ReportWire

Tag: Hacking

  • Colorado public defender ransomware attack may have exposed Social Security numbers, personal data

    Colorado public defender ransomware attack may have exposed Social Security numbers, personal data

    [ad_1]

    The Office of the Colorado State Public Defender has acknowledged personal data may have been stolen during a ransomware attack that crippled the statewide agency in early February — but won’t say much else about the ongoing effort to restore its systems after the hack.

    Files “were copied without permission” during the cyberattack, which was discovered on Feb. 9, and those files may have included names, Social Security numbers, driver’s license numbers, medical information and health insurance information, the agency said in a statement Friday.

    Officials from the public defender’s office are still investigating whose personal data may have been stolen, and whether the personal data of attorneys or their clients was compromised, they said. A statement on the agency’s website urges “individuals” to remain vigilant against identity theft and fraud.

    It’s been more than a month since public defenders across the state were locked out of their computers and files in the ransomware attack and hundreds of court hearings were delayed over the next week because public defenders couldn’t do their jobs.

    Officials this week refused to answer questions from The Denver Post about what particular parts of the agency’s systems remain inoperable. In a ransomware attack, hackers use malware to hold an organization’s data hostage then demand a payment in cryptocurrency in order for organizations to regain access to that data.

    The public defender’s office also would not disclose the amount of ransom demanded or whether a ransom was paid. A statement on the agency’s website says the office has “made progress in returning to full operations.”

    Heavily redacted emails and text messages released to The Post by the Governor’s Office of Information Technology this week in response to an open records request mention the cyberattack recovery law firm Mullen Coughlin. Chief Deputy Public Defender Zak Brown would not confirm whether the public defender’s office is working with the firm.

    “We have provided all the information we are able to at this time,” he said in an email.

    A message left with the Pennsylvania-based law firm was not returned Wednesday.

    [ad_2]

    Shelly Bradbury

    Source link

  • OMG! People Are Literally Trying To Sneak Into Princess Catherine’s Medical Records! – Perez Hilton

    OMG! People Are Literally Trying To Sneak Into Princess Catherine’s Medical Records! – Perez Hilton

    [ad_1]

    People are taking this Princess Catherine controversy WAY too far!

    As we’re sure you’ve been seeing, Kate Middleton has been in the news a lot lately with conspiracy theories about her whereabouts and the photos that Kensington Palace has been sharing. It’s been an absolute whirlwind ever since people started to take note of her long absence since her surgery back in January — which, we still don’t know a lot of details about. But apparently that’s not sitting right with some super invasive internet sleuths, because they’re actually trying to hack her medical records!

    Yes, seriously! People are going as far as to look into her personal medical info! Awful…

    Related: Kate’s Outfit In Farm Shop Video Sends More Mixed Messages!

    The London Clinic spoke to DailyMail.com on Tuesday, confirming they’d launched an investigation into the Princess of Wales’ file privacy after an employee allegedly got caught trying to snoop without permission. A spokesperson dished:

    “Senior hospital bosses contacted Kensington Palace immediately after the incident was brought to their attention and assured the palace there would be a full investigation.”

    OMG!

    The staff at the hospital are “utterly shocked and distraught over the allegations and were very hurt that a trusted colleague could have allegedly been responsible for such a breach of trust and ethics”, according to the statement. Meanwhile, when asked about the whole ordeal, the Palace said it “cannot comment” due to the ongoing investigation.

    Wild… We all want to know the juicy deets of Royal drama, but this is just far too much! Poor Kate!

    What do U think, Perezcious readers? Sound OFF (below).

    [Image via MEGA/WENN]

    [ad_2]

    Perez Hilton

    Source link

  • The French government says it’s being targeted by unusual intense cyberattacks

    The French government says it’s being targeted by unusual intense cyberattacks

    [ad_1]

    FILE – French Prime Minister Gabriel Attal gestures as he speaks during the first session of questions to the new government at the National Assembly in Paris, Tuesday, Jan. 16, 2024. The French government said Monday, March 11, 2024 that several of its services are being targeted by cyberattacks of ‘’unprecedented intensity,’’ and a special crisis center was activated to restore online services. In a statement, Prime Minister Gabriel Attal’s office said the attacks started Sunday night and hit multiple government ministries, without providing details. (AP Photo/Michel Euler, File)

    [ad_2]

    Source link

  • Microsoft says it hasn’t been able to shake Russian state hackers

    Microsoft says it hasn’t been able to shake Russian state hackers

    [ad_1]

    BOSTON — Microsoft said Friday it’s still trying to evict the elite Russian government hackers who broke into the email accounts of senior company executives in November and who it said have been trying to breach customer networks with stolen access data.

    The hackers from Russia’s SVR foreign intelligence service used data obtained in the intrusion, which it disclosed in mid-January, to compromise some source-code repositories and internal systems, the software giant said in a blog and a regulatory filing.

    A company spokesman would not characterize what source code was accessed and what capability the hackers gained to further compromise customer and Microsoft systems. Microsoft said Friday that the hackers stole “secrets” from email communications between the company and unspecified customers — cryptographic secrets such as passwords, certificates and authentication keys —and that it was reaching out to them “to assist in taking mitigating measures.”

    Cloud-computing company Hewlett Packard Enterprise disclosed on Jan. 24 that it, too, was an SVR hacking victim and that it had been informed of the breach — by whom it would not say — two weeks earlier, coinciding with Microsoft’s discovery it had been hacked.

    “The threat actor’s ongoing attack is characterized by a sustained, significant commitment of the threat actor’s resources, coordination, and focus,” Microsoft said Friday, adding that it could be using obtained data “to accumulate a picture of areas to attack and enhance its ability to do so.” Cybersecurity experts said Microsoft’s admission that the SVR hack had not been contained exposes the perils of the heavy reliance by government and business on the Redmond, Washington, company’s software monoculture — and the fact that so many of its customers are linked through its global cloud network.

    “This has tremendous national security implications,” said Tom Kellermann of the cybersecurity firm Contrast Security. “The Russians can now leverage supply chain attacks against Microsoft’s customers.”

    Amit Yoran, the CEO of Tenable, also issued a statement, expressing both alarm and dismay. He is among security professionals who find Microsoft overly secretive about its vulnerabilities and how it handles hacks.

    “We should all be furious that this keeps happening,” Yoran said. “These breaches aren’t isolated from each other and Microsoft’s shady security practices and misleading statements purposely obfuscate the whole truth.”

    Microsoft said it had not yet determined whether the incident is likely to materially impact its finances. It also said the intrusion’s stubbornness “reflects what has become more broadly an unprecedented global threat landscape, especially in terms of sophisticated nation-state attacks.”

    The hackers, known as Cozy Bear, are the same hacking team behind the SolarWinds breach.

    When it initially announced the hack, Microsoft said the SVR unit broke into its corporate email system and accessed accounts of some senior executives as well as employees on its cybersecurity and legal teams. It would not say how many accounts were compromised.

    At the time, Microsoft said it was able to remove the hackers’ access from the compromised accounts on or about Jan. 13. But by then, they clearly had a foothold.

    It said they got in by compromising credentials on a “legacy” test account but never elaborated.

