager, you’re probably using weak passwords that you can remember or you’re storing those passwords in an unprotected file on your computer. Should that be the […] More

  • in

    Australia sees rise in cybercrimes on back of 'destructive' ransomware, state actors

    Australia clocked one cybercrime report every 7 minutes in the past year, with ransomware proving to be the “most destructive” threat. State actors also remain a persistent threat for agencies such as the Australian Bureau of Statistics, which personal information on the local population makes it an attractive target. The country saw an almost 13% increase in the number of reported cybercrime cases to more than 76,000 last year, according to the Annual Cyber Threat Report 2021-2022 released by Australian Cyber Security Centre (ACSC). This meant there was one reported case every 7 minutes, up from every 8 minutes in the last financial year, the government agency said. Its annual report contains insights from the Australian Federal Police, Australian Criminal Intelligence Commission, Australian Security Intelligence Organisation, Defence Intelligence Organisation, and Department of Home Affairs.ACSC pointed to ransomware, in particular, as the most damaging, with all sectors in the local economic directly impacted by such attacks last year, where 447 ransomware cases were reported. This figure was a 10% drop from the previous year, but the report surmised that ransomware remained significantly underreported, especially amongst victims who opt to pay a ransom.The education and training sector recorded the most ransomware incidents, moving up from being fourth place the year before, and alongside four others in the top five sectors accounted for 47% of all reported ransomware attacks. “Top-tier ransomware groups are continuing to target Australian ‘big game’ entities–organisations that are high profile, high value, or provide critical services,” ACSC said. “While global trends indicate a decline in ‘big game’ targeting and a shift towards targeting small and midsize businesses (SMBs), that change has yet to be seen in Australia.”State actors a persistent threat amidst geopolitical tensionsWhat it had witnessed in the past year, though, were persistent attempts from state actors looking to access sensitive data, including personally identifiable information, to support their government’s intelligence requirements. Deputy Prime Minister and Minister for Defence Richard Marles said: “We are currently witnessing deteriorating strategic circumstances in our region and globally, including a military buildup unseen since World War II, and expanding cyber and grey zone capabilities are of particular concern.”The Australian Bureau of Statistics, for instance, is an attractive target as it holds personal information on the local population, according to the report. Prior to the national census which was conducted in August 2021, the ACSC said it held threat intelligence briefings with the bureau and assessed cyber activities against the agency. It also conducted a review of the bureau’s systems, which included a source code review, penetration testing to identify vulnerabilities, and analysis to detect malicious activities that might already be in the system. ACSC said it not find any indication of malicious activities and critical cybersecurity recommendations were resolved by the bureau before the census was conducted. While this ran without cybersecurity incident or service disruption, the cybersecurity agency noted that cyber was increasingly the domain of warfare. It pointed to Russia’s use of malware to remove data and shut down computers in Ukraine. It also highlighted a July 2021 incident in which Australia attributed the exploitation of Microsoft Exchange vulnerabilities to China’s Ministry of State Security. The Five Eyes advisory in November 2021 also confirmed an Iranian state actor had exploited the same vulnerabilities. ACSC warned that Indo-Pacific dynamics were fuelling the risk of a crisis and cyber operations were likely to be used by states to challenge the sovereignty of others.”These actors do not just want classified information. They also want to understand who we are, how we connect with each other, and what values we hold,” the Australian agency said. “In some cases, they may seek to pre-position in strategic networks to prepare for coercive or disruptive activity against us.”The report further pointed to Australia’s critical infrastructures, which continued to face potential threat from state actors as well as cybercriminals looking to cause disruptions. “Critical infrastructure encompasses the physical facilities, communication networks, and information and operational technologies that provide essential services,” ACSC said. “A sustained disruption in one part of the critical infrastructure ecosystem has knock-on effects elsewhere in the economy, and could ultimately lead to harm or loss of life, as seen internationally as a consequence of ransomware attacks on health services.”It noted that CS Energy’s corporate network in November last year was targeted by Russia-aligned Conti ransomware group. The Queensland electricity generator, which produces 10% of electricity for the national electricity market, had cut the external online connection to its network after detecting the ransomware attack and initiated business continuity procedures. ACSC said 95 cyber incidents, or about 8% of all cyber incidents it responded to last year, had involved critical infrastructuresAmongst other key findings in its report this year, the security agency estimated that AU$98 million ($62.74 million) was lost to business email compromise incidents, with an average AU$64,000 lost per report. The average cost per cybercrime report for small businesses also climbed to more than AU$39,000, while this figure clocked at AU$88,000 for medium businesses and more than AU$62,000 for large businesses. More than 25,000 calls were made to the country’s cyber security hotline, or an average 69 per day, up 15% from the previous year.Fraud, online shopping, and online banking were the leading cybercrime categories, accounting for 54% of all reported incidents.Marles noted: “This [ACSC] report maps how threat actors across the world have continued to find innovative ways to deploy online attacks, with supply chains used to penetrate cyberdefences of governments and organisations in many countries, including Australia.”Reporting cybercrime is vital for us to build a threat picture that can prevent others from falling victim to the ransomware syndicates and cybercriminals. The best cyberdefence is informed by the best intelligence,” the minister added. The government is seeking stiffer financial penalties for serious or repeated data privacy breaches, pushing maximum fines of up to AU$50 million ($31.57 million). The move comes amidst a spate of cybersecurity incidents that compromised customer data, including Optus and Medibank. RELATED COVERAGE More

  • in

    Best early Black Friday VPN deals 2022: Surfshark, NordVPN, and more available now

    For these Black Friday VPN deals, we only considered reputable and trustworthy VPN providers. There are no shortages of VPNs out there, but there is a limited number of companies that provide secure and user-friendly VPNs.Finding true VPN deals can be a bit tricky because the prices change frequently and with various subscription lengths and add-ons, it gets convoluted. Most VPNs charge less for longer subscriptions and the standard price for service is often advertised as a huge discount. But if the VPN is always available for 63% off, then I don’t consider that a sale. For the offers listed in this roundup, I based the discounted price on what I’d consider the standard offer rather than an imaginary inflated price that you’ll never have to pay.We didn’t include free VPNs in our roundup because free VPN services are a mixed bag. It takes money to run a VPN and if you’re not paying then you could be bombarded with ads or stuck with a subpar service. That’s in the best-case scenario. The worst free VPNs could make money by selling your data, so it’s best to stick with a paid service if you’re taking your privacy and security seriously. More

  • in

    How to set up and use a VPN on your iPhone

    NordVPN These days, cybersecurity is something everyone needs to think about, not just governments and big corporations. The good news is, you can use a few basic tools to defend yourself and become a less desirable target to hackers. Antivirus software can help protect you from viruses and other types of malware. But antivirus programs typically only […] More