Cybercriminals have managed to hack into an online platform used for buying and selling guns, creating a database of 111,000 entries, some of which containing information about the CRM used by gun shops across the UK, according to The Register. Guntrader is a platform very much like Gumtree where private individuals show more ...
post ads on the Internet along with their contact information so that potential buyers can get in touch. The breach of Guntrader earlier this week showed an SQL database running the online platform Guntrader.uk and its registered electronic gun shop product, consisting of around 111,000 users dating from 2016 to July 17. The database contains users' names, mobile phone numbers, email addresses, as well as geo-location data. The stolen database also contained information such as IP addresses of users, postal addresses, zip codes, phone or fax n... (read more)
Tokyo 2020 Olympic Games event volunteers and ticket holders' credentials were allegedly stolen after a data breach, according to a statement last week from a Japanese government official, says Computer Weekly. According to an official, who spoke on the condition of remaining anonymous, the stolen credentials were show more ...
sent to volunteer websites. Despite the fact that the data breach scale was not substantial, measures were being taken to prevent the dissemination of the affected information in the future. The Japanese government has been gearing up for a broader offensive than the one launched against the Rio de Janeiro and London Olympics. It has been working with the Tokyo 2020 organizing committee on cybersecurity exercises such as Cyber Colosseum that would simulate possible attacks in urban and rural areas. In order to avoid cyberattacks, Japan forme... (read more)
The minister in charge of the New Zealand government's Office of Communications Security, Andrew Little, openly accused China of funding malicious cyber activities via a gang called APT40, according to Teiss. In a statement posted on the New Zealand government's official website, Little said the government show more ...
clearly linked the Chinese Minister of State Security (MSS) to a hacking group called APT40 or Hafnium. The latter is known to be behind the recent cyberattack that targeted vulnerabilities in the Microsoft Exchange global system. Little added that a solid technical attribution process established the links between APT40 and MSS and left little doubt as to who was behind the malicious act. He further noted that New Ze... (read more)
The software vendor Kaseya said on Thursday that it has obtained a universal decryptor for unlocking systems and helping clients to recover data, according to The Hacker News. This happened almost three weeks after the broad-based supply chain ransomware attack on the company. It is unclear at this time whether show more ...
Kaseya paid the ransom right away. It should be recalled that REvil cybercriminal partners asked for a $70 million ransom. This amount was subsequently lowered to $50 million, but that the gang had abruptly and mysteriously disappeared from the Internet and shut down payment sites along with data-leaking portals soon thereafter. In all, 1500 networks were believed to have been compromised, with the VSA remote... (read more)
Law enforcement officials in the Netherlands have arrested two suspects of a Dutch cybercriminal organization that engaged in developing, renting, and selling advanced phishing frameworks to other actors in a scheme known as fraud-as-a-service, according to The Hacker News. The attacks mainly targeted users in show more ...
Belgium and the Netherlands. The suspects, identified as a 15-year-old juvenile and a 24-year-old software engineer, are suspected of being the primary developers and providers of phishing tools used to grab login information from bank users. The Dutch Police reports that the 15-year-old suspect has been released from custody and is since then awaiting an inquiry into his cybercrime activities. Cybersecurity firm Group-IB believes the cybercriminal organization known as Fraud Family has been active since at least 2020. Their frameworks include phishi... (read more)
As part of further tactic enhancements, a malware strain known to target macOS has been updated once again to include features that allow it to gather and exfiltrate sensitive information saved in different applications, including Telegram and Chrome, according to The Hacker News. XCSSET was discovered in August show more ...
2020 when a malicious payload was being fed into Xcode IDE projects and executed at the same time as project files were being generated in Xcode. The payload targeted Mac developers who were using an odd distribution. What is known is that it performs a broad variety of activities, including reading and dumping Safari cookies, malicious Java... (read more)
On Saturday, a web-based petition for an investigation into the US Biological Laboratory in Fort Detrick, Maryland, suffered two cyberattacks allegedly carried out by US hackers, according to China Daily. The good news is that the servers had withstood the attack and caused very little damage, although further attacks show more ...