    Microsoft’s latest disclosure comes three months after a new U.S. Securities and Exchange Commission rule took effect that compels publicly traded companies to disclose breaches that could negatively impact their business.

    [ad_2]

    Source link

  • Bitfinex Hacker Turns State’s Witness in Bitcoin Fog Mixer Trial: Report

    Bitfinex Hacker Turns State’s Witness in Bitcoin Fog Mixer Trial: Report

    [ad_1]

    Ilya Lichtenstein, the man behind the looting of billions of dollars from Bitfinex,  is now helping federal prosecutors build a case against Bitcoin Fog, a crypto mixing service.

    Lichtenstein pleaded guilty to money laundering charges last year after hacking Bitfinex and getting away with Bitcoin worth $3.6 million.

    Lichtenstein Testifies in Washington Trial

    According to Bloomberg, Lichtenstein appeared in a Washington, D.C., trial this week where Roman Sterlingov was accused of operating a mixing service utilized by dark-web criminals. The Bitfinex hacker was named a cooperating U.S. government witness to charges relating to money laundering associated with the platform.

    Lichtenstein told the jury that he used different mixers, including Bitcoin Fog, to obscure the stolen funds from the Bitfinex hack. He testified that he used the service about ten times to launder funds. However, he mentioned that the platform was not his main money laundering method since he later moved on to other services better suited for his purpose, such as Helix.

    U.S. authorities charged Sterlingov, a dual Russian-Swedish citizen, with operating the money-mixing service. They accuse Sterlingov of receiving millions of dollars from darknet markets associated with trafficking illegal drugs.

    Tor Ekeland, Sterlingov’s attorney, argues that no evidence exists, such as server logs and eyewitness accounts that link Lichtenstein to the platform. Ekeland further pressed Lichtenstein during the trial on whether he knew or communicated with the accused, which he denied.

    The attorney then inquired about Lichtenstein’s drug use, referencing earlier testimony where Lichtenstein admitted to purchasing mushrooms and LSD on darknet markets. However, he clarified that he was sober during the hacks.

    Sterlingov is facing multiple charges, which include money laundering, operating an unlicensed money-transmitting business, and engaging in money transmission without the requisite license in the District of Columbia.

    Bitfinex Hacker Reveals Motive

    During his testimony, Lichtenstein highlighted the reason for the Bitfinex hack in 2016, saying he faced issues with his tech startup in San Francisco. He further explained that during the time, he was burnt out from the struggling business. Later, he recruited his wife, Heather Morgan, to aid in concealing the origin of the funds. Morgan, who called herself the “Crocodile of Wall Street,” sought social media recognition by rapping about investment strategies.

    The government alleges that the pair utilized counterfeit identities to establish online accounts, masking the transaction trail by depositing and withdrawing funds through cryptocurrency exchanges and darknet markets. According to government assertions, some embezzled funds were allocated to purchase nonfungible tokens (NFTs), gold, and Walmart gift cards.

    In August 2023, Lichtenstein and his wife formally pleaded guilty to money laundering charges and conspiracy to commit fraud, ending a mystery that spanned seven years.

    SPECIAL OFFER (Sponsored)

    Binance Free $100 (Exclusive): Use this link to register and receive $100 free and 10% off fees on Binance Futures first month (terms).

    [ad_2]

    Wayne Jones

    Source link

  • The Privacy Danger Lurking in Push Notifications

    The Privacy Danger Lurking in Push Notifications

    [ad_1]

    To send those notifications that awaken a device and appear on its screen without a user’s interaction, apps and smartphone operating system makers must store tokens that identify the device of the intended recipient. That system has created what US senator Ron Wyden has called a “digital post office” that can be queried by law enforcement to identify users of an app or communications platform. And while it has served as a powerful tool for criminal surveillance, privacy advocates warn that it could just as easily be turned against others such as activists or those seeking an abortion in states where that’s now illegal.

    In many cases, tech firms don’t even demand a court order for the data: Apple, in fact, only demanded a subpoena for the data until December. That allowed federal agents and police to obtain the identifying information without the involvement of a judge until it changed its policy to demand a judicial order.

    Europe’s sweeping Digital Markets Act comes into force next week and is forcing major “gatekeeper” tech companies to open up their services. Meta-owned WhatsApp is opening its encryption to interoperate with other messaging apps; Google is giving European users more control over their data; and Apple will allow third-party app stores and the sideloading of apps for the first time.

    Apple’s proposed changes have proved controversial, but ahead of the March 7 implementation date the company has reiterated its belief that sideloading apps creates more security and privacy risks. It may be easier for apps on third-party apps stores, the company says in a white paper, to contain malware or try to access people’s iPhone data. Apple says it is bringing in new checks to try to make sure apps are safe.

    “These safeguards will help keep EU users’ iPhone experience as secure, privacy-protecting, and safe as possible—although not to the same degree as in the rest of the world,” the company claims. Apple also says it has heard from EU organizations, such as those in banking and defense, which say they are concerned about employees installing third-party apps on work devices.

    WhatsApp scored a landmark legal win this week against the notorious mercenary hacking firm NSO Group in its long-running lawsuit against that spyware seller for allegedly breaching its app and the devices of its users. The judge in the case, Phyllis Hamilton, sided with WhatsApp in its demand that NSO Group hand over the code of its Pegasus spyware, which has long been considered one of the most sophisticated pieces of spyware to target mobile devices, sometimes through vulnerabilities in WhatsApp. The code handover—which includes versions of Pegagus from 2018 to 2020 as well as NSO’s documentation around its spyware—could help WhatsApp prove its allegations that NSO hacked 1,400 of its users, including at least 100 members of “civil society” such as journalists and human rights defenders. “Spyware companies and other malicious actors need to understand they can be caught and will not be able to ignore the law,” a WhatsApp spokesperson told the Guardian.

    Here’s a solid rule of thumb: Don’t put any device in or around your home that has a camera, an internet connection, and is made by a Chinese manufacturer you’ve never heard of. In the latest reminder of that maxim, Consumer Reports this week revealed that countless brands of video-enabled doorbells have absolutely shambolic security, to the degree that for many of the devices, anyone can walk up to them outside your door, hold a button to pair their own smartphone with it, and then spy through your camera. In some cases, they can even obtain just a serial number from the device that lets them hijack it via the internet from anywhere in the world, according to the investigation. Consumer Reports found that these devices were sold under the brand names Eken and Tuck but that they appeared to share a manufacturer with no fewer than 10 other devices that all had similar designs. And while those devices might sound obscure, they’re reportedly sold through major retail platforms like Amazon, Walmart, Sears, Shein, and Temu. In some cases, Amazon had even marked the devices with their “Amazon’s Choice: Overall Pick” badge—even after Consumer Reports alerted Amazon to the security flaws.

    [ad_2]

    Andy Greenberg, Andrew Couts, Matt Burgess

    Source link

  • The White House Warns Cars Made in China Could Unleash Chaos on US Highways

    The White House Warns Cars Made in China Could Unleash Chaos on US Highways

    [ad_1]

    The US government has launched an investigation into the national security risks posed by foreign-made vehicles with internet connectivity—especially those made in China. At a briefing on Wednesday, Secretary of Commerce Gina Raimondo even raised the specter of Beijing remotely triggering mayhem on US highways.

