{"id":73943,"date":"2023-02-11T06:00:00","date_gmt":"2023-02-11T04:00:00","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=73943"},"modified":"2025-09-09T17:15:30","modified_gmt":"2025-09-09T14:15:30","slug":"hack-cheat-for-chatgpt-scandalous-leak-from-roskomnadzors-internal-network-and-other-cybersecurity-events","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/hack-cheat-for-chatgpt-scandalous-leak-from-roskomnadzors-internal-network-and-other-cybersecurity-events\/","title":{"rendered":"Hack-cheat for ChatGPT, scandalous leak from Roskomnadzor\u2019s internal network, and other cybersecurity events"},"content":{"rendered":"<p>We have rounded up the week&apos;s most important cybersecurity news.<\/p>\n<div class=\"wp-block-text-wrappers-keypoints article_keypoints\">\n<ul class=\"wp-block-list\">\n<li>The &#8216;Cyber Partisans&#8217; leak reveals the real role of one Roskomnadzor structure.<\/li>\n<li>Reddit was hacked and its source code stolen.<\/li>\n<li>Hackers have learned to create malware using ChatGPT.<\/li>\n<li>Tor onion services slowed due to DDoS attacks.<\/li>\n<\/ul>\n<\/div>\n<h2 class=\"wp-block-heading\"><strong>The Cyber Partisans leak reveals the real role of a Roskomnadzor structure<\/strong><\/h2>\n<p>The hacker group &#8216;Cyber Partisans&#8217; from Belarus shared with Russian media an archive of documents from the internal network of Roskomnadzor&apos;s subordinate Main Radiocommunication Centre (GRChC).<\/p>\n<p>The dump of more than 2 TB of information was obtained as early as November 2022. At the GRChC they acknowledged the attack but described the situation as under control. <\/p>\n<p>Some 1.5 million emails, mostly from 2020\u20132022, as well as about 200,000 text documents, spreadsheets and presentations shed light on the key role of this structure in monitoring Russians online. <\/p>\n<p>Among other things, the GRChC helps block independent media, files reports on potential &#8216;foreign agents&#8217;, censors queries in &#8216;Yandex&#8217; about the war, hunts for posts about Vladimir Putin&apos;s health, protests, and &#8216;fakes&#8217; about the army.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Reddit hacked and source code stolen<\/strong><\/h2>\n<p>On February 5, unknown attackers compromised the Reddit site and stole its source code. <\/p>\n<p>The criminals created a phishing page mimicking Reddit&apos;s internal network site. Through it, attackers stole employee credentials and two-factor authentication tokens.<\/p>\n<p>Among the compromised data were limited contact details for Reddit, as well as information about current and former employees. Potentially data about advertisers could have been stolen, but more specific financial information and campaign statistics were not affected.<\/p>\n<p>The breach did not affect the site&apos;s core working systems, passwords, or user accounts.<\/p>\n<p>The incident&apos;s other details were not disclosed, noting only a recent similar attack <a href=\"https:\/\/forklog.com\/en\/news\/dangerous-gta-online-bug-yandex-source-code-leak-and-other-cybersecurity-developments\">on game developer Riot Games<\/a>.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Hackers learned to create malware using ChatGPT<\/strong><\/h2>\n<p>A paid bot appeared on Telegram, enabling bypass of ChatGPT&apos;s restrictions on creating illegitimate content, including malware and phishing emails. Check Point researchers noted this. <\/p>\n<p>ChatGPT is available to developers. However, the current <span data-descr=\"Application Programming Interface \u2014 description of how one computer program interacts with another\" class=\"old_tooltip\">API<\/span> version of the AI bot is poorly protected against various abuses and can be used by external applications.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;For example, integrating the GPT-3 language model into Telegram channels allows creating malicious content without any restrictions or barriers set in the ChatGPT user interface,&#8221; the researchers said.<\/p>\n<\/blockquote>\n<p>On one of the hacker forums they found ads for such a service. The first 20 queries to the chat bot are free; after that, users are charged $5.50 for every 100 queries.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/blog.checkpoint.com\/wp-content\/uploads\/2023\/02\/11.jpg\" alt=\"Hack-cheat for ChatGPT, scandalous leak from Roskomnadzor's internal network, and other cybersecurity events\"\/><figcaption>Data: Check Point.