Latest Pro-Trump Twitter Clone Leaks User Data on Day 1


Security concerns pro-Trump social media sites have been a 2021 theme: an absurdly basic bug in Talking allowed all of his messages to be deleted in the hours before it was removed by its hosting provider and taken offline. Then Gab was raped by hackers who has stolen and leaked 40 million of his messages, public and private. Now a site called Gettr, started by a former Trump staffer, has become a serious third contender in the competition for the worst security among pro-Trump social media sites, as hackers have been successful in hijack large accounts and scrape tens of thousands of private user data, including email addresses and dates of birth, all within hours of launch.

Luckily for Gettr, there was much worse news to cover in the security world this week, namely the latest debacle in the ongoing global ransomware outbreak. Lily Hay Newman of WIRED reviewed the new details appear on the Kaseya remote IT management tool hack, which left thousands of businesses stricken with ransomware, and the reported vulnerability to Kaseya nearly three months before it was used for carry out this attack. We also covered an ongoing dispute over a critical Microsoft print spooler bug, which the company tried—and missed!– to be repaired this week.

In other news, we took a look at how the Amazon Echo invisibly stores user data even after a reset, how European regulators and privacy watchdogs are push for a total ban on biometric surveillance, and how difficult it is to get rid of the password habit in favor of more secure authentication methods.

And there’s more. Each week, we collect all the security news that WIRED hasn’t covered in depth. Click on the titles to read the full stories and stay safe.

Given the security mistakes at Parler and Gab, it’s no surprise that the latest startup looking to round up Trump’s refugees on Twitter was also in the crosshairs of hackers: On its launch day, July 4, the hackers immediately removed the site and disclosed the non-public personal information of at least 85,000 users, including email addresses, usernames, names and dates of birth, as has been spotted for first time by cybersecurity firm Hudson Rock. This private data scraping appears to have been made possible by a leaky API, an issue reported by security professionals even before the site launched. In fact, many prominent users of the site have also been hacked more directly, through unknown means: the official accounts of far-right MP Marjorie Taylor-Greene, former Secretary of State Mike Pompeo, from Steve Bannon and even the site’s founder, former Trump staffer Jason Miller, have all been hijacked by someone by the name of “@JubaBaghdad”. Trump, for his part, has so far refused to join the service, perhaps in part because of his security concerns, or because he has also been inundated with Sonic the Hedgehog porn.

MIT Technical Review Patrick Howell O’Neill produced a fascinating lengthy read from the archives of the cat-and-mouse cybercrime game: the story of how a joint operation between the FBI, Ukrainian intelligence agency SBU and the Russian FSB came together to take down some of Russia’s biggest cybercriminals and failed. The three agencies worked together for months to monitor and track the targets of their investigation, which included such high-profile figures as Evgeniy Bogachev, the backbone of a botnet operation known as Game Over Zeus, and Maksim Yakubets. , the leader of a group known as Evil. Corp responsible for over $ 100 million in digital theft and ransomware operations. Just as the agencies coordinated their dismantling, the Ukrainian SBU repeatedly delayed the operation – possibly due to corruption within its ranks – and the Russian FSB completely stopped responding to the FBI, eclipsing its alumni. allies. As Howell O’Neill writes, one of the greatest hacker manhunts in history – and a rare attempt at collaboration between US and Russian law enforcement agencies – was foiled by ” an exasperating mixture of corruption, rivalry and obstruction. “

Last month, the FBI and law enforcement in Australia and Europe revealed that they had secretly taken over and run a crypto phone company called Anom. They used the company to sell phones believed to protect privacy to investigative suspects around the world. The phones contained a secret backdoor which they then used to arrest more than 800 suspected criminals. Now Motherboard has obtained and performed a hands-on analysis of one of the phones used in this prick operation. They explain how it hid its encrypted messaging features in a fake calculator app, ran a custom operating system called ArcaneOS, and offered an emergency erase feature. It’s also a fun memory of one of the largest-scale law enforcement agencies ever put together by global agencies, as long as you’re not one of the many owners who will end up in jail as a result.

Amid the fallout from Kaseya this week, Bloomberg reported yet another Russian hacking incident of a seemingly different kind: hackers known as Cozy Bear, in the past linked to the Russian foreign intelligence agency known as name of SVR, violated the Republican National Committee. two people familiar with the matter told Bloomberg. The RNC itself has denied that it was hacked or that information was stolen, but then admitted that an RNC technology provider, Synnex, was hacked last weekend. It is not clear if the incident has anything to do with the ransomware-focused Kaseya hack, which has been linked to Russian cybercriminal operators known as REvil. But given that the SVR is tasked with collecting stealth intelligence on all manner of political and government targets, it may not be surprising that it targeted the RNC, just as it targeted the DNC in 2016.


More great WIRED stories



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *