• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security

Who Got Hacked This Week? Dec. 3 Edition

Who and what was hacked this week, December 3rd, 2016? Read on to find out.

December 3, 2016 Jonathan Blackwood Leave a Comment

Who Got Hacked

Note: Each week we bring you the latest hacking news on the internet. Read on to find out who and what was hacked this week.

Close to a Million Routers Knocked Offline Due to Cyber Attack

The Marai botnet that knocked out a major portion of the internet last month is at it again.

More than 900,000 broadband routers from Deutsche Telekom in Germany were knocked offline last weekend due to a cyberattack affecting phone, TV and internet service.

Routers made by Zyxel and Speedport were vulnerable to a critical remote code execution flaw. Internet port 7547, meant to be used by ISPs to manage devices remotely, were open to receive commands based on TR-069 and related TR-064 protocols.

According to security researchers BadCyber, the attack originated from a known Marai’s command-and-control server.

 

San Francisco Metro System Hacked to Give Free Rides

Last week more than 2,000 computer systems at San Francisco’s public transit agency were hacked.

Known as MUNI, station payment systems and schedule monitors were hacked by ransomware and displayed the following message:

“You Hacked, ALL Data Encrypted. Contact For Key([email protected])ID:681 ,Enter.”

This forced MUNI to shut down ticket kiosks, resulting in free rides over the weekend.

Only known by the pseudonym “Andy Saolis,” the hackers demanded $73,000 in Bitcoin in order to free up the system.

 

Russian Central Bank Loses $31 Million in Cyber Heist

The Russian Central Bank admitted this week that hackers stole more than 2 billion rubles ($31 million) in a cyber attack, without giving much more information.

In a briefing, Artyom Sychyov explained that hackers faked client credentials and attempted to steal up to 5 billion rubles from correspondent accounts.

 

Researchers Show How to Steal a Tesla by Hacking a Smartphone

Norway-based security firm Promon demonstrate how easy it is to hack a smartphone and steal a Tesla using Tesla’s official Android app.

 

Over One Million Google Accounts Hacked

A new Android malware known as “Gooligan” is responsible for breaching more than one million google accounts and is infecting 13,000 devices every day. These accounts are hijacked and access to sensitive information from Gmail, Google Photos, Google Docs, Google Play, Google Drive and G Suite is available to the attackers.

Android devices running older versions of the OS are most at risk, and the malware can be activated when downloading Android apps on 3rd party app stores. The malware generates revenue by fraudulently buying apps from Google Play Store as well as installing adware.

You can check if your device has been compromised here.

 

FBI Can Now Hack Any Computer in the World

Changes to Rule 41 of the Federal Rules of Criminal Procedure by the United States Department of Justice went into effect Thursday that grant the FBI greater powers to hack computers.

FBI can now remotely hack into multiple computer within the country or around the world with just a dingle warrant issued by any US judge, including magistrates.

Opponents to the rule changes worry that this will allow FBI to hack innocent users, while advocates say it will give them better ability to track down organized cyber criminals.

 

Talk Talk and Post Office Routers Hacked in UK

The same vulnerabilities that led to the Deutsche Telekom router attacks have been used against Talk Talk and the Post Office in the UK.

Zyxel AMG1302 routers, used by the Post Office, were compromised. A Post Office spokeswoman assures customers that no personal data or devices were compromised.

Talk Talk customers using D-Link DSL-3780 routers were also affected, but the company maintains that a small percentage of its customers use these routers.

 

Lottery Accounts in the UK Hacked

Around 26,500 UK National Lottery players accounts were accessed and suspicious activity was detected.

Details accessed may include name, contact details, date of birth, transaction history, account preferences, last four digits of card numbers, and expiration dates of card numbers.

According to Camelot, the National Lottery Operator, core systems have not been compromised. No money has been deposited of withdrawn from affected accounts, although less than 50 have had activity take place that may have been done by the players themselves.

Camelot believes the email addresses and passwords were stolen from another website where users used the same details as with their National Lottery accounts.

Affected accounts have been suspended and Camelot is reaching out to players to help them re-activate securely.

 

Saudi Arabia Hit With String of Digital Attacks

A series of destructive attacks on Saudi Arabia have been carried out over the past two weeks.

Hackers have struck computer banks of the agency running the country’s airport as well as five additional targets, erasing data and wreaking havoc.

Saudi Arabia says that several government agencies were targeted from outside the kingdom. Digital evidence suggests the attacks came from Iran.

 

 

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Jonathan Blackwood
Jonathan Blackwood

Jonathan Blackwood is the Editor-in-Chief of TechDecisions. Jonathan joined TechDecisions in 2014 and writes about technologies that help to innovate and improve practices for companies of all sizes, K-12 and higher education, government, healthcare, hospitality, retail and large venue spaces. He is especially interested in the future of work and education and the Internet of Things. Follow him @BlackwoodTweets.

Tagged With: Corporate, Cyber Attacks, Cyber Security

Related Content:

  • Cybersecurity and information or network protection. Future technology web services for business and internet project CrowdStrike Cyber Armageddon: How Do Firms Now Build…
  • DDoS, NETSCOUT Arbor Insight 7 Layers of DDoS Attacks and How To…
  • cisco webex-rooms-modern-space AVI-SPL Receives Cisco 2023 Reimagine Workspaces Partner of…
  • data breach Nearly 900 Schools Impacted by National Student Clearinghouse…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.