WiFi Phishing Attacks Discovered Around Atlanta City Hall (helpnetsecurity.com) 16
As Atlanta continues to fully recover from March's ransomware attack, new evidence discovered today by Coronet reveals hundreds of active Wi-Fi phishing attacks currently ongoing both inside of and in close proximity to Atlanta City Hall. From a report: The research also found attacks currently underway in Georgia's State Capitol Building, which is just a few blocks away. In total, Coronet identified 678 active threats within a 5-mile radius of Atlanta's City Hall. Specifically, Coronet has validated that an undetermined number of attackers are currently deploying advanced phishing techniques, including but not limited to Evil Twins, Captive Portals and ARP poisoning, in what is likely their attempt to gain unauthorized access to user credentials to cloud services that the government relies on for daily business operations and continuity.
Closed (Score:2)
Ransomware attack (Score:3, Funny)
Re: (Score:1)
Counter surveillance? (Score:2)
Every person near the site would have had face, registration plate, passenger face, daily drive, phone details kept.
Someone enters a part of the city and their phone has been near city hall a few times? Undercover.
Phone is near city hall everyday? City worker, contractor is "working".
The code pushed is just cover to get the networks and devices reporting location and unique det
Re: Counter surveillance? (Score:2)
Re: (Score:2)
Could it be internal affairs? The FBI using random "malware" as a cover for a cyber task force looking at the inner workings of city hall? Someone has put some m money and effort into most thing digital around city hall?
What has city hall got that some tourist, wealthy cafe part of a city would not have? If it was just criminals looking for instant wealth cyber crime?
Re: (Score:2)
Re: (Score:2)
Criminal does not fit well if its for max wealth in min time from pushed out malware.
Who would notice another "free" wifi offer with lots of malware in a wealthy part of a city?
So the effort for that cost must be the gathering of another type of data of value.
Someone wants someone trusted to carry extra malware into work with them and is in a hurry to infect most city workers most of the time?
Why risk