Episode 277 of the Transatlantic Cable only really has two topics of discussion this week. The first, and probably most prominent is the sale and consequent that happened over on Twitter. Twitter threads across the globe are blanketed in a sea of #RIPTwitter and #Twitterdeath, but what is the actual real possible show more ...
outcome? Following that, the team take a look at the other big story of the week, with the recent implosion of the FTX crypto-exchange – including a story (only possible in 2022, it seems) where Twitter users are being duped out of their crypto by a deepfake of Sam Bankman-Fried. Additionally, sandwiched between the two topics of discussion is an interview with Professor Dr. Dennis-Kenji Kipker Professor for IT Security Law at the University of Bremen, to talk about IT security predications for the coming year. To learn more about his work, head here. If you liked what you heard, please consider subscribing. Is this really the end of Twitter? Two Estonians arrested for running $575M crypto Ponzi scheme FTX crypto exchange owes biggest creditors $3.1bn FTX Founder Deepfake Offers Refund to Victims in Verified Twitter Scam IT Security Predictions, 2023
When discussing cybercriminal tricks, we always recommend that you look carefully at the URL when clicking a link in an email. Heres another red flag — a link to a page translated using Google Translate. In theory, it could be that the sender of the email is inviting you to visit a site in a different language and show more ...
is trying to be helpful. In practice, however, this technique is most often used to bypass antiphishing mechanisms. If the message forms part of business correspondence, and the site thats opened after you click on the link wants you to enter your mail credentials, close the browser window and delete the email right away. Why attackers use Google Translate links Lets take a look at a recent example of phishing through a Google Translate link caught by our traps: The senders of the email allege that the attachment is some kind of payment document available exclusively to the recipient, which must be studied for a contract meeting presentation and subsequent payments. The Open button link points to a site translated by Google Translate. However, this becomes clear only when clicking on it, because in the email it appears like this: The strange wording is perhaps intentional — an attempt by the attackers to create the impression of not being native English speakers to make the Google Translate link seem more convincing. Or maybe theyve just never seen a real email with financial documents. Pay attention to the two links below (Unsubscribe From This List and Manage Email Preferences), as well as the sendgrid.net domain in the link. These are signs that the message was not sent manually, but through a legitimate mailing service — in this case the SendGrid service, but any other ESP could have been used. Services of this type normally protect their reputation and periodically delete mail campaigns aimed at phishing and block their creators. Thats why attackers run their links through Google Translate — the ESPs security mechanisms see a legitimate Google domain and dont consider the site to be suspicious. In other words, its an attempt not only to dupe the end-user target, but the filters of the intermediary service as well. What does a link to a page translated by Google Translate look like? Google Translate lets you translate entire websites simply by passing it a link and selecting the source and target languages. The result is a link to a page where the original domain is hyphenated, and the URL is supplemented with the domain translate.goog, followed by the name of the original page and keys indicating which languages the translation was made to and from. For example, the URL of the translation of the home page of our English-language blog www.kaspersky.com/blog into Spanish will look like this: www-kaspersky-com.translate.goog/blog/?_x_tr_sl=auto&_x_tr_tl=es&_x_tr_hl=en&_x_tr_pto=wapp. The phishing email we analyzed sought to lure the user here: The browser address bar, despite the string of garbage characters, clearly shows that the link was translated by Google Translate. How to stay safe To keep company employees from falling for cybercriminal tricks, we recommend periodically refreshing their knowledge of phishing tactics (for example, by sending them relevant links to our blog) or, better still, raising their awareness of modern cyberthreats with the aid of specialized learning tools. Incidentally, in the above example, a trained user would never have gotten as far as the phishing page — the chances of a legitimate financial document addressed to a specific recipient being sent through an ESP service are pretty slim at best. A while back, we posted about ESP-based phishing. To be extra sure, we additionally recommend using solutions with antiphishing technologies both at the corporate mail server level and on all employee devices.
