Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label Online Security. Show all posts

SurveyLama Data Breach Exposes Millions of Users' Information

 



A major data breach has impacted the online survey platform SurveyLama, putting the sensitive data of over four million individuals at risk. The breach, which occurred in February of this year, was confirmed by the company to Troy Hunt, the creator of the well-known website Have I Been Pwned?, which tracks email addresses exposed in data breaches.

What Happened:

Unknown attackers gained unauthorised access to SurveyLama's database, compromising users' names, dates of birth, email addresses, IP addresses, passwords, phone numbers, and postal addresses. This breach leaves users vulnerable to identity theft and phishing scams.

Implications for Users:

SurveyLama rewards its users for completing surveys, making them potential targets for phishing emails. While passwords were stored in encrypted forms (salted SHA-1, bcrypt, and argon2 hashes), some could still be susceptible to brute-force attacks, especially those hashed with SHA-1, which has known vulnerabilities. Users are strongly advised to update their passwords immediately as a precautionary measure.

Protective Measures:

SurveyLama has reportedly notified affected users via email about the breach. However, users should remain cautious of any suspicious emails, particularly those promising rewards in exchange for quick action. Although the stolen information has not yet been publicly posted or sold on the dark web, proactive steps should be taken to secure accounts.

Expert Insight:

Troy Hunt, upon receiving information about the breach, independently verified the data's authenticity. SurveyLama confirmed the security incident and assured users that passwords were stored in encrypted forms. Nonetheless, users are encouraged to reset their passwords not only on SurveyLama but also on other platforms where similar credentials may have been used.

While SurveyLama has taken steps to address the breach and notify affected users, the potential risks remain significant. The possibility of the stolen data being exploited privately or leaked to cybercriminals underscores the importance of immediate action by users to safeguard their personal information.

All in all, the SurveyLama data breach serves as a reminder of the ever-present threats to online security and the importance of vigilance in protecting personal data. Users must stay informed, remain cautious of suspicious activities, and take proactive measures to enhance their online security posture.


What Are The Risks of Generative AI?

 




We are all drowning in information in this digital world and the widespread adoption of artificial intelligence (AI) has become increasingly commonplace within various spheres of business. However, this technological evolution has brought about the emergence of generative AI, presenting a myriad of cybersecurity concerns that weigh heavily on the minds of Chief Information Security Officers (CISOs). Let's synthesise this issue and see the intricacies from a microscopic light.

Model Training and Attack Surface Vulnerabilities:

Generative AI collects and stores data from various sources within an organisation, often in insecure environments. This poses a significant risk of data access and manipulation, as well as potential biases in AI-generated content.


Data Privacy Concerns:

The lack of robust frameworks around data collection and input into generative AI models raises concerns about data privacy. Without enforceable policies, there's a risk of models inadvertently replicating and exposing sensitive corporate information, leading to data breaches.


Corporate Intellectual Property (IP) Exposure:

The absence of strategic policies around generative AI and corporate data privacy can result in models being trained on proprietary codebases. This exposes valuable corporate IP, including API keys and other confidential information, to potential threats.


Generative AI Jailbreaks and Backdoors:

Despite the implementation of guardrails to prevent AI models from producing harmful or biased content, researchers have found ways to circumvent these safeguards. Known as "jailbreaks," these exploits enable attackers to manipulate AI models for malicious purposes, such as generating deceptive content or launching targeted attacks.


Cybersecurity Best Practices:

To mitigate these risks, organisations must adopt cybersecurity best practices tailored to generative AI usage:

1. Implement AI Governance: Establishing governance frameworks to regulate the deployment and usage of AI tools within the organisation is crucial. This includes transparency, accountability, and ongoing monitoring to ensure responsible AI practices.

2. Employee Training: Educating employees on the nuances of generative AI and the importance of data privacy is essential. Creating a culture of AI knowledge and providing continuous learning opportunities can help mitigate risks associated with misuse.

3. Data Discovery and Classification: Properly classifying data helps control access and minimise the risk of unauthorised exposure. Organisations should prioritise data discovery and classification processes to effectively manage sensitive information.

4. Utilise Data Governance and Security Tools: Employing data governance and security tools, such as Data Loss Prevention (DLP) and threat intelligence platforms, can enhance data security and enforcement of AI governance policies.


Various cybersecurity vendors provide solutions tailored to address the unique challenges associated with generative AI. Here's a closer look at some of these promising offerings:

1. Google Cloud Security AI Workbench: This solution, powered by advanced AI capabilities, assesses, summarizes, and prioritizes threat data from both proprietary and public sources. It incorporates threat intelligence from reputable sources like Google, Mandiant, and VirusTotal, offering enterprise-grade security and compliance support.

2. Microsoft Copilot for Security: Integrated with Microsoft's robust security ecosystem, Copilot leverages AI to proactively detect cyber threats, enhance threat intelligence, and automate incident response. It simplifies security operations and empowers users with step-by-step guidance, making it accessible even to junior staff members.

3. CrowdStrike Charlotte AI: Built on the Falcon platform, Charlotte AI utilizes conversational AI and natural language processing (NLP) capabilities to help security teams respond swiftly to threats. It enables users to ask questions, receive answers, and take action efficiently, reducing workload and improving overall efficiency.

4. Howso (formerly Diveplane): Howso focuses on advancing trustworthy AI by providing AI solutions that prioritize transparency, auditability, and accountability. Their Howso Engine offers exact data attribution, ensuring traceability and accountability of influence, while the Howso Synthesizer generates synthetic data that can be trusted for various use cases.

5. Cisco Security Cloud: Built on zero-trust principles, Cisco Security Cloud is an open and integrated security platform designed for multicloud environments. It integrates generative AI to enhance threat detection, streamline policy management, and simplify security operations with advanced AI analytics.

6. SecurityScorecard: SecurityScorecard offers solutions for supply chain cyber risk, external security, and risk operations, along with forward-looking threat intelligence. Their AI-driven platform provides detailed security ratings that offer actionable insights to organizations, aiding in understanding and improving their overall security posture.

7. Synthesis AI: Synthesis AI offers Synthesis Humans and Synthesis Scenarios, leveraging a combination of generative AI and cinematic digital general intelligence (DGI) pipelines. Their platform programmatically generates labelled images for machine learning models and provides realistic security simulation for cybersecurity training purposes.

These solutions represent a diverse array of offerings aimed at addressing the complex cybersecurity challenges posed by generative AI, providing organizations with the tools needed to safeguard their digital assets effectively.

While the adoption of generative AI presents immense opportunities for innovation, it also brings forth significant cybersecurity challenges. By implementing robust governance frameworks, educating employees, and leveraging advanced security solutions, organisations can navigate these risks and harness the transformative power of AI responsibly.

