A Canadian teenager was arrested for possession of a .5 36.5M SIM-swap

Saw this week Storm of hacker-related activity in Iran. On Wednesday, a joint adviser to the United States, the United Kingdom and Australia said Iranian state hackers were targeting important infrastructure. The next day, the U.S. judiciary charged two Iranian men with interfering in the 2020 election. Russia and China may be the main topics of conversation around foreign hacking threats, but Iran has been increasingly asserting itself over the past few years.

Another country that has been surprisingly active in cyber attacks lately? Belarus! Since 2019, it has been widely speculated that the so-called ghostwriter hacking and misinformation group was Russia, both with its strategy and goals. But the security agency Mandiant revealed this week that Ghostwriter was in fact an operation linked to the Belarussian military, focusing on NATO interests as well as intervention in the country’s neighbors.

We’ve also seen the best password managers around – and yes, you need one Android users may also want to see a new feature from DuckDuckGo that blocks trackers in apps across your phone. And when it comes to blocking things, NordicTrack has made it difficult for its customers to access a “God mode” that lets them see what they want on their treadmill’s huge display – so they’re struggling to share tasks online.

Lastly, take a few minutes of your day to read this in-depth investigation of how Amazon’s lax data protection frustrates customers. It is full of details that you will not soon forget.

And there’s more! Every week we collect all the security news that Wired has not covered deeply. Click on the title to read the full story, and stay safe there.

In a “Kids Nowadays” for the record book, a Canadian teenager was arrested this week for stealing $ 36.5 million worth of cryptocurrency from a single U.S. victim. This is the biggest theft of its kind. Like many youth-related cryptocurrency thefts these days, the so-called method is a so-called SIM-switching attack that allows criminals to transfer a target’s phone number to their own device, enabling them to intercept their SMS-based two-factor authentication codes. . There are ways to protect yourself from SIM-switching, but there is no sure way to stop them; Even Jack Dorsey’s own Twitter account has fallen into this trap. In this case, investigators allege the teenager used them in part to buy a high-value gamer tag, a popular item in the SIM-swap community.

Among the many criminal hacking gangs operating in Russia, Evil Corp has suffered losses over the years. According to the FBI, the group stole from hundreds of banks around the world and looted at least $ 100 million by 2019. Like many online gangs, they have recently acquired malware, apparently targeting the National Rifle Association in a recent attack. This week, a BBC correspondent traveled to Moscow and a nearby town in search of Evil Corps members Igor Turasev and Maxim Yakubets.

Last weekend, thousands of emails from the FBI warned that the recipients had been the victims of a cyber attack. In fact, the FBI itself compromised. A hacker has compromised the agency’s email system, meaning they have been able to send fake messages with legitimate FBI headers. Fortunately their interest, cybersecurity reporter Brian Krebs was told, was a prankster rather than a complete mess.

In an incident reminiscent of last year’s Cam4 leak, adult streaming site Stripchat released data on 65 million users, 421,000 models and 719,000 chat messages in three days earlier this month. The error was discovered by a security researcher and appears to have been resolved fairly quickly; It’s not clear if any bad actors accessed the data before securing Stripchat. The odds for such sites are particularly high, although, for performers and customers alike, any exposure to personal information is of particular concern.

More great cable story

Source link

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button