Thursday, January 16, 2025
Home Blog Page 10

Online disclosure of 5+ million Twitter users’ stolen information

1
databreach

An API flaw that was patched in January allowed for the theft of over 5.4 million Twitter user records that contained private information. These records were made available for free sharing on a hacker forum.

A security researcher has also revealed another enormous, possibly more significant, data dump of millions of Twitter records, illustrating how widely this flaw was utilised by threat actors.

The material is made up of public data that has been scraped as well as secretive email addresses and phone numbers.

The data breach on Twitter

In July of last year, a threat actor started charging $30,000 for the personal data of more than 5.4 million Twitter users.

The majority of the material was made up of publicly available details such Twitter IDs, names, login names, localities, and verified statuses; however, there was also private information like phone numbers and email addresses.

This information was gathered in December 2021 by utilising a Twitter API flaw that was made public through the HackerOne bug bounty programme. This flaw allowed users to submit their phone numbers and email addresses to the API in order to obtain the corresponding Twitter ID.

It is unclear if the HackerOne disclosure was leaked, but BleepingComputer was told that multiple threat actors were utilizing the bug to steal private information from Twitter.

Twitter confirmed it had experienced a data breach due to an API issue resolved in January 2022 after BleepingComputer sent them a sample of the user details.

This past weekend, Pompompurin, the proprietor of the Breached hacking forum, revealed to BleepingComputer that they were in charge of exploiting the flaw and producing the enormous dump of Twitter user data after another threat actor going by the name of “Devil” disclosed the vulnerability to them.

Nearly 7 million Twitter profiles with private information were found overall, including the 5.4 million records for sale and an additional 1.4 million suspended user profiles that were gathered using a different API.

Sharing of Twitter data on a hacking forum

The Whopping 5.4 million Twitter records have now been freely shared on a hacking forum twice—once in September and most recently on November 24.

twitter data leak

This data, which includes 5,485,635 records of Twitter users, was for sale in August, and Pompompurin has confirmed this to BleepingComputer.

These records include the account’s Twitter ID, name, screen name, verified status, location, URL, description, follower count, account creation date, friends count, favourites count, statuses count, and profile image URLs, along with either a private email address or phone number.

An even larger data dump was privately created

While it is concerning that threat actors released the 5.4 million records for free, an even larger data dump was allegedly created using the same vulnerability.

This data dump potentially contains tens of millions of Twitter records consisting of personal phone numbers collected using the same API bug, and public information, including verified status, account names, Twitter ID, bio, and screen name.

The news of this more significant data breach comes from security expert Chad Loder, who first broke the news on Twitter and was suspended soon after posting. Loder subsequently posted a redacted sample of this larger data breach on Mastodon.

“I have just received evidence of a massive Twitter data breach affecting millions of Twitter accounts in EU and US. I have contacted a sample of the affected accounts and they confirmed that the breached data is accurate. This breach occurred no earlier than 2021,” Loder shared on Twitter.

twitter data leak

BleepingComputer has obtained a sample file of this previously unknown Twitter data dump, which contains 1,377,132 phone numbers for users in France.

We have since confirmed with numerous users in this leak that the phone numbers are valid, verifying this additional data breach is real.

Furthermore, none of these phone numbers are present in the original data sold in August, illustrating how much larger Twitter’s data breach was than previously disclosed and the large amount of user data circulating among threat actors.

Pompompurin also confirmed with BleepingComputer that they were not responsible and did not know who created this newly discovered data dump, indicating that other people were using this API vulnerability.

BleepingComputer has learned that this newly discovered data dump consists of numerous files broken up by country and area codes, including Europe, Israel, and the USA.

We were told that it consists of over 17 million records but could not independently confirm this.

As this data can be potentially used for targeted phishing attacks to gain access to login credentials, it is essential to scrutinize any email that claims to come from Twitter.

If you receive an email claiming your account was suspended, there are log in issues, or you are about to lose your verified status, and it prompts you to login on to a non-Twitter domain, ignore the emails and delete them as they are likely phishing attempts.

Suggest an edit to this article

Check out our new Discord Cyber Awareness Server. Stay informed with CVE Alerts, Cybersecurity News & More!