Are GPUs Ready for the AI Security Test?

 


As generative AI technology gains momentum, the focus on cybersecurity threats surrounding the chips and processing units driving these innovations intensifies. The crux of the issue lies in the limited number of manufacturers producing chips capable of handling the extensive data sets crucial for generative AI systems, rendering them vulnerable targets for malicious attacks.

According to recent records, Nvidia, a leading player in GPU technology, announced cybersecurity partnerships during its annual GPU technology conference. This move underscores the escalating concerns within the industry regarding the security of chips and hardware powering AI technologies.

Traditionally, cyberattacks garner attention for targeting software vulnerabilities or network flaws. However, the emergence of AI technologies presents a new dimension of threat. Graphics processing units (GPUs), integral to the functioning of AI systems, are susceptible to similar security risks as central processing units (CPUs).


Experts highlight four main categories of security threats facing GPUs:


1. Malware attacks, including "cryptojacking" schemes where hackers exploit processing power for cryptocurrency mining.

2. Side-channel attacks, exploiting data transmission and processing flaws to steal information.

3. Firmware vulnerabilities, granting unauthorised access to hardware controls.

4. Supply chain attacks, targeting GPUs to compromise end-user systems or steal data.


Moreover, the proliferation of generative AI amplifies the risk of data poisoning attacks, where hackers manipulate training data to compromise AI models.

Despite documented vulnerabilities, successful attacks on GPUs remain relatively rare. However, the stakes are high, especially considering the premium users pay for GPU access. Even a minor decrease in functionality could result in significant losses for cloud service providers and customers.

In response to these challenges, startups are innovating AI chip designs to enhance security and efficiency. For instance, d-Matrix's chip partitions data to limit access in the event of a breach, ensuring robust protection against potential intrusions.

As discussions surrounding AI security evolve, there's a growing recognition of the need to address hardware and chip vulnerabilities alongside software concerns. This shift reflects a proactive approach to safeguarding AI technologies against emerging threats.

The intersection of generative AI and GPU technology highlights the critical importance of cybersecurity in the digital age. By understanding and addressing the complexities of GPU security, stakeholders can mitigate risks and foster a safer environment for AI innovation and adoption.


Massive Data Breach Sends Shockwaves Through Businesses

 



A colossal breach of data has rattled the digital world affecting billions of users across various platforms and organisations. This vile breach, dubbed the "mother of all breaches" (MOAB), has exposed a staggering 26 billion entries, including those from LinkedIn, Twitter, Dropbox, and others. Government agencies in several countries have also been hit.

The implications for businesses are imminent. The leaked data, totaling 12 terabytes, poses an ongoing threat to personal information and corporate security. It not only comprises information from past breaches but also includes new data, providing cybercriminals with a comprehensive toolkit for orchestrating various cyberattacks, including identity theft.

In response to this unprecedented threat, businesses are urged to adopt a proactive stance in monitoring their infrastructure. Key signals to watch for include unusual access scenarios, suspicious account activity, a surge in phishing attempts, abnormal network traffic, an increase in helpdesk requests, and customer complaints about unauthorised access or suspicious transactions.

This incident underscores the need for a new security paradigm, where companies prioritise user security over user experience. While some may resist this shift, it is essential for long-term protection against cyber threats. Implementing global security standards such as ISO/IEC 27001 and enhancing authentication policies are crucial steps in fortifying defences.

Authentication measures like multi-factor authentication and liveness detection technology are rapidly gaining traction as the go-to standards across industries. These methods not only reinforce security but also seamlessly integrate into user experiences, striking a delicate balance between safeguarding sensitive data and ensuring user convenience. By embracing these sophisticated authentication techniques, businesses can erect formidable defences against cyber threats while enhancing overall user satisfaction.

The recent MOAB incident serves as a sign of trouble for businesses worldwide to bolster their defence mechanisms and hone their cyber acumen. While the paramountcy of data security cannot be overstated, it is equally crucial for companies, particularly those engaging with consumers directly, to uphold user-friendly processes. By harmonising stringent security measures with intuitive and accessible procedures, businesses can adeptly traverse the complex system of cybersecurity, instilling trust among stakeholders and effectively mitigating potential risks in a rampant semblance of digital development.

To get a hold of the events, the MOAB data breach underlines the exponential need for businesses to invest in robust security measures while ensuring a smooth user experience. By staying a step ahead and proactive, companies can mitigate the risks posed by cyber threats and safeguard their customers' sensitive information.


Security Flaws Discovered in ChatGPT Plugins

 


Recent research has surfaced serious security vulnerabilities within ChatGPT plugins, raising concerns about potential data breaches and account takeovers. These flaws could allow attackers to gain control of organisational accounts on third-party platforms and access sensitive user data, including Personal Identifiable Information (PII).

According to Darren Guccione, CEO and co-founder of Keeper Security, the vulnerabilities found in ChatGPT plugins pose a significant risk to organisations as employees often input sensitive data, including intellectual property and financial information, into AI tools. Unauthorised access to such data could have severe consequences for businesses.

In November 2023, ChatGPT introduced a new feature called GPTs, which function similarly to plugins and present similar security risks, further complicating the situation.

In a recent advisory, the Salt Security research team identified three main types of vulnerabilities within ChatGPT plugins. Firstly, vulnerabilities were found in the plugin installation process, potentially allowing attackers to install malicious plugins and intercept user messages containing proprietary information.

Secondly, flaws were discovered within PluginLab, a framework for developing ChatGPT plugins, which could lead to account takeovers on third-party platforms like GitHub.

Lastly, OAuth redirection manipulation vulnerabilities were identified in several plugins, enabling attackers to steal user credentials and execute account takeovers.

Yaniv Balmas, vice president of research at Salt Security, emphasised the growing popularity of generative AI tools like ChatGPT and the corresponding increase in efforts by attackers to exploit these tools to gain access to sensitive data.

Following coordinated disclosure practices, Salt Labs worked with OpenAI and third-party vendors to promptly address these issues and reduce the risk of exploitation.

Sarah Jones, a cyber threat intelligence research analyst at Critical Start, outlined several measures that organisations can take to strengthen their defences against these vulnerabilities. These include:


1. Implementing permission-based installation: 

This involves ensuring that only authorised users can install plugins, reducing the risk of malicious actors installing harmful plugins.

2. Introducing two-factor authentication: 

By requiring users to provide two forms of identification, such as a password and a unique code sent to their phone, organisations can add an extra layer of security to their accounts.

3. Educating users on exercising caution with code and links: 

It's essential to train employees to be cautious when interacting with code and links, as these can often be used as vectors for cyber attacks.

