From Digital Age to Nano Age. WorldWide.

Tag: information security

Robotic Automations

Ireland privacy watchdog confirms Dell data breach investigation | TechCrunch


A top European privacy watchdog is investigating following the recent breaches of Dell customers’ personal information, TechCrunch has learned.  Ireland’s Data Protection Commission (DPC) deputy commissioner Graham Doyle confirmed to TechCrunch that the DPC has received “a breach notification on this matter” — referring to Dell — which is “currently under assessment.” Asked to elaborate, […]

© 2024 TechCrunch. All rights reserved. For personal use only.


Software Development in Sri Lanka

Robotic Automations

Threat actor says he scraped 49M Dell customer addresses before the company found out | TechCrunch


The person who claims to have 49 million Dell customer records told TechCrunch that he brute-forced an online company portal and scraped customer data, including physical addresses, directly from Dell’s servers.  TechCrunch verified that some of the scraped data matches the personal information of Dell customers. On Thursday, Dell sent an email to customers saying […]

© 2024 TechCrunch. All rights reserved. For personal use only.


Software Development in Sri Lanka

Robotic Automations

Ex-NSA hacker and ex-Apple researcher launch startup to protect Apple devices | TechCrunch


Two veteran security experts are launching a startup that aims to help other makers of cybersecurity products to up their game in protecting Apple devices.

Their startup is called DoubleYou, the name taken from the initials of its co-founder, Patrick Wardle, who worked at the U.S. National Security Agency between 2006 and 2008. Wardle then worked as an offensive security researcher for years before switching to independently researching Apple macOS defensive security. Since 2015, Wardle has developed free and open-source macOS security tools under the umbrella of his Objective-See Foundation, which also organizes the Apple-centric Objective By The Sea conference.

His co-founder is Mikhail Sosonkin, who was also an offensive cybersecurity researcher for years before working at Apple between 2019 and 2021. Wardle, who described himself as “the mad scientist in the lab,” said Sosonkin is the “right partner” he needed to make his ideas reality.

“Mike might not hype himself up, but he is an incredible software engineer,” Wardle said.

The idea behind DoubleYou is that, compared to Windows, there still are only a few good security products for macOS and iPhones. And that’s a problem because Macs are becoming a more popular choice for companies all over the world, meaning malicious hackers are also increasingly targeting Apple computers. Wardle and Sosonkin said there aren’t as many talented macOS and iOS security researchers, which means companies are struggling to develop their products.

Wardle and Sosonkin’s idea is to take a page out of the playbook of hackers that specialize in attacking systems, and applying it to defense. Several offensive cybersecurity companies offer modular products, capable of delivering a full chain of exploits, or just one component of it. The DoubleYou team wants to do just that — but with defensive tools.

“Instead of building, for example, a whole product from scratch, we really took a step back, and we said ‘hey, how do the offensive adversaries do this?’” Wardle said in an interview with TechCrunch. “Can we basically take that same model of essentially democratizing security but from a defensive point of view, where we develop individual capabilities that then we can license out and have other companies integrate into their security products?”

Wardle and Sosonkin believe that they can.

And while the co-founders haven’t decided on the full list of modules they want to offer, they said their product will certainly include a core offering, which includes the analyzing all new process to detect and block untrusted code (which in MacOS means they are not “notarized” by Apple), and monitoring for and blocking anomalous DNS network traffic, which can uncover malware when it connects to domains known to be associated to hacking groups. Wardle said that these, at least for now, will be primarily for macOS.

Also, the founders want to develop tools to monitor software that wants to become persistent — a hallmark of malware, to detect cryptocurrency miners and ransomware based on their behavior, and to detect when software tries to get permission to use the webcam and microphone.

Sosonkin described it as “an off-the-shelf catalog approach,” where every customer can pick and choose what components they need to implement in their product. Wardle described it as being like a supplier of car parts, rather than the maker of the whole car. This approach, Wardle added, is similar to the one he took in developing the various Objective-See tools such as Oversight, which monitors microphone and webcam usage; and KnockKnock, which monitors if an app wants to become persistent.

