Point of View | Page 6
OUR TAKE ON TRENDING STORIESThe emergence of the bootkit "Blacklotus" marks a chilling development in the realm of cyber threats. Originally offered for sale on various hacking forums last year for a modest $5,000, this bootkit's capabilities have proven to be as formidable as advertised. It's a game changer, being the first of its kind to bypass even the most secure UEFI boot configurations, effortlessly slipping past a fully updated Windows 11 system with UEFI secure boot enabled. With the finesse of a digital ninja, Blacklotus sidesteps antivirus scanners and renders OS security software like Windows Defender powerless.
Once nestled in a victim's system, Blacklotus goes into stealth mode, hiding its files on the EFI system partition and operating as an HTTP downloader, ready to fetch additional payloads at the beck and call of the threat actor. The laundry list of its capabilities reads like a cyber dystopian nightmare, it's a sobering reminder of the ever evolving sophistication of cyber threats lurking in the digital shadows.
Meanwhile, the demise of the underground forum BreachForums has sent shockwaves through the cyber underworld, leaving threat actors and script kiddies alike in a state of mourning. Led by the enigmatic admin Pompompurin, BreachForums was a digital haven for nefarious activities, boasting a bustling community of 300 thousand accounts in its short lifespan. Pompompurin took the operation seriously, even pulling off a brazen hack of the FBI in 2021 for a bit of trollish fun.
But alas, the long arm of the law caught up with Pompompurin, who was apprehended by the FBI in New York State. In a bid to preserve the forum's legacy, Pompompurin had arranged with their second in command, Baphoment, for a seamless transition in case of arrest. However, with Pompompurin behind bars, Baphoment made the tough call to shutter the forum, citing the newfound uncertainty of safety in the digital underworld.
Yet, amidst the chaos, Baphoment remains a beacon of resilience, hinting at the possibility of a new community rising from the ashes of BreachForums. With a vow to learn from past mistakes and fortify against future threats, Baphoment's vision for a safer, more resilient digital haven offers a glimmer of hope in an otherwise turbulent cyber landscape.
Scan Any Domain for Free https://breachaware.com/scan
Data Breach, Vulnerability & Privacy Research this Month
Bank categorically denied the breach and investigation.https://breachaware.com/research/bank-categorically-denied-the-breach-and-investigation
A total of 32 breaches were found and analysed resulting in 13,280,831 leaked accounts containing a total of 19 different data types. The breaches found publicly and freely available included Gemo Test, Stealer - Mixed Logs 0272, Stealer - Mixed Logs 0268, Stealer - Mixed Logs 0265 and Foodora.
Threat actors exfiltrate a large SQL database of COVID records.
https://breachaware.com/research/threat-actors-exfiltrate-a-large-sql-database-of-covid-records
A total of 20 breaches were found and analysed resulting in 6,204,700 leaked accounts containing a total of 19 different data types. The breaches found publicly and freely available included SberSpasibo, HDFC Bank, Stealer - Mixed Logs 0253, Okanagan College and Stealer - RedLine 0260.
Bank customers complain of phishing attacks via Twitter.
https://breachaware.com/research/bank-customers-complain-of-phishing-attacks-via-witter
A total of 11 breaches were found and analysed resulting in 9,356,800 leaked accounts containing a total of 17 different data types. The breaches found publicly and freely available included US Gamblers, Zen Mobile, Arteza, Stealer - Mixed Logs 0250 and Mobile Legends: Bang Bang.
Video game publisher based in the US suffered a data leak.
https://breachaware.com/research/video-game-publisher-based-in-the-us-suffered-a-data-leak
A total of 33 breaches were found and analysed resulting in 2,068,944 leaked accounts containing a total of 25 different data types. The breaches found publicly and freely available included Kiwi Taxi [2], TaxNet USA, Athletics Federation of India, Stealer - Meta 0239 and B Tech.
Buckle up folks, because we've got some cyber madness to unpack this month. First up on the docket: the granddaddy of all HTTP DDoS attacks, hitting the internet like a digital tsunami. Clocking in at a whopping 71 million requests per second, this attack had Cloudflare, the stalwart defender of web infrastructure, dubbing it "hyper volumetric." It's like a digital hurricane, with requests swirling at speeds that would make even the speediest internet connections break a sweat. And if you thought that was wild, just wait, this attack blew its predecessor out of the water by a staggering 46 million requests. Talk about raising the bar for cyber chaos.
