{"id":92695,"date":"2025-12-27T07:00:00","date_gmt":"2025-12-27T04:00:00","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=92695"},"modified":"2025-12-27T07:02:19","modified_gmt":"2025-12-27T04:02:19","slug":"spotifys-expropriation-a-crypto-wallet-targeting-stealer-and-other-cybersecurity-news","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/spotifys-expropriation-a-crypto-wallet-targeting-stealer-and-other-cybersecurity-news\/","title":{"rendered":"Spotify\u2019s expropriation, a crypto wallet\u2013targeting stealer, and other cybersecurity news"},"content":{"rendered":"<p>We have gathered the week\u2019s most important cybersecurity news.<\/p>\n<div class=\"wp-block-text-wrappers-keypoints article_keypoints\">\n<ul class=\"wp-block-list\">\n<li>Researchers found a new, feature-rich cryptocurrency stealer.<\/li>\n<li>Chrome extensions intercepted user traffic for eight years.<\/li>\n<li>Activists \u201cbacked up\u201d 86 million Spotify audio files.<\/li>\n<li>Uzbekistan\u2019s traffic-management database was left without a password.<\/li>\n<\/ul>\n<\/div>\n<h2 class=\"wp-block-heading\">Researchers uncover a new crypto stealer with broad capabilities<\/h2>\n<p>Experts at <a href=\"https:\/\/www.kaspersky.com\/blog\/windows-stealer-stealka\/55058\/\">Kaspersky<\/a> reported a new stealer, Stealka. The malware, which targets Windows users, can steal data and cryptocurrency, hijack accounts and install hidden miners.<\/p>\n<p>According to analysts, the software most often masquerades as cracks, cheats and mods. The malware is triggered manually by the victim and spreads via popular platforms such as GitHub, SourceForge, Softpedia and Google Sites.<\/p>\n<p>In more elaborate schemes, attackers create convincing copies of websites by tapping into popular search queries. Mimicking trusted resources, the interface tells users that all posted data have been fully scanned for viruses.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"953\" height=\"1024\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-e382355c5581b3b7-1993867744258374-953x1024.png\" alt=\"image\" class=\"wp-image-272626\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-e382355c5581b3b7-1993867744258374-953x1024.png 953w, https:\/\/forklog.com\/wp-content\/uploads\/img-e382355c5581b3b7-1993867744258374-279x300.png 279w, https:\/\/forklog.com\/wp-content\/uploads\/img-e382355c5581b3b7-1993867744258374-768x825.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-e382355c5581b3b7-1993867744258374.png 1087w\" sizes=\"auto, (max-width: 953px) 100vw, 953px\" \/><figcaption class=\"wp-element-caption\">Legitimate SourceForge service with an infected Roblox mod. Source: Kaspersky.<\/figcaption><\/figure>\n<p>Stealka offers a broad arsenal, but its primary target is user data from Chromium- and Gecko-based browsers, including popular Chrome, Firefox, Opera, Yandex Browser, Edge and Brave.<\/p>\n<p>Attackers are most interested in autofill stores containing account information and payment-card details. Cookies and session tokens let hackers bypass two-factor authentication to seize accounts, which are then used to spread the malware further.<\/p>\n<p>According to Kaspersky, Stealka targets 115 browser extensions. Popular categories at risk include:<\/p>\n<ul class=\"wp-block-list\">\n<li>crypto wallets: Binance, Coinbase, Crypto.com, SafePal, Trust Wallet, MetaMask, Ton, Phantom, Exodus;<\/li>\n<li>two-factor authentication apps: Authy, Google Authenticator, Bitwarden;<\/li>\n<li>password managers: 1Password, Bitwarden, LastPass, KeePassXC, NordPass.<\/li>\n<\/ul>\n<p>The stealer also threatens messengers, mail clients, note managers, gaming services and VPNs.<\/p>\n<h2 class=\"wp-block-heading\">Chrome extensions intercepted user traffic for eight years<\/h2>\n<p>Two Chrome Web Store extensions called Phantom Shuttle pose as proxy-service plug-ins but in fact intercept user traffic and steal confidential data, <a href=\"https:\/\/socket.dev\/blog\/malicious-chrome-extensions-phantom-shuttle\">Socket<\/a> reported.<\/p>\n<p>Phantom Shuttle targets users in China, including foreign-trade professionals who need to test network connections from various locations inside the country. Both extensions are published under the same developer and marketed as tools for traffic proxying and speed testing. They are available by subscription priced from $1.4 to $13.5.