Tuesday, July 06, 2021

MASSIVE RANSOMWARE ATTACKS GO ON UN-STOPPED. . .More Excuses

Same old and tired repeated-over-and-over again every time there's another one - Experts have predicted that when workers return to offices in the U.S. on Tuesday there may be more victims.

Kaseya ransomware attackers demand $70 million, claim they infected over a million devices

Three days after ransomware attackers started the holiday weekend by compromising Kaseya VSA, we have a clearer idea of how widespread the impact has been.

In a new ransom demand, the attackers claim to have compromised more than 1 million computers, and demand $70 million to decrypt the affected devices.

Inside Malware Markets: Current Trends and Competitive Forces

Kaseya’s software is used by Managed Service Providers to perform IT tasks remotely, but on July 2nd, the Russia-linked REvil ransomware group deployed a malicious software update exposing providers who use the platform, and their clients.

The Dutch Institute for Vulnerability Disclosure (DIVD) revealed that it appears the exploit used for the breach was same one they discovered and were in the process of addressing when the attackers struck. “We were already running a broad investigation into backup and system administration tooling and their vulnerabilities,” DIVD wrote. “One of the products we have been investigating is Kaseya VSA. We discovered severe vulnerabilities in Kaseya VSA and reported them to Kaseya, with whom we have been in regular contact since then.”

On Friday, Kaseya CEO Fred Vocolla said that “Only a very small percentage of our customers were affected – currently estimated at fewer than 40 worldwide.” Sophos VP Ross McKerchar said in a statement Sunday that “This is one of the farthest reaching criminal ransomware attacks that Sophos has ever seen. At this time, our evidence shows that more than 70 managed service providers were impacted, resulting in more than 350 further impacted organizations. We expect the full scope of victim organizations to be higher than what’s being reported by any individual security company.”

14 Infamous Computer Virus Snippets That Trace A History Of Havoc

Deputy National Security Advisor for Cyber and Emerging Technology Anne Neuberger followed up on earlier comments by President Biden, saying

“The FBI and CISA will reach out to identified victims to provide assistance based upon an assessment of national risk.”.                                                      Answers GIFs | Tenor

Huntress Labs is participating in the response to the attack and has cataloged most of the available information, saying the attack compromised over 1,000 businesses that it’s tracking.

> Sophos, Huntress and others pointed to this post (above) on REvil’s “Happy Blog,” claiming that more than a million devices have been infected and setting a ransom demand of $70 million in Bitcoin to unlock all of them.

REvil has been linked to a slew of ransomware incidents, including one attack involving Kaseya in June 2019, and a high-profile incident earlier this year targeting the meat supplier JBS. However, security researcher Marcus Hutchins expressed skepticism about the group’s claim, suggesting they’re overstating the impact in hopes of extracting a large payout from Kaseya or someone else . . ."

=========================================================================

CHILEAN BANK SHUTS DUE TO RANSOMWARE ATTACK - AYO.NEWS

Dutch researchers said they alerted Miami-based Kaseya to the breach and said the criminals used a “zero day,” the industry term for a previous unknown security hole in software. Voccola would not confirm that or offer details of the breach — except to say that it was not phishing.

“The level of sophistication here was extraordinary,” he said 

Victims > Most ransomware victims don’t publicly report attacks or disclose if they’ve paid ransoms.

Scale, details of massive ransomware attack emerge

An affiliate of the notorious REvil gang infected thousands of victims in at least 17 countries.

The FBI said in a statement Sunday that it was investigating the attack. | Jose Luis Magana/AP Photo

BOSTON — Cybersecurity teams worked feverishly Sunday to stem the impact of the single biggest global ransomware attack on record, with some details emerging about how the Russia-linked gang responsible breached the company whose software was the conduit.

An affiliate of the notorious REvil gang, best known for extorting $11 million from the meat-processor JBS after a Memorial Day attack, infected thousands of victims in at least 17 countries on Friday, largely through firms that remotely manage IT infrastructure for multiple customers, cybersecurity researchers said. They reported ransom demands of up to $5 million.

> The FBI said in a statement Sunday that it was investigating the attack along with the federal Cybersecurity and Infrastructure Security Agency, though “the scale of this incident may make it so that we are unable to respond to each victim individually.”

