In this episode, we cover Australias SBS allowing ad opt-outs on its streaming service, exploring SBSs multilingual history and its ad-funded model. We then dive into the use of emojis in passwords, discussing their pros and cons. The podcast also delves into Metas announcement of an ad-free subscription for Facebook show more ...
and Instagram in the EU, EEA, and Switzerland. Wrapping up, we discuss the increasing resemblance of long AI conversations with ChatGPT to the interactions depicted in the movie Her. Join us for this tech-packed episode! If you liked what you heard, please consider subscribing. Meta to offer ad-free subscription in Europe in bid to keep tracking other users Australian video-streamer lets users opt out of ads for burgers, booze, and betting Life-hack of the day: emoji passwords People are speaking with ChatGPT for hours, bringing 2013s Her closer to reality
The login page for the criminal reshipping service SWAT USA Drop. One of the largest cybercrime services for laundering stolen merchandise was hacked recently, exposing its internal operations, finances and organizational structure. Here’s a closer look at the Russia-based SWAT USA Drop Service, which currently show more ...
employs more than 1,200 people across the United States who are knowingly or unwittingly involved in reshipping expensive consumer goods purchased with stolen credit cards. Among the most common ways that thieves extract cash from stolen credit card accounts is through purchasing pricey consumer goods online and reselling them on the black market. Most online retailers grew wise to these scams years ago and stopped shipping to regions of the world most frequently associated with credit card fraud, including Eastern Europe, North Africa, and Russia. But such restrictions have created a burgeoning underground market for reshipping scams, which rely on willing or unwitting residents in the United States and Europe to receive stolen goods and relay them to crooks living in the embargoed areas. Services like SWAT are known as “Drops for stuff” on cybercrime forums. The “drops” are people who have responded to work-at-home package reshipping jobs advertised on craigslist.com and job search sites. Most reshipping scams promise employees a monthly salary and even cash bonuses. In reality, the crooks in charge almost always stop communicating with drops just before the first payday, usually about a month after the drop ships their first package. The packages arrive with prepaid shipping labels that are paid for with stolen credit card numbers, or with hijacked online accounts at FedEx and the US Postal Service. Drops are responsible for inspecting and verifying the contents of shipments, attaching the correct shipping label to each package, and sending them off via the appropriate shipping company. SWAT takes a percentage cut (up to 50 percent) where “stuffers” — thieves armed with stolen credit card numbers — pay a portion of each product’s retail value to SWAT as the reshipping fee. The stuffers use stolen cards to purchase high-value products from merchants and have the merchants ship the items to the drops’ address. Once the drops receive and successfully reship the stolen packages, the stuffers then sell the products on the local black market. The SWAT drop service has been around in various names and under different ownership for almost a decade. But in early October 2023, SWAT’s current co-owner — a Russian-speaking individual who uses the handle “Fearlless” — took to his favorite cybercrime forum to lodge a formal complaint against the owner of a competing reshipping service, alleging his rival had hacked SWAT and was trying to poach his stuffers and reshippers by emailing them directly. Milwaukee-based security firm Hold Security shared recent screenshots of a working SWAT stuffer’s user panel, and those images show that SWAT currently lists more than 1,200 drops in the United States that are available for stuffers to rent. The contact information for Kareem, a young man from Maryland, was listed as an active drop. Contacted by KrebsOnSecurity, Kareem agreed to speak on condition that his full name not be used in this story. A SWAT panel for stuffers/customers. This page lists the rules of the service, which do not reimburse stuffers for “acts of god,” i.e. authorities seizing stolen goods or arresting the drop. Kareem said he’d been hired via an online job board to reship packages on behalf of a company calling itself CTSI, and that he’s been receiving and reshipping iPads and Apple watches for several weeks now. Kareem was less than thrilled to learn he would probably not be getting his salary on the promised payday, which was coming up in a few days. Kareem said he was instructed to create an account at a website called portal-ctsi[.]com, where each day he was expected to log in and check for new messages about pending shipments. Anyone can sign up at this website as a potential reshipping mule, although doing so requires applicants to share a great deal of personal and financial information, as well as copies of an ID or passport matching the supplied name. A SWAT panel for stuffers/customers, listing hundreds of drops in the United States by their status. “Going to die” are those who are about to be let go without promised payment, or who have quit on their own. On a suspicion that the login page for portal-ctsi[.]com might be a custom coding job, KrebsOnSecurity selected “view source” from the homepage to expose the site’s HTML code. Grabbing a snippet of that code (e.g., “smarty/default/jui/js/jquery-ui-1.9.2.min.js”) and searching on it at publicwww.com reveals more than four dozen other websites running the same login panel. And all of those appear to be geared toward either