could come. In an online statement, Global Times, the newspaper that launched the petition, expressed its strong condemnation of the cyberattack and noted that Chinese users have a right to create a petition. The publication reported that more people, including those from other nations, will join the petition, and knowledge of the campaign will continue to spread. By Sunday, nearly 11.4 million people had signed a petition calling upon the World Health Organization in connection to the safety concerns regarding their research into ... (read more)
At a time when businesses worldwide were shedding money because of the pandemic, Zoom saw revenue growth of 370% in just one quarter, becoming a household name and a verb in the process. But right from the start the service faced pointed questions about security, and to their credit, the developers did their best to show more ...
address them quickly. In the light of Zoom’s beefed-up security mechanisms, here’s what you can — and should — configure to ensure maximum protection while Zooming. 1. Make the meeting unique You can set up a Zoom conference either with a Personal Meeting ID (PMI) or, for one-off chats, with a one-time link. Tied to a user’s account, a PMI persists unchanged for a full year from the last login, so anyone who has attended at least one PMI-based meeting can connect to any future conversation using the same PMI, even if you don’t invite them. Therefore, avoid using personal links, and instead create a separate link for each meeting — it takes just a few seconds. 2. Require invitations Publicly sharing a link to a meeting is risky. You might as well spray-paint party details on a public wall and hope no one crashes. Notify each participant individually, whether by e-mail, messaging app, or another convenient means. If you realize someone’s missing from a call already in progress, send an invitation right from Zoom. 3. Set up face control Even if you sent a link personally to a friend or colleague, that’s no guarantee someone else won’t use it to join the call: Your friend might have forwarded the link to someone else, or it could be a mischievous kid brother — or a hacker. The Waiting Room can help you make sure that there’re no uninvited guests on the call. If you enable the feature, attendees will remain sequestered until you look over the names and nicknames and decide who to let in. After the meeting starts, you can send someone back to the Waiting Room if, say, you need to discuss something with a smaller team. You can also choose to enable the Waiting Room for everyone or only for guests who are not signed in to their Zoom accounts. 4. Lock the Zoom meeting Once everyone is in, you can lock the meeting so that no one else can join. That way, even if the link to your video chat is available to outsiders, they will not be able to use it. Incidentally, locking has become one of the most effective ways to combat Zoombombing, the practice of invading Zoom calls, which became widespread during the pandemic. 5. Enable end-to-end encryption Zoom has long used point-to-point encryption (P2PE), whereby private keys are stored on the server. P2PE protects against simple data interception, but hacking the Zoom server enables an attacker to decrypt the conversation. Therefore, Zoom developers added end-to-end encryption (E2EE), which stores keys only on users’ devices. Enable end-to-end encryption and a green shield with a padlock will appear in the upper left corner of the Zoom screen. That icon means the call is protected against eavesdropping. Bear in mind that end-to-end encryption is disabled by default for a reason: With it enabled, participants using the Lync or Skype clients, the online version of the Zoom Web client, or any third-party clients for Zoom will not be able to join the call. In addition, users with free accounts will be asked to confirm their phone number and add a payment method. 6. Check the channel’s security You can check at any time to see if outsiders have used a man-in-the-middle attack to connect to your communication channel. Click on the shield icon and you will see a secret key. The host can read it out loud, and participants can compare it with their own. The numeric key is directly related to the end-to-end encryption mechanism that connects attendees’ devices. If the host’s key matches those of the call participants, that means the connection between the end devices has not been compromised. If an attacker has interfered with it, the sequence of numbers will be different. When the host’s functions are transferred to another participant, or someone joins or leaves the meeting, the system generates another secret key, and participants can check it again. 7. Get extra protection To hide your IP address — and the call itself — from outsiders, be sure to connect using a secure connection such as Kaspersky Secure Connection. Using a VPN is especially important for calls conducted over public Wi-Fi. Don’t forget to use a reliable security solution, either — no matter how much Zoom has improved its security, it cannot do anything about malware that has already set up shop on a call participant’s device.
Joseph “PlugwalkJoe” O’Connor, in a photo from a paid press release on Sept. 02, 2020, pitching him as a trustworthy cryptocurrency expert and advisor. One day after last summer’s mass-hack of Twitter, KrebsOnSecurity wrote that 22-year-old British citizen Joseph “PlugwalkJoe” show more ...
