• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure

Who Got Hacked This Week? Dec. 17 Edition

Who and what was hacked this week, December 17th, 2016? Read on to find out.

December 17, 2016 Jonathan Blackwood 2 Comments

Who Got Hacked

Note: Each week we bring you the latest hacking news on the internet. Read on to find out who and what was hacked this week.

Hackers Stole Data From 1 Billion Yahoo Users

This past week Yahoo admitted to yet another serious cyberattack.

Unconnected from the recent attack that compromised 500 million accounts, Yahoo says that a separate attack that was likely carried out in 2013 has compromised 1 billion accounts.

The company says that hackers were able to forge authentication cookies, meaning they didn’t need passwords to access user accounts. Names, email IDs, phone numbers, hashed passwords and encrypted and unencrypted security questions and answers may have been stolen in the attack.

According to the New York Times, the database was sold on the Dark Web last August for $300,000.

 

5-Year-Old Skype Backdoor Discovered

Apple’s macOS and Mac OS X operating systems could be used to spy on communications without user knowledge thanks to a recently discovered hidden backdoor in Skype.

The backdoor resided in the desktop API that allows third-party plugins and apps to communicate with Skype.

The backdoor could allow any malicious third-party app to bypass authentication procedure and give almost total access to Skype. It is believed to have been around since 2010.

 

Mac Encryption Password Can Be Hacked in 30 Seconds

https://www.youtube.com/watch?v=n_3eIFMR46Y

An attacker only requires a $300 device called PCILeech to seize full control of a Mac or MacBook by stealing the Mac FileVault2 password.

 

Backdoor Found in Low-Cost Android Phones

Low-cost Android smartphones and tablets are being shipped with malicious firmware that gathers data about the devises, displays advertisements on top of applications, and downloads unwanted APK files.

Mostly marketed in Russia, two types of downloader Trojans have been incorporated into the firmware of these devices operating on the MediaTek platform.

The Trojans are capable of collecting data, contacting command-and-control servers, automatically updating, covertly downloading and installing apps based on instructions from the server, and running whenever the device in restarted or turned on.

The Hacker News provides a full list of affected device models.

Lenovo A319, Lenovo A6000, MegaFon Login 4 LTE, Bravis NB85, Bravis NB105, Irbis TZ85, Irbis TX97, Irbis TZ43, Irbis tz56, Pixus Touch 7.85 3G, SUPRA M72KG, SUPRA M729G, SUPRA V2N10, Itell K3300, Digma Plane 9.7 3G, General Satellite GS700, Nomi C07000, Optima 10.1 3G TT1040MG, Marshal ME-711, 7 MID, Explay Imperium 8, Perfeo 9032_3G, Prestigio MultiPad Wize 3021 3G, Prestigio MultiPad PMT5001 3G, Ritmix RMD-1121, Oysters T72HM 3G, Irbis tz70, and Jeka JK103.

 

Hackers Using Malware to Use Computers as Zcash Mining Machines

Hackers are using malware to corrupt computers and turn them into Zcash mining machines.

Zcash is a new form of cryptocurrency similar to BitCoin, although Zcash is more anonymous and therefore more attractive to cyber criminals.

Mining is essentially solving math problems in exchange for a reward in the virtual currency. Legal software is available to turn a computer into a dedicated mining machine. However, cyber criminals are using malware to turn foreign computers into mining machines unknown to the owner or user. The computers are forced to mine Zcash and transfer funds to the attacker.

Up to 1,000 infected computers have been detected so far. The malware is distributed through links for pirated software. Mining can use large amounts of electricity, use up to 90 percent of a system’s RAM, and will restart when a computer is restarted or turned on.

 

Bug Allows Hackers to Read Facebook Messenger Chats

A critical vulnerability in Facebook Messenger, dubbed “Originull,” allows an attacker to read all private messages, view photos and attachments sent through Facebook Messenger. All an attacker needs to do is trick a user into visiting a malicious website to exploit the vulnerability.

 

Hacker Breaches US Agency that Certifies Voting Machines

The US Election Assistance Commission was recently breached by a hacker attempting to sell accounts that have accessed the agency.

Going by the name of Rasputin, the hacker was trying to sell an unpatched system vulnerability. More than one hundred logins were compromised.

The hacker used an SQL injection to obtain lists of logins and passwords. One could access testing plans and results for various machines with that information.

The EAC does not store voter’s personal information or vote totals.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Jonathan Blackwood
Jonathan Blackwood

Jonathan Blackwood is the Editor-in-Chief of TechDecisions. Jonathan joined TechDecisions in 2014 and writes about technologies that help to innovate and improve practices for companies of all sizes, K-12 and higher education, government, healthcare, hospitality, retail and large venue spaces. He is especially interested in the future of work and education and the Internet of Things. Follow him @BlackwoodTweets.

Tagged With: Corporate, Cyber Attacks, Cyber Security

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Software License Spending, SaaS, cloud apps Your Guide to Choosing the Best Cloud Security…
  • IT Budget 2025 Budgeting Tips for IT Pros/CIOs in 2025
  • A close-up of a technician’s hands typing and navigating through troubleshooting steps on a computer in a well-lit office. , natural light, soft shadows, with copy space Five Ways to Reduce Desktop Support Troubleshooting Time

Free downloadable guide you may like:

  • Practical Design Guide for Office SpacesPractical Design Guide for Office Spaces

    Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-face time with co-workers. When designing the office spaces — and meeting spaces in particular — enabling that connection between co-workers is crucial. But introducing the right collaboration technology in meeting spaces can […]

Reader Interactions

Comments

  1. gia xe toyota fortuner 2017 says

    January 7, 2017 at 6:12 pm

    My partner and I stumbled over here by a different page and thought I may as well check things out.
    I like what I see so i am just following you. Look forward to
    looking over your web page yet again.

    Reply
    • Jonathan Blackwood says

      January 9, 2017 at 9:16 am

      Glad you like it! Stay tuned for more installments starting this week and every week following in the new year. “Who Got Hacked” comes out every Saturday!

      Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.