stuffers or drops. In fact, more than half of the domains that use this same login panel actually include the word “stuffer” in the login URL, according to publicwww. Each of the domains below that end in “/user/login.php” are sites for active and prospective drops, and each corresponds to a unique fake company that is responsible for managing its own stable of drops: lvlup-store[.]com/stuffer/login.php personalsp[.]com/user/login.php destaf[.]com/stuffer/login.php jaderaplus[.]com/stuffer/login.php 33cow[.]com/stuffer/login.php panelka[.]net/stuffer/login.php aaservice[.]net/stuffer/login.php re-shipping[.]ru/stuffer/login.php bashar[.]cc/stuffer/login.php marketingyoursmall[.]biz/stuffer/login.php hovard[.]xyz/stuffer/login.php pullback[.]xyz/stuffer/login.php telollevoexpress[.]com/stuffer/login.php postme[.]today/stuffer/login.php wint-job[.]com/stuffer/login.php squadup[.]club/stuffer/login.php mmmpack[.]pro/stuffer/login.php yoursmartpanel[.]com/user/login.php opt257[.]org/user/login.php touchpad[.]online/stuffer/login.php peresyloff[.]top/stuffer/login.php ruzke[.]vodka/stuffer/login.php staf-manager[.]net/stuffer/login.php data-job[.]club/stuffer/login.php logistics-services[.]org/user/login.php swatship[.]club/stuffer/login.php logistikmanager[.]online/user/login.php endorphine[.]world/stuffer/login.php burbon[.]club/stuffer/login.php bigdropproject[.]com/stuffer/login.php jobspaket[.]net/user/login.php yourcontrolboard[.]com/stuffer/login.php packmania[.]online/stuffer/login.php shopping-bro[.]com/stuffer/login.php dash-redtag[.]com/user/login.php mnger[.]net/stuffer/login.php begg[.]work/stuffer/login.php dashboard-lime[.]com/user/login.php control-logistic[.]xyz/user/login.php povetru[.]biz/stuffer/login.php dash-nitrologistics[.]com/user/login.php cbpanel[.]top/stuffer/login.php hrparidise[.]pro/stuffer/login.php d-cctv[.]top/user/login.php versandproject[.]com/user/login.php packitdash[.]com/user/login.php avissanti-dash[.]com/user/login.php e-host[.]life/user/login.php pacmania[.]club/stuffer/login.php Why so many websites? In practice, all drops are cut loose within approximately 30 days of their first shipment — just before the promised paycheck is due. Because of this constant churn, each stuff shop operator must be constantly recruiting new drops. Also, with this distributed setup, even if one reshipping operation gets shut down (or exposed online), the rest can keep on pumping out dozens of packages a day. A 2015 academic study (PDF) on criminal reshipping services found the average financial hit from a reshipping scheme per cardholder was $1,156.93. That study looked into the financial operations of several reshipping schemes, and estimated that approximately 1.6 million credit and debit cards are used to commit at least $1.8 billion in reshipping fraud each year. It’s not hard to see how reshipping can be a profitable enterprise for card crooks. For example, a stuffer buys a stolen payment card off the black market for $10, and uses that card to purchase more than $1,100 worth of goods. After the reshipping service takes its cut (~$550), and the stuffer pays for his reshipping label (~$100), the stuffer receives the stolen goods and sells them on the black market in Russia for $1,400. He has just turned a $10 investment into more than $700. Rinse, wash, and repeat. The breach at SWAT exposed not only the nicknames and contact information for all of its stuffers and drops, but also the group’s monthly earnings and payouts. SWAT apparently kept its books in a publicly accessible Google Sheets document, and that document reveals Fearlless and his business partner each routinely made more than $100,000 every month operating their various reshipping businesses. The exposed SWAT financial records show this crime group has tens of thousands of dollars worth of expenses each month, including payments for the following recurring costs: -advertising the service on crime forums and via spam; -people hired to re-route packages, usually by voice over the phone; -third-party services that sell hacked/stolen USPS/Fedex labels; -“drops test” services, contractors who will test the honesty of drops by sending them fake jewelry; -“documents,” e.g. sending drops to physically pick up legal documents for new phony front companies. The spreadsheet also included the cryptocurrency account numbers that were to be credited each month with SWAT’s earnings. Unsurprisingly, a review of the blockchain activity tied to the bitcoin addresses listed in that document shows that many of them have a deep association with cybercrime, including ransomware activity and transactions at darknet sites that peddle stolen credit cards and residential proxy services. The information leaked from SWAT also has exposed the real-life identity and financial dealings of its principal owner — Fearlless, a.k.a. “SwatVerified.” We’ll hear more about Fearlless in Part II of this story. Stay tuned.
When everybody is responsible for a task, sometimes nobody takes ownership. Here are three steps to distribute cybersecurity throughout your organization.
According to a report by security firm Sophos, 75% of ransomware attacks on healthcare organizations involve the malicious encryption of data. This reflects the increasing skill level of hackers in the healthcare sector.
“We are aware of a cyber incident impacting elements of our parts and distribution business,” Boeing told The Register. At the time of writing, the company’s parts and distribution website was “down due to technical issues.”
The investigation by the Electronic Frontier Foundation (EFF) found that innocent content related to education, therapy, and LGBTQ+ issues was consistently flagged as potentially harmful, leading to a "stunning invasion of privacy."