O’Connor appeared to have been involved in the incident. When the U.S. Justice Department last week announced O’Connor’s arrest and indictment, his alleged role in the Twitter compromise was well covered in the media. But most of the coverage seems to have overlooked the far more sinister criminal charges in the indictment, which involve an underground scene wherein young men turn to extortion, sextortion, SIM swapping, death threats and physical attacks — all in a frenzied effort to seize control over social media accounts. Skim the government’s indictment and you might overlook a footnote on Page 4 that says O’Connor is part of a group that had exactly zero reservations about using their playbook of harassment tactics against law enforcement agents who were already investigating their alleged crimes. “O’Connor has potentially been linked to additional prior swatting incidents and possibly (although not confirmed and currently still under investigation) the swatting of a U.S. law enforcement officer,” the footnote reads. Swatting involves making a false report to authorities in a target’s name with the intention of sending a heavily armed police force to that person’s address. It’s a potentially deadly hoax: Earlier this month, a Tennessee man was sentenced to 60 months in prison for setting in motion a swatting attack that led to the death of a 60-year-old grandfather. As for the actual criminal charges, O’Connor faces ten counts, including conspiracy, computer intrusion, extortive communications, stalking and threatening communications. FEMALE TARGETS All of those come into play in the case of the Snapchat account of actor Bella Thorne, who was allegedly targeted by PlugwalkJoe and associates in June 2019. Investigators say O’Connor was involved in a “SIM swap” against Thorne’s mobile phone number. Unauthorized SIM swapping is a scheme in which fraudsters trick or bribe employees at wireless phone companies into redirecting the target’s text messages and phone calls to a device they control. From there, the attackers can reset the password for any online account that allows password resets via SMS. In this case, the SIM swap was done to wrest control over Thorne’s Snapchat account. Once inside, the attackers found nude photos of Thorne, which they then threatened to release unless she agreed to post on social media thanking the hackers using their online handles. The intruders posted on Thorne’s Snapchat, “Will drop nudes if 5000 of you follow @PlugwalkJoe.” Thorne told the feds her phone lost service shortly before her account was hijacked. Investigators later found the same Internet address used to access Thorne’s Snapchat account also was used minutes later to access “@Joe” on Instagram, which O’Connor has claimed publicly. On June 15, 2019, Thorne posted on Twitter that she’d been “threatened with my own nudes,” and posted screenshots of the text message with the individual who had extorted him/her. Thorne said she was releasing the photographs so that the individual would not be able to “take yet another thing from me.” The indictment alleges O’Connor also swatted and cyberstalked a 16-year-old girl, sending her nude photos and threatening to rape and/or murder her and her family. Social media personality Addison Rae had 55 million followers when her TikTok account got hacked last August. I noted on Twitter at the time that PlugWalkJoe had left his calling card yet again. The indictment alleges O’Connor also was involved in a SIM-swap against Rae’s mobile number. BAD REACTION Prosecutors believe that roughly a week after the Twitter hack O’Connor called in bomb threats and swatting attacks targeting a high school and an airport in California. They’re confident it was O’Connor making the swatting and bomb threat calls because his voice is on record in a call he made to federal investigators, as well as to an inmate arrested for SIM swapping. Curiously left out of the media coverage of O’Connor’s alleged crimes is that PlugwalkJoe appears to have admitted in a phone call with the FBI to being part of a criminal conspiracy. In the days following the Twitter mass-hack, O’Connor was quoted in The New York Times denying any involvement in the Twitter bitcoin scam. “I don’t care,” O’Connor told The Times. “They can come arrest me. I would laugh at them. I haven’t done anything.” Speaking with KrebsOnSecurity via Instagram instant message just days after the Twitter hack, O’Connor demanded that his name be kept out of future blog posts here. After he was told that couldn’t be promised, he mentioned that some people in his circle of friends had been known to hire others to deliver physical beatings on people they didn’t like. In nearly the same breath, O’Connor said he was open to talking to federal investigators and telling his side of the story. According to the indictment, a week after the Twitter hack a man identifying himself as O’Connor called federal investigators in Northern California. Specifically, the call went to the REACT Task Force. REACT is a team of law enforcement officers and prosecutors based in Santa Clara, Calif. that is focused on catching criminal SIM swappers, and by this point REACT already had plenty of audio from phone calls traced back to O’Connor in which he allegedly participated in a SIM swapping or swatting attack. “REACT began receiving tips in 2018 regarding illegal activity of an individual using the online moniker ‘PlugwalkJoe,’ purportedly identified as O’Connor from the United Kingdom,” the indictment states. Prosecutors redacted the name of the law enforcement officer who allegedly was swatted by PlugwalkJoe, referring to him only as “C.T.,” a criminal investigator for the Santa Clara District Attorney and a REACT Task Force member. FBI agents called O’Connor back at the number he left. O’Connor told the FBI that on the afternoon of July 15, 2020 he’d been in contact with other associates who were in communications with the alleged mastermind of the Twitter bitcoin scam. Those intermediaries worked directly with Graham Clark, then 17, who pleaded guilty to fraud charges last summer in connection with the Twitter hack and agreed to serve three years in prison followed by three years of probation. The indictment says O’Connor told the feds he only wanted his friends to relay his desire for Clark to secure several different short Twitter usernames that belonged to other people, accounts that were to be later sold for a profit. The other associates who allegedly helped PlugwalkJoe interact with Clark also have since been charged in connection with the Twitter hack. A copy of the indictment is here (PDF).