    “Imagine if there were thousands or hundreds of thousands of Chinese connected vehicles on American roads that could be immediately and simultaneously disabled by somebody in Beijing,” Raimondo said.

    The new US government fears about Chinese autos come as automakers such as BYD and Geely have become major global players in car manufacturing—and particularly electric vehicles. They also build on evidence that as cars have become increasingly computerized, and connected to the internet, vehicles have become vulnerable to new security threats. Hackers have shown it is possible to disable internet-connected vehicles from afar. Automated driving systems and internet connectivity have added cameras and other sensors to vehicles, and can also make them mobile repositories of personal information.

    Raimondo said that the Bureau of Industry and Security, a division of the Commerce Department that handles national security issues related to advanced technology, would explore how sensor-laden, internet-connected vehicles could be used to commit espionage, collect data on US citizens, or commit sabotage on US roads.

    The alarm sounded about Chinese autos adds to a recent history of US government concern about China’s technology ambitions under President Joe Biden and under President Trump before him. Trump imposed sanctions on Chinese telecoms equipment maker Huawei and other 5G companies working on 5G wireless technology and targeted Chinese AI firms with similar controls. The Biden administration has aggressively restricted the flow of advanced chips into China. Concerns over sensitive US data passing back to China has led to a TikTok ban for most federal government devices.

    The move comes as US automakers miss targets for EV sales, and as Chinese automakers such as BYD tout record global sales and build new factories. Many Chinese manufacturers are producing cars, and particularly EVs, more efficiently and profitably than their US counterparts, with billions in assistance from the central government.

    In January, BYD overtook Tesla as the world’s leading manufacturer of EVs, according to figures released by the two companies. Last year, China became the world’s biggest car exporter.

    “China is determined to dominate the future of the auto market, including by using unfair practices,” reads a statement from Biden released by the White House. “China’s policies could flood our market with its vehicles, posing risks to our national security. I’m not going to let that happen on my watch.”

    Rising Power

    China’s automakers are expected to soon begin a direct assault on the US market. Recent news reports suggest that Chinese automakers including BYD, MG, and Chery plan to manufacture their lower-cost electric vehicles in Mexico, enabling them to take advantage of North American trade treaties and evade US tariffs of 27.5 percent on imported Chinese autos.

    The Alliance for American Manufacturing, a trade group, earlier this month called China a “significant” threat to US car manufacturers. It urged US policymakers to “adopt a proactive and evolving strategy to stymie the CCP’s penetration.”

    [ad_2]

    Aarian Marshall, Will Knight

    Source link

  • SIM Swappers Charged Over $400 Million FTX Hack Amid Bankcuptcy Filing

    SIM Swappers Charged Over $400 Million FTX Hack Amid Bankcuptcy Filing

    [ad_1]

    In a court case that happened recently – and whose transcripts were made available today – the identities of those behind the $400 million FTX exploit that took place shortly after the bankruptcy was declared were uncovered.

    However, FTX was not the sole victim of the hacks. According to the court documents, a total of 50 victims were exploited by the SIM-swapping trio consisting of Robert Powell, Carter Rohn, and Emily Hernandez.

    Russian Hypothesis Disproven

    Although FTX is only referred to in the proceedings as “Victim Company-1,” two confidential sources have come forward and stated that the company in question is indeed the failed exchange, according to Bloomberg.

    This information is further supported by security reports from Elliptic and Brian Krebs. Previously, Elliptic believed that the attack had been carried out by cybercriminal groups linked to Russia due to the specific way that the funds were moved. However, it turned out that that was not the case.

    The trio, also known by their noms-de-guerre “R$/ElSwapo1, Em, and Punslayer/Carti, allegedly gained access to the FTX wallets by obtaining the personal information of an employee, including his identification documents.

    Poor Security at Fault

    Using a doctored document bearing all the original information but with Hernandez’s photograph, the defendant was able to convince an AT&T employee in Texas to conduct the SIM swap.

    The FTX employees’ personal number was apparently enough to penetrate FTX’s notoriously Byzantine and/or lax security, as the authentication codes sent to this number allowed for direct access to the exchange’s hot wallets.

    “On or about November 11, 2022 (…), co-conspirators sent to Powell the various authentication codes needed to access Victim Company 1’s online accounts. (…) The co-conspirators gained unauthorized access to online accounts owned by the company. On November 11, and continuing into November 12, co-conspirators transferred over $400 million in virtual currency to wallets controlled by the co-conspirators.”

    At the time, Kraken’s head of cybersecurity claimed to know the identity of the user behind the hack due to attempts to cash the money out via the exchange he works for.

    It’s unclear whether this contributed to the eventual indictment of the SIM swappers, who committed a series of SIM swaps between March 2021 and April 2023, give or take.

    The defendants were indicted by a Washington court of conspiracy to commit wire fraud, aggravated identity theft, and access device fraud.

    An arrest warrant has been submitted in Powell’s name, and all proceeds of the crimes are subject to forfeiture once recovered.

    SPECIAL OFFER (Sponsored)

    Binance Free $100 (Exclusive): Use this link to register and receive $100 free and 10% off fees on Binance Futures first month (terms).



    [ad_2]

    Cristian Lipciuc

    Source link

  • Journalists, lawyers and activists hacked with Pegasus spyware in Jordan, forensic probe finds

    Journalists, lawyers and activists hacked with Pegasus spyware in Jordan, forensic probe finds

    [ad_1]

    Israeli-made Pegasus spyware was used in Jordan to hack the cellphones of at least 30 people, including journalists, lawyers, human rights and political activists, the digital rights group Access Now said Thursday.

    The hacking with spyware made by Israel’s NSO Group occurred from 2019 until last September, Access Now said in its report. It did not accuse Jordan’s government of the hacking.

    One of the targets was Human Rights Watch’s deputy director for the region, Adam Coogle, who said in an interview that it was difficult to imagine who other than Jordan’s government would be interested in hacking those who were targeted.

    The Jordanian government had no immediate comment on Thursday’s report.

    In a 2022 report detailing a much smaller group of Pegasus victims in Jordan, digital sleuths at the University of Toronto’s Citizen Lab identified two operators of the spyware it said may have been agents of the Jordanian government. A year earlier, Axios reported on negotiations between Jordan’s government and NSO Group.

    “We believe this is just the tip of the iceberg when it comes to the use of Pegasus spyware in Jordan, and that the true number of victims is likely much higher,” Access Now said. Its Middle East and North Africa director, Marwa Fatafta, said at least 30 of 35 known targeted individuals were successfully hacked.

    Citizen Lab confirmed all but five of the infections, with 21 victims asking to remain anonymous, citing the risk of reprisal. The rest were identified by Human Rights Watch, Amnesty International’s Security Lab, and the Organized Crime and Corruption Reporting Project.

    NSO Group says it only sells to vetted intelligence and law enforcement agencies — and only for use against terrorists and serious criminals. But cybersecurity researchers who have tracked the spyware’s use in 45 countries have documented dozens of cases of politically motivated abuse of the spyware — from Mexico and Thailand to Poland and Saudi Arabia.

    An NSO Group spokesperson said the company would not confirm or deny its clients’ identities. NSO Group says it vets customers and investigates any report its spyware has been abused.