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"674\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-0928f80ecb47fcdd-1993867438380357-1024x674.png\" alt=\"image\" class=\"wp-image-272624\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-0928f80ecb47fcdd-1993867438380357-1024x674.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-0928f80ecb47fcdd-1993867438380357-300x197.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-0928f80ecb47fcdd-1993867438380357-768x505.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-0928f80ecb47fcdd-1993867438380357.png 1035w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source: Socket.<\/figcaption><\/figure>\n<p>Active since 2017, the software routes a user\u2019s web traffic through attacker-controlled proxy servers, accessed using hard-coded credentials. Malicious code is embedded inside a legitimate jQuery library.<\/p>\n<p>By \u201clistening\u201d to web traffic, the extensions can intercept HTTP authentication requests on every site visited. They dynamically reconfigure Chrome\u2019s proxy settings using a proxy auto-configuration script.<\/p>\n<p>In the Default mode the malware can filter more than 170 domains, including:<\/p>\n<ul class=\"wp-block-list\">\n<li>developer platforms;<\/li>\n<li>cloud-service management consoles;<\/li>\n<li>social networks;<\/li>\n<li>adult-content portals.<\/li>\n<\/ul>\n<p>Local networks and the control domain are whitelisted to avoid disruption and detection.<\/p>\n<p>Operating as a man-in-the-middle attack, the extension can:<\/p>\n<ul class=\"wp-block-list\">\n<li>intercept data from any forms (logins, card details, passwords, personal information);<\/li>\n<li>steal session cookies from HTTP headers;<\/li>\n<li>extract <span data-descr=\"application programming interface\" class=\"old_tooltip\">API<\/span> tokens from requests.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">Activists \u201cbacked up\u201d 86 million Spotify audio files<\/h2>\n<p>The leading music-streaming service was subjected to mass <span data-descr=\"collection and extraction of data\" class=\"old_tooltip\">scraping<\/span> by pirate activists from Anna\u2019s Archive.<\/p>\n<p>The group is widely known for a campaign to preserve literature, scientific publications, magazines and other materials. They call themselves \u201cthe largest truly open library in human history\u201d, providing access to more than 61 million books and 95 million articles.<\/p>\n<p>In a 20 December 2025 post, \u201c<a href=\"https:\/\/annas-archive.li\/blog\/backing-up-spotify.html\">Backing up Spotify<\/a>\u201d, the team claims it obtained access to metadata for more than 250 million tracks and 86 million of the service\u2019s audio files.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"656\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-b9218eec2b59909d-1993867438521334-1024x656.png\" alt=\"image\" class=\"wp-image-272625\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-b9218eec2b59909d-1993867438521334-1024x656.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-b9218eec2b59909d-1993867438521334-300x192.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-b9218eec2b59909d-1993867438521334-768x492.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-b9218eec2b59909d-1993867438521334.png 1149w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source: Anna\u2019s Archive.<\/figcaption><\/figure>\n<p>The haul amounts to about 300 TB. The most-played tracks, per Spotify\u2019s metrics, are available at 160 kbps, while less popular ones are compressed to 75 kbps.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-4e2d6ce37a7c4c4f-1993868681308276-1024x768.png\" alt=\"image\" class=\"wp-image-272627\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-4e2d6ce37a7c4c4f-1993868681308276-1024x768.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-4e2d6ce37a7c4c4f-1993868681308276-300x225.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-4e2d6ce37a7c4c4f-1993868681308276-768x576.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-4e2d6ce37a7c4c4f-1993868681308276-1536x1152.png 1536w, https:\/\/forklog.com\/wp-content\/uploads\/img-4e2d6ce37a7c4c4f-1993868681308276.png 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source: Anna\u2019s Archive.<\/figcaption><\/figure>\n<p>Anna\u2019s Archive says the move allowed it to create \u201cthe world\u2019s first archive for music\u201d. Activists claim it covers 99.6% of all listens on Spotify.<\/p>\n<p>The group has posted the metadata on its torrent site and plans to release the audio files later. Additional metadata and album art will follow. The archive will be published in order of popularity.