πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
26K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Shellbot Crimeware Re-Emerges in Monero Mining Campaign πŸ•΄

New attack uses a repurposed version of the Trojan that spreads using Internet Relay Chat.

πŸ“– Read

via "Dark Reading: ".
<b>&#9000; More Alleged SIM Swappers Face Justice &#9000;</b>

<code>Prosecutors in Northern California have charged two men with using unauthorized SIM swaps to steal and extort money from victims. One of the individuals charged allegedly used a hacker nickname belonging to a key figure in the underground who’s built a solid reputation hijacking mobile phone numbers for profit.</code><code>According to indictments unsealed this week, Tucson, Ariz. resident Ahmad Wagaafe Hared and Matthew Gene Ditman of Las Vegas were part of a group that specialized in tricking or bribing representatives at the major wireless providers into giving them control over phone numbers belonging to people they later targeted for extortion and theft.</code><code>Investigators allege that between October 2016 and May 2018, Hared and Ditman grew proficient at SIM swapping, a complex form of mobile phone fraud that is often used to steal large amounts of cryptocurrencies and other items of value from victims.</code><code>The Justice Department says Hared was better known to his co-conspirators as β€œwinblo.” That nickname corresponds to an extremely active and at one time revered member of the forum ogusers[.]com, a marketplace for people who wish to sell highly prized social media account names β€” including short usernames at Twitter, Instagram and other sites that can fetch thousands of dollars apiece.</code><code>Media</code><code>Winblo’s account on ogusers[.]com</code><code>Winblo was an associate and business partner of another top Oguser member, a serial SIM swapper known to Oguser members as β€œXzavyer.” In August 2018, authorities in California arrested a hacker by the same name β€” whose real name is Xzavyer Clemente Narvaez β€” charging him with identity theft, grand theft, and computer intrusion.

</code><code>Prosecutors allege Narvaez used the proceeds of his crimes (estimated at > $1 million in virtual currencies) to purchase luxury items, including a McLaren β€” a $200,000 high-performance sports car.</code><code>According to the indictments against Hared and Ditman, one of the men (the indictment doesn’t specify which) allegedly used his ill-gotten gains to purchase a BMW i8, an automobile that sells for about $150,000.</code><code>Investigators also say the two men stole approximately 40 bitcoins from their SIM swapping victims. That’s roughly $136,000 in today’s conversion, but it would have been substantially more in 2017 when the price of a single bitcoin reached nearly $20,000.</code><code>Interestingly, KrebsOnSecurity was contacted in 2018 by a California man who said he was SIM swapped by Winblo and several associates. That victim, who asked not to be identified for fear of reprisals, said his Verizon mobile number was SIM hijacked by Winblo and others who used that access to take over his Twitter and PayPal accounts and then demand payment for the return of the accounts.</code><code>A computer specialist by trade, the victim said he was targeted because he’d invested in a cryptocurrency startup, and that the hackers found his contact information from a list of investors they’d somehow obtained. As luck would have it, he didn’t have much of value to steal in his accounts.</code><code>The victim said he learned more about his tormentors and exactly how they’d taken over his mobile number after they invited him to an online chat to negotiate a price for the return of his accounts.</code><code>β€œThey told me they had called a Verizon employee line [posing as a Verizon employee] and managed to get my Verizon account ID number,” said my victim source. β€œOnce they had that, they called Verizon customer service and had them reset the password. They literally just called and pretended to be me, and were able to get my account tied to another SIM card.”</code><code>The victim said his attackers even called his mom because the mobile account was in her name. Soon after that, his phone went dead.</code><code>β€œThe funny thing was, after I got my account…
⚠ Digital signs left wide open with default password ⚠

One thing the world doesn't need: hackers who can broadcast to billboards of any size, be they PC monitor- or Godzilla-sized.

πŸ“– Read

via "Naked Security".
⚠ Just two hacker groups are behind 60% of stolen cryptocurrency ⚠

Chainalysis found that two groups, which it calls Alpha and Beta, are responsible for stealing around $1 billion in funds from exchanges.

πŸ“– Read

via "Naked Security".
⚠ Firefox 66 will silence autoplaying web audio ⚠

From Firefox 66 for desktop and Android, due in March, media autoplay of video or audio will be blocked by default.

πŸ“– Read

via "Naked Security".
⚠ Jack’d dating app is showing users’ intimate pics to strangers ⚠

A clear and present danger: Anyone with a web browser who knows where to look can access Jack'd users' photos, be they private or public.

πŸ“– Read

via "Naked Security".
πŸ•΄ 7 Tips For Communicating With the Board πŸ•΄

The key? Rather than getting bogged down in the technical details, focus on how a security program is addressing business risk.

πŸ“– Read

via "Dark Reading: ".
❌ Modern Cybercrime: It Takes a Village ❌

Today's financial cyber-rings have corporate insider and management roles -- cybercrime is not just just for hackers and coders anymore.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” 4 tips to keep your business safe online, according to Google πŸ”

Most people still lack an understanding of best practices for passwords and other security measures, Google found.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Data breaches, GDPR lead 54% of companies to increase IT security spending πŸ”

One in three companies is still unprepared for many potential cybersecurity threats, according to an eSecurityPlanet.com report.

πŸ“– Read

via "Security on TechRepublic".
❌ Microsoft Confirms Serious β€˜PrivExchange’ Vulnerability ❌

The elevated privilege flaw exists in Microsoft Exchange and would allow a remote attacker to impersonate an administrator.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ Serverless Computing: 'Function' vs. 'Infrastructure' as-a-Service πŸ•΄

How much do companies really gain from offloading security duties to the cloud? Let's do the math.

πŸ“– Read

via "Dark Reading: ".
πŸ” 3 things businesses need to know about customer privacy expectations πŸ”

After a data breach, 57% of consumers blame companies above everyone else, even hackers, for the event, according to an RSA Security report.

πŸ“– Read

via "Security on TechRepublic".
❌ What are Data Manipulation Attacks, and How to Mitigate Against Them ❌

Hackers don't always steal data. Sometimes the goal is to manipulate the data to intentionally trigger external events that can be capitalized on.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ” Attention developers: Google wants to pay you $15,000 to improve cloud security πŸ”

Google's Confidential Computing Challenge aims to make it easier to achieve end-to-end encryption of data in the cloud.

πŸ“– Read

via "Security on TechRepublic".
❌ Clever Phishing Attack Enlists Google Translate to Spoof Facebook Login Page ❌

A tricky two-stage phishing scam is targeting Facebook and Google credentials using a landing page that hides behind Google's translate feature.

πŸ“– Read

via "Threatpost | The first stop for security news".
πŸ•΄ 4 Practical Questions to Ask Before Investing in AI πŸ•΄

A pragmatic, risk-based approach can help CISOs plan for an efficient, effective, and economically sound implementation of AI for cybersecurity.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Consumers Care About Security - Sometimes πŸ•΄

New RSA Security survey shows a generation gap in concerns over cybersecurity and privacy.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2015-9282

The Pie Chart Panel plugin through 2019-01-02 for Grafana is vulnerable to XSS via legend data or tooltip data. When a chart is included in a Grafana dashboard, this vulnerability could allow an attacker to gain remote unauthenticated access to the dashboard.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ Some Airline Flight Online Check-in Links Expose Passenger Data πŸ•΄

Several airlines send unencrypted links to passengers for flight check-in that could be intercepted by attackers to view passenger and other data, researchers found.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Google Tackles Gmail Spam with Tensorflow πŸ•΄

Tensorflow, Google's open-source machine learning framework, has been used to block 100 million spam messages.

πŸ“– Read

via "Dark Reading: ".