    The U.S. government was unpersuaded and blacklisted the NSO Group in November 2021, when iPhone maker Apple Inc. sued it, calling its employees “amoral 21st century mercenaries who have created highly sophisticated cyber-surveillance machinery that invites routine and flagrant abuse.”

    Those targeted in Jordan include Human Rights Watch’s senior researcher for Jordan and Syria, Hiba Zayadin. Both she and Coogle had received threat notifications from Apple on Aug. 29 that state-sponsored attackers had attempted to compromise their iPhones.

    Coogle’s local, personal iPhone was successfully hacked in October 2022, he said, just two weeks after the human rights group published a report documenting the persecution and harassment of citizens organizing peaceful political dissent.

    After that, Coogle activated “Lockdown Mode,” on the iPhone, which Apple recommends for users at high risk.

    Human Rights Watch said in a statement Thursday that it had contacted NSO Group about the attacks and specifically asked it to investigate the hack of Coogle’s device “but has received no substantive response to these inquiries.”

    Jordanian human rights lawyer Hala Ahed — known for defending women’s and workers rights and prisoners of conscience — was also targeted at least twice by Pegasus, successfully in March 2021 then unsuccessfully in February 2023, Access Now said.

    About half of those found to have been targeted by Pegasus in Jordan — 16 in all — were journalists or media workers, the report said.

    One veteran Palestinian-American journalist and columnist, Dauod Kuttab, was hacked with Pegasus three times between February 2022 and September 2023.

    Along the way, he said, he’s learned important lessons about not clicking on links in messages purporting to be from legitimate contacts, which is how one of the Pegasus hacks snared him.

    Kuttab refused to speculate about who might have targeted him.

    “I always assume that somebody is listening to my conversations,” he said, as getting surveilled “comes with the territory” when you are journalist in the Middle East.

    But Kuttab does worry about his sources being compromised by hacks — and the violation of his privacy.

    “Regardless of who did it, it’s not right to intervene into my personal, family privacy and my professional privacy.”

    ___

    This story has been corrected to say that Access Now says the hacking occurred from 2019 until last September, not from early 2020 until last November.

    [ad_2]

    Source link

  • Mac Users Beware: Kaspersky Alerts About a Malicious Exploit Targeting Your Crypto Wallets

    Mac Users Beware: Kaspersky Alerts About a Malicious Exploit Targeting Your Crypto Wallets

    [ad_1]

    Apple users have been urged to be vigilant as cybersecurity firm Kaspersky reports a verified macOS exploit targeting the latest operating system version.

    The exploit is designed to deceive Bitcoin and Exodus wallet users into unwittingly downloading a fraudulent version of the software.

    Crypto-Stealing Malware Targets macOS Users

    Kaspersky mentioned that the malware, distributed through pirated applications, is distinctive in its focus on compromising wallet applications. Unlike typical proxy trojans or remote control software, this malware stands out in two ways.

    First, it utilizes DNS records to deliver a malicious Python script. Second, rather than merely stealing crypto wallets, it replaces a wallet application with its infected version. This allows the malware to steal the secret phrase to access cryptocurrency stored in the compromised wallets.

    The malware is tailored to target macOS versions 13.6 and above, irrespective of whether they run on Intel or Apple Silicon devices. Kaspersky emphasizes the unique creativity of the attackers in hiding a Python script within a DNS server’s record, enhancing the malware’s stealth in network traffic.

    Security researcher Sergey Puzan from Kaspersky has advised users with cryptocurrency wallets to exercise extra caution. Kaspersky suggests users take precautions such as updating their computer’s operating system, installing anti-malware software, and downloading apps only from official stores like the Apple App Store to protect digital investments.

    While these measures enhance security, it’s important to note that even hardware wallets are not foolproof. In a separate incident, 16.8 Bitcoin (approximately $587,238) was stolen after a fake Ledger cryptocurrency wallet management app was downloaded from the Microsoft App Store in November.

    Crypto Wallets Under Threat

    Malware targeting crypto wallets continues to pose a threat, with recent incidents highlighting the vulnerability of users and the potential for financial losses. Since November, over $4 million has been stolen through scams and fake airdrops on the Solana network.

    Additionally, hackers linked to North Korea’s Lazarus group reportedly stole over $35 million from users of Atomic Wallet, taking various cryptocurrencies such as USDT, XRP, Cardano, and Dogecoin. Meanwhile, the Kaspersky report has raised concerns, especially for wallet providers like Exodus, Coinbase, and MetaMask, which hackers have targeted in the past.

    Exodus Wallet CEO JP Richardson has emphasized the company’s commitment to customer security, conducting comprehensive code audits to identify and mitigate potential threats. Despite these efforts, Richardson recommends users consider using a hardware wallet for an additional layer of security.

    SPECIAL OFFER (Sponsored)

    Binance Free $100 (Exclusive): Use this link to register and receive $100 free and 10% off fees on Binance Futures first month (terms).



    [ad_2]

    Wayne Jones

    Source link

  • Microsoft says state-backed Russian hackers accessed emails of senior leadership team members

    Microsoft says state-backed Russian hackers accessed emails of senior leadership team members

    [ad_1]

    BOSTON — State-backed Russian hackers broke into Microsoft’s corporate email system and accessed the accounts of members of the company’s leadership team, as well as those of employees on its cybersecurity and legal teams, the company said Friday.

    In a blog post, Microsoft said the intrusion began in late November and was discovered on Jan. 12. It said the same highly skilled Russian hacking team behind the SolarWinds breach was responsible.

    “A very small percentage” of Microsoft corporate accounts were accessed, the company said, and some emails and attached documents were stolen.

    A company spokesperson said Microsoft had no immediate comment on which or how many members of its senior leadership had their email accounts breached. In a regulatory filing Friday, Microsoft said it was able to remove the hackers’ access from the compromised accounts on or about Jan. 13.

    “We are in the process of notifying employees whose email was accessed,” Microsoft said, adding that its investigation indicates the hackers were initially targeting email accounts for information related to their activities.

    The Microsoft disclosure comes a month after a new U.S. Securities and Exchange Commission rule took effect that compels publicly traded companies to disclose breaches that could negatively impact their business. It gives them four days to do so unless they obtain a national-security waiver.

    In Friday’s SEC regulatory filing, Microsoft said that “as of the date of this filing, the incident has not had a material impact” on its operations. It added that it has not, however, “determined whether the incident is reasonably likely to materially impact” its finances.

    Microsoft, which is based in Redmond, Washington, said the hackers from Russia’s SVR foreign intelligence agency were able to gain access by compromising credentials on a “legacy” test account, suggesting it had outdated code. After gaining a foothold, they used the account’s permissions to access the accounts of the senior leadership team and others. The brute-force attack technique used by the hackers is called “password spraying.”

    The threat actor uses a single common password to try to log into multiple accounts. In an August blog post, Microsoft described how its threat-intelligence team discovered that the same Russian hacking team had used the technique to try to steal credentials from at least 40 different global organizations through Microsoft Teams chats.

    “The attack was not the result of a vulnerability in Microsoft products or services,” the company said in the blog. “To date, there is no evidence that the threat actor had any access to customer environments, production systems, source code, or AI systems. We will notify customers if any action is required.”

