DecryptedTech

Wednesday29 June 2022

Rate this item
(0 votes)

The Lapsus$ group, the same ones that broke into NVIDIA and Stole corporate data and had their attack VM encrypted, appear to have also broken into Samsung. Lapsus$ has leaked what they claim to be source code for several sensitive applications include apps that run in the Trust Zone on Samsung Mobile Devices.

Rate this item
(0 votes)

As mobile devices continue to be a focus for attackers, we are hearing that there is new banking malware in the Google Play Store. The new malware belongs to a the SharkBot family and, according to researchers, is also a new generation thanks to included features found inside. The biggest difference between SharkBot and other banking malware is that SharkBot allows the developers to steal money in a highly automated fashion.

Rate this item
(0 votes)

IoT devices in general are the bane of most security teams. Typically, they lack basic security features and are complicated at best to keep patched. Much of this is due to the process needed to patch them and the rest of due to vendors being slow to push out the updated/patched images. To further complicate this, in the medical world you have the demand for 100% uptime and the ever-popular FDA exclusions that far too many vendors operate under. This usually means that on any given day Medical IoT devices are an attack surface waiting to be attacked.

Rate this item
(0 votes)

In one of the “odder” breaches that we have covered, NVIDIA has confirmed it was the victim of a breach that resulted in the loss of data. Information about the breach first crossed our paths about a week ago, but much of the information was speculation and some of the claims seemed very unusual. One of the most unusual was a claim by the alleged hacking group LAPSUS$ that NVIDIA had actually hacked them back.

Rate this item
(0 votes)

The Russian invasion of Ukraine has given an insight into how modern warfare is carried out on a strategic level. We have seen how Russia used malware and specific cyber attacks to interrupt communications and to potentially wipe critical data. We have seen new methods to disrupt this these attacks. We have also seen a new shift in modern warfare, the rise of the cyber partisan. In typical wars commanders on both side account for local resistance and partisan groups that can have an impact on battles and logistics. These are usually small groups of armed civilians (sometimes with government support), but now they have moved behind the keyboard.

Rate this item
(0 votes)

Banking malware for mobile devices is on the rise thanks to the ubiquitous use of mobile apps for personal financial tracking and transactions. This move was almost certain to attract threat actors like a moth to a porchlight. When given the gloriously poor state of mobile anti-malware and protection it is no wonder there are so many flavors of this popping up. What is even more disappointing, is the fact that we are seeing the malware packages pushed out through legitimate app stores.

Rate this item
(0 votes)

It seems that Microsoft shares an issue that is a bit like one that can happen in mobile devices. When you reset your device on an Android Device and you have accounts that sync data with their own internal folders, there can be lingering information even after a reset of the device. Although not as prevalent as it once was, the advice was and still is, to remove all accounts before beginning the reset process. This is so that there is no data left behind after a reset. This same issue has popped up in Windows 10.

Rate this item
(0 votes)

As the Steam Deck is starting to get to people that have ordered them questions about Steam’s place in Web3 and recent moves around NFTs come up in conversation. Steam, Valve’s distribution arm has been seen as a one of the more cutting-edge services, with founder Gabe Newell once having a following like Elon Musk (at least in the gaming world). However, despite this perception they have never really been completely onboard with Crypto and the trappings of Web3.

Rate this item
(0 votes)

Warfare has changed little over its centuries of existence. The tools have changes, the arenas have moved from two dimensions to 3, but the concepts and execution area basically the same. You need to not only assault and occupy ground, but you must stop organized response of whoever you are attacking or defending from. If you can successfully confuse or disrupt their attack/defense, then you gain a tactical advantage on the battlefield. With the Russian invasion of Ukraine this was very clear as the country was hit with multiple cyber attacks prior to the ground assault.

Rate this item
(0 votes)

Last year a group call Centre for Countering Digital Hate reviewed interactions in the Metaverse. The results of their checkup were not encouraging as they encountered 100 potential violations of Meta’s policies in the span of only 11.5 hours. The focus was on the VRChat app, one of the apps you can pickup from the Meta VR App store. They recorded interactions in the chat app as part of their study.

Page 5 of 288