> The attack comes less than a month after Biden pressed Russian President Vladimir Putin to stop providing safe haven to REvil and other ransomware gangs whose unrelenting extortionary attacks the U.S. deems a national security threat.

> A broad array of businesses and public agencies were hit by the latest attack, apparently on all continents, including in financial services, travel and leisure and the public sector — though few large companies, the cybersecurity firm Sophos reported. Ransomware criminals break into networks and sow malware that cripples networks on activation by scrambling all their data. Victims get a decoder key when they pay up.

> John Hammond of Huntress Labs, one of the first cybersecurity firms to sound the alarm on the attack, said he’d seen $5 million and $500,000 demands by REVil for the decryptor key needed to unlock scrambled networks. The smallest amount demanded appears to have been $45,000.

> Sophisticated ransomware gangs on REvil’s level usually examine a victim’s financial records — and insurance policies if they can find them — from files they steal before activating the data-scrambling malware. The criminals then threaten to dump the stolen data online unless paid. It was not immediately clear if this attack involved data theft, however. The infection mechanism suggests it did not.

Report from The Verge: Public WiFi Network Names

Researcher finds certain network names can disable Wi-Fi on iPhones

It looks like Wi-Fi networks with percent symbols in their names may cause a bug

A security researcher has found that certain Wi-Fi networks with the percent symbol (%) in their names can disable Wi-Fi on iPhones and other iOS devices. Carl Schou tweeted that if an iPhone comes within range of a network named %secretclub%power, the device won’t be able to use Wi-Fi or any related features, and even after resetting network settings, the bug may continue to render Wi-Fi on the device unusable.

A few weeks ago, Schou and his not-for-profit group, Secret Club, which reverse-engineers software for research purposes, found that if an iPhone connected to a network with the SSiD name %p%s%s%s%s%n it would cause a bug in iOS’ networking stack that would disable its Wi-Fi, and system networking features like AirDrop would become unusable.

9to5 Mac offered a possible explanation for the weird bug:

the ‘%[character]’ syntax is commonly used in programming languages to format variables into an output string. In C, the ‘%n’ specifier means to save the number of characters written into the format string out to a variable passed to the string format function. The Wi-Fi subsystem probably passes the Wi-Fi network name (SSID) unsanitized to some internal library that is performing string formatting, which in turn causes an arbitrary memory write and buffer overflow. This will lead to memory corruption and the iOS watchdog will kill the process, hence effectively disabling Wi-Fi for the user. 

 

Meet Elon Musk’s Newest Invention: The Tesla Restaurant

CANCAN TURNS INTO A FIGHT | PERCOSSA | KNOCK OUT!

RUSSIA’S MIG-31 FOXHOUND INTERCEPTORS WENT TO SYRIA—They were invited, Guys!

LOWER CHAMBERS CLOSED TO THE PUBLIC: Remote Mesa City Council Study Session Thu 07.08.2021 @ 5:15 p.m.

The Final Agenda was - remarkably - printed on what date and what day? _______________
 
ANSWER: Printed on 7/3/2021
 
Hmmm.
 
That was a Saturday, a weekend day, the day after Friday
And the usual city work week is 4 days Monday - Thursday.
 
 
____________________________________________________________________________
Council Study Session Notice: 
To decrease COVID-19 exposure, the City Council Chambers is closed, but public viewing and input on the items are available electronically. 
Members of the City Council may appear electronically for this meeting, via a video conferencing platform, and the live meeting will be accessible via broadcast and telephonically. 
Because of the current public health emergency, the City Council Chambers is closed for Council study sessions. 

City Council Meeting public comment card


City Council Meeting comments ONLY


 

Please use the below links if you would like to provide comments for:

Council Board or Committee

Advisory Board Meeting, you must visit the individual Board's web page for their specific comment card

Planning & Zoning Card HERE

e8e12451657115.58f5ef11be461.gif
However, the live meeting may be watched on local cable Mesa channel 11, online at Mesa11.com/live, www.youtube.com/user/cityofmesa11/live, or https://www.facebook.com/CityofMesa, or listened to by calling 888-788-0099 or 877-853-5247 (toll free) using meeting ID 5301232921 and following the prompts. 
For any difficulties accessing this meeting, please call 480-644-2099. 
=========================================================================
 

 
_____________________________________________________________________________
City Council Study Session
City of Mesa
Meeting Agenda - Final 
Printed on 7/3/2021
Thursday, July 8, 2021 5:15 PM 
Lower Council Chambers 
 
Roll Call (City Council members participate in person or by electronic means.) 
 