<\/p>\n<p>On December 21 a Spotify team told <a href=\"https:\/\/www.billboard.com\/business\/streaming\/spotify-music-library-leak-1236143970\/\">Billboard<\/a> the scraping had been confirmed:<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201cThe investigation of unauthorized access showed that a third party collected public metadata and used illegal methods to circumvent technical copyright-protection measures to gain access to part of the platform\u2019s audio files.\u201d<\/em><\/p>\n<\/blockquote>\n<p>On December 23 a Spotify spokesperson told <a href=\"https:\/\/www.pcmag.com\/news\/spotify-confirms-someone-scraped-its-library-to-get-up-to-300tb-of-data\">PCMag<\/a> of \u201cdetecting and blocking the accounts of the malicious actors involved in the unlawful data collection\u201d.<\/p>\n<h2 class=\"wp-block-heading\">Uzbekistan\u2019s traffic-management system database was left without a password<\/h2>\n<p>Security researchers <a href=\"https:\/\/techcrunch.com\/2025\/12\/23\/inside-uzbekistans-nationwide-license-plate-surveillance-system\/\">uncovered<\/a> a critical data leak in Uzbekistan\u2019s national road-traffic monitoring system. A network of a hundred high-resolution cameras using facial and licence-plate recognition had been openly accessible for an extended period without a password.\u00a0<\/p>\n<p>According to Anurag Sen, the researcher who found the vulnerability, the \u201cintelligent traffic-management\u201d database contains millions of photos and raw 4K video recordings. These can be used to reconstruct citizens\u2019 routes.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"626\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-e0823bd5c0246879-1993870426713405-1024x626.png\" alt=\"image\" class=\"wp-image-272629\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-e0823bd5c0246879-1993870426713405-1024x626.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-e0823bd5c0246879-1993870426713405-300x183.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-e0823bd5c0246879-1993870426713405-768x469.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-e0823bd5c0246879-1993870426713405.png 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source: TechCrunch.<\/figcaption><\/figure>\n<p>For example, one driver was tracked for half a year: cameras logged his trips between Tashkent and nearby settlements several times a week.<\/p>\n<p>The system is built on equipment from China\u2019s Maxvision and Singapore\u2019s Holowits. Beyond recording traffic violations, the algorithms can identify drivers and passengers in real time. Cameras are deployed not only in large cities such as Jizzakh and Namangan but also at strategically important border sections.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"678\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-4ea247afc7ed58b4-1993868697088586-1024x678.png\" alt=\"image\" class=\"wp-image-272628\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-4ea247afc7ed58b4-1993868697088586-1024x678.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-4ea247afc7ed58b4-1993868697088586-300x199.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-4ea247afc7ed58b4-1993868697088586-768x508.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-4ea247afc7ed58b4-1993868697088586.png 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source: TechCrunch.<\/figcaption><\/figure>\n<p>Despite the scale of the leak, government agencies, including the Interior Ministry and the UZCERT incident-response team, had not closed access to the data or issued official comments at the time of publication.<\/p>\n<p>The incident echoes recent problems at an American surveillance giant \u2014 Flock. Earlier it was reported that in the US dozens from this supplier also <a href=\"https:\/\/techcrunch.com\/2025\/11\/03\/lawmakers-say-stolen-police-logins-are-exposing-flock-surveillance-cameras-to-hackers\/\">ended up accessible<\/a> online without authorization.<\/p>\n<p>Leaks of this scale pose serious privacy risks, allowing criminals to exploit state infrastructure for stalking and the theft of personal data.<\/p>\n<h2 class=\"wp-block-heading\">Interpol carried out sweeping raids in Africa<\/h2>\n<p>During Operation Sentinel in Africa, coordinated by <a href=\"https:\/\/www.interpol.int\/News-and-Events\/News\/2025\/574-arrests-and-USD-3-million-recovered-in-coordinated-cybercrime-operation-across-Africa\">Interpol<\/a>, law-enforcement officers arrested 574 people and recovered $3 million linked to business email compromise and ransomware.