Cybersecurity lapses at major companies have led to class-action lawsuits and settlements in the hundreds of millions of dollars, including those involving Target, Home Depot, and others.
The No More Ransom project celebrates its fifth anniversary today after helping over six million ransomware victims recover their files and saving them almost €1B ($1.18B) in ransomware payments.
Both Dahua and Hickvision, two of China’s largest security camera makers, are no longer members of the Security Industry Association (SIA), the largest trade organization for surveillance vendors.
What GitLab sets out to achieve with the new open source tool -- named Package Hunter -- is the detection of malicious code that would execute within an application’s dependencies.
The information that may have been exposed includes names, dates of birth, and Social Security numbers, as well as the health insurance contract numbers and routing numbers for direct deposit.
A spammer has flooded the forum of the Babuk ransomware group with explicit GIFs after the Babuk gang failed to pay a $5,000 ransom demand the threat actor made on Friday.
The seller claims the secret database contains 3.8 billion phone numbers and each number is ranked by a score (Number of Clubhouse users who have this phone number in their phonebook).
According to THORChain, the decentralized exchange has become a victim of a sophisticated attack on its ETH router. The protocol took to Twitter to announce the hack and loss it suffered.
Speaking to local radio, the Deputy Mayor said that a malicious virus had been installed, with hackers asking for a “ransom” to “unlock” the files, although it wasn't said how much or if he was paid.
According to Kaspersky researchers, a majority of these fake Win 11 installers pose as a downloadable file appearing to be a genuine MS Windows installer as far as size and structure are concerned.
A fake PDF file masquerades as a Japanese-language report on Olympics-related cyberattacks, for example. Opening it activates malware that infects the user's computer and deletes files.
Organizations are becoming increasingly dependent on APIs to power web and mobile applications that make it easier for customers to consume services via connected devices or apps.
Taiwan says it has been able to defend against the overwhelming majority of attacks. Successful breaches number in the hundreds, while only a handful are what the government classifies as "serious."
The PetitPotam technique can potentially impact most of the supported Windows versions, it was successfully tested against Windows 10, Windows Server 2016, and Windows Server 2019 systems.
High-ranking government officials around the world, including US allies' national security officials, were targeted using spyware from NSO Group, according to WhatsApp head Will Cathcart.
Sophos has announced it’s acquiring Braintrace, a cybersecurity startup that provides organizations visibility into suspicious network traffic patterns. Terms of the deal were not disclosed.
Although the issue was reported in December 2020, given the difficulty of reproducing the bug, it isn't until this month that a fix was rolled out to the Android users of the encrypted messaging app.
Vulnerabilities in biometric access control devices manufactured by IDEMIA could lead to remote code execution (RCE), denial of service, and arbitrary file read/write, researchers have warned.
The MITRE Top 25 list is compiled from NIST’s NVD database and the CVSS scores for each CVE, with a formula applied to score each weakness based on prevalence and severity.
Malware authors are increasingly using rarely spotted programming languages such as Go, Rust, Nim and DLang in order to create new tools and to hinder analysis, researchers have found.
As explained by SecureTeam and Outflank, HTML smuggling is a technique that allows threat actors to assemble malicious files on users’ devices by clever use of HTML5 and JavaScript code.
