Proactive Computing | Optimizing IT for usability, performance and reliability since 1997

Category: #DataBreach (Page 1 of 4)

Auto Added by WPeMatico

2021 was the year cybersecurity became everyone’s problem

This year marked a turning point for malicious attacks on computer systems, fueled by a rise in nation-state attacks and ransomware.

Why it matters: Once a worry mostly for IT leaders, the risk of a cyber intrusion is now a top concern for CEOs and world leaders.


Driving the news:

  • May’s Colonial Pipeline attack helped drive that message home, as did ransomware attacks on cities and hospitals — emphasizing the very real world impact that cyber attacks can have.
  • Meanwhile, the current Log4j flaw shows just how vulnerable our digital systems are. It’s a single piece of open source code, but it is used so broadly and the flaw so fundamental that it potentially opens nearly every business and government to attack.

The big picture: Evidence that cybersecurity has become the big issue abounds. Foreign Affairs devotes the current issue to the topic, while J.P. Morgan International Council identified it as the most significant threat facing businesses and government in a report released Thursday.

Between the lines: One can never permanently “win” the battle against malicious attacks, but it is possible to be losing the fight. 2021 definitely felt like a year in which the attackers had the upper hand.

  • The combination of cryptocurrency and ransomware has proven to be especially tough to fight as it is often in the business interests of a victim to pay up rather than take the risk of data loss or even a business disruption.

The rise in cyberattacks has also made for thorny diplomacy among nation states. With physical attacks, there has been a relatively clear line that acts as a deterrent, even for nations with significant conflicts. But in cyberspace, the division is murkier.

  • “The domain of cyberspace is shaped not by a binary between war and peace but by a spectrum between those two poles—and most cyberattacks fall somewhere in that murky space,” former deputy director of national intelligence Sue Gordon and former Pentagon chief of staff Eric Rosenbach wrote in a Foreign Affairs piece.
  • “In trying to analogize the cyberthreat to the world of physical warfare, policymakers missed the far more insidious danger that cyber-operations pose: how they erode the trust people place in markets, governments and even national power,” argues Hoover Institution’s Jacquelyn Schneider, in another Foreign Affairs article. “Cyberattacks prey on these weak points, sowing distrust in information, creating confusion and anxiety, and exacerbating hatred and misinformation.”

What’s next: Leaders are calling for much tighter cooperation between businesses and governments as the key way to fighting back. Also needed, many say, is an international agreement on what is and isn’t permissible, in much the way the Geneva Convention sets limits on traditional warfare.

Yes, but: The U.S. government is still woefully short of workers with needed cybersecurity skills.

Source: https://www.axios.com/2021-cybersecurity-ransomware-cyber-attack-91ccc592-b611-4825-8e0a-65e37d06a450.html
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Ina Fried

Robinhood Hack Compromises Millions of Customer Email Addresses and Names

7efce449de58bd2d21b3928e922a8fd9.jpg

Someone recently hacked and attempted to extort Robinhood, the popular investment and trading platform, gaining access to millions of customers’ email addresses and full names in the process.

Read more…

Source: https://gizmodo.com/robinhood-hack-compromises-millions-of-customer-email-a-1848019174
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Lucas Ropek

Hacker Reveals Twitch Source Code In “Part One” of Massive Gigaleak

The Twitch logo on a gradient background.Twitch

In an effort to “foster more disruption and competition in the online video streaming space,” an anonymous hacker has leaked the entirety of Twitch’s source code and creator earnings. The leak also contains info on an unreleased Steam competitor and data related to Twitch’s security tools. And unfortunately, this is just “part one” of an ongoing gigaleak.

Wrapped in a 125GB torrent, this leaked data was first shared on a 4chan thread the morning of October 6th. Trusted sources have verified its authenticity to Video Games Chronicle and The Verge, and Twitch confirms that it suffered a data breach (it hasn’t verified the leak’s authenticity). Some files in this leak were last modified on October 4th, a sign that Twitch may have been hacked just a few days ago.