<\/p>\n<p>From October 27 to November 27, 2025, police in 19 countries took down about 6,000 malicious links and decrypted six ransomware variants. Financial losses from cybercriminals\u2019 actions totalled more than $21 million.<\/p>\n<p>Operation Sentinel highlights:<\/p>\n<ul class=\"wp-block-list\">\n<li>Senegal: a $7.9 million transfer was prevented in an attack on an oil company;<\/li>\n<li>Ghana: after a loss of $120,000 and the encryption of 100 TB at an unnamed financial institution due to a ransomware attack, police restored 30 TB of data and made numerous arrests;<\/li>\n<li>Ghana, Nigeria: a cross-border scam impersonating well-known fast-food brands deceived more than 200 victims out of roughly $400,000. Police detained ten suspects, seized over 100 devices and disabled 30 servers;<\/li>\n<li>Benin: 106 arrests, removal of 43 malicious domains and blocking of 4,318 social-media accounts linked to fraud;<\/li>\n<li>Cameroon: rapid action against an online car-sales scheme traced a compromised server and secured the emergency freezing of bank accounts within hours.<\/li>\n<\/ul>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-14f6dc4975cca4b0-1993871019579077.webp\" alt=\"image\" class=\"wp-image-272630\"\/><figcaption class=\"wp-element-caption\">Arrests in Benin. Source: Interpol.<\/figcaption><\/figure>\n<p>Private companies also took part in the investigation: Team Cymru, The Shadowserver Foundation, Trend Micro, TRM Labs and Uppsala Security.<\/p>\n<p>The teams helped trace IP addresses used in ransomware attacks and sextortion cases, and helped freeze criminal proceeds.<\/p>\n<p>Also on ForkLog:<\/p>\n<ul class=\"wp-block-list\">\n<li>Trust Wallet users were <a href=\"https:\/\/forklog.com\/en\/news\/trust-wallet-users-suffer-7-million-hack\">hacked<\/a> for $7 million.<\/li>\n<li>CZ <a href=\"https:\/\/forklog.com\/en\/news\/cz-proposes-measures-to-combat-address-poisoning\">proposed<\/a> a way to combat \u201caddress poisoning\u201d.<\/li>\n<li>AI was <a href=\"https:\/\/forklog.com\/en\/news\/ai-utilised-for-forging-art-documentation\">used<\/a> to forge documents for works of art.<\/li>\n<li>Polymarket <a href=\"https:\/\/forklog.com\/en\/news\/polymarket-confirms-user-account-breach\">reported a breach<\/a> of user accounts.<\/li>\n<li>Media <a href=\"https:\/\/forklog.com\/en\/news\/chinese-darknet-transactions-on-telegram-surge-to-2-billion\">reported<\/a> that Chinese darknet turnover on Telegram rose to $2 billion.<\/li>\n<li>\u201cPrompt injection\u201d has <a href=\"https:\/\/forklog.com\/en\/news\/prompt-injection-emerges-as-a-major-threat-to-ai-browsers\">become<\/a> the chief hazard for AI browsers.<\/li>\n<li>An investor <a href=\"https:\/\/forklog.com\/en\/news\/investor-loses-nearly-50-million-in-address-spoofing-attack\">lost<\/a> nearly $50 million in an address-substitution attack.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">What to read this weekend?<\/h2>\n<p>The safety of investment capital often hinges on measured decisions, typically justified with expert reports. ForkLog revisited top analysts\u2019 forecasts for 2025 and compared them with objective reality.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We have gathered the week\u2019s most important cybersecurity news.<\/p>\n","protected":false},"author":1,"featured_media":92696,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"The week\u2019s key cybersecurity developments.","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1238,1233],"class_list":["post-92695","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybersecurity-digest","tag-industry-digests"],"aioseo_notices":[],"amp_enabled":true,"views":"182","promo_type":"1","layout_type":"1","short_excerpt":"The week\u2019s key cybersecurity developments.","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/92695","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=92695"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/92695\/revisions"}],"predecessor-version":[{"id":92697,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/92695\/revisions\/92697"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/92696"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=92695"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=92695"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=92695"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}