    Microsoft calls the hacking unit Midnight Blizzard. Prior to revamping its threat-actor nomenclature last year, it called the group Nobelium. The cybersecurity firm Mandiant, owned by Google, calls the group Cozy Bear.

    In a 2021 blog post, Microsoft called the SolarWinds hacking campaign “the most sophisticated nation-state attack in history.” In addition to U.S. government agencies, including the departments of Justice and Treasury, more than 100 private companies and think tanks were compromised, including software and telecommunications providers.

    The main focus of the SVR is intelligence-gathering. It primarily targets governments, diplomats, think tanks and IT service providers in the U.S. and Europe.

    [ad_2]

    Source link

  • Microsoft says state-backed Russian hackers accessed emails of senior leadership team members

    Microsoft says state-backed Russian hackers accessed emails of senior leadership team members

    [ad_1]

    BOSTON — State-backed Russian hackers broke into Microsoft’s corporate email system and accessed the accounts of members of the company’s leadership team, as well as those of employees on its cybersecurity and legal teams, the company said Friday.

    In a blog post, Microsoft said the intrusion began in late November and was discovered on Jan. 12. It said the same highly skilled Russian hacking team behind the SolarWinds breach was responsible.

    “A very small percentage” of Microsoft corporate accounts were accessed, the company said, and some emails and attached documents were stolen.

    A company spokesperson said Microsoft had no immediate comment on which or how many members of its senior leadership had their email accounts breached. In a regulatory filing Friday, Microsoft said it was able to remove the hackers’ access from the compromised accounts on or about Jan. 13.

    “We are in the process of notifying employees whose email was accessed,” Microsoft said, adding that its investigation indicates the hackers were initially targeting email accounts for information related to their activities.

    The Microsoft disclosure comes a month after a new U.S. Securities and Exchange Commission rule took effect that compels publicly traded companies to disclose breaches that could negatively impact their business. It gives them four days to do so unless they obtain a national-security waiver.

    In Friday’s SEC regulatory filing, Microsoft said that “as of the date of this filing, the incident has not had a material impact” on its operations. It added that it has not, however, “determined whether the incident is reasonably likely to materially impact” its finances.

    Microsoft, which is based in Redmond, Washington, said the hackers from Russia’s SVR foreign intelligence agency were able to gain access by compromising credentials on a “legacy” test account, suggesting it had outdated code. After gaining a foothold, they used the account’s permissions to access the accounts of the senior leadership team and others. The brute-force attack technique used by the hackers is called “password spraying.”

    The threat actor uses a single common password to try to log into multiple accounts. In an August blog post, Microsoft described how its threat-intelligence team discovered that the same Russian hacking team had used the technique to try to steal credentials from at least 40 different global organizations through Microsoft Teams chats.

    “The attack was not the result of a vulnerability in Microsoft products or services,” the company said in the blog. “To date, there is no evidence that the threat actor had any access to customer environments, production systems, source code, or AI systems. We will notify customers if any action is required.”

    Microsoft calls the hacking unit Midnight Blizzard. Prior to revamping its threat-actor nomenclature last year, it called the group Nobelium. The cybersecurity firm Mandiant, owned by Google, calls the group Cozy Bear.

    In a 2021 blog post, Microsoft called the SolarWinds hacking campaign “the most sophisticated nation-state attack in history.” In addition to U.S. government agencies, including the departments of Justice and Treasury, more than 100 private companies and think tanks were compromised, including software and telecommunications providers.

    The main focus of the SVR is intelligence-gathering. It primarily targets governments, diplomats, think tanks and IT service providers in the U.S. and Europe.

    [ad_2]

    Source link

  • Microsoft executive emails hacked by Russian intelligence group, company says

    Microsoft executive emails hacked by Russian intelligence group, company says

    [ad_1]

    Satya Nadella, CEO of Microsoft.

    CNBC

    Microsoft said in a Friday regulatory filing that a Russian intelligence group accessed some of the software maker’s top executives’ email accounts. Nobelium, the same group that breached government supplier SolarWinds in 2020, carried out the attack, which Microsoft detected last week, according to the company.

    It isn’t the first time Russian hackers have gained entry into Microsoft’s systems. State-sponsored attacks that can result in the dissemination of sensitive data becomes a greater risk during periods of armed conflict, and Russia’s war against Ukraine has been going on for almost two years now. On Thursday, Russia said Ukrainian forces conducted drone strikes in multiple Russian locations.

    Microsoft’s announcement comes after new U.S. requirements for disclosing cybersecurity incidents went into effect. A Microsoft spokesperson said that while the company does not believe the attack had a material effect, it still wanted to honor the spirit of the rules.

    The Cybersecurity and Infrastructure Security Agency is “closely coordinating with Microsoft to gain additional insights into this incident and understand impacts so we can help protect other potential victims,” CISA executive assistant director for cybersecurity Eric Goldstein said in a statement to CNBC. “As noted in Microsoft’s announcement, at this time we are not aware of impacts to Microsoft customer environments or products.” 

    In late November, the group accessed “a legacy non-production test tenant account,” Microsoft’s Security Response Center wrote in the blog post. After gaining access, the group “then used the account’s permissions to access a very small percentage of Microsoft corporate email accounts, including members of our senior leadership team and employees in our cybersecurity, legal, and other functions, and exfiltrated some emails and attached documents,” the corporate unit wrote.

    The company’s senior leadership team, including Chief Financial Offer Amy Hood and President Brad Smith, regularly meets with CEO Satya Nadella.

    Microsoft said it has not found signs that Nobelium had accessed customer data, production systems or proprietary source code.

    The U.S. government and Microsoft consider Nobelium to be part of the Russian foreign intelligence service SVR. The hacking group was responsible for one of the most prolific breaches in U.S. history when it added malicious code to updates to SolarWinds’ Orion software, which some U.S. government agencies were using. Microsoft itself was ensnared in the hack.

    Nobelium, also known as APT29 or Cozy Bear, is a sophisticated hacking group that has attempted to breach the systems of U.S. allies and the Department of Defense. Microsoft also uses the name Midnight Blizzard to identify Nobelium.

    It was also implicated alongside another Russian hacking group in the 2016 breach of the Democratic National Committee’s systems.

    Last year, a vulnerability in Microsoft software allowed China-aligned hackers to access the email accounts of senior government officials, including Commerce Secretary Gina Raimondo, ahead of a critical U.S.-China meeting. The company’s “negligent cybersecurity practices” led to the attack, Sen. Ron Wyden, a Democrat from Oregon, wrote in a letter to CISA director Jen Easterly, and other federal officials.

    “We are continuing our investigation and will take additional actions based on the outcomes of this investigation and will continue working with law enforcement and appropriate regulators,” the Microsoft blog post said.

    The Federal Bureau of Investigation told CNBC that it knows about the attack and is working with federal partners to help.

    Don’t miss these stories from CNBC PRO:

    [ad_2]

    Source link

  • Russian hacking group accessed Microsoft executive emails, company says

    Russian hacking group accessed Microsoft executive emails, company says

    [ad_1]

    Microsoft Corp. said Friday a Russian hacking group illegally gained access to some of its top executives’ email accounts.

    In a regulatory filing, the software giant
    MSFT,
    +1.22%

    said a group called Nobelium was responsible for the attack.