Cybersecurity Knowledge Base

Homepage

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmarkClose

Irish Data Protection Commission (DPC) fined Meta for failing to prevent data scraping from Facebook users

0

The Irish Data Protection Commission (DPC) has fined Meta €265 million ($275.5 million) for the data leak that Facebook experienced in 2021 that exposed the data of millions of Facebook users.

Additionally, Meta is being subject to a number of corrective measures from the Data Protection Commission.

The Meta Platforms Ireland Limited (MPIL), the data controller for the social media network “Facebook,” was the subject of a Data Protection Commission (DPC) investigation that was concluded today with a €265 million fine and a number of corrective actions being taken. reads the press announcement from the DPC.

A hacker forum user published 533 million Facebook users’ phone numbers and personal information for free online on April 3, 2021.

The availability of the data was first reported by Alon Gal, CTO of cyber intelligence firm Hudson Rock.

The data of Facebook users from 106 countries were available for free, with over 32 million records belonging to users from the US, 11 from the UK, and 6 million users from India. Leaked data included users’ phone numbers, Facebook IDs, full names, locations, birthdates, bios, and for some accounts the associated email addresses.

Immediately after the disclosures of the data leak the Irish DPC launched an investigation of potential GDPR violations by Meta. The data were amassed by threat actors by exploiting a vulnerability fixed in 2019 that allowed data scraping from the social network.

“The company, at the time known as Facebook, said the data had been gathered by what it said were malicious actors who misused a Facebook tool called “Contact Importer” to upload a large volume of phone numbers to see which ones matched the service’s users.” reported the WSJ. “On Monday, the company reiterated that it had removed the ability to use phone numbers to scrape its services in this way in 2019.”

Now DPC concluded the investigation and argued that Meta violated the GDPR for not implementing appropriate technical and organizational measures, and not adopting the necessary safeguards as required by the European Regulation.

“The decision, which was adopted on Friday, 25 November 2022, records findings of infringement of Articles 25(1) and 25(2) GDPR. The decision imposed a reprimand and an order requiring MPIL to bring its processing into compliance by taking a range of specified remedial actions within a particular timeframe.” continues the press release.

Meta declared that it has made multiple changes to better safeguard users’ data since the incident took place. The Iris privacy regulator revealed it has several dozen more ongoing cases involving multiple tech giants.

After learning about the data loss, the Irish DPC immediately began looking into any GDPR violations by Meta. Threat actors used a vulnerability addressed in 2019 that permitted data scraping from the social network to gather the data.

“The company, at the time known as Facebook, said the data had been gathered by what it said were malicious actors who misused a Facebook tool called “Contact Importer” to upload a large volume of phone numbers to see which ones matched the service’s users.” reported the WSJ. “On Monday, the company reiterated that it had removed the ability to use phone numbers to scrape its services in this way in 2019.”

Now that the inquiry is complete, DPC claimed that Meta had broken the GDPR by failing to implement the proper organisational and technical safeguards and by not adopting the necessary protections as required by the European Regulation.

The decision, which was adopted on Friday, 25 November 2022, records findings of infringement of Articles 25(1) and 25(2) GDPR. The decision imposed a reprimand and an order requiring MPIL to bring its processing into compliance by taking a range of specified remedial actions within a particular timeframe.” continues the press release.

Meta declared that it has made multiple changes to better safeguard users’ data since the incident took place. The Iris privacy regulator revealed it has several dozen more ongoing cases involving multiple tech giants.

Suggest an edit to this article

Check out our new Discord Cyber Awareness Server. Stay informed with CVE Alerts, Cybersecurity News & More!

Cybersecurity Knowledge Base

Homepage

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmarkClose

U.S. Govt. Apps Bundled Russian Code With Ties to Mobile Malware Developer

0

A recent scoop by Reuters revealed that mobile apps for the U.S. Army and the Centers for Disease Control and Prevention (CDC) were integrating software that sends visitor data to a Russian company called Pushwoosh, which claims to be based in the United States. But that story omitted an important historical detail about Pushwoosh: In 2013, one of its developers admitted to authoring the Pincer Trojan, malware designed to surreptitiously intercept and forward text messages from Android mobile devices.

