Toggle light / dark theme

23andMe agrees to $30m settlement over data breach targeting Jewish and Chinese users

Genetic testing company settles with plaintiffs over breach that was revealed when hacker published link to database labeled ‘ashkenazi DNA Data of Celebrities’

The breach, which occurred last October, affected more than 6.9 million customers and included users’ personal details such as their location, name and birthdate, as well as some information about their family trees. That data was shared on BreachForums, an online forum used by cybercriminals.

According to court documents, the data breach was revealed October 6 after a hacker going by the pseudonym Golem, a reference to the Jewish mythical defender made of clay, published a link to a database labeled ashkenazi DNA Data of Celebrities. According to the lawsuit, the hacker referred to the list as the most valuable data you’ll ever see, though most of the names were not famous.

GitHub, Telegram Bots, and ASCII QR Codes Abused in New Wave of Phishing Attacks

“This makes the scam much harder to spot, as the information provided is personally relevant to the victims, arrives via the expected communication channel, and the linked, fake websites look as expected.”

What’s more, the diversification of the victimology footprint has been complemented by improvements to the toolkit that allow the scammer groups to speed up the scam process using automated phishing page generation, improve communication with targets via interactive chatbots, protecting phishing websites against disruption by competitors, and other goals.

Telekopye’s operations have not been without their fair share of hiccups. In December 2023, law enforcement officials from Czechia and Ukraine announced the arrest of several cybercriminals who are alleged to have used the malicious Telegram bot.

OpenAI confirms threat actors use ChatGPT to write malware

O.o!!!!


OpenAI has disrupted over 20 malicious cyber operations abusing its AI-powered chatbot, ChatGPT, for debugging and developing malware, spreading misinformation, evading detection, and conducting spear-phishing attacks.

The report, which focuses on operations since the beginning of the year, constitutes the first official confirmation that generative mainstream AI tools are used to enhance offensive cyber operations.

The first signs of such activity were reported by Proofpoint in April, who suspected TA547 (aka “Scully Spider”) of deploying an AI-written PowerShell loader for their final payload, Rhadamanthys info-stealer.

/* */