    In late November, the group accessed “a legacy non-production test tenant account and [gained] a foothold, and then used the account’s permissions to access a very small percentage of Microsoft corporate email accounts, including members of our senior leadership team and employees in our cybersecurity, legal, and other functions, and exfiltrated some emails and attached documents,” Microsoft’s Security Response Center wrote in a blog post.

    Microsoft’s senior leadership team, which includes Chief Financial Officer Amy Hood and President Brad Smith, routinely meets with Chief Executive Satya Nadella.

    The company reported that there were no signs Nobelium had obtained customer data, production systems or proprietary source code.

    A Microsoft spokesperson provided this comment late Friday: “Our security team recently detected an attack on our corporate systems attributed to the Russian state-sponsored actor Midnight Blizzard. We immediately activated our response process to investigate, disrupt malicious activity, mitigate the attack, and deny the threat actor further access. The attack was not the result of a vulnerability in Microsoft products or services. To date, there is no evidence that the threat actor had any access to customer environments, production systems, source code, or AI systems. More information is available in our blog.”

    Nobelium, also known as APT29 or Cozy Bear, is a shadowy hacking group that attempted to crack the systems of the U.S. Defense Department and did breach the Democratic National Committee’s systems in 2016.

    Netskope Threat Labs, which tracks Nobelium, said the hacking group uses a variety of techniques to compromise accounts, including compromised Azure AD accounts to collect victim emails. “This hack underscores the importance of securing corporate email accounts, even those in non-production and test environments,” a Netskope spokesperson said. “Even if the email account isn’t regularly used or doesn’t contain anything sensitive, it can still be used to launch additional attacks.”

    Microsoft’s disclosure comes amid new U.S. requirements to report cybersecurity incidents.

    [ad_2]

    Source link

  • China and cybercriminals are targeting American AI companies, FBI Director Wray says

    China and cybercriminals are targeting American AI companies, FBI Director Wray says

    [ad_1]

    FBI Director Christopher Wray testifies during a Senate Homeland Security and Government Affairs Committee hearing on Capitol Hill in Washington, DC, on October 31, 2023.

    Mandel Ngan | Afp | Getty Images

    American companies like Google, Microsoft, and OpenAI are currently driving the cutting edge of generative artificial intelligence development across the globe. However two of U.S.’s top national security leaders said that AI lead is under attack from foreign cybercriminals and nation-states like China.

    “Eighteen of the 20 most successful AI companies in the world are American,” FBI Director Christopher Wray told CNBC’s Morgan Brennan during a CNBC CEO Council virtual roundtable on Tuesday. “You can bet your bottom dollar that foreign adversaries, especially the Chinese, are actively targeting that innovation, that intellectual property.”

    Wray, who was joined at the virtual roundtable by General Paul Nakasone, commander of U.S. Cyber Command, said that generative AI is a “significant amplifier, both in terms of quantity and sophistication, of the threats that are already out there,” adding that AI tools are helping criminals “make their attacks more sophisticated, more credible, more pernicious.”

    “Generative AI, in the world of cyberattacks, is what I would describe as taking kind of junior varsity athletes and making them varsity,” Wray said. “But we are rapidly approaching a stage where the varsity adversaries are going to be able to find enough value from generative AI to take their game to the next level.”

    But while much of the discussion around AI in the cybersecurity space has centered on how AI is enhancing both attackers and defenders, Wray said the FBI is also focused on “defending American AI [research and development], American innovation in AI.”

    Nakasone, who also serves as the director of the National Security Agency and chief of the Central Security Service, said adversaries of the U.S. are using AI capabilities developed by American companies, making protecting that intellectual property crucial.

    “That tells me we have the lead in artificial intelligence; we want to maintain that lead,” Nakasone said. “This is our future; this is where we’re going to have a marked impact in terms of our economy, our national security, and other things.”

    The FBI and the U.S. Cyber Command, a command in the Department of Defense focused on cyberspace, are working closely on operations against a variety of adversaries, whether that’s nation-states like China, Russia, Iran, or North Korea, as well as criminal groups and other foreign actors.

    AI is set to play a key role in that defense, Nakasone said. In September 2023, the National Security Agency created a new entity called the AI Security Center to oversee the development and integration of AI capabilities within U.S. national security systems.

    “We knew that we had to be able to do this, in terms of being able to provide insights to understand what tradecraft or what techniques [adversaries] are going to try to steal your intellectual property,” said Nakasone, adding that similar efforts across cybersecurity have been successful.

    Both Nakasone and Wray stressed that as attackers and adversaries utilize these AI tools more, the best defense will be formed through partnerships, whether that is between government agencies like their own, the public and private sectors, and allies across the globe.

    “That kind of partnership will beat what the Chinese bring to the table every day of the week,” Wray said.

    [ad_2]

    Source link

  • Crypto Hacking Losses Dropped by 51% in 2023, Here's the Total: CertiK

    Crypto Hacking Losses Dropped by 51% in 2023, Here's the Total: CertiK

    [ad_1]

    CertiK’s latest report reveals a noteworthy decline in cryptocurrency security incidents in 2023.

    Total losses came down to $1.84 billion across 751 events, marking a 51% decrease from 2022. Moreover. each incident averaged $2.45 million in losses, with the top ten contributing $1.11 billion. Interestingly, the blockchain security firm found that the median loss per incident was a mere $101,132.

    November claimed the highest amount lost at $363,367,327 from 45 incidents, while Q3 dominated with $686,558,472 losses from 183 hacks, scams, and exploits.

    Private Key: Not So Private

    Private key compromises accounted for nearly 50% of total losses, amounting to $880 million. CertiK’s report found that these numbers stemmed from just 47 incidents, representing only 6.3% of total security incidents throughout the year, yet over half of the losses.

    Notably, six of the ten most costly security incidents throughout 2023 were due to private key compromises.

    The compromise of Multichain in July caused a loss of $125 million. Despite asserting decentralization, it was disclosed that Multichain’s CEO had exclusive control over its multi-party computation servers and private keys. The vulnerability came to light with the CEO’s arrest, rendering $1.5 billion in Total Value Locked (TVL) on the Multichain bridge inaccessible to users.

    As such, CertiK has informed users to implement certain private key management practices, which include:

    • Employing multi-signature wallets to distribute control, reducing the risk of single-point failures.
    • Opting for hardware wallets for secure key storage, preventing exposure in plain text.
    • Storing private key backups offline in secure locations like safety deposit boxes.
    • Defining strict access policies to limit key access to authorized personnel only.
    • Safeguarding private keys with strong encryption in secure formats.
    • Regularly audit and monitor key use to detect unauthorized access.
    • Utilizing cold wallets for extended private key storage, minimizing online threats.
    • Educating relevant staff on key management best practices, emphasizing security and confidentiality.
    • Considering Multi-Party Computation (MPC) for secure key sharing without exposing the entire key to one party.
    • Leveraging professional key management services, especially for enterprise-level operations, to ensure compliance with industry standards.

    Other Highlights

    Meanwhile, Ethereum emerged as the leader in losses, as per CertiK’s findings in terms of blockchains. The report indicates that Ethereum experienced losses totaling $686 million, spanning 224 incidents, averaging around $3 million per occurrence.