But wait, there's more, the Tor network, that beloved bastion of online anonymity, has been under siege by a barrage of DoS attacks over the past seven months. These attacks have left users struggling to load pages or access onion services, casting a shadow over the normally resilient network. The Tor team is scratching their heads, unable to pinpoint the culprits or their motives. Who would have thought that the onion network would become the battleground for cyber warfare? It's like something out of a cyberpunk novel.
And speaking of cyber shenanigans, Lockbit, the ransomware gang with a penchant for chaos, has been stirring up trouble yet again. This time, their sights are set on none other than the Royal Mail, the crown jewel of the United Kingdom's postal service. With a ransom demand starting at a cool 65 million pounds, Lockbit seemed to think they hit the jackpot. But even after some haggling, they graciously lowered their price to a mere 33 million. Clearly, the Royal Mail hasn't been selling enough stamps this year to entertain such a generous offer. It's a digital heist fit for a cyber blockbuster, but let's hope the Royal Mail can deliver a swift response and put an end to Lockbit's postal plundering.
Scan Any Domain for Free https://breachaware.com/scan
Grab your digital popcorn because this month's cyber theatre has been nothing short of a blockbuster. First up on the marquee: a dark web marketplace showdown that's straight out of a cyber spy thriller. Picture this, a rival marketplace swoops in like a cyber ninja, hijacking the competition's site and redirecting users straight into their digital lair. It's like a turf war in the digital underworld, where every click could lead you down a rabbit hole of illicit deals and shady transactions.
But wait, there's more, our friends over at the Israeli smartphone hacking company are in hot water after a massive leak of their source code hits the digital streets. Clocking in at a whopping 1.7 TB, this leak is a goldmine for threat actors looking to exploit bugs and vulnerabilities or even create their own version of the software. And what's at stake? Oh, just the ability to break into almost anyone's mobile phone with a few clicks. Whether you're the Prime Minister or just good ol' Bob down the road, nobody's safe from the digital snooping.
And speaking of breaches, LastPass is back in the spotlight after their parent company GOTO spills the beans on a recent "security incident." Turns out, a third party cloud storage provider used by both LastPass and GOTO fell victim to hackers, who used information from a previous breach to compromise the shared cloud data. It's a cyber domino effect, with usernames, hashed passwords, and even multi-factor authentication settings potentially up for grabs. With GOTO offering a range of services like VPNs and video conferencing software, the stakes are higher than ever.
So there you have it, another month in the wild world of cyber mayhem. From dark web drama to leaked source code and cloud breaches, it's a reminder that in the digital age, the line between security and vulnerability is as thin as a pixel on a screen.
Scan Any Domain for Free https://breachaware.com/scan
The cyber sleigh ride continues, with breaches aplenty making headlines this month. Let's dive into a couple that caught my eye: First up, we've got a leading global business content hub that's found itself in hot water after experiencing a data breach. This hub, a veritable treasure trove of media content aimed at helping businesses improve their organisational management, boasts on-demand solutions and digital classes led by world leaders. But it seems their digital empire has sprung a leak, with hundreds of thousands of unique email addresses now floating around cyberspace, complete with personal data like gender, names, mobile numbers, and physical addresses. It's a harsh reminder that even the most well intentioned hubs aren't immune to the prying eyes of cyber villains.
Next on the hit list: a program/website run by the FBI that's left the alphabet boys scrambling. This platform, designed to foster networking, data sharing, and the protection of critical infrastructure, has become a prime target for threat actors. And what a haul they've scored, a treasure trove of high-profile individuals, including CEOs of major companies and international business tycoons, now find their personal information up for grabs. Full names, physical addresses, mobile numbers, and email addresses, it's a digital jackpot fit for the naughtiest of cyber grinches.
And as we bid adieu to another year filled with cyber mayhem, it's worth reflecting on the lessons learned. With over 770 million unique accounts publicly leaked throughout the year, it's clear that the stakes have never been higher. The nervous energy surrounding the importance of critical infrastructure and the potential fallout from leaked credentials, looms large in the collective consciousness. It's a sobering reminder that in the digital age, vigilance is key, and no one, not even Santa, is safe from the prying eyes of cyber mischief makers.
Scan Any Domain for Free https://breachaware.com/scan
Buckle up, cyber friends, because it's been a wild ride in the world of cybersecurity this month. Let's dive into the chaos, shall we? First up on the chopping block: Twitter. The self-proclaimed "chief twit" has been stirring up trouble, with news breaking last week of a breach from January 2022 making a comeback. Thanks to a vulnerability dating back to June 2021, threat actors managed to waltz right into Twitter's backyard, snatching up geolocations, profile pictures, usernames, and millions of unique email addresses faster than you can say "tweetstorm." It's a cyber buffet for scammers and ne'er-do-wells, so Twitter users, keep those peepers peeled for anything fishy floating in your inbox or lurking in your DMs.
And speaking of headlines, the saga of the 500 million leaked WhatsApp numbers has whipped the mainstream media into a frenzy. But hold onto your smartphones, folks, because the plot thickens. Rumour has it that this data dump is nothing more than a blast from the past, hailing from the Facebook breach of 2019. Sure, it's cause for concern, but let's not hit the panic button just yet. After all, a number without a name is like a fish without a bicycle, it's missing that personal touch that makes a scam truly sing.
But fear not, dear cyber citizens, for I come bearing tips to keep the scammers at bay:
1. Don't take the bait: avoid clicking on unexpected links, even if they promise you the moon and stars (or a year's free BreachAware account).
2. When in doubt, block it out: exercise caution when answering calls or messages from unknown numbers, and don't hesitate to hit that block button faster than you can say "robo-caller."
3. And for my fellow WhatsApp warriors, consider making the switch to a more privacy focused messaging app like Signal, because in the wild west of cyberspace, it pays to be cautious.
So there you have it, a whirlwind tour of the month's cyber shenanigans. Remember, stay vigilant, stay informed, and whatever you do, don't forget to delete WhatsApp and switch to Signal. (Disclaimer: I'm not getting paid to plug them, I just care about your digital well-being!)
Scan Any Domain for Free https://breachaware.com/scan
The tangled web of cyber mischief strikes again, and this time it's hitting close to home, literally. Let's unpack these intriguing breaches, shall we? First up, we have a free online tool designed to be the neighborhood hero for small businesses, promising exposure and marketing bliss in communities across the USA and Canada. With its glossy interface and lofty mission statement, this platform seemed poised for success, until it fell victim to a breach. Over 100,000 unique email addresses, along with hashed Bcrypt passwords and full names, were snagged in the cyber net. Talk about neighborhood gossip, this breach is sure to have tongues wagging from coast to coast.
But wait, there's more, because this breach isn't just another blip on the corporate radar. No, dear cyber citizens, this one hits closer to home, quite literally. Down under in Australia, drivers are feeling the heat after a massive data breach at Optus last week. With ten million Aussie motorists caught in the crossfire, authorities are pulling out all the stops to prevent fraud. And guess what? For the first time ever, drivers have the chance to bid adieu to their old license numbers and snag a shiny new one, no leg swaps required. It's a bold move in the battle against cyber crooks, and one that's sure to make waves in the land down under.
So there you have it, folks, a tale of cyber woes and cautionary tales from the streets to the suburbs. Whether you're a small business owner or a driver down under, the message is clear: stay vigilant, stay informed, and never underestimate the power of a cyber villain on the prowl.
Scan Any Domain for Free https://breachaware.com/scan
Amidst the chaos of Iran hitting the off switch on their internet and mysterious explosions rocking the Baltic Sea, there's another headline grabbing everyone's attention Down Under: Optus, Australia's second largest telecommunications company, finds itself in the hot seat after a colossal data breach. With nearly 10 million users impacted, it's a debacle of mammoth proportions. But wait, is this a hack or a leak? Rumour has it that Optus may have left the door wide open with an exposed API, essentially laying out customer data for anyone with a curious click.
Enter the enigmatic hacker, striding onto the scene like a cyber cowboy in a digital showdown. Posting on a notorious hacking forum, they lay down the gauntlet with a cool demand: cough up a cool million bucks, or else. Sample data in hand, over ten thousand unique email addresses, it's a tantalizing taste of what's at stake. But just when the plot thickens, the hacker pulls a surprise twist straight out of a cyber thriller. Deleting the thread and penning a new one, they declare a change of heart: the data's not for sale, and a heartfelt apology is extended to Optus. A case of cold feet, or perhaps a quiet handshake behind closed digital doors? The plot thickens.
Meanwhile, in a twist worthy of a cyber noir novel, a revered cybersecurity company finds itself in an unexpected twist of fate. Their entire client list, laid bare for the world to see. Names, mobile numbers, email addresses, the works. It's a stark reminder that even the guardians of the digital realm aren't immune to the slings and arrows of cyber misfortune.
Scan Any Domain for Free https://breachaware.com/scan
WHAT THE PR!V*CY
THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.
Weekly Summary
SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINESSCHEDULE A DEMO
MAKE THE SMART CHOICE TODAY