More than 100 people have been arrested in the UK’s biggest-ever fraud operation, which brought down a website police describe as a “one-stop spoofing shop” used by scammers to steal tens of millions of pounds from Britons via fake bank phone calls.
Microsoft said today that security vulnerabilities found to impact a web server discontinued since 2005 have been used to target and compromise organizations in the energy sector.
A survey from Daon shows 92% of consumers believe cybersecurity threats will continue to outpace cybersecurity technology, with 91% willing to take extra security measures to prove their identity on an ongoing basis to protect their assets.
According to the report provided by jdsupra, the attackers obtained data which contains personal information of Home Trust Mortgage clients. It is claimed that the data holds the names, addresses and the social security numbers.
According to Google's Project Zero, after its team discovered five separate bugs in the ARM Mali GPU driver, ARM "promptly" issued a patch in July and August. Yet, it reported that every test device they looked at this week remains vulnerable.
Group-IB states that the 34 Russian hacking groups are distributing info-stealers and offering them as stealer-as-a-service. The hackers mainly offer Redline and Racoon info-stealers to steal passwords from Roblox and Steam gaming accounts.
The European Parliament's official website was down due to a "sophisticated cyberattack" on Wednesday afternoon, mere hours after MEPs passed a strongly-worded resolution declaring Russia a "state sponsor of terrorism."
The Netherlands government has drawn up a new national cyber security strategy that aims to provide digital protection in Dutch society. It is taking action to raise the country’s digital resilience, strengthen security systems and tackle threats.
Artificial intelligence and machine learning (AI/ML) systems trained using real-world data are increasingly being seen as open to certain attacks that fool the systems by using unexpected inputs.
Cryptonite is a ransomware kit that exists as FOSS. Unusually, it is available to download by anyone with the skills to deploy it (as opposed to being available for sale on the criminal underground).
Chrome browser extension 'SearchBlox' installed by more than 200,000 users has been discovered to contain a backdoor that can steal your Roblox credentials as well as your assets on Rolimons, a Roblox trading platform.
Researchers reviewed a sample of 1,000 records to determine who owned the data and informed them about the exposed database. As per their findings, each record they reviewed had some form of PII related to children.
According to a new report by Cyble, over 50 websites impersonating the official MSI Afterburner site have appeared online in the past three months, pushing XMR (Monero) miners along with information-stealing malware.
A vulnerability in popular remote access service/platform ConnectWise Control could have been leveraged by scammers to make compromising targets’ computers easier, Guardio researchers have discovered.
The updated IRPF, CISA explains, now includes new tools for identifying critical infrastructure, in the form of the Datasets for Critical Infrastructure Identification guide.
Trellix researchers analyzed thousands of leaked internal messages related to the Yanluowang group and revealed the group's inner workings, victims, and possible collaboration with other Russian ransomware groups.
To steal crypto assets, VenomSoftX tries to tamper with API requests that sites use for several actions such as money withdrawal or sending security codes.
WithSecure researchers have published an advisory about new developments of the Ducktail infostealer. The recent campaigns feature new tricks to spear-phish targets via WhatsApp.
The findings were described in a new advisory published by the Cybereason Global SOC (GSOC) team earlier today, highlighting several Black Basta infections using QakBot beginning on November 14, 2022.
Unlike its previous version, this new variant dubbed Life ransomware uses a batch file to download and execute WINWORD.exe to perform DLL side-loading and load the ransomware in memory.
The National Informatics Centre (NIC) at AIIMS Delhi on Wednesday said that a ransomware attack affected the hospital server due to which day-to-day activities including OPD registrations and blood sample reports remained halted.
Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about Falco as a mix between snort, ossec and strace.
This Metasploit module exploits a newline injection into an RPM .rpmspec file that permits authenticated users to remotely execute commands. Successful exploitation results in remote code execution as the root user.