    In contrast, BNB Chain, despite encountering 387 security incidents, reported significantly lower losses at $134 million, highlighting a notable contrast with Ethereum’s figures. Moreover, the challenge of cross-chain interoperability continues to be a significant concern within the crypto industry. The blockchain security firm observed that security breaches impacting multiple blockchains resulted in losses of $799 million.

    SPECIAL OFFER (Sponsored)

    Binance Free $100 (Exclusive): Use this link to register and receive $100 free and 10% off fees on Binance Futures first month (terms).

    [ad_2]

    Chayanika Deka

    Source link

  • Radiant Capital Flash Loan Attack Leads to $4.5 Million Loss

    Radiant Capital Flash Loan Attack Leads to $4.5 Million Loss

    [ad_1]

    Cross-chain lending protocol Radiant Capital has suffered a hack resulting in the loss of 1,900 ETH, equivalent to approximately $4.5 million, according to blockchain security and analytics firm PeckShield Inc.

    Radiant Capital operates as a decentralized borrowing and lending protocol featuring cross-chain functionality built using LayerZero technology. As of the latest data from DefiLlama, the protocol has around $315 million in total value locked.

    Radiant Capital Investigates Flash Loan Attack

    PeckShield explained the Radiant Capital incident as the hacker exploiting a time window just six seconds after the activation of a new USDC market in the lending system.

    The attacker capitalized on a “rounding issue” in the codebase, leading to cumulative precision errors. This loophole allowed them to profit through repeated deposit and withdrawal operations, as stated in a post on X.

    Radiant Capital, addressing the issue on X, mentioned that the Radiant DAO Council has temporarily suspended lending and borrowing markets on Arbitrum.

    The protocol has acknowledged that the incident is a result of an “issue with the newly created native USDC market on Arbitrum.” It assures users that a postmortem report will be published once the problem is resolved.

    The Radiant Capital post emphasized that current funds were not at risk and assured users that operations would return to normalcy after the investigation concluded.

    However, amidst this situation, fake Radiant Capital accounts on X have been rampant, disseminating phishing links under the guise of aiding users in revoking approvals, creating additional challenges in managing the aftermath of the security breach.

    Flash Loan Attacks Become Rampant

    Flash loan attacks continue to pose security challenges in various blockchain ecosystems. On October 12, 2023, DeFi Protocol Platypus Finance suffered a flash loan attack that led to a loss of more than $2 million.

    CertiK’s subsequent investigation into the incident revealed that two malicious entities stole approximately $1.3 million worth of wrapped AVAX (WAVAX) and around $913,000 in liquid-staked AVAX (sAVAX). The perpetrators specifically targeted the AVAX-sAVAX liquidity pool.

    In the BNB Chain, on October 11, 2023, an attacker utilizing a Miner Extractable Value (MEV) bot executed a significant arbitrage profit amounting to $1.575 million. Earlier, in June of the same year, a decentralized finance (DeFi) protocol named Sturdy Finance experienced multiple hacks, resulting in the loss of 442 ETH worth $800,000.

    SPECIAL OFFER (Sponsored)

    Binance Free $100 (Exclusive): Use this link to register and receive $100 free and 10% off fees on Binance Futures first month (terms).

    [ad_2]

    Wayne Jones

    Source link

  • States and Congress wrestle with cybersecurity at water utilities amid renewed federal warnings

    States and Congress wrestle with cybersecurity at water utilities amid renewed federal warnings

    [ad_1]

    HARRISBURG, Pa. — The tiny Aliquippa water authority in western Pennsylvania was perhaps the least-suspecting victim of an international cyberattack.

    It had never had outside help in protecting its systems from a cyberattack, either at its existing plant that dates to the 1930s or the new $18.5 million one it is building.

    Then it — along with several other water utilities — was struck by what federal authorities say are Iranian-backed hackers targeting a piece of equipment specifically because it was Israeli-made.

    “If you told me to list 10 things that would go wrong with our water authority, this would not be on the list,” said Matthew Mottes, the chairman of the authority that handles water and wastewater for about 22,000 people in the woodsy exurbs around a one-time steel town outside Pittsburgh.

    The hacking of the Municipal Water Authority of Aliquippa is prompting new warnings from U.S. security officials at a time when states and the federal government are wrestling with how to harden water utilities against cyberattacks.

    The danger, officials say, is hackers gaining control of automated equipment to shut down pumps that supply drinking water or contaminate drinking water by reprogramming automated chemical treatments. Besides Iran, other potentially hostile geopolitical rivals, including China, are viewed by U.S. officials as a threat.

    A number of states have sought to step up scrutiny, although water authority advocates say the money and the expertise are what is really lacking for a sector of more than 50,000 water utilities, most of which are local authorities that, like Aliquippa’s, serve corners of the country where residents are of modest means and cybersecurity professionals are scarce.

    Besides, utilities say, it’s difficult to invest in cybersecurity when upkeep of pipes and other water infrastructure is already underfunded, and some cybersecurity measures have been pushed by private water companies, sparking pushback from public authorities that it is being used as a back door to privatization.

    Efforts took on new urgency in 2021 when the federal government’s leading cybersecurity agency reported five attacks on water authorities over two years, four of them ransomware and a fifth by a former employee.

    At the Aliquippa authority, Iranian hackers shut down a remotely controlled device that monitors and regulates water pressure at a pumping station. Customers weren’t affected because crews alerted by an alarm quickly switched to manual operation — but not every water authority has a built-in manual backup system.

    With inaction in Congress, a handful of states passed legislation to step up scrutiny of cybersecurity, including New Jersey and Tennessee. Before 2021, Indiana and Missouri had passed similar laws. A 2021 California law commissioned state security agencies to develop outreach and funding plans to improve cybersecurity in the agriculture and water sectors.

    Legislation died in several states, including Pennsylvania and Maryland, where public water authorities fought bills backed by private water companies.

    Private water companies say the bills would force their public counterparts to abide by the stricter regulatory standards that private companies face from utility commissions and, as a result, boost public confidence in the safety of tap water.

    “It’s protecting the nation’s tap water,” said Jennifer Kocher, a spokesperson for the National Association of Water Companies. “It is the most economical choice for most families, but it also has a lack of confidence from a lot of people who think they can drink it and every time there’s one of these issues it undercuts the confidence in water and it undercuts people’s willingness and trust in drinking it.”

    Opponents said the legislation is designed to foist burdensome costs onto public authorities and encourage their boards and ratepayers to sell out to private companies that can persuade state utility commissions to raise rates to cover the costs.

    “This is a privatization bill,” Justin Fiore of the Maryland Municipal League told Maryland lawmakers during a hearing last spring. “They’re seeking to take public water companies, privatize them by expanding the burden, cutting out public funding.”

    For many authorities, the demands of cybersecurity tend to fade into the background of more pressing needs for residents wary of rate increases: aging pipes and increasing costs to comply with clean water regulations.

    One critic, Pennsylvania state Sen. Katie Muth, a Democrat from suburban Philadelphia’s Montgomery County, criticized a GOP-penned bill for lacking funding.

    “People are drinking water that is below standards, but selling out to corporations who are going to raise rates on families across our state who cannot afford it is not a solution,” Muth told colleagues during floor debate on a 2022 bill.

