Popular voice assistants have been hacked using light commands

Researchers with the University of Michigan and the University of Electro-Communications (Tokyo) have devised a new technique, called “light commands,” to remotely hack popular voice assistants, such as Amazon Alexa, Apple Siri, Facebook Portal, and Google Assistant.

The “light commands” attack exploits a design flaw in the smart assistants microelectro-mechanical systems (MEMS) microphones. MEMS microphones convert voice commands into electrical signals, but researchers demonstrated that they can also react to laser light beams.

The researchers demonstrated how an attacker can inject arbitrary audio signals to the target microphone by aiming an amplitude-modulated light at the microphone’s aperture.

Read more about it here.

Alabama hospital chain paid ransom to resume operations after ransomware attack

The DCH Health System said its hospitals in the west Alabama cities of Tuscaloosa, Northport and Fayette resumed admitting new patients on October 10, 2019. The 3 hospitals were hit on October 1, 2019 by a ransomware attack that paralyzed its systems.

While the hospitals were able to provide critical medical care to some patients during the 10 day period, non-emergency patients were diverted to other hospitals, and the hospital needed to use paper rather than electronic records when providing care.

The amount of ransom paid wasn’t disclosed.

Read more about it here.

10 hospitals in Alabama and Australia hit by ransomware attacks

Three hospitals in Alabama and seven in Australia have been hit with paralyzing ransomware attacks that are affecting their ability to take new patients. All three hospitals that make up the DCH Health System in Alabama were closed to new patients on October 1, 2019, as officials were coping with the attack. All but critical patients were turned away.

At the same time, seven hospitals in Australia were forced to either shut down systems or go into manual operation mode, following a ransomware attache of their information systems.

Read more about it here.

Researchers find 737 million medical images and data exposed on the Internet

Researchers at Greenbone Networks vulnerability analysis and management company analyzed 2,300 Picture Archiving and Communication System (PACS) systems. Of the 2,300, 590 archiving systems were accessible from the Internet, exposing 24 million medical records from 52 countries. They contained 737 million images linked to this patient data, around 400 million of which are accessible or can be easily downloaded from the internet.

Many of these servers were set up and then forgotten about, or weren’t patched regularly.

Read more about it here.

Google Calendar Possibly Revealing Users’ Data

Security researcher Avinash Jain discovered more than 8,000 Google Calendars exposed online, that were indexed by the Google search engine.

The issue isn’t new, however users may not be aware of it. It occurs when users make the Google calendar public.

“While this is an intended setting by the user and intended behavior of the service,” Jain says, “the main issue here is that anyone can view any public calendar by making a single Google search query, and without the calendar link being shared with them.”

Users should review their calendar sharing options – see https://support.google.com/a/answer/60765?hl=en.

Read more about it here.

An entire nation has been hacked – Ecuador

According to internet security firm vpnMentor. 20.8 million records of Ecuadorian citizens had their data exposed by an unsecured Elasticsearch server run by an Ecuadorian marketing and analytics firm.

The country’s population is only 16.6 million. Most likely, the data leakage included duplicate records and data of deceased citizens.

The personal information leaked online included full names, dates of birth, national identity card numbers, tax identification numbers, employment information, names of family members, and more.

The database was secured on September 11, 2019, after vpnMentor notified its discovery to the Ecuador CERT (Computer Emergency Response Team) team.

Read more about it here.

Choice Hotels has been hacked

Security researchers discovered an unsecured database containing 700,000 records from hotel franchise Choice Hotels. The MongoDB database contained 5.6 million records.

The database was hosted on a vendor’s server. Exposed records included guests names, email addresses, and phone numbers.

The hackers left a ransom note saying that 700,000 records had been stolen and backed up elsewhere, demanding 0.4 Bitcoin, or about $3,856. However, they didn’t lock up the data, making the ransom demand moot.

Read more about it here.

Naples, Florida, lost $700,000 in a cyber attack

The city of Naples, Florida, has confirmed that is lost $700,000 following a spear phishing cyber attack. “The funds were paid to a fake bank account the attacker provided while posing as a representative from the Wright Construction Group, which was doing infrastructure work on Eighth Street South in downtown Naples”, according to a news release.

The attackers sent an email disguised as coming from the Wright Construction Group, tricking a city employee into transferring the funds to a fake bank account under their control.

Fortunately, City Manager Charles Chapman confirmed that the attack did not breach the city’s data systems.

Recently, a number of cities in Florida were victims of cyber attacks: Riviera Beach, Key Biscayne, and others.

Read more about it here.

State Farm suffers a credential stuffing attack

State Farm, an American group of insurance and financial services companies, disclosed that it has been a victim of a credential stuffing attack. The attack was discovered in July 2019. The company notified the impacted users, but didn’t disclose how many users were affected.

Credential stuffing occurs when bad actors steal usernames and passwords from one online account, and then try them on other online account, revealing additional user information.

In response to the attack, State Farm reset the passwords of the impacted accounts.

Read more about it here.