Pushwoosh says it is a U.S. based company that provides code for software developers to profile smartphone app users based on their online activity, allowing them to send tailor-made notifications. But a recent investigation by Reuters raised questions about the company’s real location and truthfulness.

The Army told Reuters it removed an app containing Pushwoosh in March, citing “security concerns.” The Army app was used by soldiers at one of the nation’s main combat training bases.

Reuters said the CDC likewise recently removed Pushwoosh code from its app over security concerns, after reporters informed the agency Pushwoosh was not based in the Washington D.C. area — as the company had represented — but was instead operated from Novosibirsk, Russia.

Pushwoosh’s software also was found in apps for “a wide array of international companies, influential nonprofits and government agencies from global consumer goods company Unilever and the Union of European Football Associations (UEFA) to the politically powerful U.S. gun lobby, the National Rifle Association (NRA), and Britain’s Labour Party.”

The company’s founder Max Konev told Reuters Pushwoosh “has no connection with the Russian government of any kind” and that it stores its data in the United States and Germany.

But Reuters found that while Pushwoosh’s social media and U.S. regulatory filings present it as a U.S. company based variously in California, Maryland and Washington, D.C., the company’s employees are located in Novosibirsk, Russia.

Reuters also learned that the company’s address in California does not exist, and that two LinkedIn accounts for Pushwoosh employees in Washington, D.C. were fake.

“Pushwoosh never mentioned it was Russian-based in eight annual filings in the U.S. state of Delaware, where it is registered, an omission which could violate state law,” Reuters reported.

Pushwoosh admitted the LinkedIn profiles were fake, but said they were created by a marketing firm to drum up business for the company — not misrepresent its location.

Pushwoosh told Reuters it used addresses in the Washington, D.C. area to “receive business correspondence” during the coronavirus pandemic. A review of the Pushwoosh founder’s online presence via Constella Intelligence shows his Pushwoosh email address was tied to a phone number in Washington, D.C. that was also connected to email addresses and account profiles for over a dozen other Pushwoosh employees.

Pushwoosh was incorporated in Novosibirsk, Russia in 2016.

THE PINCER TROJAN CONNECTION

The dust-up over Pushwoosh came in part from data gathered by Zach Edwards, a security researcher who until recently worked for the Internet Safety Labs, a nonprofit organization that funds research into online threats.

Edwards said Pushwoosh began as Arello-Mobile, and for several years the two co-branded — appearing side by side at various technology expos. Around 2016, he said, the two companies both started using the Pushwoosh name.

A search on Pushwoosh’s code base shows that one of the company’s longtime developers is a 41-year-old from Novosibirsk named Yuri Shmakov. In 2013, KrebsOnSecurity interviewed Shmakov for the story, “Who Wrote the Pincer Android Trojan?” wherein Shmakov acknowledged writing the malware as a freelance project.

Shmakov told me that, based on the client’s specifications, he suspected it might ultimately be put to nefarious uses. Even so, he completed the job and signed his work by including his nickname in the app’s code.

“I was working on this app for some months, and I was hoping that it would be really helpful,” Shmakov wrote. “[The] idea of this app is that you can set it up as a spam filter…block some calls and SMS remotely, from a Web service. I hoped that this will be [some kind of] blacklist, with logging about blocked [messages/calls]. But of course, I understood that client [did] not really want this.”

Shmakov did not respond to requests for comment. His LinkedIn profile says he stopped working for Arello Mobile in 2016, and that he currently is employed full-time as the Android team leader at an online betting company.

In a blog post responding to the Reuters story, Pushwoosh said it is a privately held company incorporated under the state laws of Delaware, USA, and that Pushwoosh Inc. was never owned by any company registered in the Russian Federation.

“Pushwoosh Inc. used to outsource development parts of the product to the Russian company in Novosibirsk, mentioned in the article,” the company said. “However, in February 2022, Pushwoosh Inc. terminated the contract.”

However, Edwards noted that dozens of developer subdomains on Pushwoosh’s main domain still point to JSC Avantel, an Internet provider based in Novosibirsk, Russia.

WAR GAMES

Pushwoosh employees posing at a company laser tag event.

