Proactive Computing | Optimizing IT for usability, performance and reliability since 1997

Category: #Hacks (Page 1 of 5)

Auto Added by WPeMatico

Robinhood Hack Compromises Millions of Customer Email Addresses and Names


Someone recently hacked and attempted to extort Robinhood, the popular investment and trading platform, gaining access to millions of customers’ email addresses and full names in the process.

Read more…

Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Lucas Ropek

Hacker Reveals Twitch Source Code In “Part One” of Massive Gigaleak

The Twitch logo on a gradient background.Twitch

In an effort to “foster more disruption and competition in the online video streaming space,” an anonymous hacker has leaked the entirety of Twitch’s source code and creator earnings. The leak also contains info on an unreleased Steam competitor and data related to Twitch’s security tools. And unfortunately, this is just “part one” of an ongoing gigaleak.

Wrapped in a 125GB torrent, this leaked data was first shared on a 4chan thread the morning of October 6th. Trusted sources have verified its authenticity to Video Games Chronicle and The Verge, and Twitch confirms that it suffered a data breach (it hasn’t verified the leak’s authenticity). Some files in this leak were last modified on October 4th, a sign that Twitch may have been hacked just a few days ago.

All of Twitch’s source code is included in this leak, and that includes source code for the platform’s mobile, desktop, and console clients. Shockingly, this source code is so complete that it contains full “commit history” from the company’s developers—that is, notes made to indicate changes made to the Twitch backend.

We can confirm a breach has taken place. Our teams are working with urgency to understand the extent of this. We will update the community as soon as additional information is available. Thank you for bearing with us.

— Twitch (@Twitch) October 6, 2021

Internal Twitch moderation tools also appear in the leak. The most notable (so far) is Twitch’s “red teaming system,” which allows moderators to pretend that they’re hackers. Oh, and evidence that the “golden kappa” that users randomly receive is manually handed out by moderators. We still don’t know if any damaging security tools are tucked in this leak.

And if you’ve ever wondered how much your favorite streamer makes, you’ll probably find out on social media. This leak contains three years of payout data for Twitch creators. Some streamers have already verified that this leaked financial data matches their earnings, although we’re still not sure if this data is all-inclusive or only focuses on a fraction of Twitch streamers.

There are a few oddities here, too. Because this leak contains all properties owned by Twitch, such as CurseForge, it reveals some unreleased projects. The most notable is called Vapor, a games marketplace with a working title that clearly references Steam.

Some Vapeworld assets, including some 3d emotes with specular and albedo maps
I don’t have whatever version of unity installed that they used, so I’m limited in what assets i can get caps of with stuff like blener and renderdoc.
There’s custom unity plugins in here for devs too.

— Sinoc (@Sinoc229) October 6, 2021

Early analysis of the Vapor data shows that Twitch is working on something called Vapeworld—fortunately (or unfortunately, depending on your priorities), this game has nothing to do with smoking cessation. It’s a VR chat client full of weird 3D Bob Ross emojis. We’re not sure if Vapeworld is an abandoned project or a work in progress, but its files were last modified this week.

The hacker who shared this data clearly did it for altruistic reasons, citing Twitch as a “disgusting cesspool” that hampers competition in the “video streaming space.” As such, the leak doesn’t include a ton of personal data (aside from streamers’ earnings). It seems that the hacker intentionally omitted this data to protect users.

But any data breach is dangerous, and some analysts say that encrypted user passwords are a part of this leak (though these claims are unverified). Not to mention, hackers could use the Twitch source code to find vulnerabilities in its security system, and we’re still waiting for “part two” of this leak, which could target Twitch users instead of targeting the company.

I strongly suggest changing your Twitch password and enabling two-factor authentication on your account. And if you want to be extra safe, I suggest doing the same to your Amazon account, which may be linked to Twitch depending on how you signed up.

Source: VGC, The Verge, PC Gamer

Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Andrew Heinzman

Hacker Steals a U.S. Navy Facebook Account to Livestream ‘Age of Empires’

A screenshot of the hacked page. The livestreamed video is captioned "Hahahahaha."Malwarebytes

A lone hacker decided to take on the U.S. Navy this week, and all things considered, he had a pretty good run. The Navy confirms that a hacker hijacked the official USS KIDD Facebook page to livestream Age of Empires playthroughs for four days in a row. Evidently, the Navy had to bargain with Facebook to secure the USS KIDD warship’s account back.

On October 3rd, the hijacked USS KIDD page livestreamed Age of Empires for four hours. The stream was captioned with the word “Hahahahaha,” which is exactly what I would say if I stole a warship (or its Facebook page).

But I would’ve played Age of Empires a bit better. The 20-year-old strategy game is all about building civilizations from scratch. But as reported by Task and Purpose, the hacker never made it past the damn stone age! Several of the comments left on his livestream tell him that he sucks—“somebody teach this guy how to play,” said one Facebook user.

Screenshots of the hacker's livestreams with captions like "play game," "fffff," "hi everyone," and "POSC."Task and Purpose

Despite the negative comments, our hacker continued to stream Age of Empires on the USS KIDD page. He even changed the USS KIDD’s account type to “Gaming Video Creator.” But on the morning of October 8th, the jig was up. The U.S. Navy finally convinced Facebook to resolve its problem. It also deleted all of the game streams, unfortunately.