4. Monitoring plugin activity constantly: 

By regularly monitoring plugin activity, organisations can detect any unusual behaviour or unauthorised access attempts promptly.

5. Subscribing to security advisories for updates:

Staying informed about security advisories and updates from ChatGPT and third-party vendors allows organisations to address vulnerabilities and apply patches promptly.

As organisations increasingly rely on AI technologies, it becomes crucial to address and mitigate the associated security risks effectively.


Unveiling the Power of Zero-Knowledge Proofs in Blockchain Technology

In the dynamic realm of blockchain technology, a groundbreaking innovation is emerging as a beacon of privacy and security: Zero-Knowledge Proofs (ZKPs). These cryptographic marvels are poised to redefine the landscape of blockchain transactions, offering unparalleled privacy and integrity. Let's delve into the intricate world of ZKPs and explore their transformative potential within the blockchain ecosystem. 

Let’s Understand What is ZKPs Zero-knowledge Proofs 

(ZKPs) stand as a cornerstone of modern cryptography, enabling individuals to assert knowledge of specific data without disclosing the data itself. Their utility extends across various domains, particularly in scenarios where data confidentiality is paramount. 

Privacy on Blockchains: While blockchains offer transparency, preserving privacy is often crucial, especially when dealing with sensitive financial or personal information within smart contracts. To safeguard this data, smart contracts typically require specific inputs before execution. 

Prover and Verifier: In Zero-Knowledge Proofs (ZKPs), one party (the prover) demonstrates cryptographically to another party (the verifier) that they possess accurate knowledge of hidden data. The data remains undisclosed, known only to the prover with a high level of certainty. 

Maintaining Privacy: ZKPs emerge as a key method for ensuring privacy on public blockchains. They enable the prover to prove knowledge without revealing the actual data, crucial for preserving confidentiality in transactions. 

Enhanced Security: Beyond privacy, ZKPs also bolster security. With 66% of organizations experiencing cyber attacks in the past year, such technology becomes increasingly vital for safeguarding sensitive information. 

Understand With This Example: 
Imagine your friend, Chani, claims she knows the password to your favorite online game but does not want to reveal it. Instead, she aims to prove her knowledge without disclosing the password itself. Enter Zero-Knowledge Proofs (ZKPs). 

In this scenario, Chani serves as the prover, while you are the verifier. Chani seeks to demonstrate her knowledge of the password without giving it away. Using a Zero-Knowledge Proof, Chani can achieve this by engaging in a series of interactions with you that showcase her knowledge without directly revealing the password. 

For example, Chani might ask you to input any word as a password and then perform a sequence of actions that only someone aware of the actual password could execute correctly. Perhaps she requests you to enter the password into a login screen multiple times, each time making slight modifications to the input to prove her familiarity with the correct password. After witnessing several successful attempts, you become convinced of Chani's knowledge of the password, even though she never explicitly discloses it. 

In this manner, Chani effectively proves her knowledge without divulging any additional information beyond the fact that she knows the password. This straightforward illustration underscores the efficacy of Zero-Knowledge Proofs in real-life scenarios, enabling individuals to demonstrate possession of specific knowledge without exposing the knowledge itself. Such a concept finds broad applicability across various domains, including cryptography, cybersecurity, and everyday interactions where privacy and security are paramount. 

Understand How ZKP Works? 

Advanced Verification: This is like a security guard checking if someone trying to enter a restricted area knows the secret moves or actions. If someone tries to fake it, the security system detects the trickery. 

Interactive ZKP: This is when the prover has to go through the secret handshake process separately with each verifier every time they want to prove their knowledge. 

Non-Interactive ZKP: Here, the prover creates a special proof that anyone else who knows the secret handshake can easily check without having to interact directly with the prover. It is like having a stamp of approval that others can use to verify your knowledge. 

Zero-Knowledge Proofs (ZKPs) Come in Different Types, Each With its Own Strengths: 

PLONK: This ZKP is highly versatile and can handle various tasks involving many people. It is like a Swiss Army knife of ZKPs, ready for any challenge. 

ZK-SNARKS: These proofs are fast and easy to verify. They are like simple puzzles that you can quickly solve once you have the right pieces. Using smart math tricks, they keep things running smoothly. 

ZK-STARKS: These proofs are lightning-fast. They do not need much chatting back and forth between the prover and verifier, so they speed through the process. 

Bulletproofs: These ZKPs are short and to the point. They do not require any special setup, making them perfect for keeping cryptocurrency transactions private without relying on trust. 

Zero-Knowledge Proofs (ZKPs) are rapidly becoming a standard in various fields, offering solutions to pressing challenges. They enable private transactions, as seen in cryptocurrencies like Zcash, ensuring anonymity for users. Additionally, ZKPs contribute to decentralized identity systems, safeguarding personal information while allowing for verification. Furthermore, they facilitate verifiable computations in decentralized networks, enhancing the trustworthiness of smart contracts accessing off-chain data. With their versatility and security features, ZKPs are poised to continue revolutionizing cybersecurity, Web3 projects, and beyond, shaping the future of digital transactions and identity management. 

Everything You Need To Know About VPN

 


In an era where our daily lives intertwine with the digital world, the internet becomes both a companion and a potential threat, understanding the role of Virtual Private Networks (VPNs) is key to safeguarding your online experience. Whether you're working remotely, enjoying a coffee shop's Wi-Fi, or travelling, a VPN functions as a dependable safeguard against potential security risks.


What is a VPN? 

A VPN, or Virtual Private Network, is your online security guard. Its purpose is to create a secure, private tunnel over the internet, encrypting your data and protecting it from prying eyes. This extra layer of security is especially crucial given the internet's initial design prioritising data transfer reliability over privacy.


How does it work? 

Imagine your computer wanting to visit a website like ZDNET. Instead of sending unprotected data, a VPN encrypts it and sends it through a secure tunnel to a VPN server. This server then decrypts the information, establishing a safe connection between your device and the destination, ensuring your data remains confidential.

There are two main types of VPNs. Corporate VPNs connect private networks within the same organisation over the internet, securing data transmission. Consumer VPNs, offered as a service, protect your data transmission to the provider's data centre, enhancing security, especially on public Wi-Fi.


When should you use a VPN? 

Whenever you're away from your secure home or office network and using public Wi-Fi, a VPN is your go-to. It adds an extra layer of protection against potential snoopers on open networks, especially when accessing services with personal information.

Choosing the right VPN service matters. While free VPNs exist, they often come with privacy risks. Some are even set up by malicious entities to harvest personal data. Opting for a reputable paid VPN service is a safer choice.

However, a VPN does not serve as an infallible solution for privacy. While it secures your connection, it does not have the capability to prevent websites from tracking your activities. Users are advised to maintain vigilance regarding potential privacy infringements that may extend beyond the scope of the VPN.