Edwards said the U.S. Army’s app had a custom Pushwoosh configuration that did not appear on any other customer implementation.

“It had an extremely custom setup that existed nowhere else,” Edwards said. “Originally, it was an in-app Web browser, where it integrated a Pushwoosh javascript so that any time a user clicked on links, data went out to Pushwoosh and they could push back whatever they wanted through the in-app browser.”

An Army Times article published the day after the Reuters story ran said at least 1,000 people downloaded the app, which “delivered updates for troops at the National Training Center on Fort Irwin, Calif., a critical waypoint for deploying units to test their battlefield prowess before heading overseas.”

In April 2022, roughly 4,500 Army personnel converged on the National Training Center for a war games exercise on how to use lessons learned from Russia’s war against Ukraine to prepare for future fights against a major adversary such as Russia or China.

Edwards said despite Pushwoosh’s many prevarications, the company’s software doesn’t appear to have done anything untoward to its customers or users.

“Nothing they did has been seen to be malicious,” he said. “Other than completely lying about where they are, where their data is being hosted, and where they have infrastructure.”

GOV 311

Edwards also found Pushwoosh’s technology embedded in nearly two dozen mobile apps that were sold to cities and towns across Illinois as a way to help citizens access general information about their local communities and officials.

The Illinois apps that bundled Pushwoosh’s technology were produced by a company called Government 311, which is owned by Bill McCarty, the current director of the Springfield Office of Budget and Management. A 2014 story in The State Journal-Register said Gov 311’s pricing was based on population, and that the app would cost around $2,500 per year for a city with approximately 25,000 people.

McCarty told KrebsOnSecurity that his company stopped using Pushwoosh “years ago,” and that it now relies on its own technology to provide push notifications through its 311 apps.

But Edwards found some of the 311 apps still try to phone home to Pushwoosh, such as the 311 app for Riverton, Ill.

“Riverton ceased being a client several years ago, which [is] probably why their app was never updated to change out Pushwoosh,” McCarty explained. “We are in the process of updating all client apps and a website refresh. As part of that, old unused apps like Riverton 311 will be deleted.”

FOREIGN ADTECH THREAT?

Edwards said it’s far from clear how many other state and local government apps and Web sites rely on technology that sends user data to U.S. adversaries overseas. In July, Congress introduced an amended version of the Intelligence Authorization Act for 2023, which included a new section focusing on data drawn from online ad auctions that could be used to geolocate individuals or gain other information about them.

Business Insider reports that if this section makes it into the final version — which the Senate also has to pass — the Office for the Director of National Intelligence (ODNI) will have 60 days after the Act becomes law to produce a risk assessment. The assessment will look into “the counterintelligence risks of, and the exposure of intelligence community personnel to, tracking by foreign adversaries through advertising technology data,” the Act states.

Edwards says he’s hoping those changes pass, because what he found with Pushwoosh is likely just a drop in a bucket.

“I’m hoping that Congress acts on that,” he said. “If they were to put a requirement that there’s an annual audit of risks from foreign ad tech, that would at least force people to identify and document those connections.”

Article Sourced From KrebsOnSecurity.com
Author: BrianKrebs

Suggest an edit to this article

Cybersecurity Knowledge Base

Latest Cybersecurity News

Cybersecurity Academy

Homepage

Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for our Weekly Cybersecurity Newsletter Today.

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmarkClose

Chinese bots flood Twitter in a bid to try and obscure Covid protests

0

In an apparent state-directed effort to suppress footage of the protests, Twitter has been overloaded with nuisance tweets.

Chinese bot accounts, which are not managed by humans, are used to flood social networking services with advertisements for sex workers and pornography. Users search for major cities in China using Chinese script.

Alex Stamos is the director of the Stanford Internet Observatory. He said that the Chinese activity was a “first major failure” to stop government interference” under Twitter’s ownership. The actions were meant to restrict international observation of protests, as Twitter access is blocked in China. You can access Twitter from China using a virtual private network. This creates an encrypted connection between your computer and remote servers that can be found anywhere in the world.

First reported by the Washington Post, the manipulation of Twitter by Chinese government source is a result of widespread job cuts at Twitter. This includes members of Twitter’s safety and trust team. Musk , who purchased Twitter last month for $44bn (PS36.4bn), has fired half the 7,500 employees and another 1,200 have reportedly resigned. He reportedly told other workers to either accept being “hardcore”, or leave.

A whistleblower in July warned that Twitter was vulnerable to foreign interference. Peiter Zatko was fired in January as the head of security. He claimed he knew of multiple instances of Twitter being hacked by foreign intelligence agencies, or that he was complicit in a threat against democracies.

Tech Against Terrorism is a United Nations-backed non profit organisation that warned last week that Twitter’s staff cuts could expose it to terrorist exploitation. Concerns were raised about the possibility of ban accounts being reinstated for promoting hate and violence. The organization also suggested a new policy that would allow hateful content to be demolished rather than removed entirely.

As frustrations over the government’s Covid policies simmered, protests broke out in dozens of Chinese cities this weekend.

People from a single digit to over 1,000 joined together for peaceful street protests and candlelit vigils. Protesters in Wuhan pushed past pandemic barriers. In Shanghai, demonstrators clashed against police. Protesters are holding candles, phones lights and blank paper and calling for an end to lockdowns as well as frequent mass testing.

Other protests have called for democracy, press freedom and the end of online censorship. Reports also indicate that there were chants echoing the slogans of the Beijing bridge protester at last month’s Communist Party congress political meeting.

Suggest an edit to this article

Check out our new Discord Cyber Awareness Server. Stay informed with CVE Alerts, Cybersecurity News & More!

Cybersecurity Knowledge Base

Homepage

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmarkClose

Hacker tries to sell 500m WhatsApp user data on dark web

0
Cybersecurity
Cybersecurity

An alleged hacker posted a dark web dataset containing personal information for almost 500 million WhatsApp users.

The post was posted to BreachForums hacking forum on November 16 and claimed that the hacker was selling current personal information from 487 million WhatsApp users in 84 countries. The alleged hacker stated that those who purchased the datasets would receive ” the most recent mobile numbers” from WhatsApp users.

CyberNews, a technology news website, reported the leak. It said that it had “investigated” the data set supplied by the hacker. CyberNews reported that the site was able verify that the 1,914 numbers stolen by the hacker belonged to WhatsApp users. This means the hacker’s claims are “likely…to prove true.”

The bad actor claims that the 487 million records contain details about 32 million US users, 11million UK users, and six million German users. CyberNews reported that hackers had claimed to have told them they were selling these data sets at US$7,000, US$2,500, and US$2,000.

The hacker didn’t explain how so much user data was collected. He said only that they “used their strategy” in order to get it.

This news comes days after it was reported by Meta that employees at WhatsApp’s parent company Meta had been fired for violating Facebook’s terms and service by hacking into user accounts.

Meta has since denied the leak. An unnamed spokesperson is alleged to have reached out to multiple news outlets that reported on the leak on November 28, with unidentified sources. These news sources claim that the spokesperson claimed that CyberNews’ article was based on “unsubstantiated snapshots” and that there is no evidence of a “data leak” from WhatsApp.

WhatsApp and Meta, its parent company, have not yet made any official statements about the alleged data leakage.

Suggest an edit to this article

Check out our new Discord Cyber Awareness Server. Stay informed with CVE Alerts, Cybersecurity News & More!

Cybersecurity Knowledge Base

Homepage

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmarkClose

Musk Confirms Twitter 2.0 will Bring End-to-End Encryption to Direct Messages

0

Twitter CEO Elon Musk has confirmed plans to implement end-to-end encryption ( E2EE) in direct messages.

The feature forms part of Musk’s vision of Twitter 2.0. It is expected to become an “everything app”. Other functionalities include longform tweets and payments, according to a slide deck shared by Musk over the weekend.

The company’s plans to send encrypted messages were first discovered by Jane Manchun Wong , a mobile researcher who discovered source code modifications in Twitter’s Android application. These changes were referencing conversation keys that could be used for E2EE chats.

Notably, many other messaging platforms such as Signal, Threema and WhatsApp already support encryption of messages.

Google has already enabled E2EE for one to-one chats within its RCS-based Messenger app for Android. The company is currently testing the same option for group conversations. Facebook also enabled E2EE Messenger for selected users in August.