“We don’t need to use new technology to make this work. What we need is to actually take the tools available and put them in the right place,” Sosonkin said.

Wardle and Sosonkin’s plan, for now, is not to take any outside investment. The co-founders said they want to remain independent and avoid some of the pitfalls of getting outside investment, namely the need to scale too much and too fast, which will allow them to focus on developing their technology.

“Maybe in a way, we are kind of like foolish idealists,” Sosonkin said. “We just want to catch some malware. I hope we can make some money in the process.”


Software Development in Sri Lanka

Robotic Automations

Apex Legends hacker says game developers patched exploit used on streamers | TechCrunch


Last month, a hacker wreaked havoc during an esports tournament of the popular shooter game Apex Legends, hacking two well-known streamers mid-game to make it look like they were using cheats.

A month later, it seems like the hacking saga may have come to a close with the game developers patching the bug exploited by the hacker.

Because of the hack, the organizers had to suspend the tournament on March 17. Two days later, Apex Legends developer Respawn said on its official X account that it had “deployed the first of a layered series of updates to protect the Apex Legends player community.” Then a week later, the company wrote that it had “added another update that is intended to further protect our players and ensure the competitive integrity of Apex Legends.”

Respawn’s posts don’t clearly say that the updates patched the bugs exploited during the tournament. But the hacker behind the cheating scandal told TechCrunch this week that Respawn’s patches fixed the vulnerability that he had exploited to hack the two streamers.

“The exploit I’ve used in [Apex Legends Global Series] is fully patched,” the hacker who goes by Destroyer2009 said in an online chat.

Destroyer2009, who previously told TechCrunch that he had hacked the two streamers “for fun,” said he didn’t want to reveal any technical details of the bug he exploited, even if it is now patched.

“No one likes when severe vulnerabilities in your product are exposed publicly. I asked my friend and we both agreed that we don’t really want to publicly expose what happened from a technical perspective yet,” the hacker said, referring to a friend he worked with to develop the hack.

Contact Us

Do you know more about this hack? Or other video game hacking incidents? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or email. You also can contact TechCrunch via SecureDrop.

Referring to an unrelated botched in-game update by Respawn this week, Destroyer2009 said: “[I] don’t think embarrassing them even more is fair.”

Destroyer2009 said he tested his exploit after Respawn’s announcement of the second update on March 26, although he said it’s possible it was patched sooner because he didn’t have a chance to test it before.

Destroyer2009’s hacks were high-profile, disruptive, and caused a big stir in the Apex Legends community. The two streamers targeted, ImperialHal and Geburten, collectively have 2.5 million followers on the game streaming platform Twitch, and several other Apex Legends players and streamers commented on the news of the hacks on their channels.

Yet, Respawn isn’t being forthcoming about the patches it released. TechCrunch asked Respawn and Electronic Arts, the owners of the development studio, to confirm whether the exploit used by Destroyer2009 is indeed patched, and if so, when it was patched.

But neither Respawn nor Electronic Arts responded to TechCrunch’s multiple requests for comment. The two companies did not respond to requests for comment in the last few weeks either.

Meanwhile, Destroyer2009 said he won’t do any more public hacks for now, because “anything more severe than the [Apex tournament hack] accident will be already considered as a real hacking with all the consequences so [probably] will just play the game until it gets boring as usual.”




Software Development in Sri Lanka

Robotic Automations

A crypto wallet maker's warning about an iMessage bug sounds like a false alarm | TechCrunch


A crypto wallet maker claimed this week that hackers may be targeting people with an iMessage “zero-day” exploit — but all signs point to an exaggerated threat, if not a downright scam.

