Aug 22 2023
Welcome to Gone Phishing, your daily cybersecurity newsletter that’s wondering whether #gamescom2023 will get hacked or are all the hackers busy nerding out in attendance 🤔😳😂
Today’s hottest cybersecurity news stories:
🥸 Fake Google ad for Amazon links to phoney Microsoft Defender alert scam 🚫
🤡 White hat hackers troll Def Con attendees by spoofing their Apple devices 😈
⌚ Japanese watchmaker Seiko struck by BlackCat ransomware gang
Cybersecurity researchers have uncovered a concerning scheme targeting unsuspecting users. An Amazon ad seemingly legit in Google search results hides a sneaky trap. 🕵️♂️
The ad displays Amazon's actual URL, tricking users into thinking it's authentic. 😱 But, upon clicking, it diverts victims to a crafty tech support scam masquerading as a Microsoft Defender alert. The fake warning claims infection by the ads(exe).finacetrack(2).dll malware. 🦠
⚠️ Falling for this scam locks your browser in full-screen mode, making escape a challenge. Even closing Google Chrome becomes a loop – relaunching prompts restoration of the scam page. 😫
This isn't the first time – back in June 2022, Malwarebytes discovered a similar YouTube ad deception, leading to the same scam.
Google and Amazon have been notified, but no response yet. 😤 Google ads have suffered from malvertising, aiding malware distribution and even ransomware attacks. Threat actors mimic legitimate sites, swapping download links with malware-laden versions.
Stay vigilant and share this warning with loved ones. 🔒 Let's keep our online community safe from these clever tricks!
Remember, online safety is a team effort! 🤝🌐
I came across ZZZ money club during the crypto market bull run when everyone’s a winner, even during the bear market this discord group has been amazing at giving information on projects and ways to make passive income in various ways.
The group is very active and everyone in this private discord group is very chatty and helpful.
If you are interested in joining the group you can through the link below.
A startling revelation from the Def Con hacking conference has exposed how white hat hackers demonstrated the vulnerability of Apple devices. 😱🔐
Attendees with iPhones were targeted with pop-up messages urging them to share their Apple ID or password with nearby Apple TVs.
As reported by TechCrunch, these unsettling messages were part of a rather cheeky research project led by security researcher Jae Bochs.
Bochs clarified on Mastodon that this experiment aimed to remind users to turn off Bluetooth fully and to bring some humour, with no data collection intentions. 👨💻📡
Using cost-effective tools like a Raspberry Pi Zero 2 W, antennas, and a Bluetooth adapter, Bochs could imitate BLE signals of Apple devices. His experiment revealed that devices within 50 feet could be tricked. 📶🎯
Bochs honed in on "proximity actions" – interactions between devices when in close proximity. He ingeniously imitated Apple TV signals, which prompted pop-ups on iPhones, potentially allowing attackers to access sensitive data like phone numbers and Apple ID emails.
Even clicking on the Bluetooth icon doesn't halt these actions, raising concerns. Bochs theorised these vulnerabilities might be intentional, designed for the convenience of devices like smartwatches. Apple's silence on these issues adds to the uncertainty. 🍏🔒
Each fortnite, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!
💰The Crypto Nutshell: Crypto News & Expert Predictions all in a nutshell 💪
📈The Breakthrough: Receive one idea, one question, and one exercise each week that could spark your next breakthrough.
✈️ViaTravelers: Get exclusive travel tips, news, and insider deals right in your inbox.
Let us know what you think!
The clock is ticking (geddit?) for Seiko following July’s ransomware attack, which the BlackCat group has today claimed responsibility for.
This significant cyberattack disclosure by Seiko, the renowned watchmaker, has sent shockwaves through the cybersphere. The BlackCat/ALPHV ransomware group has seized responsibility for the breach that rocked Seiko earlier this month. 🕰️💥
Seiko, boasting a heritage in horology (word of the day, surely!), experienced unauthorised entry into its IT infrastructure on July 28th. The breach prompted Seiko to engage external cybersecurity experts for a thorough investigation, revealing a significant data compromise. 😓
BlackCat, a notorious ransomware gang, escalated the situation by sharing purloined data samples, exposing production plans, passport scans, model releases, and even confidential technical schematics and watch designs.
This intrusion could unveil Seiko's closely guarded internal workings, posing a threat to innovation and competition. 😱💼
With its advanced tactics, BlackCat is infamous for adapting and refining its extortion strategies. This gang pioneered clearweb data leak websites and introduced a data leak API for efficient stolen data distribution.
Curated Intel's revelation further complicates matters, suggesting a possible initial access broker sale to a manufacturing company linked to Seiko's profile.
While Seiko remains mum on the claims, the incident serves as a reminder of the relentless nature of cyber threats. Stay vigilant and follow best practices to shield against such attacks! 🛡️🌐
So long and thanks for reading all the phish!