Welcome to the latest copy of Pardon The Intrusion, TNW’s bi-weekly newsletter in which we analyze the wild world of security.

GPS and fitness-tracking aggregation Garmin became the latest in a long list of firms that have become victim to a ransomware attack.

The adventure left some of its systems encrypted, arresting many of its online services, including website functions, chump support, customer-facing applications, and aggregation communications for more than three days.

Although there’s no affirmation that claimed advice was accessed or stolen, Garmin has so far not stated if there was a ransom demand and whether or not it paid the blackmailers to balance access to its systems.

As of today, most of its casework are back online, while a few others are operating in a “limited” state, according to the company’s status dashboard.

The ransomware strain that wreaked havoc on Garmin’s systems is believed to be WastedLocker, a accomplishment of a Russian cybercriminal gang which calls itself “Evil Corp.” It’s not clear if Evil Corp itself targeted Garmin.

Earlier this June, Symantec noted that Evil Corp’s series of cyber attacks have hit more than 31 organisations already, with eight of them being Fortune 500 companies.

With Garmin’s software used for aerospace and even amphibian navigation, the attack should worry anyone who uses a smartwatch or any wearable.

It should also serve as a wake-up call for companies to secure analytical systems and aegis acute GPS, health, and fettle data from the prying eyes of hackers, abnormally when it has the abeyant to agitate casework that millions of people rely on.

And for the rest of us, be sure to have backups, and backups of backups.

What’s trending in security?

Researchers baldheaded a new attack that hacked into news websitesto plant their bogus stories, a Hong Kong-based VPN annual provider was caught advertisement users log files admitting claiming to the contrary, and the US charged two Chinese nationals for a massive global hacking spree that also targeted COVID-19 research.

  • UFO VPN, a Hong Kong-based VPN annual provider that claimed to have a zero logs policy, was found aperture millions of log files about users of its service, including their annual passwords and IP addresses. [Comparitech]
  • Diebold Nixdorf, the aggregation behind ATMs and point-of-sale systems, warned of a new “jackpotting” attack that allows abyss to gain access to the apparatus internals to illegitimately allocate cash. [Ars Technica]
  • FireEye advisers appear a new Russia-linked “Ghostwriter” attack that targeted audiences in Lithuania, Latvia, and Poland with bogus agreeable abrasive NATO and the US military, and in some cases hacked the agreeable administration systems of news websites to plant their own stories. [FireEye]
  • A new form of attack called “Shadow Attack” allows bad actors to modify the agreeable of digitally signed PDF documents. The new flaws were found by the same team who found a separate set of flawswhich let attackers to abstract capacity of a password-protected file. [PDF Insecurity]
  • Internal source code from 50 high-profile companies including Microsoft, Disney, and Nintendo was leaked and posted online for people to access. [Bleeping Computer]
  • The Electronic Frontier Foundation has appear a handy alternate map of all the surveillance tech used by law administration in the US. It’s called the “Atlas of Surveillance.” [EFF]
  • Hackers alive for Russia’s GRU aggressive intelligence agency are advancing US energy companies, while the Vatican and the Catholic Diocese of Hong Kong were among several Catholic Church-related organizations that were targeted by China’s RedDelta hacking crew. Both campaigns used phishing lures to bear malware. [WIRED / Recorded Future]


  • It’s only July, but here are the better 11 data breaches of 2020. [Auth0]
  • The US answerable two Chinese spies for a decade-long global hacking spree that also targeted COVID-19 research. Meanwhile, Russian state-sponsored hackers were found targeting coronavirus vaccine research, an accusation Kremlin has refuted. [The Hacker News]
  • Forbes’ Thomas Brewster went into detail about Mitre Corp, a not-for-profit alignment that builds a wide array of tools for the US aggressive agencies, including a ancestor that can hack into smartwatches, fettle trackers, and home thermometers, software to aggregate human fingerprints from social media platforms, and a “study to actuate whether someone’s body odour can show they’re lying.” [Forbes]
  • Westbridge, the US arm of the arguable spyware vendor NSO Group, pitched its phone-hacking technology to the Secret Annual as late as 2018. [Motherboard]
  • A hacker group affiliated with Iranian state authorities left a trove of data which included, among other things, almost five hours’ worth of video answer how to accommodation accounts acceptance to people in the US and Greek armed forces and siphon acute data out of those accounts. [The Hacker News]
  • The fortnight in data breaches, leaks, and ransomware: Dave, Drizly, Dunzo, Garmin, GEDmatch, Instacart, Orange, Promo.com, and Twilio.

Tweet of the week

Google is calling out Apple for its new Security Analysis Device affairs that places restrictions that anticipate 90-day disclosures for major aegis flaws.

That’s it. See you all in two weeks. Stay safe!


Read next: Microsoft might buy TikTok — here’s what’s going on

Pssst, hey you!