Sources in East Asia are calling attempted raids on South Korean Bitcoin exchanges a North Korean operation. Pyongyang has a history of turning to online crime to meet its financial needs. This may be the latest instance of such a campaign.
The ransomware that hit NHS Lanarkshire has been identified as "Bit Paymer," a fairly recently discovered strain (samples were posted to Virus Total on July 11th). Bit Paymer is regarded as well-coded malware devised by programmers of some ability. NHS Lanarkshire reports that its operations have largely returned to normal.
Scammers are using fraudulent Hurricane Harvey relief efforts as both con games and phishbait. Some have registered domains to assist their bunco.
Other phishbait being dangled includes convincing but bogus emails from the US Internal Revenue Service.
Comparitech researchers have found a waterholing come-on boosted by high Google search rankings. If you wish to learn how to "mix/tumble/launder Bitcoin" (and you probably shouldn't), an outfit called Darkwebmarkets will give you a good, concise tutorial in this dubious art. Unfortunately it will also take you to malicious sites that will divest you of your cryptocurrency.
Forcepoint researchers have also found a threat to cryptocurrency owners circulating in the wild, this one an evolved version of the well-known Trickbot banking Trojan.
The Onliner spambot, known for distributing the Ursnif banking Trojan, is found to hold some 711 million email addresses and 80 million SMTP credentials.
The US FDA has approved a firmware patch for St. Jude pacemakers (affecting 465 thousand patients).