Telegram (AI) YouTube Facebook X
Ру
Leak at Call of Duty publisher, Coinbase staff phishing and other cybersecurity developments

Leak at Call of Duty publisher, Coinbase staff phishing and other cybersecurity developments

We round up the weeks most important cybersecurity news.

  • Coinbase staff were targeted by SMS phishing.
  • The FBI detected malicious activity on an internal network.
  • A Call of Duty update schedule was leaked publicly.
  • GoDaddy disclosed a multi-year compromise of its systems.

Coinbase staff targeted by SMS phishing

On February 17, the cryptocurrency exchange Coinbase stated that its employees had fallen victim to an SMS phishing campaign. The incident occurred on February 5.

The targeted employees received text messages about the urgent need to log in to their account via the provided link. One recipient clicked it, entered their login and password.

The 2FA on the account was bypassed by the attackers, who called the employee impersonating the IT department. The victim followed instructions and authenticated on their device.

The Coinbase security team detected the suspicious activity, promptly blocking the compromised account.

The attacker managed to obtain limited contact information of employees, including names, email addresses and phone numbers.

At the same time, the exchange stressed that customer data and their funds were not affected.

Coinbase suspected that the attack was carried out by the hacker group 0ktapus, also known as Scattered Spider, which has at least 130 similar breaches against other organisations.

FBI records malicious activity on internal network

On February 17, an unknown intruder breached the computer system of the FBI’s New York field office, according to CNN.

According to informed sources, the affected segment was used to investigate crimes related to the sexual exploitation of children.

According to the agency, this was a single incident that was promptly contained. The FBI provided no further comment on the investigation, including potential threat sources.

Call of Duty update schedule leaked online

The game developer and publisher Activision confirmed unauthorized access to one of its internal Slack channels and data theft. The incident occurred in December 2022, but public disclosure came only after researchers from Vx-underground reported it.

They published a number of edited screenshots from December 4, 2022, obtained directly from the attackers. They show confidential internal documents relating to the Call of Duty franchise, as well as the content publication schedule for 2023.

According to Vx-underground, the breach was carried out through a phishing SMS attack targeting an employee. After that the hackers gained access to Activision’s Slack channel.

The game developer itself did not provide details of the breach, but assured that the game’s source code and players’ personal data were not affected.

According to Insider Gaming, the leak includes full names, email addresses, phone numbers, salary ranges and other employee data. In addition, the compromised Activision employee, according to journalists, works in the human resources department and has access to a large amount of confidential information.

GoDaddy reports multi-year systems compromise

In an SEC filing, the registrar GoDaddy disclosed the fact of a targeted attack on its systems lasting for several years.

According to the company, unknown actors compromised the shared hosting environment running cPanel, stole the source code and installed malware on their servers.

The issue came to light in early December 2022 after customers complained their sites were redirected to random domains.

GoDaddy noted that the attack was carried out by an organised group targeting hosting providers worldwide. Their objective was to infect sites with malware to conduct phishing campaigns and other malicious actions.

The registrar’s team is now working with external cybersecurity experts and law enforcement authorities to investigate the incident.

A new infostealer gains traction in the dark Web

Among cybercriminals, a new infostealer Stealc, capable of stealing data from browsers, extensions and cryptocurrency wallet addresses, is gaining popularity. Sekoia experts noted this.

Since January 2023, the malware has been actively advertised on hacker forums and Telegram channels.

Advertisement for Stealc stealer on XSS, published by Plymouth on 9 January, 2023.
Data: Sekoia.

In particular, authors note that Stealc’s developers drew on existing “market” solutions, including Vidar, Raccoon, Mars and Redline. However, unlike them, the new stealer can be configured to capture specific file types.

Researchers identified more than 40 Stealc command servers and several dozen malware samples, indicating interest among cybercriminals.

Experts flag surge in attacks via social media and messaging apps

Positive Technologies specialists studied the most current cybersecurity threats of the fourth quarter of 2022. Among the main trends is the increase in attacks through social networks and messaging apps.

Also criminals used malware, social engineering and exploitation of vulnerabilities.

As a result, there were disruptions to critical infrastructure, large-scale data leaks of user data and product source code.

Call of Duty publisher leak, Coinbase employee phishing and other cybersecurity events
Data: Positive Technologies.

The total number of cyberattacks during the study period rose by 15% year-on-year from Q4 2021.

Also on ForkLog:

What to read this weekend?

In the education section “Kryptorium” we discuss the Ronin sidechain reboot after the massive breach.

Подписывайтесь на ForkLog в социальных сетях

Telegram (основной канал) Facebook X
Нашли ошибку в тексте? Выделите ее и нажмите CTRL+ENTER

Рассылки ForkLog: держите руку на пульсе биткоин-индустрии!

We use cookies to improve the quality of our service.

By using this website, you agree to the Privacy policy.

OK