• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Cybersecurity • Endpoint Security • News • Ransomware  /  Cybersecurity News Rundown December 2017
Cybersecurity News Rundown December 2017
31 December 2017

Cybersecurity News Rundown December 2017

Written by Seqrite
Seqrite
Cybersecurity, Endpoint Security, News, Ransomware
6
Shares

Welcome to our Cybersecurity News Rundown for the month of December 2017. Here, we will be sharing latest and trending news on events and technological updates from the world of cybersecurity that happened over the past month. Make sure to visit the News Rundown by the end of every month for quick highlights and insights.

1. Nissan Canada data breach exposed data of 1.13 million customers

Nissan Canada’s finance business revealed that the firm has been a victim of a data breach. It all started with a malware placed on the Nissan Motor Co.’s network that allowed the transmission of sensitive data such as user IDs and passwords. The data breach exposed personal and financial information of 1.13 million current and previous customers of Nissan’s vehicle-financing arm.

The company became aware of unauthorized access to the personal information of some customers on 11th December 2017. It is believed that the unknown hacker may have had access to the customers’ personal information such as name and address, vehicle identification number (VIN), makes and models of cars, loan amounts, credit scores, etc.

2. A collection of 1.4 billion hacked and leaked password found on the Dark Web

As per the security researchers of 4iQ, who have been monitoring the Dark Web sites, online black markets and hacker forums, a 41GB file has been found on the Dark Web that contains 1.4 billion username and password combinations. The collection also consists of email addresses and other credentials in clear text. This huge data trove was found online on December 5.

According to 4iQ, the file shows dumps from LinkedIn, Pastebin, Bitcoin, RedBox, MySpace, Anti Public, Netflix, Minecraft, Runescape and many other well-known websites. The most common passwords found in the database are 123456, qwerty, password and 111111.

3. Bitcoin Heist: Millions stolen from NiceHash

NiceHash, a Bitcoin mining platform, was attacked and hacked by some professional hackers. The attack happened on 6th December, when the hackers broke into the Bitcoin mining marketplace using highly sophisticated social engineering skills. The hackers stole more than 4,700 Bitcoins, worth more than $60 million at current prices.

NiceHash stopped all the operations for 24 hours after the payment system was compromised and NiceHash Bitcoin wallet has been stolen.

4. MoneyTaker revealed after 1.5 years of silent bank heists, stole more than $10 million

A group of Russian-speaking hackers has been uncovered by the security researchers of the security firm Group IB. The security researchers nicknamed the group of hackers as “MoneyTaker” after the malware used in certain hacks. This group of hackers has been silently targeting financial institutions, legal firms and some major banks in United Kingdom, United States and Russia.

MoneyTaker stole millions of dollars since May 2016 through these international heists. It is believed that the group of hackers conducted more than 20 attacks against multiple financial institutions and stole more than $10 million.

5. Virtual keyboard app exposed 31 million users’ personal data

Virtual keyboard app developer, Ai.type accidentally leaked the personal data of approx 31 million users. As per the security researchers, the exposed personal data majorly consist of contact numbers.

The security researchers from Kromtech Security Center discovered the data breach and later reported that nearly 580 GB of sensitive data was leaked online. The leaked data was stored in MongoGB database which allows the user to access the stored files online. The server was owned by Mr. Eitan Fitusi, CEO, and founder of Ai.type. The exposed database is visible to the application’s Android users.

 Previous PostSecurity issues faced by Financial Sector from outdated vendor sy...
Next Post  2018: What’s your New Year resolution for cybersecurity?
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • ZTNA Use Cases and Benefits for BFSI

    May 19, 2025
  • Market Guide for Choosing the Right ZTNA Solution

    May 14, 2025
  • Protect What Matters Most with Data Discovery and Classification

    May 12, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies