CrypLogger.com
  • Home
  • Exclusive
  • Learn About Coins
  • Artificial Intelligence
  • Special Projects
  • News
  • Opinions
  • Current Prices
No Result
View All Result
  • Home
  • Exclusive
  • Learn About Coins
  • Artificial Intelligence
  • Special Projects
  • News
  • Opinions
  • Current Prices
No Result
View All Result
CrypLogger
No Result
View All Result
Home News

Android fingerprint brute force, Meta record fine and other cybersecurity events

by Vaibhav
May 29, 2023
in News
0
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter

Cybersec_Digest_3

We have collected the most important news from the world of cybersecurity for the week.

  • Meta has been fined $1.3 billion in the EU for sending user data to the US.
  • Experts have discovered a way to hack Android through fingerprints.
  • Phishing service Inferno Drainer stole more than $5.9 million in cryptocurrencies.
  • US government contractor attacked by ransomware.

Meta fined $1.3 billion in the EU for sending user data to the US

The Data Protection Commission of Ireland imposed on the local branch of the Meta Corporation record fine in the amount of $1.3 billion for a breach of confidentiality.

The agency found that the company is transferring data from platform users from the EU to the US, where data protection rules vary in each state, and thus does not guarantee their security.

The Irish regulator, which is the lead privacy regulator in a block of 27 countries, launched an investigation back in August 2020.

Now Meta is obliged to stop transferring user data to the United States, bring it into line with GDPR and within six months, delete all illegally stored and processed information.

Corporation representatives called imposed a fine unfair and intend to appeal the decision of the authorities.

Experts have discovered a way to hack Android through fingerprints

Some models of Android smartphones from Samsung, Xiaomi, OnePlus, Vivo, OPPO, and Huawei have been found vulnerable to fingerprint hacking. About it report researchers from Tencent Labs and Zhejiang University.

In an attack called BrutePrint, the attacker generates a large number of fingerprint samples and matches them to the device’s sensor until he finds a suitable one. As a result, he can access the target device and all the information stored on it.

brute print
General scheme of attack. Data: Tencent.

An attacker would need physical access to the device, a database of fingerprints from academic datasets or biometric leaks, and hardware worth about $15.

equipment
Attack equipment. Data: Tencent.

Android devices allow for infinite fingerprinting, so given enough time, the attack will be successful.

The reason for the vulnerability is that many smartphone manufacturers use standard fingerprint recognition algorithms. More advanced devices equipped with ultrasonic sensors are better protected.

Phishing service Inferno Drainer stole more than $5.9 million in cryptocurrencies

Since March 27, the phishing service Inferno Drainer has stolen more than $5.9 million worth of cryptocurrencies through at least 689 fake websites. About it reported scam sniffer company.

Inferno Drainer is advertised as a multi-chain scam. Its creators provide customers with an administration panel with the ability to set up phishing pages and even offer a trial version.

The pages created with Inferno Draine mimic the sites of 229 popular brands, including Pepe, MetaMask, OpenSea, Sui, zkSync and more.

At the time of writing, most of the assets ($4.3 million) were stolen from the Ethereum network, $790,000 from Arbitrum, $410,000 from Polygon and $390,000 from BNB Chain.

stats
Data: Scam Sniffer.

According to the researchers, the attackers distribute the funds received from the attacks among five wallets.

US government contractor attacked by ransomware

Swiss multinational technology company and US government contractor ABB confirmed ransomware attack on some of their systems. The incident happened on May 7th.

See also  The volume of “fixed” bitcoins reached a historical maximum

Attackers were able to steal an unnamed amount of data from hacked devices, but the company did not reveal signs of impact on client systems.

ABB has located the service disruption and is taking additional security measures to protect the network. An investigation has been launched with the participation of law enforcement officers.

Edition BleepingComputer found that the attack was organized by hackers from the Black Basta group. They targeted the corporate Windows Active Directory and affected hundreds of Windows-based devices, company sources told reporters.

ABB develops industrial control, supervisory control and data acquisition systems for industries and energy suppliers. Her clients include the US Department of Defense and federal civilian agencies, including the Departments of the Interior, Transportation, and Energy, as well as the US Coast Guard and Postal Service.

The companies behind the “army” of IT-specialists of the DPRK came under US sanctions

OFAC announced on sanctions against four organizations and one individual from North Korea involved in cyber attacks and illegal schemes for generating income from IT.

The department list includes:

  • Pyongyang University of Automation;
  • Bureau of Technical Intelligence of the Main Intelligence Directorate of the DPRK;
  • cyber division of the 110th research center;
  • Chinyong Information Technology Cooperation Company;
  • citizen of the DPRK Kim Sang-man.

According to OFAC, thousands of IT professionals from the DPRK are fraudulently employed by foreign companies. They deliberately hide their identity and location using proxy accounts, stolen identities, and falsified documents.

The income received from their activities is used to finance the North Korean nuclear missile program.

Over 50,000 downloads turned app into spyware

Android screen recording app iRecorder – Screen Recorder has been trojanized after a year of being uploaded to the Google Play Store as a result of a recent update. This was reported by the experts of the company ESET.

During this time, it has been downloaded more than 50,000 times.

iRecorder_Google_Play
Data: Google Play.

The developer included in the mentioned update the RAT AhRat malware with the prescribed code for the backdoor and communication with the command and control server.

The AhRat malware can track the location of infected devices, steal call, contact and text message logs, send SMS, record background sounds, and take photos.

The app is currently removed from Google Play, but may be available on unofficial Android app stores.

Also on Cryplogger:

What to read on the weekend?

In the educational section “Cryptorium” we talk about what a VPN is, about the pros and cons of such services.

Subscribe to Cryplogger on social networks

Found a mistake in the text? Select it and press CTRL+ENTER

Cryplogger Newsletters: Keep your finger on the pulse of the bitcoin industry!

Related articles

Judge Gives U.S. Attorneys Until October 3 To Solve Case Against Alex Mashinsky

Judge Gives U.S. Attorneys Until October 3 To Solve Case Against Alex Mashinsky

July 25, 2023
Alphapo payment system hack valued at over $60M – ZachXBT

Alphapo payment system hack valued at over $60M – ZachXBT

July 25, 2023

Cybersec_Digest_3

We have collected the most important news from the world of cybersecurity for the week.

  • Meta has been fined $1.3 billion in the EU for sending user data to the US.
  • Experts have discovered a way to hack Android through fingerprints.
  • Phishing service Inferno Drainer stole more than $5.9 million in cryptocurrencies.
  • US government contractor attacked by ransomware.
See also  Binance warns users about 1.25 billion USDT transfer

Meta fined $1.3 billion in the EU for sending user data to the US

The Data Protection Commission of Ireland imposed on the local branch of the Meta Corporation record fine in the amount of $1.3 billion for a breach of confidentiality.

The agency found that the company is transferring data from platform users from the EU to the US, where data protection rules vary in each state, and thus does not guarantee their security.

The Irish regulator, which is the lead privacy regulator in a block of 27 countries, launched an investigation back in August 2020.

Now Meta is obliged to stop transferring user data to the United States, bring it into line with GDPR and within six months, delete all illegally stored and processed information.

Corporation representatives called imposed a fine unfair and intend to appeal the decision of the authorities.

Experts have discovered a way to hack Android through fingerprints

Some models of Android smartphones from Samsung, Xiaomi, OnePlus, Vivo, OPPO, and Huawei have been found vulnerable to fingerprint hacking. About it report researchers from Tencent Labs and Zhejiang University.

In an attack called BrutePrint, the attacker generates a large number of fingerprint samples and matches them to the device’s sensor until he finds a suitable one. As a result, he can access the target device and all the information stored on it.

brute print
General scheme of attack. Data: Tencent.

An attacker would need physical access to the device, a database of fingerprints from academic datasets or biometric leaks, and hardware worth about $15.

equipment
Attack equipment. Data: Tencent.

Android devices allow for infinite fingerprinting, so given enough time, the attack will be successful.

The reason for the vulnerability is that many smartphone manufacturers use standard fingerprint recognition algorithms. More advanced devices equipped with ultrasonic sensors are better protected.

Phishing service Inferno Drainer stole more than $5.9 million in cryptocurrencies

Since March 27, the phishing service Inferno Drainer has stolen more than $5.9 million worth of cryptocurrencies through at least 689 fake websites. About it reported scam sniffer company.

Inferno Drainer is advertised as a multi-chain scam. Its creators provide customers with an administration panel with the ability to set up phishing pages and even offer a trial version.

The pages created with Inferno Draine mimic the sites of 229 popular brands, including Pepe, MetaMask, OpenSea, Sui, zkSync and more.

At the time of writing, most of the assets ($4.3 million) were stolen from the Ethereum network, $790,000 from Arbitrum, $410,000 from Polygon and $390,000 from BNB Chain.

stats
Data: Scam Sniffer.

According to the researchers, the attackers distribute the funds received from the attacks among five wallets.

See also  Bath in Brooklyn spoke about the use of heat from bitcoin mining

US government contractor attacked by ransomware

Swiss multinational technology company and US government contractor ABB confirmed ransomware attack on some of their systems. The incident happened on May 7th.

Attackers were able to steal an unnamed amount of data from hacked devices, but the company did not reveal signs of impact on client systems.

ABB has located the service disruption and is taking additional security measures to protect the network. An investigation has been launched with the participation of law enforcement officers.

Edition BleepingComputer found that the attack was organized by hackers from the Black Basta group. They targeted the corporate Windows Active Directory and affected hundreds of Windows-based devices, company sources told reporters.

ABB develops industrial control, supervisory control and data acquisition systems for industries and energy suppliers. Her clients include the US Department of Defense and federal civilian agencies, including the Departments of the Interior, Transportation, and Energy, as well as the US Coast Guard and Postal Service.

The companies behind the “army” of IT-specialists of the DPRK came under US sanctions

OFAC announced on sanctions against four organizations and one individual from North Korea involved in cyber attacks and illegal schemes for generating income from IT.

The department list includes:

  • Pyongyang University of Automation;
  • Bureau of Technical Intelligence of the Main Intelligence Directorate of the DPRK;
  • cyber division of the 110th research center;
  • Chinyong Information Technology Cooperation Company;
  • citizen of the DPRK Kim Sang-man.

According to OFAC, thousands of IT professionals from the DPRK are fraudulently employed by foreign companies. They deliberately hide their identity and location using proxy accounts, stolen identities, and falsified documents.

The income received from their activities is used to finance the North Korean nuclear missile program.

Over 50,000 downloads turned app into spyware

Android screen recording app iRecorder – Screen Recorder has been trojanized after a year of being uploaded to the Google Play Store as a result of a recent update. This was reported by the experts of the company ESET.

During this time, it has been downloaded more than 50,000 times.

iRecorder_Google_Play
Data: Google Play.

The developer included in the mentioned update the RAT AhRat malware with the prescribed code for the backdoor and communication with the command and control server.

The AhRat malware can track the location of infected devices, steal call, contact and text message logs, send SMS, record background sounds, and take photos.

The app is currently removed from Google Play, but may be available on unofficial Android app stores.

Also on Cryplogger:

What to read on the weekend?

In the educational section “Cryptorium” we talk about what a VPN is, about the pros and cons of such services.

Subscribe to Cryplogger on social networks

Found a mistake in the text? Select it and press CTRL+ENTER

Cryplogger Newsletters: Keep your finger on the pulse of the bitcoin industry!