Ubuntu Security Notice 5736-1 - It was discovered that ImageMagick incorrectly handled certain values when processing PDF files. If a user or automated system using ImageMagick were tricked into opening a specially crafted PDF file, an attacker could exploit this to cause a denial of service. This issue only affected show more ...
Ubuntu 14.04 ESM, Ubuntu 16.04 ESM and Ubuntu 18.04 LTS. Zhang Xiaohui discovered that ImageMagick incorrectly handled certain values when processing image data. If a user or automated system using ImageMagick were tricked into opening a specially crafted image, an attacker could exploit this to cause a denial of service. This issue only affected Ubuntu 18.04 LTS and Ubuntu 22.10.
Red Hat Security Advisory 2022-8535-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.16. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2022-8534-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.11.16. Issues addressed include a denial of service vulnerability.
Ubuntu Security Notice 5740-1 - It was discovered that X.Org X Server incorrectly handled certain inputs. An attacker could use these issues to cause the server to crash, resulting in a denial of service, or possibly execute arbitrary code.
Ubuntu Security Notice 5739-1 - Several security issues were discovered in MariaDB and this update includes new upstream MariaDB versions to fix these issues. MariaDB has been updated to 10.3.37 in Ubuntu 20.04 LTS and to 10.6.11 in Ubuntu 22.04 LTS and Ubuntu 22.10. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes.
Ubuntu Security Notice 5638-3 - USN-5638-1 fixed a vulnerability in Expat. This update provides the corresponding updates for Ubuntu 16.04 ESM, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 22.10. This update also fixes a minor regression introduced in Ubuntu 18.04 LTS.
The Android banking fraud malware known as SharkBot has reared its head once again on the official Google Play Store, posing as file managers to bypass the app marketplace's restrictions. A majority of the users who downloaded the rogue apps are located in the U.K. and Italy, Romanian cybersecurity company Bitdefender said in an analysis published this week. SharkBot, first discovered towards
Companies based in the U.S. have been at the receiving end of an "aggressive" Qakbot malware campaign that leads to Black Basta ransomware infections on compromised networks. "In this latest campaign, the Black Basta ransomware gang is using QakBot malware to create an initial point of entry and move laterally within an organization's network," Cybereason researchers Joakim Kandefelt and
The operators of the RansomExx ransomware have become the latest to develop a new variant fully rewritten in the Rust programming language, following other strains like BlackCat, Hive, and Luna. The latest version, dubbed RansomExx2 by the threat actor known as Hive0091 (aka DefrayX), is primarily designed to run on the Linux operating system, although it's expected that a Windows version will
A set of five medium-severity security flaws in Arm's Mali GPU driver has continued to remain unpatched on Android devices for months, despite fixes released by the chipmaker. Google Project Zero, which discovered and reported the bugs, said Arm addressed the shortcomings in July and August 2022. "These fixes have not yet made it downstream to affected Android devices (including Pixel, Samsung,
As 2022 comes to an end, now's the time to level up your bug bounty program with Intigriti. Are you experiencing slow bug bounty lead times, gaps in security skills, or low-quality reports from researchers? Intigriti's expert triage team and global community of ethical hackers are enabling businesses to protect themselves against every emerging cybersecurity threat. Join the likes of Intel,
The cyber espionage group known as Bahamut has been attributed as behind a highly targeted campaign that infects users of Android devices with malicious apps designed to extract sensitive information. The activity, which has been active since January 2022, entails distributing rogue VPN apps through a fake SecureVPN website set up for this purpose, Slovak cybersecurity firm ESET said in a new
Deepfake shenanigans strike users of troubled crypto firm FTX, the perils of charging your electric vehicle, and is Microsoft’s takeover of Activision good news for video game fanatics. All this and much more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by John Hawes of AMTSO.
UK police are texting 70,000 people who they believe have fallen victim to a worldwide scam that saw fraudsters steal at least £50 million from bank accounts. Read more in my article on the Tripwire State of Security blog.