In an October 7th conversation with Task and Purpose, Commander Nicole Schwegman stated that “the official Facebook page for USS Kidd (DDG 100) was hacked … We are currently working with Facebook technical support to resolve the issue.” Keep in mind that the page was first hijacked on October 3rd—did it take the Navy four days to realize what happened?

Some people speculate that the USS KIDD page wasn’t hacked. Like last year’s Fort Bragg porn-posting incident, someone with legitimate access to the USS KIDD Facebook account may have simply forgot to log out. But this theory doesn’t make sense, given the U.S. Navy’s statement and its inability to access the USS KIDD page.

Source: Task and Purpose via Malwarebytes

Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Andrew Heinzman

Anonymous Claims to Have Stolen Huge Trove of Data From Epik, the Right-Wing’s Favorite Web Host


Members of the hacktivist collective Anonymous claim to have hacked web registration company Epik, allegedly stealing “a decade’s worth of data,” including reams of information about its clients and their domains.

Read more…

Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Lucas Ropek

A Complete Guide to Not Getting Hacked


As safe as you might feel sitting at your laptop, happily typing and posting and scrolling, we all know the truth: the internet is actually a giant hellscape full of spies, criminals, ransomware, and all kinds of other dangerous shit.

Read more…

Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Lucas Ropek

T-Mobile’s Data Breach Is Real And Worse Than You Imagined

T-Mobile storefrontAlastair Pike/AFP/Getty Images

Earlier this week, T-Mobile confirmed news and reports that the company had been hacked and experienced a wide customer data breach. And while the company’s findings show not all 100+ million customers are affected, it’s still bad news, and the details are going from bad to worse.

After confirming over 40 million customers’ user data was compromised, on Friday, the mobile carrier reported that hackers illegally accessed customer names, dates of birth, phone numbers, social security numbers, addresses, and even IMEI numbers for customer devices. This includes current, former, and potential customers, as well as postpaid users.

T-Mobile also said it had identified an additional 667,000 accounts of former customers that were accessed. This is bad news as hackers can easily use that info for identity theft, SIM swapping attacks to intercept secure two-factor logins, and other harmful activities.

So far, the number of affected customers is over 50 million. In a press release, the company said it’s taking immediate steps to help protect affected customers and is coordinating with law enforcement.

“We take our customers’ protection very seriously and we will continue to work around the clock on this forensic investigation to ensure we are taking care of our customers in light of this malicious attack,” said the company. “While our investigation is ongoing, we wanted to share these initial findings even as we may learn additional facts through our investigation that cause the details above to change or evolve.”

The company has now opened a dedicated webpage full of information for customers. Here, T-Mobile users can find information on how to change their PIN or passwords or sign up for a complimentary 2-years of McAfee ID Theft Protection services. T-Mobile recommends postpaid customers change their PIN and have already alerted many users or reset it themselves.

via The Verge

Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Cory Gunther

T-Mobile confirms data breach affects over 47 million people


As part of its ongoing data breach investigation, T-Mobile has confirmed the enormity of the stolen information. Roughly 47.8 million current and former or prospective customers have been affected by the cyberattack on its systems, the carrier confirmed on Wednesday. Of that number, about 7.8 million are current T-Mobile postpaid accounts and the rest are prior or potential users who had applied for credit, the company added in a press release

Worryingly, the data includes some personal information including the first and last names, date of birth, SSN, and driver’s license/ID information for a “subset of customers.” So far, T-Mobile said it does not have any indication that the stolen files contain phone numbers, account numbers, passwords or financial information.

What’s more, the company said about 850,000 active T-Mobile prepaid customers also had their names, phone numbers and account PINs exposed. The affected users do not include Metro by T-Mobile, former Sprint prepaid, or Boost users and T-Mobile said it has reset the PINs on these accounts. In addition, it claimed that “some additional information” from inactive prepaid accounts was accessed through prepaid billing files.

The findings from the carrier’s preliminary analysis come just days after it was notified of a data breach. Initially, it was reported that a member of an underground forum claimed to have obtained the data for over 100 million T-Mobile customers. The culprit was reportedly selling information of about 30 million T-Mobile customers for about $270,000 in Bitcoin. 

As part of its compensation and mitigation efforts, T-Mobile is offering affected customers two years of McAfee’s ID Theft Protection Service; recommending all postpaid users change their PIN; and setting up an online resource page. T-Mobile said that it began coordination with law enforcement on Tuesday as its investigation into the data breach — the third such attack it has suffered in the past two years — continues.

Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Saqib Shah

T-Mobile confirms unauthorized access to ‘some’ data


Following reports of a data breach over the weekend, T-Mobile has confirmed it’s investigating a cybersecurity incident. In an update published on Monday, the company said someone gained unauthorized access to its computer systems, but that it has yet to determine if any customer data was stolen.

“We are confident that the entry point used to gain access has been closed, and we are continuing our deep technical review of the situation across our systems to identify the nature of any data that was illegally accessed,” the carrier said.

When Motherboard first broke the news of the data breach on Sunday, the information of about 30 million T-Mobile customers was on sale on the dark web for about $270,000 in Bitcoin. A hacker told the outlet they had obtained social security and IMEI numbers connected to more than 100 million people. As of the second quarter of 2021, T-Mobile had 104.7 million subscribers. The carrier said it could not “confirm the reported number of records affected or the validity of statements made by others” until it completes its investigation. Once it knows more about the situation, T-Mobile promises to proactively contact customers.

Proactive Computing found this story and shared it with you.
The Article Was Written/Published By: Igor Bonifacic

« Older posts