You might not sleep well after this.

Aug 03 2023

Gone Phishing Banner

Welcome to Gone Phishing, your daily cybersecurity newsletter that treats cybercriminals like Democrats treat former U.S. presidents πŸ˜³πŸ˜¬πŸ˜‚

Today’s hottest cyber security stories:

  • πŸ›οΈ Mattress giant Tempur Sealy gets cyberattacked forcing system shutdown πŸ’€

  • πŸ‘€ New NodeStealer variant targets Facebook Business accounts, crypto wallets πŸ’°

  • πŸ‘Ύ Hackers steal Signal, WhatsApp user data with fake Android chat app πŸ’¬

Mattress Attack turns up the Tempurature 😏

πŸ“°πŸ”’ Cyberattack Hits World's Biggest Mattress Seller! πŸ”’πŸ“°

Tempur Sealy, the leading bedding provider known for brands like Tempus, Cocoon, Sealy, and Stearns & Foster, is facing a cyberattack that has forced parts of its IT systems to shut down. πŸ˜±πŸ’»

Chief Financial Officer Bhaskar Rao reported the incident to the U.S. Securities and Exchange Commission on Monday, stating that the attack began on July 23, disrupting operations.

While the company hasn't confirmed if it's a ransomware attack, they activated incident response and business continuity plans to contain the situation. Legal counsel, cybersecurity experts, and authorities have been engaged to advise on the matter. πŸ‘©β€πŸ’ΌπŸ•΅οΈβ€β™‚οΈ

Tempur Sealy has started bringing critical IT systems back online and resumed operations, but the financial impact is still being assessed. πŸ”„πŸ’° They are also investigating whether customer or employee data was compromised and plan to inform regulators if any data was leaked. πŸ“ˆπŸ”

No specific hacking group has claimed responsibility for the attack. In the past, hackers targeted mattress sellers like MyPillow.com and Amerisleep.com to steal payment information. πŸ˜“πŸ’³

Stay tuned for further updates on this developing situation. Remember to stay vigilant and protect your online data! πŸ›‘οΈπŸ”

I came across ZZZ money club during the crypto market bull run when everyone’s a winner, even during the bear market this discord group has been amazing at giving information on projects and ways to make passive income in various ways.

The group is very active and everyone in this private discord group is very chatty and helpful.

Its run by Yourfriendandy and Decadeinvestor, you can find them here on YouTube, both top guys with great content.

If you are interested in joining the group you can through the link below.

Oh Node you didn’t 😁

πŸ”’πŸ•΅οΈβ€β™‚οΈ Python Variant of NodeStealer Poses Threat to Facebook Business Accounts and Cryptocurrency πŸ”’πŸ•΅οΈβ€β™‚οΈ

Cybersecurity experts at Palo Alto Networks Unit 42 have discovered a new variant of the stealer malware called NodeStealer, designed to target Facebook business accounts and steal cryptocurrency. The campaign began in December 2022, but there is no current evidence of its activity. πŸ˜±πŸ’»πŸ’ΌπŸ’°

NodeStealer was initially exposed by Meta (formerly Facebook) in May 2023, and it was known for harvesting cookies and passwords from web browsers to compromise Facebook, Gmail, and Outlook accounts. While previous versions were written in JavaScript, the latest strain is coded in Python, making it even more dangerous. πŸπŸ•ΈοΈ

According to Lior Rochberger, a researcher at Unit 42, NodeStealer poses significant risks to both individuals and organisations. Besides directly impacting Facebook business accounts financially, the malware steals browser credentials, which could lead to further cyberattacks. πŸš¨πŸ”‘

The attacks start with deceptive messages on Facebook, promising free "professional" budget tracking Microsoft Excel and Google Sheets templates. Victims are tricked into downloading a ZIP archive file hosted on Google Drive, which then initiates the malware. πŸ“ˆπŸ’»πŸ“‰

πŸ›‘οΈ Top Tips:

  • Stay vigilant and cautious while interacting on social media platforms and avoid downloading suspicious files. Regularly update your cybersecurity measures to protect against evolving threats. πŸ›‘οΈπŸ”

πŸ—žοΈ Extra, Extra! Read all about itΒ πŸ—žοΈ

Each fortnite, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!

  • πŸ’ΈΒ The MoneyFitt Morning: A daily heads-up on what's important in investing & business. Loved by investors of all levels.

  • πŸ“ˆΒ Trends.vc: Discover new markets and ideas. Join 55,248 founders using this free newsletter to stay ahead.

  • 😈 The API Hacker Inner Circle: Join a community of developers, testers, and hackers who are upskilling their API hacking tradecraft.

Let us know what you think!

WhatsApp? Signal failure…

πŸ”πŸ“± Beware of 'SafeChat' Android App Spreading Spyware! πŸ”πŸ“±

Hackers are using a fake Android app called 'SafeChat' to infect devices with spyware, compromising call logs, texts, and GPS locations from phones. πŸ˜±πŸ’»πŸ“žπŸ—ΊοΈ

This Android spyware is suspected to be a variant of "Coverlm," which targets popular communication apps like Telegram, Signal, WhatsApp, Viber, and Facebook Messenger.

The Indian APT hacking group 'Bahamut' is behind the campaign, mainly employing spear-phishing messages on WhatsApp to deliver malicious payloads to victims. πŸ‘₯πŸŽ£πŸ“©

Researchers at CYFIRMA have identified similarities between 'Bahamut' and another Indian state-sponsored group called 'DoNot APT' (APT-C-35), which previously infiltrated Google Play with fake chat apps acting as spyware. πŸ’»πŸ”πŸ‘₯

The 'Safe Chat' app appears authentic, tricking victims into installing it, often under the pretext of transitioning to a more secure platform for communication. The interface looks legitimate, and the user registration process adds credibility, providing a cover for the spyware. πŸ“²βœ‰οΈπŸ•΅οΈβ€β™‚οΈ

The latest campaign by Bahamut targets individuals in South Asia.

πŸ›‘οΈ Top Tips:

  • It's essential to be cautious while downloading apps and avoid suspicious links to protect your personal data from such cyber threats.

    πŸ›‘οΈπŸ”’ Stay informed and stay safe! πŸ˜ŠπŸ‘

So long and thanks for reading all the phish!

Recent articles