Concerned about your computer slowing down? 

Advancements in CPU performance have effectively mitigated the impact of data encryption and decryption processes. However, network performance remains susceptible to the quality of public Wi-Fi and the geographical location of the VPN server. 

Certain VPN services may impose limitations on usage, such as data caps or speed restrictions. These restrictions are often associated with free services. Therefore, opting for a dependable paid service that aligns with your specific requirements becomes imperative.

In the domain of online security, VPNs play a pivotal role. Whether safeguarding sensitive work data or ensuring privacy on public networks, a comprehensive understanding of VPN fundamentals empowers users to traverse the internet securely. It is advised to make informed choices, stay updated, and consider your VPN as a reliable tool for online protection.


Cloudflare Faces Cybersecurity Breach in Okta Supply-Chain Attack



Cloudflare, a prominent Internet security and DDoS protection company, recently fell victim to a cyberattack linked to the widespread Okta supply-chain campaign last fall. The breach, affecting Cloudflare's Atlassian Bitbucket, Confluence, and Jira platforms, commenced on Thanksgiving Day.

Cloudflare, in collaboration with industry and government partners, determined that a nation-state attacker aimed to gain persistent and widespread access to its global network. Working with CrowdStrike, the company found that cyber attackers initially accessed the internal wiki (Confluence) and bug database (Jira). They later established persistence on the Atlassian server and proceeded to explore potential points of entry. The assailants successfully breached Cloudflare's source code management system (Bitbucket) and an AWS instance.

The analysis revealed the attackers sought information about the configuration and management of Cloudflare's global network. They accessed various Jira tickets related to vulnerability management, secret rotation, MFA bypass, network access, and the company's response to the Okta incident. Fortunately, due to network segmentation and a zero-trust authentication approach limiting lateral movement, the attackers were largely prevented from accessing critical systems.

Despite minimal access, Cloudflare took comprehensive measures, rotating over 5,000 production credentials, segmenting test and staging systems, and conducting forensic triages on nearly 5,000 systems. The company also reimaged and rebooted every machine in its global network and all Atlassian products.

Experts emphasise the severity of supply chain attacks, highlighting the risk of non-human access being exploited by attackers to gain high-privilege access to internal systems. This breach underscores the importance of monitoring both cloud-based and on-premises solutions.

Notably, Cloudflare identified the compromise's connection to a prior Okta breach in October. Okta, an identity and access management services provider, disclosed a compromise in its customer support case management system, exposing sensitive customer data. The attackers leveraged access tokens and service account credentials obtained during the Okta compromise. All threat actor access was terminated on November 24, according to CrowdStrike.

In response, Cloudflare conducted a thorough security remediation, emphasising the need for credential rotation after a security incident. Okta confirmed its prior notification to customers about the October security incident, urging them to rotate credentials and providing indicators of compromise.

This incident draws attention to the ongoing challenges posed by sophisticated cyber threats, making it clear that the importance of continuous vigilance and proactive security measures is substantial. The collaboration between companies and security experts remains crucial in mitigating the impact of such attacks.

As cybersecurity threats continue to evolve, it is imperative for organisations to stay informed, implement robust security practices, and prioritise swift responses to potential breaches.


Interpol's Operation 'Synergia' Secures Numerous Cybercriminal Arrests, Disrupts Global C2s

 

An international operation aimed at countering the rising threat of phishing, banking malware, and ransomware attacks globally has successfully dismantled command-and-control (C2) servers across Africa and the Middle East. Led by Interpol, the Synergia operation engaged 60 law enforcement agencies, including 17 from the Middle East and Africa (MEA) region. 

Notably, significant takedowns occurred in South Sudan and Zimbabwe, resulting in four arrests. Kuwait law enforcement collaborated with Internet Service Providers (ISPs) to identify victims, conduct field investigations, and provide technical guidance to mitigate the impacts of cyber threats.

Collaborating with local law enforcement and cybersecurity firms such as Group-IB, Kaspersky, ShadowServer, Team Cymru, and TrendMicro, Interpol executed the operation from September to November. The global initiative led to the arrest of 31 individuals and the identification of 70 additional suspects.

Beyond the MEA region, the operation yielded notable results worldwide:

- Europe witnessed the majority of C2 server takedowns, resulting in 26 arrests.
- The Hong Kong and Singapore Police successfully took down 153 and 86 servers, respectively.
- Bolivia mobilized various public authorities to identify malware and vulnerabilities.

Synergia also uncovered malicious infrastructure and resources in over 50 countries, spread across 200 web hosting providers globally. Currently, 70% of the C2 servers have been taken offline, with the remainder under investigation.

Bernardo Pillot, Assistant Director to the Interpol Cybercrime Directorate, emphasized the collaborative efforts of multiple countries and partners, underscoring the commitment to safeguarding the digital space. By dismantling the infrastructure supporting phishing, banking malware, and ransomware attacks, the operation aims to create a more secure online environment for users worldwide.

Mercedes-Benz Accidentally Leaked Private Data, Including Source Code

 

Mercedes-Benz unintentionally leaked a trove of internal data by leaving an obscure key online that gave "unrestricted access" to the company's source code, according to the security research team that unearthed it. 

TechCrunch was notified of the exposure by RedHunt Labs' co-founder and chief technology officer Shubham Mittal, who also requested help in notifying the automaker. The London-based cybersecurity firm claimed that during a standard internet scan in January, it found the authentication token of a Mercedes employee in a public GitHub project.

According to Mittal, this token, which is a substitute to using a password for authentication on GitHub, could allow anyone complete access to Mercedes's GitHub Enterprise Server, allowing them to acquire the company's proprietary source code repositories. 

“The GitHub token gave ‘unrestricted’ and ‘unmonitored’ access to the entire source code hosted at the internal GitHub Enterprise Server,” Mittal explained. “The repositories include a large amount of intellectual property… connection strings, cloud access keys, blueprints, design documents, [single sign-on] passwords, API Keys, and other critical internal information.”

Mittal provided TechCrunch evidence that Mercedes source code, a Postgres database, and keys for Microsoft Azure and Amazon Web Services (AWS) were all there in the exposed repository. If any customer data was present in the repositories is unknown. 

Mercedes was informed of the security flaw by TechCrunch on Monday of last week. Mercedes official Katja Liesenfeld stated on Wednesday that the company has revoked the respective API token and removed the public repository immediately. 

“We can confirm that internal source code was published on a public GitHub repository by human error. The security of our organisation, products, and services is one of our top priorities. We will continue to analyse this case according to our normal processes. Depending on this, we implement remedial measures,” Liesenfeld added. 