Multiple cyberattacks have been found targeting Windows OS. Its users were targeted, almost on a daily basis, with some new malware, vulnerability, or attack vector. Therefore, the best solution is to always stay updated and frequently install the latest patches.
Red Hat Security Advisory 2021-2881-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 78.12.0. Issues addressed include man-in-the-middle, out of bounds write, and use-after-free vulnerabilities.
Gentoo Linux Security Advisory 202107-55 - Multiple vulnerabilities have been found in libsdl2, the worst of which could result in a Denial of Service condition. Versions less than 2.0.14-r1 are affected.
This Metasploit module allows an attacker with a privileged WordPress account to launch a reverse shell due to an arbitrary file upload vulnerability in WordPress SP Project and Document plugin versions prior to 4.22. The security check only searches for lowercase file extensions such as .php, making it possible to show more ...
upload .pHP files for instance. Finally, the uploaded payload can be triggered by a call to /wp-content/uploads/sp-client-document-manager//.php.
This Metasploit module allows an attacker with a privileged WordPress account to launch a reverse shell due to an arbitrary file upload vulnerability in WordPress Modern Events Calendar plugin versions prior to 5.16.5. This is due to an incorrect check of the uploaded file extension. Indeed, by using text/csv show more ...
content-type in a request, it is possible to upload a .php payload as is is not forbidden by the plugin. Finally, the uploaded payload can be triggered by a call to /wp-content/uploads/.php.
It was discovered that the eBPF implementation in the Linux kernel did not properly track bounds information for 32 bit registers when performing div and mod operations. A local attacker could use this to possibly execute arbitrary code. It was discovered that the virtual file system implementation in the Linux kernel show more ...
contained an unsigned to signed integer conversion error. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code.
Gentoo Linux Security Advisory 202107-54 - Multiple vulnerabilities have been found in libyang, the worst of which could result in a Denial of Service condition. Versions less than 1.0.236 are affected.
Red Hat Security Advisory 2021-2883-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 78.12.0. Issues addressed include man-in-the-middle, out of bounds write, and use-after-free vulnerabilities.
Red Hat Security Advisory 2021-2882-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 78.12.0. Issues addressed include man-in-the-middle, out of bounds write, and use-after-free vulnerabilities.
A newly uncovered security flaw in the Windows operating system can be exploited to coerce remote Windows servers, including Domain Controllers, to authenticate with a malicious destination, thereby allowing an adversary to stage an NTLM relay attack and completely take over a Windows domain. The issue, dubbed "PetitPotam," was discovered by security researcher Gilles Lionel, who shared
There is a saying that goes something like, "Do not judge a book by its cover." Yet, we all know we can not help but do just that - especially when it comes to online security. Logos play a significant role in whether or not we open an email and how we assess the importance of each message. Brand Indicators for Message Identification, or BIMI, aims to make it easier for us to quickly identify
Microsoft Windows 10 and Windows 11 users are at risk of a new unpatched vulnerability that was recently disclosed publicly. As we reported last week, the vulnerability — SeriousSAM — allows attackers with low-level permissions to access Windows system files to perform a Pass-the-Hash (and potentially Silver Ticket) attack. Attackers can exploit this vulnerability to obtain hashed passwords
An infamous cross-platform crypto-mining malware has continued to refine and improve upon its techniques to strike both Windows and Linux operating systems by setting its sights on older vulnerabilities, while simultaneously latching on to a variety of spreading mechanisms to maximize the effectiveness of its campaigns. "LemonDuck, an actively updated and robust malware that's primarily known
It seems my boss here at “Grahamcluley” has decided that I deserve a wage increase. This is not only terrific news for my bank balance, but also terribly exciting as I never knew I even had a boss – let alone that my company had a human resources department and accounts team...
Graham Cluley Security News is sponsored this week by the folks at 1Password. Thanks to the great team there for their support! Learn from security experts at top organizations, hear about new security and technology trends, and get quick tips for building a culture of security at work and at home – all in four show more ...
… Continue reading "Stay sharp this summer with security tips from the experts – sign up to 1Password’s Security Summer School today"
The Instagram account of SBS Australia - a group of free-to-air TV and radio stations down under - has been hacked by someone who clearly loves "Vikings".
Kaseya hasn't paid anyone for the decryptor it managed to get its paws on last week, and is offering to customers hit by a massive ransomware attack. Which only raises the question - who did?