Share76Tweet47

Related Posts

Judge Gives U.S. Attorneys Until October 3 To Solve Case Against Alex Mashinsky

Judge Gives U.S. Attorneys Until October 3 To Solve Case Against Alex Mashinsky

by Vaibhav
July 25, 2023
0

Author Victoria Lyapota Reading 2 minutes Views 2 Published 07/25/2023 Updated 07/25/2023 Attorneys for the US Department of Justice have...

Alphapo payment system hack valued at over $60M – ZachXBT

Alphapo payment system hack valued at over $60M – ZachXBT

by Vaibhav
July 25, 2023
0

Author Anna Kuznetsova Reading 3 min Views 4 Published 07/25/2023 Updated 07/25/2023 According to a July 25 report by online...

Avalanche Foundation allocates $50 million investment to purchase asset tokens on the network

Avalanche Foundation allocates $50 million investment to purchase asset tokens on the network

by Vaibhav
July 25, 2023
0

Author Victoria Lyapota Reading 2 minutes Published 07/25/2023 Updated 07/25/2023 On July 25, the Avalanche Foundation announced the launch of...

Era Lend on zkSync used for $3.4 million replay attack

Era Lend on zkSync used for $3.4 million replay attack

by Vaibhav
July 25, 2023
0

Author Alexander Zhdanov Reading 3 min Views 5 Published 07/25/2023 Updated 07/25/2023 The Era Lend lending app on zkSync was...

Abu Dhabi Regulator Grants Trading Firm Rain Permission to Offer Cryptocurrency Services

Abu Dhabi Regulator Grants Trading Firm Rain Permission to Offer Cryptocurrency Services

by Vaibhav
July 25, 2023
0

Author Alexander Zhdanov Reading 2 minutes Views 5 Published 07/25/2023 Updated 07/25/2023 The Abu Dhabi Global Financial Services Regulatory Authority...

Load More

Recent News

  • Judge Gives U.S. Attorneys Until October 3 To Solve Case Against Alex Mashinsky
  • Alphapo payment system hack valued at over $60M – ZachXBT
  • Avalanche Foundation allocates $50 million investment to purchase asset tokens on the network
  • Era Lend on zkSync used for $3.4 million replay attack
  • Abu Dhabi Regulator Grants Trading Firm Rain Permission to Offer Cryptocurrency Services
  • Flashbots Becomes a Unicorn in a $60M Round
  • FOMC Preview: What Bitcoin and Crypto Traders Should Prepare for
  • Game Developer Solana Automata Announces Massive Layoffs
  • Is Cardano TVL a Critical Factor for Reviving ADA Prices?
  • Elon Musk: X will cover half of the global financial system
  • Cryptocurrency-friendly Robinhood moves closer to UK with local CEO appointed
  • Ducati to launch NFT in partnership with XRP Ledger
  • Media: auditors did not find anything suspicious in the scandalous deal with FTX Europe
  • Elon Musk says X will offer ‘the entire financial world’ in the coming months
  • Journalists learned about the reduction of 30% of the staff of the KuCoin exchange
  • EraLend DeFi protocol hacked for $3.4 million
  • Era Land protocol lost $3.4 million in hack
  • The creator of Axie Infinity will develop a new game in collaboration with CyberKongz
  • Azimut Group refuses to pay BlackCat bitcoin ransomware
  • Media: Worldcoin fell under the sight of the UK regulator
  • Home
  • About Us
  • CCPA
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms of Use
Email: contact@cryplogger.com

© 2021-23 Cryplogger.com
CrypLogger is a cult magazine about bitcoin, blockchain technology and the digital economy. Every day we supply news and analytics on the cryptocurrency market since 2021.

No Result
View All Result
  • Home
  • Artificial Intelligence
  • Special Projects
  • News
  • Opinions

© 2021-23 Cryplogger.com
CrypLogger is a cult magazine about bitcoin, blockchain technology and the digital economy. Every day we supply news and analytics on the cryptocurrency market since 2021.

Go to mobile version