    Pennsylvania state Rep. Rob Matzie, a Democrat whose district includes the Aliquippa water authority, is working on legislation to create a funding stream to help water and electric utilities pay for cybersecurity upgrades after he looked for an existing funding source and found none.

    “The Aliquippa water and sewer authority? They don’t have the money,” Matzie said in an interview.

    In March, the U.S. Environmental Protection Agency proposed a new rule to require states to audit the cybersecurity of water systems.

    It was short-lived.

    Three states — Arkansas, Missouri and Iowa — sued, accusing the agency of overstepping its authority and a federal appeals court promptly suspended the rule. The EPA withdrew the rule in October, although a deputy national security adviser, Anne Neuberger, told The Associated Press that it could have “identified vulnerabilities that were targeted in recent weeks.”

    Two groups that represent public water authorities, the American Water Works Association and the National Rural Water Association, opposed the EPA rule and now are backing bills in Congress to address the issue in different ways.

    One bill would roll out a tiered approach to regulation: more requirements for bigger or more complex water utilities. The other is an amendment to Farm Bill legislation to send federal employees called “circuit riders” into the field to help smaller and rural water systems detect cybersecurity weaknesses and address them.

    If Congress does nothing, 6-year-old Safe Drinking Water Act standards will still be in place — a largely voluntary regime that both the EPA and cybersecurity analysts say has yielded minimal progress.

    Meanwhile, states are in the midst of applying for grants from a $1 billion federal cybersecurity program, money from the 2021 federal infrastructure law.

    But water utilities will have to compete for the money with other utilities, hospitals, police departments, courts, schools, local governments and others.

    Robert M. Lee, CEO of Dragos Inc., which specializes in cybersecurity for industrial-control systems, said the Aliquippa water authority’s story — that it had no cybersecurity help — is common.

    “That story is tens of thousands of utilities across the country,” Lee said.

    Because of that, Dragos has begun offering free access to its online support and software that helps detect vulnerabilities and threats for water and electric utilities that draw under $100 million in revenue.

    After Russia attacked Ukraine in 2022, Dragos tested the idea by rolling out software, hardware and installation at a cost of a couple million bucks for 30 utilities.

    “It was amazing, the feedback,” Lee said. “You wonder, ‘Hey I think I can move the needle in this way’ … and those 30 were like, ‘Holy crap, no one’s ever paid attention to us. No one’s ever tried to get us help.’”

    ___

    Follow Marc Levy at www.twitter.com/timelywriter.

    [ad_2]

    Source link

  • Pink Drainer Hackers Drain $4.4 Million in LINK

    Pink Drainer Hackers Drain $4.4 Million in LINK

    [ad_1]

    The infamous crypto-hacking group Pink Drainer has been implicated in a highly sophisticated phishing scam that led to a loss of $4.4 million worth of Chainlink (LINK) tokens.

    This recent cyber heist targeted a single victim who fell prey to a deceptive tactic that led to the signing of a transaction linked to the ‘Increase Approval’ function.

    Pink Drainer Exploits ‘Increase Approval’ Function

    The ‘Increase Approval’ function is a standard procedure in the crypto world, allowing users to set limits on the number of tokens accessible for transfer by another wallet.

    Without the victim’s knowledge, this action enabled the unauthorized transfer of 275,700 LINK tokens in two distinct transactions.

    Details from Scam Sniffer, a crypto-security platform, revealed that the tokens were drained in two separate transfers.

    Initially, 68,925 LINK tokens were diverted to a wallet tagged by Etherscan as “PinkDrainer: Wallet 2.” The remainder, amounting to 206,775 LINK, was sent to a different address ending with “E70e.”

    ZachXBT, a renowned crypto detective, has also disclosed that the stolen funds were quickly converted into Ethereum (ETH) and laundered through the eXch service, complicating the traceability of the assets.

    “The stolen funds were sold for ETH and are currently being laundered through eXch,” he stated.

    $4.4 Million Chainlink Heist Linked to Pink Drainer

    Scam Sniffer’s investigation confirms the involvement of the Pink Drainer group in this heist, although the exact method used to coerce the victim into authorizing the token transfer remains unclear.

    Scam Sniffer has also identified at least 10 new scam sites connected to Pink Drainer in the last 24 hours alone.

    The Pink Drainer syndicate, notorious for its high-profile attacks on platforms such as Twitter and Discord, has been linked to incidents involving Evomos, Pika Protocol, and Orbiter Finance.

    Earlier this year, they were also implicated in a scam posing as crypto journalists, leading to the theft of approximately $3 million from over 1,932 victims.

    The latest data from Dune Analytics indicates an escalation in Pink Drainer’s activities, with total losses amounting to $18.7 million, affecting 9,068 victims as of December 19.

    SPECIAL OFFER (Sponsored)

    Binance Free $100 (Exclusive): Use this link to register and receive $100 free and 10% off fees on Binance Futures first month (terms).

    [ad_2]

    Wayne Jones

    Source link

  • Here’s Why Telcoin (TEL) Crashed 40% on Christmas Day

    Here’s Why Telcoin (TEL) Crashed 40% on Christmas Day

    [ad_1]

    The crypto remittance mobile application Telcoin has suffered an exploit that led to the loss of approximately $1.3 million in digital assets.

    According to an X update from the Telcoin team, the security attack affected wallets that have never initiated transactions on the platform.

    Telcoin Loses $1.3M in Security Exploit

    The Telcoin team announced they were aware of the situation late Monday and temporarily froze the app to resolve the issue.

    “We are aware of the situation with the Telcoin App. We have temporarily frozen use of the app while we look into the issue, and will provide an update as soon as we can,” the Telcoin team said.

    During the investigation, the team found that the issue was with the proxy implementation of the wallet on Polygon and not with the Telcoin app itself. A fix has been employed to prevent further exploitation.

    No private keys, backend systems, and user data were breached through the exploit. The project’s team intends to restore affected users’ assets to previous balances before turning the app service back on.

    “We will provide another update soon and appreciate everyone’s patience and support. The Telcoin team is grateful for assistance from the blockchain security community, and will be thanking them publicly once we complete our investigation,” the team explained.

    TEL Slumps 40%

    On-chain data shows the stolen assets include 37 Ether (ETH) and over 1.3 million Polygon (MATIC) worth $85,000 and $1.19 million, respectively. While the Telcoin team has yet to reveal the details of the exploit, blockchain security firm PeckShield disclosed the losses amounted to approximately $1.3 million.

    Following the Telcoin exploit, TEL, the native app of the platform, suddenly plunged by 40% from $0.0023 to $0.00079. At the time of writing, the token had recovered slightly and was trading around $0.0015, per data from CoinMarketCap.

    Telcoin has joined the list of crypto platforms to be exploited in December. The platform’s attack comes less than two weeks after the decentralized exchange OKX was hacked through the theft of credentials needed to access wallets where funds are kept until transactions are completed. Although the attack was stopped before severe damage was done, the hacker successfully made away with $424,000 in different cryptocurrencies.

    SPECIAL OFFER (Sponsored)

    Binance Free $100 (Exclusive): Use this link to register and receive $100 free and 10% off fees on Binance Futures first month (terms).

    [ad_2]

    Mandy Williams

    Source link