Callaway’s Data Breach Alert! 😱

Sep 04 2023

Gone Phishing Banner

Welcome to Gone Phishing, your daily cybersecurity newsletter that KOs cybercriminals like the iPhone KO’d the #BlackBerry back in β€˜07. #worthawatch πŸ‘€

Today’s hottest cybersecurity news stories:

  • 🏌️ FORE! Calloway golf company suffers data breach: 1.1m records leaked 🚩

  • πŸ”“ LogicMonitor: cybersec firm issues weak default passwords, gets hacked πŸ”‘

  • πŸ”— VMConnect supply chain attack persists, N. Korean Lazarus group suspected 😈

Hackers: Callowaaay we go! 😬

πŸ“’ Breaking News: Callaway's Data Breach Alert! 😱

We've got some important news to share with you. Callaway, the popular American golf equipment company, experienced a data breach at the beginning of August, affecting over a million of its valued customers. β›³οΈπŸŒοΈ

Callaway, known for its golf clubs, balls, bags, and more, operates in over 70 countries and has an annual revenue of $1.2 billion with a workforce of 25,000 employees. πŸŒŽπŸ’Ό

Here's the scoop: On August 1st, an IT system hiccup left their e-commerce services vulnerable, exposing personal data. But don't worry, they detected it quickly and took action! πŸ˜…

The compromised data includes names, addresses, emails, phone numbers, order histories, account passwords, and security question answers. This affects Callaway, Odyssey, Ogio, and Callaway Gold Preowned customers. πŸ“¦πŸ“§πŸ“ž

Good news: No payment card info or Social Security Numbers were leaked. πŸš«πŸ’³πŸ”’

Callaway's response? They've reset all customer passwords to protect your accounts. Head to "callawaygolf.com/reset-password" for instructions. πŸ†˜πŸ”

To stay safe, change passwords on other sites, and be cautious of strange messages asking for info. πŸš¨πŸ”

We hope this helps you stay on par with your online security! β›³οΈπŸ”’

Stay tuned for more updates on cyber safety! πŸ”πŸ“°

I came across ZZZ money club during the crypto market bull run when everyone’s a winner, even during the bear market this discord group has been amazing at giving information on projects and ways to make passive income in various ways.

The group is very active and everyone in this private discord group is very chatty and helpful.

Its run by Yourfriendandy and Decadeinvestor, you can find them here on YouTube, both top guys with great content.

If you are interested in joining the group you can through the link below.

LogicMonitor: β€œWelcome@”, hackers! πŸ™ˆ

Animation Password GIF by The Explainer Studio

Gif by ExplainerStudio on Giphy

🚨 Important Cybersecurity Alert: LogicMonitor Security Incident! 🚨

We've got a crucial update on a recent security incident involving LogicMonitor, a network security company. πŸ˜±πŸ”’

Here's the scoop: Some LogicMonitor customers fell victim to hacking due to the use of default passwords. πŸ˜¬πŸ”

A spokesperson from LogicMonitor confirmed the incident, saying they are actively addressing it and working closely with affected customers to minimise the impact. πŸ€πŸ’Ό

The problem arose because LogicMonitor used to assign laughably guessable default passwords (like "Welcome@" plus a short number) to customer accounts until recently. These passwords were neither strong nor temporary. However, the company has now implemented a 30-day limit on setup passwords and requires users to change them upon first login. πŸ”„πŸ”‘

A customer email warned about potential username/password breaches, which could lead to ransomware attacks on monitored systems. πŸ˜¨πŸ’»

Unfortunately, more details about the incident are limited at this time. πŸ˜•πŸ€

According to a source, a breached company lost over 400 systems due to a ransomware attack exploiting these weak default passwords.Β πŸ˜±πŸ”“

LogicMonitor offers a software-as-a-service platform for network infrastructure visibility, monitoring 800 billion metrics daily across millions of devices in over 30 countries. πŸŒπŸ’Ό

Stay vigilant, folks! It's a reminder to always strengthen your passwords and keep an eye on your cybersecurity. πŸ’ͺπŸ›‘οΈ

Stay tuned for more updates on tech security! πŸ“°πŸ”’

πŸ—žοΈ Extra, Extra! Read all about it! πŸ—žοΈ

Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!

  • ✈️ ViaTravelers: Get exclusive travel tips, news, and insider deals right in your inbox.

  • 🌐 Leadership in Tech: A weekly newsletter for CTOs, engineering managers and senior engineers to become better leaders.

  • 🧠 Big Brain: Trending AI news, jobs and tools delivered in 3 minutes per day.

Let us know what you think!

Chink in the chain? πŸ’€πŸ’€πŸ’€

πŸ” Breaking News: Beware of VMConnect Malicious Python Packages! 🐍🚨

Hello, Python enthusiasts! We've got an important cybersecurity update for you. In early August, the experts at ReversingLabs uncovered a sneaky supply chain attack featuring 24 harmful Python packages known as VMConnect. 😱🐍

Here's the lowdown:

Details:

The attackers put in a lot of effort to make their actions seem genuine. They created GitHub repositories with convincing descriptions and used real source code. Crafty, right? πŸŽ­πŸ‘Ύ

Newly Identified Packages:

Among the recently spotted packages, 'tablediter,' 'request-plus,' and 'requestspro' caught the researchers' attention. The first pretends to be a table editing utility, while the latter two impersonate the popular 'requests' Python library for making HTTP requests. Sneaky, sneaky! πŸ’»πŸ“¦

Attribution:

While ReversingLabs couldn't pin this campaign to a specific threat actor, Crowdstrike's analysts linked it to Labyrinth Chollima, a subgroup of the North Korean Lazarus Group.

JPCERT/CC also connected it to DangerousPassword, another Lazarus Group faction. These findings strongly suggest the same threat actor is behind both attacks. πŸ‘₯πŸ•΅οΈβ€β™‚οΈ

Stay Safe! πŸ‘Š

This VMConnect campaign is just another example of attacks targeting PyPI repository users. To stay protected, organisations should invest in training, raise awareness about typosquatting, and enhance their defences. πŸ›‘οΈπŸ‘¨β€πŸ’»

Stay vigilant and keep your Python packages secure! πŸŒπŸ”’

So long and thanks for reading all the phish!

Recent articles