The activation of the kill switch disabled various system services, replaced the original malware, and maintained persistence, suggesting a deliberate dismantling of the botnet.
The library has stated that there is no evidence of compromised personal information, and they are actively working with cybersecurity experts and law enforcement to investigate the incident.
Dallas County in Texas has provided an update on a ransomware attack that was reported earlier this week. The county was able to stop the hackers before they could encrypt files or systems.
The attack was quickly detected and contained within one segment of the network. The compromised information may include names, addresses, birthdates, Social Security numbers, diagnosis codes, insurance information, and treatment service types.
Ransomware attacks are increasing at a record-breaking pace, with the frequency of attacks in Q3 2023 up 11% from the previous quarter and 95% from the previous year, according to Corvus Insurance.
While many organizations still run core business applications on the mainframe, the changing digital landscape and stricter data regulations highlight the need for stronger security practices.
Multiple cities and districts in western Germany have been paralyzed by a ransomware attack. The attack encrypted the servers of the local municipal service provider Südwestfalen IT, affecting over 70 municipalities.
The attack targeted a data firm called Westat, used by the Office of Personnel Management (OPM) for surveys. The hackers exploited a vulnerability in the MOVEit Transfer software developed by Ipswitch INC.
The RansomedVC group, which recently claimed responsibility for several high-profile attacks, is now up for sale. The owner, citing personal reasons and a desire to avoid monitoring by federal agencies, is offering a 20% discount to a trusted buyer.
The flaw, known as CVE-2023-46604, allows attackers to execute arbitrary shell commands by exploiting the serialized class types in the OpenWire protocol. The issue affects several versions of Apache ActiveMQ, but patches have been released.
The attackers use hijacked Facebook accounts and create multiple profiles featuring photos of young women to entice users to click on infected links. Clicking on the ads downloads a malicious file that steals browser cookies and passwords.
The new version addresses criticisms of previous versions by including metrics for safety, automation, recovery, value density, vulnerability response effort, and provider urgency.
The company failed to adequately protect electronic protected health information, violated HIPAA laws, and lacked sufficient monitoring and policies to prevent and address cyberattacks.
Querétaro Intercontinental Airport in Mexico has experienced a cyberattack, with an employee downloading a file containing malware, but the airport's operational security was not compromised and the attack has been contained and isolated.
MuddyWater's tactics have evolved over time, with the group now utilizing a new file-sharing service called Storyblok and a new command-and-control framework called MuddyC2Go.
Río Hondo College in Southern California experienced a cybersecurity incident that disrupted campus functions and financial aid disbursements, potentially indicating a ransomware attack.
Ransomware gang Alphv, also known as BlackCat, claims to have stolen data from Advarra, a firm that assists with medical trials. The criminals gained access to an executive's accounts by SIM swapping their cellphone number.
By developing a SketchUp fuzzing harness and using a dumb file format fuzzer, 20 unique vulnerabilities, including use-after-free and stack buffer overflow, were discovered in just one month.
This new product offers SaaS discovery and risk assessment coupled with a free user access review in a unique “freemium” model Securing employees' SaaS usage is becoming increasingly crucial for most cloud-based organizations. While numerous tools are available to address this need, they often employ different approaches and technologies, leading to unnecessary confusion and complexity. Enter
The Iranian nation-state actor known as MuddyWater has been linked to a new spear-phishing campaign targeting two Israeli entities to ultimately deploy a legitimate remote administration tool from N-able called Advanced Monitoring Agent. Cybersecurity firm Deep Instinct, which disclosed details of the attacks, said the campaign "exhibits updated TTPs to previously reported MuddyWater activity,"
As many as 34 unique vulnerable Windows Driver Model (WDM) and Windows Driver Frameworks (WDF) drivers could be exploited by non-privileged threat actors to gain full control of the devices and execute arbitrary code on the underlying systems. "By exploiting the drivers, an attacker without privilege may erase/alter firmware, and/or elevate [operating system] privileges," Takahiro Haruyama, a
The Forum of Incident Response and Security Teams (FIRST) has officially announced CVSS v4.0, the next generation of the Common Vulnerability Scoring System standard, more than eight years after the release of CVSS v3.0 in June 2015. "This latest version of CVSS 4.0 seeks to provide the highest fidelity of vulnerability assessment for both industry and the public," FIRST said in a statement.
Cybersecurity researchers are warning of suspected exploitation of a recently disclosed critical security flaw in the Apache ActiveMQ open-source message broker service that could result in remote code execution. "In both instances, the adversary attempted to deploy ransomware binaries on target systems in an effort to ransom the victim organizations," cybersecurity firm Rapid7 disclosed in a
The unexpected drop in malicious activity connected with the Mozi botnet in August 2023 was due to a kill switch that was distributed to the bots. "First, the drop manifested in India on August 8," ESET said in an analysis published this week. "A week later, on August 16, the same thing happened in China. While the mysterious control payload – aka kill switch – stripped Mozi bots of most
Workers wonder if their colleagues are actually AI, and we take a deeper look into the curious scams going on via Booking.com. All this and more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault.