A mental health startup built its business on easy-to-use technology. Patients joined in droves. Then came a catastrophic data breach.
Category: cybercrime/malcode – Page 131
Lauded for years as the system able to best prevent malware infection, macOS recently fell victim to an operating system vulnerability that hackers used to circumvent all of Apple’s system defenses.
Security researcher Cedric Owens discovered this bug in March 2021 while assessing Apple’s Gatekeeper mechanism, a safeguard that will only allow developers to run their software on Macs after registering with Apple and paying a fee. Moreover, the company requires that all applications undergo an automated vetting process to further protect against malicious software.
Unfortunately, Owens uncovered a logic flaw in the macOS itself, rather than the defense systems. The bug allowed attackers to develop malware able to deceive the operating system into running their malware regardless of whether they passed Apple’s safety checks. Indeed, this flaw resembles a door that has been securely locked and bolted but still has a small pet door at the bottom through which you can break in or insert a bomb.
GPS is a world-changing technology. It’s also incredibly fragile, easily spoofable, and consistently hackable. That’s why the U.S. Navy and Marine Corps are looking to the stars for a navigational Plan B.
Deleting another spam email in our inbox is becoming an everyday habit. Some may have even had their accounts hacked after clicking a misleading link or had their identities stolen. These are some common cybercrimes and as our reliance on the internet grows, our interactions with cybercrimes becomes more frequent.
According to a recent FBI report on internet crime, 241342 Americans fell victim to phishing, vishing (via call) and smishing (via text) attacks last year, making it the most common type of cybercrime.
This chart shows the most common types of internet crimes in the U.S. in 2020.
Advances in machine learning have made it possible to automate a growing array of coding tasks, from auto-completing segments of code and fine tuning algorithms… See More.
Programs such as GPT-3 can compose convincing text. Some people are using the tool to automate software development and hunt for bugs.
Rees explained how his astronomy background meshes with his concern for humanity’s fate:
People often ask does being an astronomer have any effect on one’s attitude toward these things. I think it does in a way, because it makes us aware of the long-range future. We’re aware that it’s taken about 4 billion years for life to evolve from simple beginnings to our biosphere of which we are a part, but we also know that the sun is less than halfway through its life and the universe may go on forever. So we are not the culmination of evolution. Post-humans are going to have far longer to evolve. We can’t conceive what they’d be like, but if life is a rarity in the universe, then, of course, the stakes are very high if we snuff things out this century.
Bottom line: From nuclear weapons to biowarfare to cyberattacks, humanity has much to overcome. Martin Rees and Frederick Lamb discuss the obstacles we face as we look forward to humanity’s future on Earth.
Attackers are exploiting the ProxyLogon Microsoft Exchange Server flaws to co-opt vulnerable machines to a cryptocurrency botnet named Prometei, according to new research.
“Prometei exploits the recently disclosed Microsoft Exchange vulnerabilities associated with the HAFNIUM attacks to penetrate the network for malware deployment, credential harvesting and more,” Boston-based cybersecurity firm Cybereason said in an analysis summarizing its findings.
First documented by Cisco Talos in July 2020, Prometei is a multi-modular botnet, with the actor behind the operation employing a wide range of specially-crafted tools and known exploits such as EternalBlue and BlueKeep to harvest credentials, laterally propagate across the network and “increase the amount of systems participating in its Monero-mining pool.”
On an incident response engagement, CISA found that cybercriminals exploited VPN flaws to acquire access and deploy Supernova malware on SolarWinds.
An unprecedented event occurred a few hours ago when, by mistake, thousands of users received an email from Twitter requesting users to confirm their accounts, giving the impression of being a massive phishing attack. This incident, which began around 10:00 PM on Thursday, impacted individual and business accounts alike.
The subject line of these messages only mentioned the phrase “Confirm your Twitter account”, and included a button to complete the action. While these messages seemed legitimate, the cybersecurity community soon began to question their provenance and intentions, as this clearly seemed like a simple but effective phishing attack.
During the minutes following the sending of this message, users began posting their doubts on Twitter and other social media platforms.
A new phishing campaign targets specific targets by trying to distribute various remote access Trojan (RAT) variants. According to Cisco Talos Intelligence researchers, this hacking campaign was identified as “Fajan” and could be being operated from an Arabic-speaking country.
Experts believe this campaign would have started in early March, starting with a commitment to “low-profile” targets to determine whether malware samples were properly distributed or some debugging process was needed.
Attacks begin in the form of emails specifically addressed to Bloomberg Industry Group customers. This company adds news content on platforms for various industries, such as law, taxes and accounting, and government, and sells them to its various customers.