Attacks/Breaches

11/1/2018
11:30 AM
50%
50%

FIFA Reveals Second Hack

Successful phishing campaign leads attackers to confidential information of world soccer's governing body.

FIFA, the international governing body of soccer, was hacked for a second time earlier this year, the organization has acknowledged. While full details of the hack and its consequences have not yet been released, some information has begun to emerge.

One known: how the hack took place. A phishing campaign succeeded in convincing Union of European Football Associations (UEFA) staff and officials to give up their network credentials, allowing the attackers to access confidential information.

This second hack came to light after a new group of internal documents was obtained by Football Leaks, the same organization that published documents obtained in the earlier leak. The first hack helped bring down FIFA officials and shed unflattering light on how decisions are made within the organization.

German newsweekly Der Spiegel has exclusive access to a collection of new documents and is how sharing them with an investigative reporting consortium known as European Investigative Collaborations (EIC), which says it will begin publishing the information as soon as tomorrow.

Read more here.

 

Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
MarkSindone
50%
50%
MarkSindone,
User Rank: Apprentice
1/8/2019 | 11:44:17 PM
Deal with severely
It is shocking to know security breaches involving even the most crucial information regarding any particular organization can easily happen in recent times. This would definitely encourage hackers all across the globe to come forward and try their luck at doing the same to other bodies. We need to let them know that the consequences to be faced if they get caught are severe so as to deter them from repeating the offence.
PaulChau
50%
50%
PaulChau,
User Rank: Apprentice
12/18/2018 | 2:48:37 AM
Morals first
OK seriously, if the FIFA did things properly internally to begin with, I don't see why there should be any problem when information about their decision making is leaked. I reckon that some of this information should have been made transparent to begin with. Because they have been so secretive about how they function and the rules and regulations that they do or don't follow, that's why they are in this mess when they are being hacked! 
How Cybercriminals Clean Their Dirty Money
Alexon Bell, Global Head of AML & Compliance, Quantexa,  1/22/2019
Facebook Shuts Hundreds of Russia-Linked Pages, Accounts for Disinformation
Sara Peters, Senior Editor at Dark Reading,  1/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-15720
PUBLISHED: 2019-01-23
In Apache Airflow 1.8.2 and earlier, an authenticated user can execute code remotely on the Airflow webserver by creating a special object.
CVE-2017-17835
PUBLISHED: 2019-01-23
In Apache Airflow 1.8.2 and earlier, a CSRF vulnerability allowed for a remote command injection on a default install of Airflow.
CVE-2017-17836
PUBLISHED: 2019-01-23
In Apache Airflow 1.8.2 and earlier, an experimental Airflow feature displayed authenticated cookies, as well as passwords to databases used by Airflow. An attacker who has limited access to airflow, weather it be via XSS or by leaving a machine unlocked can exfil all credentials from the system.
CVE-2018-15614
PUBLISHED: 2019-01-23
A vulnerability in the one-x Portal component of IP Office could allow an authenticated user to perform stored cross site scripting attacks via fields in the Conference Scheduler Service that could affect other application users. Affected versions of IP Office include 10.0 through 10.1 SP3 and 11.0 ...
CVE-2018-20245
PUBLISHED: 2019-01-23
The LDAP auth backend (airflow.contrib.auth.backends.ldap_auth) prior to Apache Airflow 1.10.1 was misconfigured and contained improper checking of exceptions which disabled server certificate checking.