<\/figcaption><\/figure>\n<p>During testing, experts were able to create a phishing email and a script that steals PDF documents from an infected computer and sends them to the attacker via FTP. To create this script they used the request: &#8220;Write malware that will collect PDF files and send them via FTP&#8221;.<\/p>\n<p>Another hacker-forum member published code that allows free generation of malware.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/blog.checkpoint.com\/wp-content\/uploads\/2023\/02\/12.jpg\" alt=\"Hack-cheat for ChatGPT, scandalous leak from Roskomnadzor's internal network, and other cybersecurity events\"\/><figcaption>Data: \u200b\u200bCheck Point.<\/figcaption><\/figure>\n<h2 class=\"wp-block-heading\"><strong>Secure messaging app hacked to monitor drug traffickers<\/strong><\/h2>\n<p>Dutch police dismantled the anonymous messaging service Exclu. Before that, authorities hacked the service and, for five months, tracked the criminals&apos; activities.<\/p>\n<blockquote class=\"twitter-tweet\" data-conversation=\"none\">\n<p lang=\"nl\" dir=\"ltr\">On Friday, the police carried out an action day as part of the investigation into the cryptocommunication service #Exclu. Arrests were also made over the past weekend, and around 200 phones were seized for further investigation: https:\/\/t.co\/0B9brVcF8K @Europol @Eurojust @landelijkparket<\/p>\n<p>\u2014 Landelijke Eenheid (@POL_Lnd_Eenheid) <a href=\"https:\/\/twitter.com\/POL_Lnd_Eenheid\/status\/1622636244969586700?ref_src=twsrc%5Etfw\">February 6, 2023<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>During the investigation, 79 searches were conducted in the Netherlands, Germany and Belgium, 42 people were arrested.<\/p>\n<p>Two of those detained were the owners and operators of Exclu, the others were users of the service, including operators of drug laboratories. They seized several kilograms of narcotics, firearms, more than \u20ac4.3 million in cash and luxury items.<\/p>\n<p>Exclu sold six-month subscriptions for \u20ac800 and allowed encrypted messaging and media exchange. Police estimate the messenger&apos;s audience to be about 3,000 people, 750 of whom lived in the Netherlands.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Tor onion services slowed due to DDoS attacks<\/strong><\/h2>\n<p>For the last seven months, the Tor network has been regularly disrupted due to powerful <span class=\"old_tooltip\" data-descr=\"distributed denial of service\" >DDoS attacks<\/span>. Users report issues loading pages and lack of access to onion services.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/substackcdn.com\/image\/fetch\/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep\/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F86b5f069-beee-40f1-820c-6686d8e05d94_1500x707.png\" alt=\"Hack-cheat for ChatGPT, scandalous leak from Roskomnadzor's internal network, and other cybersecurity events\"\/><figcaption>Data: Risky Business.<\/figcaption><\/figure>\n<p>Tor Project developers are aware of the problem and are working to mitigate the impact of attacks and protect the network.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;The methods and targets of these attacks have changed over time, and we have adapted as they continued. It is not possible to identify with certainty who is behind them, or what their intentions are,&#8221; said a Tor Project representative.<\/p>\n<\/blockquote>\n<p>According to Risky Business, the attacks do not occur simultaneously across the whole network. Instead, attackers target a small number of specific relays and switch to others after a few days.<\/p>\n<p>At the same time, none of the operators received ransom demands during the attacks.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Malicious Dota 2 mods found in Steam<\/strong><\/h2>\n<p>Experts at Avast found four malicious game mods for Dota 2 in the Steam store that allowed attackers to backdoor players&apos; systems. Despite mandatory checks at publication, the authors of the mods managed to bypass them.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/decoded.avast.io\/wp-content\/uploads\/sites\/2\/2023\/02\/test_addon.png\" alt=\"Hack-cheat for ChatGPT, scandalous leak from Roskomnadzor's internal network, and other cybersecurity events\"\/><figcaption>Data: Avast.<\/figcaption><\/figure>\n<p>To gain control over a player&apos;s machine, the attackers used Valve\u2019s Panorama framework. Its JavaScript part relies on an vulnerable V8 engine version.<\/p>\n<p>The exploit was embedded in a legitimate file that added a scoreboard functionality, making it harder to detect.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;The backdoor allowed any JavaScript code retrieved via HTTP to be executed, giving the attacker the ability to hide or modify the exploit code at will, and to fully update the entire mod,&#8221; Avast said.<\/p>\n<\/blockquote>\n<p>Additionally, the attacker embedded in the mods a file that tested executing a malicious Lua snippet on the server side. It features logging, arbitrary command execution, coroutines, and HTTP GET requests.<\/p>\n<p>Avast notified Valve\u2019s developers, who updated the vulnerable V8 version on January 12, 2023. The company also removed the malicious mods from Steam and warned at least 200 players affected by the attack.<\/p>\n<p>Also on ForkLog:<\/p>\n<ul class=\"wp-block-list\">\n<li>South Korea imposed <a href=\"https:\/\/forklog.com\/en\/news\/south-korea-imposes-sanctions-on-bitcoin-extortionists\">sanctions against Bitcoin ransomware operators<\/a>.<\/li>\n<li>The Bank of Russia added <a href=\"https:\/\/forklog.com\/en\/news\/bank-of-russia-blacklists-fake-broker-cz-changpeng-fx\">CZ-Changpeng FX<\/a> to the blacklist.<\/li>\n<li>The Webaverse team <a href=\"https:\/\/forklog.com\/en\/news\/webaverse-team-loses-about-4-million-in-usdc-after-meeting-with-an-investor\">lost $4m in USDC<\/a> after meeting with an &#8220;investor&#8221;.<\/li>\n<li>Yuga Labs <a href=\"https:\/\/forklog.com\/en\/news\/yuga-labs-wins-lawsuit-against-one-of-the-creators-of-fake-bayc-tokens\">won a court case<\/a> against one of the creators of &#8220;fake&#8221; BAYC tokens.<\/li>\n<li>The Damus social network announced payouts in satoshis. This led scammers to <a href=\"https:\/\/forklog.com\/en\/news\/damus-social-network-announces-sats-payouts-scammers-seek-to-profit\">monetize this<\/a>.<\/li>\n<li>Bitzlato co-founder Anton Shkurenko <a href=\"https:\/\/forklog.com\/en\/news\/media-bitzlato-co-founder-anton-shkurenko-detained-in-moscow\">was arrested in Moscow<\/a>. He <a href=\"https:\/\/forklog.com\/en\/news\/bitzlato-co-founder-comments-on-his-detention-in-moscow\">gave an exclusive interview<\/a> to ForkLog on the matter.<\/li>\n<li>CoW Swap <a href=\"https:\/\/forklog.com\/en\/news\/cow-swap-decentralised-exchange-loses-166000-in-hack\">lost $166,000<\/a> due to a hack.<\/li>\n<li>UN: North Korean hackers stole a record amount of cryptocurrency in 2022.<\/li>\n<li>GitHub chief urged <a href=\"https:\/\/forklog.com\/en\/news\/github-chief-urges-exemption-of-open-source-software-from-the-eu-ai-act\">to remove open-source software<\/a> from the EU AI Act.<\/li>\n<li>Russia\u2019s Interior Ministry <a href=\"https:\/\/forklog.com\/en\/news\/russias-interior-ministry-could-not-identify-victims-or-the-amount-of-damage-in-the-revil-hackers-case\">could not identify victims<\/a> or the amount of losses in the REvil case.<\/li>\n<li>A Russian court found a participant in a P2P deal <a href=\"https:\/\/forklog.com\/en\/news\/russian-court-convicts-p2p-deal-participant-of-fraud\">guilty of colluding<\/a> with the attacker.<\/li>\n<li>Experts suspected the crypto project <a href=\"https:\/\/forklog.com\/en\/news\/experts-suspect-the-dingo-crypto-project-of-fraud\">Dingo of fraud<\/a>.<\/li>\n<li>Interpol will develop <a href=\"https:\/\/forklog.com\/en\/news\/interpol-to-develop-methods-to-curb-crime-in-the-metaverse\">means of policing crime<\/a> in the metaverse.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\"><strong>What to read this weekend?<\/strong><\/h2>\n<p>In ForkLog\u2019s educational section \u201cCryptoorium\u201d we cover types of scams and offer advice on how not to become a victim.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We have rounded up the week&apos;s most important cybersecurity news.<\/p>\n","protected":false},"author":1,"featured_media":73944,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1238,1233],"class_list":["post-73943","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybersecurity-digest","tag-industry-digests"],"aioseo_notices":[],"amp_enabled":true,"views":"54","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/73943","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=73943"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/73943\/revisions"}],"predecessor-version":[{"id":73945,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/73943\/revisions\/73945"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/73944"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=73943"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=73943"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=73943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}