Tech News

The latest clone of Pro-Trump Twitter filters user data on Day 1

[ad_1]

Security issues It has been the theme of 2021 social media sites in favor of Trump: First Parler’s absurd basic flaws can scratch all of his posts he left the host provider and went offline in the previous hours. Then Gab was hacked by hackers who stole and leaked 40 million of his posts, both public and private. Now, a site called Gettr, launched by former Trump employees, has become a third strong competitor in the competition for the worst security among pro-Trump social media sites, as hackers did. hijack high-profile accounts and drag the private data of tens of thousands of users, including email addresses and dates of birth, just a few hours after launch.

Fortunately for Gettr, this week saw much worse news in the security world, which is the latest issue in the ongoing ransomware epidemic. WIRED looked at Lily Hay Newman new details coming to light About the hack of the remote IT management tool Kaseya, thousands of companies were hit with ransomware and the vulnerability was reported to Kaseya almost three months before it was used to carry out that attack. We also covered the ongoing discussion of a critical bug in the Microsoft printing spooler that the company tried.and failed!“To fix it this week.”

In other news, we looked at how Amazon’s Echo it stores user data invisibly even after reset, How European regulators and privacy guardians are encouraging a complete ban on biometric surveillance, and how hard it is to get rid of the password habit in favor of more secure authentication methods.

And there is more. Every week, WIRED did not cover all the security news in depth. Click on the titles to read the full story and stay safe away.

Given Parler’s and Gab’s misguided security, it’s no surprise that Trump’s latest startup, which seeks to gather refugees on Twitter’s Twitter, also comes into the hackers ’perspective: , including email addresses, usernames, first names, and dates of birth, as seen by cybersecurity company Hudson Rock. This recycling of private data probably seems to have been done by a filtering API, a problem that security professionals pointed out even before the site was launched. In fact, many top users of the site were also hacked more directly, through unknown means: the official accounts of far-right congresswoman Marjorie Taylor-Greene, former Secretary of State Mike Pompeo, Steve Bannon and the website’s founder. Trump Miller employee Jason Miller was kidnapped by someone named “@JubaBaghdad”. Trump, for his part, has so far refused to join the service, perhaps in part because of security concerns or because of Sonic the Hedgehog overflowing with porn.

MIT Tech Review’s Patrick Howell O’Neill has created a fascinating long-running reading from the archives of the game of cats and cybercriminals: the story of how a joint operation between the FBI, the Ukrainian intelligence agency SBU and the Russian FSB came together. Russia’s biggest cybercriminal — and it failed. The three agencies worked together for months to analyze and monitor the research objectives. Among them are Evgeniy Bogachev, known as the basis of the botnet operation known as Game Over Zeus, and Maksim Yakubets, the head of a group known as Evil. Responsible for more than $ 100 million in digital theft and ransomware operations. At the time the agencies were coordinating the removal, the Ukrainian SBU repeatedly delayed the operation – perhaps due to its corruption – and the Russian FSB stopped fully responding to the FBI, ghosting its former allies. As Howell O’Neill writes, one of the biggest hacker hunts in history — and a rare attempt at cooperation between U.S. and Russian law enforcement — was thwarted by “corruption, rivalry, and a mad mix of walls”.

Last month the Australian and European FBI and law enforcement agencies revealed that they had secretly taken over and run an encrypted phone company called Anom. The company was allegedly used to sell phones to protect privacy suspects from investigators around the world. The phones had a secret back door, which then damaged more than 800 alleged criminals. Now Motherboard has done and done a hands-on analysis of one of the phones used in this sting operation. They determine how to hide the encrypted messaging features of a fake fake app, run a custom operating system called ArcaneOS, and offer an emergency cleanup feature. It also makes for a fun reminder of one of the largest-scale law enforcement agencies ever taken out by global agencies. As long as you’re not one of the many owners who end up in jail as a result.

In the midst of Kaseya’s downfall this week, Bloomberg reported another incident of another type of Russian hacking: hackers known as Cozy Bear, linked to the Russian foreign intelligence agency formerly known as SVR, violated the Republican National Commission. , two people who knew the subject told Bloomberg. The RNC itself denied that it had been hacked or stolen information, but then admitted that it had hacked a Synnex RNC technology provider last weekend. It is unclear whether the incident was linked to the Ransomware-targeted Kaseya hack, which was linked to Russian cybercriminal operators known as REvil. But since SVR is engaged in secret intelligence gathering for all sorts of political and governmental purposes, it may come as no surprise that it has led the RNC, as it did in 2016 when it led the DNC.


More great KABEKO stories

[ad_2]

Source link

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button