Musk also stated that the number of new users signing up for the social media platform is at an “all time high,” with over 2 million people per day on average in the past seven days, up 66% from the same week 2021. Twitter boasts more than 253.8 million active daily monetizable users (mDAU).

These slides also show that reports of impersonations on this service spiked earlier in the month, before, and after the launch of its revamped TwitterBlue subscription.

The new subscription level will be available as soon as December 2, 2022. It features a multi-colored verification system, which aims to award gold badges to companies, gray to governments, and blue to individual accounts.

Suggest an edit to this article

Check out our new Discord Cyber Awareness Server. Stay informed with CVE Alerts, Cybersecurity News & More!

Cybersecurity Knowledge Base

Homepage

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmarkClose

UK bans Chinese CCTV cameras at ‘sensitive’ government locations

0

Government departments have been told to rip them off core networks and replace them whenever and wherever possible

“A review of the current and future possible security risks associated with the installation of visual surveillance systems on the government estate has concluded that, in light of the threat to the UK and the increasing capability and connectivity of these systems, additional controls are required,” reads a statement from Oliver Dowden, Chancellor of the Duchy of Lancaster (the second-most senior minister in cabinet behind the current PM, Rishi Sunak).

“Departments have therefore been instructed to cease deployment of such equipment onto sensitive sites, where it is produced by companies subject to the National Intelligence Law of the People’s Republic of China,” the statement adds.

The advice does not name companies it feels represent a risk, but politicians have campaigned to ban cameras from partly Chinese state-owned CCTV manufacturers Hikvision and Dahua, on grounds that they have been used as instruments of repression of the Muslim Uighur people in China’s Xinjiang province. The US has already barred both vendors from selling their products for the same reason.

China claims it has not abused human rights in Xinjiang. Chinese tech companies consistently claim that, while Chinese law technically obliges them to do any Beijing asks, including surveillance, they have no other ambitions than delivering great products to their customers.

However, there are still concerns that China’s presence could lead to the creation of maps of networks. This is a very useful intelligence tool. It also means that Chinese workers may be part of the Communist Party. There is also the possibility that equipment from China could be damaged by software updates, or even bricked at Beijing’s command.

The UK announcement doesn’t mention funding for Chinese cameras or a time frame for disconnection and/or replacement.

EXCLUSIVE: ieGeek Security Cameras Continue To Present Risk In 2022

Suggest an edit to this article

Check out our new Discord Cyber Awareness Server. Stay informed with CVE Alerts, Cybersecurity News & More!

Cybersecurity Knowledge Base

Homepage

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmarkClose

Chrome Update: Exploited Zero-Day Vulnerability fixed by Google, the 8th this year

0

In response to a heap buffer overflow vulnerability, Google has released a security update for the desktop versions of Google Chrome for Windows, Linux, and Mac. The Chrome vulnerability is already being used in the wild, claims Google’s own blog. This is the eighth time this year that a Google Chrome zero-day vulnerability has been used in an attack. Exploiting this flaw could cause programmes to crash, execute arbitrary code, or even let an attacker get past security measures and take control of the underlying system.

CVE-2022-4135

The vulnerability tracked as CVE-2022-4135 is a Heap buffer overflow in GPU. Google is holding back on releasing any further details for now. They do this to prevent further exploitation of the bug until a majority of users has had a chance to update to the fixed version of Chrome. Heap buffer overflow is a memory vulnerability that can result in data being written to forbidden locations. Attackers can in turn use this to overwrite an application’s memory to manipulate its execution path, leading to unrestricted information access or arbitrary code execution.

Update Vulnerable Google Chrome Installations

In order to protect yourself against the vulnerability mentioned above, Google advises updating all Google Chrome installations to the new patched version. For Windows that is 107.0.5304.121/.122, for Mac and Linux that is version 107.0.5304.121. You can find more information about the security fix on Google’s release blog.

Suggest an edit to this article

Cybersecurity Knowledge Base

Latest InfoSec News

Cybersecurity Academy

Homepage

Why not join our InfoSec News & Awareness group on Facebook? get involved, and spread cyber awareness as we know it!

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.