1 Review and discuss items on the agenda for the July 8, 2021 regular Council meeting >
 
 
2 Take action on the following appointments: 
21-0763 Appointments to the Design Review Board, Historic Preservation Board, Judicial Advisory Board, and Museum and Cultural Advisory Board. 2-a 
File #:21-0763   
Type:AppointmentStatus:Agenda Ready
In control:City Council Study Session
On agenda:7/8/2021
Title:Appointments to the Design Review Board, Historic Preservation Board, Judicial Advisory Board, and Museum and Cultural Advisory Board.
Attachments:1. Appointment Memo

July 8, 2021 
TO: CITY COUNCILMEMBERS 
FROM: MAYOR JOHN GILES 
SUBJECT: Appointments to Boards and Committees 

The following are my recommendations for appointments to City of Mesa Advisory Boards and Committees. 
 
Design Review Board – Seven-member board including new appointments 
Dane Astle, District 1. 
Mr. Astle is founder & CEO of EDIFACE Architecture in Gilbert. 
He is active in the community serving in scouting and neighborhood community service projects. 
He previously served as chair of the Planning and Zoning Board. 
He earned a bachelor’s degree in architecture from University of Utah and a master’s degree in architecture from Arizona State University. 
His term will expire June 30, 2024. 
 
Historic Preservation Board – Seven-member board including new appointments 
Jocelyn Skogebo, District 4. 
Ms. Skogebo owns Humblebee Home, an interior design business. 
She is a designer and has experience in private homes, renovations, commercial businesses and boardrooms. 
Ms. Skogebo owns an historic home and participates in the Historic Home Tour. 
She earned a bachelor’s degree in interior design from Arizona State University. 
Her term will expire June 30, 2024. 
Judicial Advisory Board – Seven-member board including new appointments 
Reappointment(s): Judge Daniel Kiley, Citywide. 
The Honorable Daniel Kiley is a judge on the Superior Court of Maricopa County. 
He has experience in civil, criminal and family court and is a member of the State Bar of Arizona and Maricopa County Bar Association. 
He earned a bachelor’s degree in government form Harvard University and Juris Doctor from Arizona State University. 
Judge Kiley’s term will expire June 30, 2024. 
 
Appointment(s): Kelly Durham, Citywide. 
Ms. Durham is the owner of K Durham Law, PLLC in Tempe and is a member of the Arizona Bar Association. 
She serves as the President of the Phoenix Zoo Auxiliary, on the Steering Committee of Arizona Women Lawyer’s Association and as the District V Justice for Phi Alpha Delta Legal Fraternity. 
She earned a bachelor’s degree in interdisciplinary studies from ASU and Juris Doctor from Texas A&M. 
Her term will expire June 30, 2024. 
 
Museum and Cultural Advisory Board – Seven-member board including new appointments 
Dr. Colleen Byron, District 4. 
Dr. Byron is an associate clinical professor and lead faculty in the Master of Organizational Leadership program at Northern Arizona University. 
She is also an organizational change and development consultant for the Arizona Historical Society. 
She earned a bachelor’s degree in business administration, master’s degree in public administration and doctorate in public administration from Arizona State University. 
Her term will expire June 30, 2024.
3 Current events summary including meetings and conferences attended
4 Scheduling of meetings. 
There's a helluva lot on-the-table
Scroll down to see if anything catches the attention of your eyes - for example in the dollar amounts of Contract Awards, or if there's anything in the district where you live that you might want to know about...and then again, there's always the issue of water for expanding mixed-use development.
It only takes a few minutes to get informed 
 
Use the link provided to send in online comment cards or if you want an item removed from the Consent Agenda
==========================================================================
Council Meeting Notice: To decrease COVID-19 exposure, the City Council Chambers is closed, but public participation and viewing will be available electronically.
How to Keep the Party Crashers from Crashing Your Zoom Event ...
 
 
zzz