All of Twitch’s source code is included in this leak, and that includes source code for the platform’s mobile, desktop, and console clients. Shockingly, this source code is so complete that it contains full “commit history” from the company’s developers—that is, notes made to indicate changes made to the Twitch backend.

We can confirm a breach has taken place. Our teams are working with urgency to understand the extent of this. We will update the community as soon as additional information is available. Thank you for bearing with us.

— Twitch (@Twitch) October 6, 2021

Internal Twitch moderation tools also appear in the leak. The most notable (so far) is Twitch’s “red teaming system,” which allows moderators to pretend that they’re hackers. Oh, and evidence that the “golden kappa” that users randomly receive is manually handed out by moderators. We still don’t know if any damaging security tools are tucked in this leak.

And if you’ve ever wondered how much your favorite streamer makes, you’ll probably find out on social media. This leak contains three years of payout data for Twitch creators. Some streamers have already verified that this leaked financial data matches their earnings, although we’re still not sure if this data is all-inclusive or only focuses on a fraction of Twitch streamers.

There are a few oddities here, too. Because this leak contains all properties owned by Twitch, such as CurseForge, it reveals some unreleased projects. The most notable is called Vapor, a games marketplace with a working title that clearly references Steam.

Some Vapeworld assets, including some 3d emotes with specular and albedo maps
I don’t have whatever version of unity installed that they used, so I’m limited in what assets i can get caps of with stuff like blener and renderdoc.
There’s custom unity plugins in here for devs too. pic.twitter.com/6y4woQDcst

— Sinoc (@Sinoc229) October 6, 2021

Early analysis of the Vapor data shows that Twitch is working on something called Vapeworld—fortunately (or unfortunately, depending on your priorities), this game has nothing to do with smoking cessation. It’s a VR chat client full of weird 3D Bob Ross emojis. We’re not sure if Vapeworld is an abandoned project or a work in progress, but its files were last modified this week.

The hacker who shared this data clearly did it for altruistic reasons, citing Twitch as a “disgusting cesspool” that hampers competition in the “video streaming space.” As such, the leak doesn’t include a ton of personal data (aside from streamers’ earnings). It seems that the hacker intentionally omitted this data to protect users.

But any data breach is dangerous, and some analysts say that encrypted user passwords are a part of this leak (though these claims are unverified). Not to mention, hackers could use the Twitch source code to find vulnerabilities in its security system, and we’re still waiting for “part two” of this leak, which could target Twitch users instead of targeting the company.

I strongly suggest changing your Twitch password and enabling two-factor authentication on your account. And if you want to be extra safe, I suggest doing the same to your Amazon account, which may be linked to Twitch depending on how you signed up.

Source: VGC, The Verge, PC Gamer

Source: https://www.reviewgeek.com/99930/hacker-reveals-twitch-source-code-in-part-one-of-massive-gigaleak/
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Andrew Heinzman

A Complete Guide to Not Getting Hacked

dc07161d07fda46b61d1e9afd243cc30.jpg

As safe as you might feel sitting at your laptop, happily typing and posting and scrolling, we all know the truth: the internet is actually a giant hellscape full of spies, criminals, ransomware, and all kinds of other dangerous shit.

Read more…

Source: https://gizmodo.com/a-complete-guide-to-not-getting-hacked-1847400695
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Lucas Ropek

T-Mobile’s Data Breach Is Real And Worse Than You Imagined

T-Mobile storefrontAlastair Pike/AFP/Getty Images

Earlier this week, T-Mobile confirmed news and reports that the company had been hacked and experienced a wide customer data breach. And while the company’s findings show not all 100+ million customers are affected, it’s still bad news, and the details are going from bad to worse.

After confirming over 40 million customers’ user data was compromised, on Friday, the mobile carrier reported that hackers illegally accessed customer names, dates of birth, phone numbers, social security numbers, addresses, and even IMEI numbers for customer devices. This includes current, former, and potential customers, as well as postpaid users.