Trust Wallet’s official X (previously Twitter) account wrote that “we have credible intel regarding a high-risk zero-day exploit targeting iMessage on the Dark Web. This can infiltrate your iPhone without clicking any link. High-value targets are likely. Each use raises detection risk.”

The wallet maker recommended iPhone users to turn off iMessage completely “until Apple patches this,” even though no evidence shows that “this” exists at all.

The tweet went viral, and has been viewed over 3.6 million times as of our publication. Because of the attention the post received, Trust Wallet hours later wrote a follow-up post. The wallet maker doubled down on its decision to go public, saying that it “actively communicates any potential threats and risks to the community.”

Trust Wallet, which is owned by crypto exchange Binance, did not respond to TechCrunch’s request for comment. Apple spokesperson Scott Radcliffe declined to comment when reached Tuesday.

As it turns out, according to Trust Wallet’s CEO Eowyn Chen, the “intel” is an advertisement on a dark web site called CodeBreach Lab, where someone is offering said alleged exploit for $2 million in bitcoin cryptocurrency. The advert titled “iMessage Exploit” claims the vulnerability is a remote code execution (or RCE) exploit that requires no interaction from the target — commonly known as “zero-click” exploit — and works on the latest version of iOS. Some bugs are called zero-days because the vendor has no time, or zero days, to fix the vulnerability. In this case, there is no evidence of an exploit to begin with.

A screenshot of the dark web ad claiming to sell an alleged iMessage exploit. Image Credits: TechCrunch

RCEs are some of the most powerful exploits because they allow hackers to remotely take control of their target devices over the internet. An exploit like an RCE coupled with a zero-click capability is incredibly valuable because those attacks can be conducted invisibly without the device owner knowing. In fact, a company that acquires and resells zero-days is currently offering between $3 to $5 million for that kind of zero-click zero-day, which is also a sign of how hard it is to find and develop these types of exploits.

Contact Us

Do you have any information about actual zero-days? Or about spyware providers? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram, Keybase and Wire @lorenzofb, or email. You also can contact TechCrunch via SecureDrop.

Given the circumstances of how and where this zero-day is being sold, it’s very likely that it is all just a scam, and that Trust Wallet fell for it, spreading what people in the cybersecurity industry would call FUD, or “fear uncertainty and doubt.”

Zero-days do exist, and have been used by government hacking units for years. But in reality, you probably don’t need to turn off iMessage unless you are a high-risk user, such as a journalist or dissident under an oppressive government, for example.

It’s better advice to suggest people turn on Lockdown Mode, a special mode that disables certain Apple device features and functionalities with the goal of reducing the avenues hackers can use to attack iPhones and Macs.

According to Apple, there is no evidence anyone has successfully hacked someone’s Apple device while using Lockdown Mode. Several cybersecurity experts like Runa Sandvik and the researchers who work at Citizen Lab, who have investigated dozens of cases of iPhone hacks, recommend using Lockdown Mode.

For its part, CodeBreach Lab appears to be a new website with no track record. When we checked, a search on Google returned only seven results, one of which is a post on a well-known hacking forum asking if anyone had previously heard of CodeBreach Lab.

On its homepage — with typos — CodeBreach Lab claims to offer several types of exploits other than for iMessage, but provides no further evidence.

The owners describe CodeBreach Lab as “the nexus of cyber disruption.” But it would probably be more fitting to call it the nexus of braggadocio and naivety.

TechCrunch could not reach CodeBreach Lab for comment because there is no way to contact the alleged company. When we attempted to buy the alleged exploit — because why not — the website asked for the buyer’s name, email address, and then to send $2 million in bitcoin to a specific wallet address on the public blockchain. When we checked, nobody has so far.

In other words, if someone wants this alleged zero-day, they have to send $2 million to a wallet that, at this point, there is no way to know who it belongs to, nor — again — any way to contact.

And there is a very good chance that it will remain that way.




Software Development in Sri Lanka

Back
WhatsApp
Messenger
Viber