While scam connections in Southeast Asia continue to run massive campaigns targeting victims around the world, Wired look deeper how Elon Musk’s satellite internet service provider Starlink keeps many of the connections in Myanmar online. Meanwhile, FTC complaints obtained by Wired that an ‘Openai’ work scams used telegram to recruit workers in Bangladesh before the fraudsters suddenly disappeared.
Wired published the Inside Story of Russian Tech CEO Vladislav Klyushin, which, according to Vladimir Putin’s actions, was part of a significant American Russia prisoner, after being convicted in the US and captured in the US for insider trade. Earlier this week, TVs at the headquarters of the Department of Housing and Urban Development in Washington, DC, showed an apparent AI-generated video on the run of Donald Trump kissing Elon Musk’s feet. The words “Long Live the Real King” were posted about the video.
Wired conducted an investigation into telegram groups devoted to doxing and harassment of women who joined “Are we with the same man?” Groups on Facebook. And since female entrepreneurs in Tech Face have a steeper chance of gaining support for a business, a team of female founders received seed finance and completed a series of A -round in a few months for cloud holder security firm Edera.
But wait, there’s more! Every week we make the security and privacy news that we do not cover in depth ourselves. Click the headings to read the full stories. And stay safe out there.
After years of Russian cyberampression against the United States and its longtime allies – including repeated election medicines, hack and leak operations, disinformation campaigns, extensive spying and fierce, disruptive cyber attacks – the recent actions of the Trump have re -told the US states of the Russian threats. adversaries. The opposite comes when Donald Trump and Russian President Vladimir Putin increasingly strengthened their tires. However, the consistent assessments of the US intelligence community of Russia’s activity in cyberspace and the threat it poses to the US would indicate that such a change in approach could jeopardize the US.
The deprioritization of the Russia threat came in various forms. The Deputy Secretary of the US State Department for International Cyber Security Liesyl Franz said during a speech in a United Nations working group last week that the US was concerned about digital attacks from China and Iran, but that he did not mention Russia. A recent memo distributed at the CyberSecurity and Infrastructure Security Agency outlined priorities for the agency, focusing on China and defending US systems, but has omitted any reference to Russia. And on Friday, the Cybersecurity News Outlet reported the record that Pete Hegseth ordered the US cyber commission last week to stop all cyber operation planning against Russia, including offensive digital campaigns.
Eight days have passed since the Cryptocurrency Exchange has revealed that hackers have stolen Ethereum-based assets worth $ 1.4 billion from the company, a Heist, which, according to some, is the biggest theft of Crypto in history. Now the race is detecting the stolen funds on blockchains, preventing its liquidation, or even recovering it – and the breed is powered by $ 140 million to bedding offered by bit itself. By bit earlier this week, a website launched where it invited Crypto -Sleuths to submit tips on the destination of its stolen Ethereum funds and the offer of 5 percent of the value of any funds that those tracers can identify and help to freeze or seize. Bybit has offered another 5 percent of the value as a separate reward for any crypto exchange or other platform that the funds acquire.
From Friday, the site counted a dozen bounty Hunters, which is currently registered as part of the crypto tracking of the crypto detection and places the score of payout rewards at around $ 4.3 million. The site also contains a scoreline scoring list that successfully identified the funds by following it over blockchains or frozen funds – as well as a list of crypto exchanges that, on the other hand, have liped the stolen funds on behalf of the thieves. So far, only one exchange, known as Exch, has been marked as $ 94 million of the stolen assets. Bybit notes that Excheck refuses to respond to his messages, and the exchange did not respond to a BBC request for comment.
Earlier this week, the FBI took the unusual step to publicly identify the hackers behind the massive Bybit hack: Tradertrainer, a group of state-sponsored cyber criminals working on behalf of the North Korean government. The FBI asked the crypto industry not to wash the funds of the hackers, part of the larger umbrella group commonly known as Lazarus that has long plagued the cryptocurrency world and stole billions of rands in crypto and non-crypto assets. In his warning, the bureau also released a list of Ethereum addresses associated with the stolen funds in an effort to help the crypto industry identify and seize any part of the $ 1.4 billion before it can be paid out. Crypto uplifting firm TRM Labs wrote in a post on Thursday that about $ 400 million of the funds have already been moved and may have been successfully liquidated.
In July, an entity that calls itself “null bullge” published a 1.1-TB TB data stolen from Disney’s internal Slack archive, and cast off a crazy cleaning attempt, while Disney rushed to get a handle about the leaked income numbers, employee information such as passport numbers and sensitive customer information. The offense occurred after a Disney employee, Matthew van Andel, malware involuntarily downloaded on his personal computer who collected his reporting vouchers for a number of services, including the password of great importance to his 1 password -worthy safe. “It’s impossible to convey the feeling of offense,” he told the Wall Street Journal. Van Andel also stole his credit card numbers and other personal data, and then lost his job when a Disney audit from his work computer claimed to have access to porn of the device. Van Andel denies the accusation. The episode is only one in a series of offenses where malware that infects the personal computer of a worker can have major consequences for the institution they employ.
Mattia Ferrari, an Italian priest who works with a migrant rescue group and has a close relationship with the pope, revealed this week that he had received a warning from Meta that his phone was chopped with sophisticated spyware of Paragon in Israelies. The news follows revelations that Luca Casarini, the founder of the NGO Mediterranea who saves people, where Ferrari served as chaplain, also jeopardized his phone by Spyware, just like Italian investigator Francescellato. The range of spyware infections that target Italian activists and a journalist raises the question of who is possibly performing the hacking operations, with opposition leaders calling on the administration of Italian Premier Giorgia Meloni to address the issue. The Meloni government denied being behind the incidents of the hacking. Pope Francis, who is currently in critical condition with pneumonia, mentioned that he spoke during a TV interview with Ferrari during a TV interview in January, which raised the question of whether the spies chopped Ferrari’s phone on a conversation with the pope himself.