T-Mobile also said it had identified an additional 667,000 accounts of former customers that were accessed. This is bad news as hackers can easily use that info for identity theft, SIM swapping attacks to intercept secure two-factor logins, and other harmful activities.

So far, the number of affected customers is over 50 million. In a press release, the company said it’s taking immediate steps to help protect affected customers and is coordinating with law enforcement.

“We take our customers’ protection very seriously and we will continue to work around the clock on this forensic investigation to ensure we are taking care of our customers in light of this malicious attack,” said the company. “While our investigation is ongoing, we wanted to share these initial findings even as we may learn additional facts through our investigation that cause the details above to change or evolve.”

The company has now opened a dedicated webpage full of information for customers. Here, T-Mobile users can find information on how to change their PIN or passwords or sign up for a complimentary 2-years of McAfee ID Theft Protection services. T-Mobile recommends postpaid customers change their PIN and have already alerted many users or reset it themselves.

via The Verge

Source: https://www.reviewgeek.com/95482/t-mobiles-data-breach-is-real-and-worse-than-you-imagined/
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Cory Gunther

T-Mobile confirms data breach affects over 47 million people

f6504e10-0a0e-11eb-bffe-84d3e0cb9010

As part of its ongoing data breach investigation, T-Mobile has confirmed the enormity of the stolen information. Roughly 47.8 million current and former or prospective customers have been affected by the cyberattack on its systems, the carrier confirmed on Wednesday. Of that number, about 7.8 million are current T-Mobile postpaid accounts and the rest are prior or potential users who had applied for credit, the company added in a press release

Worryingly, the data includes some personal information including the first and last names, date of birth, SSN, and driver’s license/ID information for a “subset of customers.” So far, T-Mobile said it does not have any indication that the stolen files contain phone numbers, account numbers, passwords or financial information.

What’s more, the company said about 850,000 active T-Mobile prepaid customers also had their names, phone numbers and account PINs exposed. The affected users do not include Metro by T-Mobile, former Sprint prepaid, or Boost users and T-Mobile said it has reset the PINs on these accounts. In addition, it claimed that “some additional information” from inactive prepaid accounts was accessed through prepaid billing files.

The findings from the carrier’s preliminary analysis come just days after it was notified of a data breach. Initially, it was reported that a member of an underground forum claimed to have obtained the data for over 100 million T-Mobile customers. The culprit was reportedly selling information of about 30 million T-Mobile customers for about $270,000 in Bitcoin. 

As part of its compensation and mitigation efforts, T-Mobile is offering affected customers two years of McAfee’s ID Theft Protection Service; recommending all postpaid users change their PIN; and setting up an online resource page. T-Mobile said that it began coordination with law enforcement on Tuesday as its investigation into the data breach — the third such attack it has suffered in the past two years — continues.

Source: https://www.engadget.com/t-mobile-data-breach-affected-people-103104868.html?src=rss
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Saqib Shah

T-Mobile confirms unauthorized access to ‘some’ data

016d3470-0a10-11ea-b3ab-05aa46926fd7

Following reports of a data breach over the weekend, T-Mobile has confirmed it’s investigating a cybersecurity incident. In an update published on Monday, the company said someone gained unauthorized access to its computer systems, but that it has yet to determine if any customer data was stolen.

“We are confident that the entry point used to gain access has been closed, and we are continuing our deep technical review of the situation across our systems to identify the nature of any data that was illegally accessed,” the carrier said.

When Motherboard first broke the news of the data breach on Sunday, the information of about 30 million T-Mobile customers was on sale on the dark web for about $270,000 in Bitcoin. A hacker told the outlet they had obtained social security and IMEI numbers connected to more than 100 million people. As of the second quarter of 2021, T-Mobile had 104.7 million subscribers. The carrier said it could not “confirm the reported number of records affected or the validity of statements made by others” until it completes its investigation. Once it knows more about the situation, T-Mobile promises to proactively contact customers.

Source: https://www.engadget.com/t-mobile-confirms-data-breach-203719462.html?src=rss
Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Igor Bonifacic

« Older posts