Mercedes declined to comment on whether it was aware of any unauthorised access by third parties to the leaked data or whether it possesses the technological know-how, such as access logs, to ascertain whether unauthorised access to its data repositories occurred. The representative gave vague security justifications. 

The personal information of Hyundai Motor India customers who had their vehicles serviced at Hyundai-owned stations throughout India, including names, mailing addresses, email addresses, and phone numbers, was exposed due to a bug that was fixed by the company's India subsidiary, as TechCrunch exclusively reported earlier this month.

Zeppelin2 Ransomware: An Emerging Menace in the Dark Web Ecosystem

 

In a recent update from an underground online forum, a user is actively promoting the sale of Zeppelin2 ransomware, providing both its source code and a cracked version of its builder tool. This malicious software, known for its destructive capabilities, has garnered the attention of cybersecurity experts and law enforcement agencies globally.

The forum post asserts that the user successfully breached the security measures of the Zeppelin2 builder tool, originally designed for data encryption. The post includes screenshots of the source code, shedding light on the intricate details of the build process and revealing that the ransomware is programmed in Delphi.

The Zeppelin2 ransomware builder tool, being promoted by the threat actor, showcases various features, such as file settings, ransom notes, IP logging, startup commands, task killers, and auto-unlocking busy files. The threat actor underscores the ransomware's capability to comprehensively encrypt files, rendering data recovery impossible without a unique private key held by the attackers.

Upon completing the encryption process, victims are presented with a ransom note declaring the encryption of all their files. The note instructs victims to contact the attackers via email and offers a method for testing the legitimacy of the decryptor by sending a non-valuable file.

Reports indicate that Zeppelin2 ransomware demands ransom payments in Bitcoin, with extortion amounts ranging from several thousand dollars to over a million dollars. The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have jointly issued a cybersecurity advisory to address the Zeppelin2 threat.

Zeppelin2, employed by threat actors since 2019 and continuing at least until June 2022, targets various sectors through its ransomware-as-a-service (RaaS) model. These sectors include defense contractors, educational institutions, manufacturers, technology companies, and notably, organizations in the healthcare and medical industries.

The ransomware's modus operandi involves exploiting vulnerabilities such as remote desktop protocol (RDP) exploitation, SonicWall firewall vulnerabilities, and phishing campaigns to gain access to victim networks. Before deploying the Zeppelin2 ransomware, threat actors meticulously map and enumerate the victim's network, identifying critical data enclaves, including cloud storage and network backups.

Consistent with ransomware groups, Zeppelin2 operators exfiltrate sensitive corporate data with the intention of making it accessible to buyers or the public if the victim resists complying with their demands.

Of significance, the FBI has observed instances where Zeppelin2 actors execute their malware multiple times within a victim's network, generating different IDs or file extensions for each attack instance, necessitating multiple unique decryption keys.

Parent Company of CBS and Paramount Discloses Cybersecurity Breach Impacting 80K Individuals

 

The parent company of CBS and Paramount, National Amusements, has recently reported a data breach that occurred a year ago, affecting 82,128 individuals. TechCrunch initially covered the incident, which was disclosed in a legal filing with the Attorney General of Maine under the state's 2005 digital privacy law. Despite the company not making public comments about the breach beyond the legal filing, it remains unclear whether the compromised data pertains to customers or exclusively employees.

According to Maine's data breach notification, the hack took place from December 13 to 15, 2022, with 82,128 people impacted, including 64 Maine residents. The notice, filed by National Amusements' senior vice president of human resources, suggests a focus on internal employee data. 

The company reportedly began notifying affected customers in writing on December 22, 2023, approximately 372 days after the breach was identified. In a letter to victims, National Amusements stated that it became aware of suspicious network activity on or about December 15, 2022, taking immediate steps to secure its network.

However, an inconsistency arises as the notice from Maine's Attorney General's office lists the "date breach discovered" as August 23, 2023. This indicates that the company may not have been aware of the intrusion until eight months after the incident, contradicting the claim of immediate action.

The legal filing mentions that hackers accessed financial information, including account and credit/debit card numbers in combination with security codes, access codes, passwords, or PINs. National Amusements has committed to providing 12 months of Experian credit monitoring and identity theft services to individuals whose social security numbers were compromised.

Engadget has reached out to National Amusements for confirmation and additional information.  

It's important to note that National Amusements, which gained a controlling stake in Paramount and CBS in 2019 through the Viacom-CBS merger, experienced a separate hack from the one disclosed by Paramount in August through Massachusetts' Attorney General's Office. The latter breach was reported to have occurred between May and June 2023.

Hackers are Launching DDoS Attacks During Peak Business Hours

 

Threat groups' tactics to avoid detection and cause harm are becoming increasingly sophisticated. Many security practitioners have seen distributed denial-of-service (DDoS) attacks carried out during peak business hours, when firms are more likely to be understaffed and caught off guard.

DDoS attacks are a year-round threat, but we've seen an increase in attacks around the holiday season. Microsoft mitigated an average of 1,435 assaults per day in 2022. These attacks peaked on September 22, 2022, with roughly 2,215 documented attacks, and continued at a greater volume until the last week of December. From June to August, the number of attacks were reduced.

One reason for this trend could be that many organisations operate with fewer security staff and limited resources to monitor their networks and apps during the holidays. The huge volume of traffic and income made by organisations during this peak business season make this time of year even more tempting to attackers. 

Cybercriminals frequently take advantage of this opportunity to carry out lucrative attacks at a low cost. A DDoS assault can be ordered via a DDoS subscription service for as little as $5 under a cybercrime-as-a-service business model. In the meantime, small and medium-sized businesses spend an average of $120,000 to restore services and manage operations during a DDoS attack. 

With this knowledge, security teams can take preemptive steps to fight against DDoS assaults during busy business seasons. Continue reading to find out how. 

Understanding the varieties of DDoS attacks 

Before we can discuss how to protect against DDoS attacks, we must first comprehend what they are. DDoS attacks are classified into three groups, each with its own set of cyberattacks. Attackers can utilise a variety of attack types against a network, including those from distinct categories. 

The first type of attack is a volumetric attack. This type of attack focuses on bandwidth and is intended to overload the network layer with traffic. A domain name server (DNS) amplification attack, which leverages open DNS servers to flood a target with DNS answer traffic, is one example.

Then there are protocol attacks. This category primarily targets resources by exploiting flaws in the protocol stack's Layers 3 and 4. A protocol attack may be a synchronisation packet flood (SYN) attack, which uses all available server resources, rendering the server unusable. 