Bookmark
Please login to bookmarkClose

RESEARCH: analytics information related to iPhones include a Directory Services Identifier (DSID) that may be used to identify users

0

The Directory Services Identifier (DSID), which might be used to identify users, is a part of the analytics data acquired by iPhone, according to researchers at the software company Mysk

Because Apple collects both DSID and Apple ID, it can use the former to recognise the user and access any related personal data, such as full name, contact information, date of birth, email address, and address.

“Apple uses DSID to uniquely identify Apple ID accounts. DSID is associated with your name, email, and any data in your iCloud account. This is a screenshot of an API call to iCloud, and DSID it can be clearly seen alongside a user’s personal data” reads a Tweet by Mysk.

The experts claim that this conduct is against the company’s privacy policy, which stipulates that “none of the obtained information identifies you personally.”

According to the policy, “Personal data is either not logged at all, is subject to privacy protecting mechanisms like differential privacy, or is erased from any reports before they’re submitted to Apple.”

“Having a DSID is equivalent to having a name. According to security expert and app developer Tommy Mysk, it’s one-to-one to your identification. “All of these in-depth metrics will be immediately linked to you. And that’s a problem as there isn’t a switch to turn it off.

It is important to highlight that Mysk researchers used a jailbroken iPhone running iOS 14.6 for their tests in order to be able to decrypt the traffic and determine which data are sent back to Apple.

The experts also tested an iPhone running iOS 16, but security measures implemented by Apple could not allow them to “jailbreak” the device to inspect the traffic. Anyway, the experts argue that a jailbroken phone would send the same data as the latest iOS version.

Apple has yet to respond to a request for comment on the issue.

Earlier this month, Mysk researchers also discovered that Apple collects analytics information even when the users switch off the iPhone setting “Share iPhone Analytics.”

Bookmark
Please login to bookmarkClose

Over 50 Million Passwords Stolen by 30+ Russian Cybercrime Groups Using Stealer Malware

0

In the first seven months of 2022, up to 34 Russian-speaking gangs using the stealer-as-a-service business model to distribute information-stealing software stole no less than 50 million credentials.

The Singapore-based Group-IB reported that the “underground market value of stolen logs and compromised card data is estimated to be over $5.8 million.”

The thieves not only stole passwords but also 2.11 billion cookie data, 113,204 crypto wallets, and 103,150 credit and debit cards.

The United States is the country with the highest concentration of victims, followed by Brazil, India, Germany, Indonesia, the Philippines, France, Turkey, Vietnam, and Italy. During that time, 890,000 devices across 111 nations were affected.

According to Group-IB, some scam groups’ members who are spreading information thieves previously took part in the Classiscam operation.

These hierarchical groups, which are active on Telegram and often have 200 members, are made up of administrators and workers (also known as traffers), the latter of whom are in charge of leading gullible individuals to info-stealers like RedLine and Raccoon.

This is done by creating bait websites that pose as well-known businesses in order to trick people into downloading dangerous files. Links to these websites are then shared directly with NFT artists or included in YouTube video critiques of well-known games and lotteries on social media.

“Administrators usually give workers both RedLine and Racoon in exchange for a share of the stolen data or money,” the company said. “Some groups use three stealers at the same time, while others have only one stealer in their arsenal.”

After a successful compromise, cybercriminals sell the stolen data on the dark web in order to profit.

The finding underlines Telegram’s pivotal role in facilitating a variety of illegal actions, including serving as a focal point for providing customer service, publicising product updates, and stealing data from hacked devices.

The discoveries come in the wake of a fresh SEKOIA study that exposed the addition of an emerging information stealer by the name of Aurora to the toolkits of seven separate traffers teams.

“The popularity of schemes involving stealers can be explained by the low entry barrier,” Group-IB explained. “Beginners do not need to have advanced technical knowledge as the process is fully automated and the worker’s only task is to create a file with a stealer in the Telegram bot and drive traffic to it.”

Suggest an edit to this article

Cybersecurity Knowledge Base

Latest InfoSec News

Cybersecurity Academy

Homepage

Why not join our InfoSec News & Awareness group on Facebook? get involved, and spread cyber awareness as we know it!

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmarkClose