Site iconSite icon ForkLog

Cybersecurity Highlights: Tech Giants’ Secrets for Monero and a Crypto Thief Disguised as a Messenger

Cybersecurity Highlights: Tech Giants' Secrets for Monero and a Crypto Thief Disguised as a Messenger

We have compiled the most significant cybersecurity news of the week.

  • Hacker IntelBroker claimed leaks at AMD, Apple, Atlassian, and T-Mobile.
  • A fraudulent messenger for stealing cryptocurrency spread online.
  • Fake errors in Google Chrome were used to install a hidden cryptominer.
  • Kaspersky antivirus was banned in the US.

Hacker IntelBroker Claims Leaks at AMD, Apple, Atlassian, and T-Mobile

IntelBroker, a hacker known in cybercriminal circles, has been offering alleged leaks from several major companies for sale over the past few days.

He first published a data dump from chip manufacturer AMD. According to the hacker, the archive contains unreleased corporate solutions, client and employee information, software source codes, and financial data.

The seller did not specify the price or source of the files.

Source: BreachForums.

AMD told Bleeping Computer that it is investigating the potential incident with law enforcement.

In other posts, IntelBroker offers for sale:

T-Mobile representatives denied any system compromise, calling the published screenshots of their infrastructure outdated and likely stolen from a third-party service provider.

Fraudulent Messenger for Cryptocurrency Theft Spreads Online

Researchers at Recorded Future studied large-scale attacks on cryptocurrency holders using the Vortax malware, disguised as a virtual meeting application.

To lend legitimacy to the malware, its operator, identified as markopolo, maintains a dedicated blog on Medium and a verified X-account with a gold checkmark.

Inviting users from Discord to a call in Vortax. Source: Recorded Future.

Vortax distributes several info-stealers, exploiting macOS vulnerabilities. Once inside a victim’s system, the malware not only empties cryptocurrency addresses but also steals available credentials for further resale.

Fake Errors in Google Chrome Used to Install Hidden Cryptominer

Cybercriminals created pop-ups with fake errors in Google Chrome, Microsoft Word, and OneDrive to trick users into running malicious PowerShell “fixes.” This was reported by researchers at Proofpoint.

The discovered payloads include the XMRig cryptominer, the Lumma Stealer for cryptocurrency wallets and other information, the DarkGate and NetSupport remote access trojans, the Matanbuchus malicious loader, and the Amadey Loader botnet.

Attack chain. Source: Proofpoint.

In one scenario, users are redirected to a compromised site with a malicious script, which is hosted on the blockchain via Binance Smart Chain smart contracts.

Kaspersky Antivirus Banned in the US

On June 20, the administration of US President Joe Biden announced an upcoming ban on Kaspersky Lab’s antivirus software and the distribution of updates for it among American companies and consumers.

The decision is driven by “an unacceptable risk to US national security” due to the developer company’s ties to the Russian government.

American users of Kaspersky Antivirus are advised to find alternative cybersecurity software by September 29, 2024.

Russia Adopts “Right to Be Forgotten” Law

On June 19, the Federation Council approved a law requiring all search engines to ensure the “right to be forgotten” online, and banning search results from foreign sites that violate Russian laws. This was reported by TASS.

At the request of Roskomnadzor, search system operators must connect to the registry of information resources with restricted access within 30 working days and stop providing information about such sites within three working days.

Ukrainian Hackers Attack Banks and Payment Systems in Russia

On June 20, the IT ARMY of Ukraine conducted a large-scale DDoS attack on the Russian financial system, causing disruptions in major companies.

Among those affected were VTB, Sberbank, T-Bank (formerly Tinkoff), Alfa-Bank, Beeline, MTS, Rostelecom, Gazprombank, MegaFon, FPS, NPCS, UISC, and others.

Source: IT ARMY of Ukraine.

Representatives of NPCS, the operator of the “Mir” payment cards, confirmed the incident and issues with service access.

According to them, the attack was carpet-bombing in nature, causing “all border network equipment to overload and network connectivity to be disrupted.”

Also on ForkLog:

What to Read This Weekend?

Alongside a guest author, we explore why on-chain analytics tools sometimes err in marking suspicious transactions.

Exit mobile version