The last type of DDoS assault is resource layer attacks. This category is meant to disrupt data flow between hosts by targeting Web application packets. Consider an HTTP/2 Rapid Reset attack, for example. In this case, the attack delivers a predetermined amount of HTTP requests followed by RST_STREAM. This pattern is then repeated to produce a large volume of traffic on the targeted HTTP/2 servers.

Hackers Use This New Malware to Backdoor Targets in Middle East, Africa and U.S

 

Various entities in the Middle East, Africa, and the United States have fallen victim to an unidentified threat actor orchestrating a campaign involving the dissemination of a recently discovered backdoor named Agent Racoon. According to Chema Garcia, a researcher at Palo Alto Networks Unit 42, the malware is crafted using the .NET framework and exploits the domain name service (DNS) protocol to establish a covert communication channel, facilitating diverse backdoor functionalities.

The targeted organizations hail from a range of sectors, including education, real estate, retail, non-profit, telecommunications, and government. Despite the lack of attribution to a specific threat actor, the campaign is suspected to be state-sponsored due to discernible victimology patterns and the utilization of sophisticated detection and defense evasion techniques. Palo Alto Networks is monitoring this threat cluster under the label CL-STA-0002. The exact method of infiltration and the timeline of the attacks remain unclear at this point.

The adversary employs additional tools alongside Agent Racoon, such as a customized version of Mimikatz named Mimilite and a novel utility known as Ntospy. The latter utilizes a custom DLL module implementing a network provider to pilfer credentials for a remote server. Notably, while Ntospy is employed across the affected organizations, Mimilite and Agent Racoon are specifically found in the environments of non-profit and government-related organizations.

Agent Racoon, executed through scheduled tasks, enables the execution of commands, uploading and downloading of files, all while camouflaging itself as Google Update and Microsoft OneDrive Updater binaries. The command-and-control (C2) infrastructure linked to the implant dates back to at least August 2020, with the earliest sample of Agent Racoon uploaded to VirusTotal in July 2022.

Unit 42's investigation revealed instances of successful data exfiltration from Microsoft Exchange Server environments, resulting in the theft of emails matching various search criteria. The threat actor has also been observed harvesting victims' Roaming Profile. Despite these findings, the tool set associated with this campaign has not been definitively linked to a specific threat actor and appears to extend beyond a single cluster or campaign, according to Garcia.

Hackers for Hire: Navigating the Dark Web, Penetration Tests, and More

 

As the digital landscape undergoes transformation, it is imperative for organizations to remain vigilant in the face of a persistent threat from for-hire hackers. 

To safeguard their networks, customers, and financial stability, organizations must comprehend the risks associated with cyber threats and take proactive measures. 

Sourcing Hackers for Hire:

Hackers for hire, malevolent individuals who offer their hacking services to carry out cyberattacks on behalf of others or as a paid service, provide a range of offerings. These services encompass malware as a service (MaaS), ransomware as a service (RaaS), phishing as a service (PhaaS), distributed denial of service (DDoS) as a service, and targeted attacks on specific systems or environments.

These nefarious hacker-for-hire services are widely available on the dark web, an unregulated corner of the internet beyond the reach of conventional search engines like Chrome™, Safari®, or Firefox™. The dark web serves as a notorious marketplace for hackers offering services such as MaaS, RaaS, PhaaS, and DDoS attacks. Potential clients can peruse various hackers' offerings on dark web marketplaces and select the services they require. 

Payment is typically made using cryptocurrencies, which offer a degree of anonymity to both parties involved. Privacy-centric digital currencies like Monero, Zcash, and AXEL provide the highest level of anonymity, although investigative techniques can still be employed to trace transaction origins.

However, hacker-for-hire services are not limited to the dark web. These services can also be found on social media platforms and messaging apps such as WhatsApp and Telegram, as these apps provide end-to-end encryption for all messages, making them attractive to both hackers and their customers.

Crowe cybersecurity experts conducted an investigation to assess the ease of hiring a hacker, both on the regular internet and the dark web. The study found that DDoS services are the most straightforward to access. A simple search using terms like "IP booter" or "IP stresser," along with advanced techniques for identifying forums and communities that offer these tools, yielded a wealth of information from active sites providing hacker-for-hire services.

DDoS services are often categorized into tiers based on resource usage, application programming interface (API) access, and attack duration. For instance, Tier 1 offers a 300-second attack duration, while Tier 4 extends to 3,600 seconds with access to the developer API (dev API) for use in other applications. DDoS services are accessible and affordable to individuals or groups with disposable income.

To explore more significant hacker-for-hire services such as malware and ransomware, the investigators turned to the dark web, utilizing a specialized browser to search for hubs offering these services. They identified marketplaces, vendors, and individual developers offering custom payloads for customer-specific scenarios. 

Some marketplaces provided guaranteed escrow, indicating a level of professionalism and significant resources allocated to market, sell, and purchase these services. The range of offerings included malware, adware, worms, keyloggers, and other custom-developed tools, many of which included developer support for setup and execution.

The researchers also encountered a market on the dark web selling stolen cryptocurrency wallets, offering access to the wallets' private keys in exchange for bitcoin (BTC).

Investigation Results:

The investigation unveiled the disconcerting reality that virtually anyone with internet access can engage the services of hackers, employ their skills, and purchase compromised credentials, wallets, and personal information. These threats demand serious attention, and organizations and individuals should take immediate action to mitigate these potential risks before they materialize.

The services identified in the investigation were tailored based on specific exploitation criteria, the hacker's skill set, and available toolkits. Most of these services were reasonably affordable for individuals with the financial means and motivation to acquire them. The scope of hacker-for-hire services is limited only by the online presence of potential targets, suggesting that anyone can become a target for the right price.

Typical Customers:

A report from the cyberthreat intelligence firm Mandiant identified government-sponsored groups like UNC2589 and APT28 as significant clients for hackers for hire. Government-sponsored groups leverage hackers for hire to carry out espionage, sabotage, or disruptive activities against their adversaries. Corporate entities also resort to hacker-for-hire services to access their competitors' trade secrets, customer financial data, or to launch attacks like DDoS on competitors' websites. Individuals use hacker-for-hire services for personal motives, including revenge or personal gain.

Potential customers do not need to possess an in-depth understanding of cyberattacks; they merely need to provide a target and payment. Hiring a hacker for DDoS services, for example, can be as straightforward as searching for relevant keywords.

Serious Consequences:

Cyberattacks orchestrated by hackers for hire can inflict severe damage on organizations and individuals. In addition to the direct financial costs associated with a breach, organizations experience reputational harm, potentially leading to a loss of revenue as customers lose trust in a compromised business. According to a 2022 report by IBM, 83% of organizations have faced multiple data breaches.

Hackers for hire themselves can also face severe consequences if caught. For instance, in December 2022, the Federal Bureau of Investigation (FBI) seized approximately 48 domains related to DDoS-for-hire services. These domains were operated by six individuals who were subsequently arrested and faced criminal charges. The FBI linked these domains to DDoS attacks on educational organizations, government agencies, and prominent gaming platforms between 2014 and 2022.

Consequences have also befallen hackers offering ransomware as a service (RaaS). In January 2023, the FBI dismantled Hive, a major Russian crime syndicate that had been selling ransomware tools and services to affiliates since spring 2021.

The Importance of Pen Tests:

One of the most effective means for organizations to mitigate the threat posed by hackers for hire is by employing penetration testers (pen testers). These experts evaluate an organization's security by assessing its external internet presence, internal network, websites, applications, and even simulating scenarios like ransomware, malware, and social engineering campaigns.

Pen tests identify vulnerabilities that could be exploited by malicious hackers, enabling organizations to address these issues before they are used against them. Pen tests often reveal specific areas where improvements can be made, including network segmentation, Microsoft Active Directory™ security, and missing security patches on various systems.

Pen tests are a valuable investment for organizations of all sizes, ranging from small businesses like restaurants and banks to large multinational corporations and government entities. Even seemingly insignificant businesses can be targeted by hackers for hire, and the costs associated with a successful breach can be devastating.

Pen Tests and Staying Ahead of Threats:

The proliferation of hackers for hire represents a significant threat to both organizations and individuals. These malicious actors offer an array of services, including malware, ransomware, phishing, and DDoS attacks, and their services are increasingly accessible. 

However, organizations can protect themselves by conducting regular pen tests, which identify vulnerabilities in their systems or networks before they can be exploited by malevolent hackers. It is crucial for businesses to regularly assess the security of their environments and services and take proactive steps to enhance their security posture.

Passkeys vs Passwords: The Future of Online Authentication

 

In the realm of online security, a shift is underway as passkeys gain traction among tech giants like Apple, Google, Microsoft, and Amazon. 

These innovative authentication methods offer a more seamless login experience and bolster cybersecurity against threats like malware and phishing. However, traditional passwords still hold their ground, allowing users to retain control over their security preferences.

A password is a unique combination of characters, including upper and lower case letters, numbers, and symbols, used to verify a user's identity. While originally designed to be memorized or manually recorded, they can now be securely stored online with tools like NordPass.

Passkeys, the technologically advanced successors to passwords, rely on PINs, swipe patterns, or biometric data (such as fingerprints or facial scans) for identity verification. They leverage the WebAuthn standard for public-key cryptography, generating a unique key pair on user devices, making them impervious to theft or forgetfulness.

Passkey vs Password: Security Comparison

Passkeys and passwords vary fundamentally in design, approach, and effectiveness in securing accounts. Here are some key distinctions:

Cybersecurity:

Passwords are susceptible to hacking, especially those with fewer than 10 characters. Passkeys, on the other hand, utilize biometric data and cryptographic methods, drastically reducing vulnerability. Only with access to the user's authenticator device and biometric information can a passkey be breached.

Convenience:

Creating, recalling, and managing complex passwords can be arduous and time-consuming, leading to 'password fatigue.' Passkeys, once set up, facilitate quick and seamless authentication, eliminating the need to remember multiple passwords.

Login Success Rate:

Passkeys have a significantly higher success rate compared to passwords. Recent data from Google revealed that while passwords succeed only 13.8% of the time, passkeys boasted a success rate of 63.8%.

Popularity:

Although passkeys are gaining traction, they are not yet universally supported. Familiarity with passwords and concerns over passkey error handling and biometric privacy contribute to their slower adoption.

The Evolution of Authentication

While passkeys represent a significant leap forward in security and user-friendliness, the demise of passwords is a gradual process. The established dominance of passwords, spanning over half a century, requires a patient transition. Behavioral habits and the need for technological refinement play pivotal roles in this shift.

Presently, passkey usage is seldom mandatory, allowing users to choose their preferred verification method. For sites exclusively supporting passwords, outsourcing password management is advisable, with various free tools available to assess password strength.

In conclusion, the future of online authentication is evolving towards passkeys, offering a more secure and user-friendly experience. However, the transition from passwords will be a gradual one, shaped by technological advancements and user behavior.

Report: September Sees Record Ransomware Attacks Surge

 

In September, a notable surge in ransomware attacks was recorded, as revealed by NCC Group's September Threat Pulse. Leak sites disclosed details of 514 victims, marking a significant 153% increase compared to the same period last year. This figure surpassed the previous high set in July 2023 at 502 attacks.

Among the fresh wave of threat actors, LostTrust emerged as the second most active group, accounting for 10% of all attacks with a total of 53. Another newcomer, RansomedVC, secured the fourth spot with 44 attacks, making up 9% of the total. LostTrust, believed to have formed in March of the same year, mirrors established threat actors' tactics of employing double extortion.

Notably, well-established threat actors remained active in September. Lockbit maintained its lead from August, while Clop's activity diminished, responsible for only three ransomware attacks in September.

In line with previous trends, North America remained the primary target for ransomware attacks, experiencing 258 incidents in September.

Europe followed as the second most targeted region with 155 attacks, trailed by Asia with 47. Nevertheless, there was a 3% rise in attacks on North America and a 2% increase on Europe, while Asia saw a 6% decrease from the previous month. This indicates a shifting focus of threat actors towards Western regions.

Industrials continued to bear the brunt of attacks, comprising 40% (19) of the total, followed by Consumer Cyclicals at 21% (10), and Healthcare at 15% (7). The sustained focus on Industrials is unsurprising, given the allure of Personally Identifiable Information (PII) and Intellectual Property (IP) for threat actors. 

The Healthcare sector witnessed a notable surge, experiencing 18 attacks, marking an 86% increase from August. This trend aligns with patterns observed earlier in the year, suggesting that August's dip was an anomaly. The pharmaceutical industry's susceptibility to ransomware attacks continues due to the potential financial impact.

The surge in ransomware attacks can be attributed in part to the emergence of new threat actors, notably RansomedVC. Operating similarly to established organizations like 8Base, RansomedVC also functions as a penetration testing entity. 

However, their approach to extortion incorporates compliance with Europe's General Data Protection Regulation (GDPR), pledging to report any vulnerabilities discovered in the target's network. This unique approach intensifies pressure on victims to meet ransom demands, as GDPR allows for fines of up to 4% of a victim's annual global turnover.

RansomedVC garnered attention by claiming responsibility for the attack on Sony, a major Japanese electronics company, on September 24th. In this incident, RansomedVC compromised the company's systems and offered to sell stolen data. This successful targeting of a global giant like Sony highlights the significant impact RansomedVC is exerting, indicating its continued activity in the months ahead.

Matt Hull, Global Head of Threat Intelligence at NCC Group, commented on the situation, noting that the surge in attacks in September was somewhat anticipated for this time of year. However, what sets this apart is the sheer volume of these attacks and the emergence of new threat actors playing a major role in this surge. Groups like LostTrust, Cactus, and RansomedVC stand out for their adaptive techniques, putting extra pressure on victims. 

The adoption of the double extortion model and the embrace of Ransomware as a Service (Raas) by these new threat actors signify an evolving landscape in global ransomware attacks. Hull predicts that other groups may explore similar methods in the coming months to increase pressure on victims.

Emerging Phishing Campaigns Aim FTX Users After Kroll Data Breach

 

In a recent turn of events that has reverberated across the cryptocurrency community, Changpeng ‘CZ’ Zhao, the Chief Executive Officer of Binance, a globally renowned cryptocurrency exchange, has issued a stern caution to users who were formerly associated with the now-defunct FTX platform. 

This alert revolves around a fresh surge of phishing attacks that have been set in motion following a significant data breach stemming from Kroll, the claims agent responsible for managing FTX’s bankruptcy case.

The Core of the Issue: Kroll Data Breach and Its Ramifications

The crux of this matter revolves around a recent breach in cybersecurity suffered by Kroll, the entity tasked with overseeing claims linked to the ongoing bankruptcy proceedings of FTX. While the specific details of the breach were initially kept confidential, it has now been unveiled that the breach exposed certain non-sensitive customer data belonging to specific claimants involved in the case.

Zhao’s warning emphasizes the seriousness of the situation, explicitly connecting the current series of phishing attacks to this data breach. The pronouncements from the CEO of Binance closely follow FTX’s own declaration concerning the breach, a revelation that has understandably triggered significant apprehension among its user community.

However, what renders this breach especially alarming is the technique through which it was executed. Zhao has illuminated the fact that a SIM swap maneuver executed on an employee's account was pivotal in enabling the breach. For those unfamiliar, a SIM swap involves malicious actors deceiving cellular service providers into transferring a victim’s phone number to a device under their control.

Subsequently, this maneuver allows them to intercept crucial information, including authentication codes, effectively circumventing security measures like two-factor authentication. The gravity of the threat was so pronounced that FTX was compelled to temporarily suspend operations on its claims portal.

The Escalating Peril of Phishing Attacks

Phishing attacks are not an emerging concept in the digital domain. Nevertheless, their persistent and evolving nature has solidified their status as one of the most malicious hazards that internet users encounter today. Fundamentally, these attacks capitalize on deception and psychological manipulation to deceive unsuspecting individuals into disclosing sensitive information, spanning from login credentials to personal financial particulars.

Zhao’s recent alert acts as a somber reminder of the possible havoc that phishing attacks can unleash. When successful, these attacks can lead to a spectrum of consequences, encompassing identity theft, unauthorized entry into sensitive accounts, and substantial financial losses. The fact that prominent platforms like FTX, BlockFi, and the now-defunct Genesis crypto exchange have become targets for cybercriminals underscores the sheer scale and audacity of these threats.

Bolstering Defenses Against the Digital Threatscape

In light of these unfolding events, the responsibility falls upon individual users to enhance their digital safeguards. Zhao's message is crystal clear: complacency is not an option. Users are urged to be proactive in their stance on online security, adopting a multifaceted approach to thwart potential threats.

Foremost, staying well-informed is of paramount significance. Being cognizant of the latest threats and comprehending the strategies of cybercriminals can play a pivotal role in precluding potential attacks. Equally important is vigilance. Users ought to exercise caution in response to unsolicited communications, particularly those soliciting personal or financial information.

Furthermore, embracing robust security measures is imperative. This encompasses, but is not limited to, utilizing strong and distinct passwords for various accounts, activating two-factor authentication whenever feasible, and regularly updating software and applications to rectify known vulnerabilities.

While the digital era presents unparalleled conveniences and avenues, it also introduces an array of challenges. The recent events encompassing the FTX platform and the Kroll data breach underline the ever-evolving nature of the threat landscape. Nonetheless, by merging awareness, vigilance, and resilient security practices, users can confidently navigate this landscape, securing their digital well-being.

Here's How to Safeguard Your Credit Card Info

 

Sure, you recognise a phishing email (even if your parents don't). Unfortunately, thieves are constantly coming up with new ways to get unauthorised access to credit card information, leaving you with financial losses and emotional distress. While hackers demonstrate their limitless creativity, the old means of defrauding do not appear to be fading away. 

Here's what you need to know about the different ways your credit card information might be stolen so you can safeguard your financial well-being. 

Phishing scam

One of the most common ways to get credit card information continues to be phishing. You may be duped into providing your credit card information by cybercriminals who send false emails, messages, or fake websites that appear to be legitimate companies. If you refrain from your research before responding to a suspicious phishing email, you can end up "confirming your identity" with a hacker. 

The following are some effective anti-phishing strategies: Never click on shady links or give confidential information to an unknown. When confirming an email's legitimacy, double-check the sender's address. There is no chance that your bank will get in touch with you through Gmail. 

Card skimming

Yes, ATM card skimming still occurs in the digital era. When fraudsters install devices on ATMs, petrol pumps or point-of-sale terminals to steal credit card information from unknowing victims, this is called card skimming. These devices can be hard to find, and the information obtained from them is later utilised to make cloned cards or make online payments.

You should check card readers for signs of manipulation, cover your hand when entering your PIN, utilise ATMs that are located in secure, well-lit places, and use mobile pay or tap to pay whenever feasible to protect yourself against card skimming. 

Breach of confidentiality 

Data breaches occur when hackers secure access to a company's systems and steal critical consumer information, such as credit card information. Unfortunately, these breaches are prevalent and can impact even major, well-known companies. Cybercriminals may then sell or utilise this information for fraudulent transactions on the dark web. 

Check for data breach notifications from firms with which you have accounts on a regular basis, and use two-factor authentication whenever possible. If you learn that your information has been exposed as a result of a data breach, you should change your password on any sites where you use the same login information—and avoid reusing passwords! 

Physical thievery 

With all of the modern tools of theft to be aware of, we must not overlook good old-fashioned pickpocketing. Even losing your wallet or purse can expose your credit card information, especially if the criminal watched you enter your PIN at the ATM before robbing you. If your card is lost or stolen, don't put it off: notify your bank right away to limit the damage. 

The bottom line when it comes to avoiding credit card fraud is to be attentive, practise good security habits, and constantly examine your financial statements to discover any strange activity as soon as possible. The best line of defence against credit card theft is to be vigilant and knowledgeable.