Thursday 31 October 2024, Safety Guide

SUPER-PHARM data breach

Lost24

As a result of a hacker attack on the online system of the Super-Pharm chain of drugstores and pharmacies, customer data was leaked. The incident occurred on October 21, when cybercriminals exploited a vulnerability in the e-commerce software - Magento operated by an external supplier, Adobe Commerce. Super-Pharm informed customers about the leak by sending an email on October 25 with an apology and assurance of the steps taken to secure the system.

The leak concerns data such as first name, last name, e-mail address, delivery address, telephone number and details of customer orders. The company noted that so far there is no evidence that unauthorized persons downloaded this data, and the incident does not include login information to the mobile application and

Lost24

Facebook and Instagram plan to roll out new features to improve security and privacy, including identity verification via video in which users are asked to record their face from different angles. This solution is intended to reduce the risk of scams and frauds, such as impersonating famous people or using false data. Facebook, after the recent controversy related to storing passwords unencrypted, assures that the new data protection mechanisms will be fully safe - recordings are to be encrypted and deleted after the verification process.

The new facial recognition technology will be used to block the content of fake ads, which often use images of celebrities to increase credibility. In the future, when appropriate mechanisms detect an advertisement containing t

Lost24

In late September 2024, a 6.4 GB SQL file containing login details for users of the website web.archive.org was released publicly. The file contained email addresses, usernames, hashed passwords (using Bcrypt), timestamps, and other internal information. The last timestamp in the data is September 28, 2024, suggesting that the attack occurred then.

Cybersecurity expert Troy Hunt reported that the data would be added to the Have I Been Pwned (HIBP) service so that users could see if their data had been leaked. Hunt tried to contact the Internet Archive, but did not receive a response. After 72 hours, as previously announced, he released the information about the leak, allowing users to verify if their data had been stolen.


Ch

Sunday 29 September 2024, Safety Guide

Polish clothing brand OCHNIK hacked

Lost24

Hackers attacked the Polish clothing company OCHNIK, gaining access to customer data such as names, surnames, delivery addresses, emails and phone numbers. The hack occurred on September 18, when cybercriminals hacked into the company's technical account using a software vulnerability. OCHNIK responded quickly, implementing preventive measures and securing the system. The company claims that no passwords or transaction history were stolen, and the risk of data misuse is low. Nevertheless, caution is advised against phishing, spam and suspicious messages.





Monday 23 September 2024, Safety Guide

Flooding Scams in Poland

Lost24

Internet fraudsters are exploiting the floods that hit southwestern Poland to conduct fraud, including creating fake phishing sites and fake charity collections. The fake sites are often styled as authentic news sites, and their goal is to trick users into revealing their personal and financial information, such as credit card numbers or email addresses. Facebook posts are also being published, reporting on children allegedly missing during the floods. This false information often appears in the form of paid advertisements or articles that seem credible, but are in fact an attempt to scam people.

The Central Bureau for Combating Cybercrime has previously warned against such activities, including fake collections and fake RCB alerts that are designed to mislead p

Sunday 15 September 2024, Safety Guide

FORTINET hacked

Lost24

Fortinet, a cybersecurity company, fell victim to a hacker attack. The company officially admitted responsibility for the incident. Hackers gained access to a Microsoft Sharepoint server, stealing approximately 440 GB of data, including online digital file storage credentials. The attack likely affected customers in the Asia-Pacific region. The hackers demanded a ransom, but Fortinet has not yet met their demands and is offering support to the victims.

Source: komputerswiat.pl


Saturday 31 August 2024, Safety Guide

Whatsapp data leak

Lost24

The data of 3.2 million WhatsApp users in Belgium has been put up for sale on the Dark Web, posing a serious risk to the privacy and security of users. The leak of this information, including phone numbers and user IDs, could lead to an increase in phishing attacks and the takeover of WhatsApp accounts. It is not yet known whether the leak also affects users from other countries.

Belgian platform Safeonweb, managed by the Cybersecurity Center, warned of the consequences of the incident, emphasizing that detecting the sellers will be difficult due to the cryptocurrency payment. The data could be used not only for fraud and intrusive marketing, but also to impersonate genuine users.

Meta, the owner of WhatsApp, has not yet issued an official sta

Lost24

A group of hackers called RansomHub carried out an attack on the District Labor Office in Police, gaining access to computers belonging to employees of this institution. The attack was first revealed on August 14 on the blog of the hacker group, which announced its intention to make the stolen data public. RansomHub kept its promise by publishing this information on August 22 at 2:00 p.m., as announced.

The hackers gained access to the office's internal network infrastructure and individual computers, as suggested by the directory structure of the files they published. Analysis of the stolen data showed that cybercriminals did not manage to take over the full database of the office's petitioners, which could result in a mass leak of information, but this is not

Lost24

The Helldown cybercrime group attacked seven organizations, including two Polish companies: Briju 1920 Limited and Vindix S.A. Stolen data has been published, including:


information about employees,
login details,
PESEL numbers,
residential addresses,
telephone numbers
date of birth.

Helldown claims to have obtained 103GB of data from Briju and 23GB from Vindix. Victims of data leaks should immediately withhold their PESEL numbers.


Source: cyberdefence24.pl
&l

Lost24

Cybercriminals took advantage of vulnerabilities in the MOVEit software, stealing the data of up to 100 million people. This attack was one of the most serious security problems in 2023 and made it possible to extort a ransom of up to $100 million. In 2024, the number of vulnerabilities in edge services increased by 22%. compared to 2023

Software vulnerabilities published in the KEV catalog by CISA were responsible for 14 percent. security breaches last year, an increase of 180%. Every year. The average time from detecting a vulnerability to patching it is 175 days. Devices at the edge of the network, constantly connected to the Internet, are difficult to monitor and often do not have EDR installed.

In 2023, cybercriminals attacked 12 Norwegia

Wednesday 17 July 2024, Safety Guide

Agata Meble attacked by hackers

Lost24

Agata S.A. issued a statement regarding the recent hacker attack that disrupted the operation of their IT system. Currently, the system works properly and shopping is possible both in stationary stores and online at agatameble.pl. Verification is in progress whether customer data (name, surname, address, telephone number, e-mail) has been leaked. The company urges customers to be cautious of suspicious calls and emails that may be phishing attempts. Customers should verify message senders, avoid opening suspicious attachments and not provide personal information to unknown people.


Source:

Lost24

The United States arrested 35-year-old Chinese national YunHe Wang for offering free VPN programs that installed malware on millions of Windows computers. Wang allegedly used infected computers to create a huge botnet, offering it to cybercriminals for a fee. VPN programs such as MaskVPN, DewVPN, Shine VPN, and ProxyGate have been in operation since 2011, containing backdoors that allow control over infected computers.

The botnet, with 19 million IP addresses in nearly 200 countries, including 613,841 in the U.S., was likely the largest in history. Wang sold access to the botnet through a "911 S5" proxy service that allowed cybercriminals to anonymously conduct hacking activities, including financial fraud and other crimes.

The Depar

Lost24

A new threat has been detected, which is a banking trojan that attacks Android users. Discovered by Cyble, the Antidot Trojan pretends to be an application and is distributed through unofficial sources as an "exclusive update" or "special version" of the application. It may also appear in suspicious emails and text messages.

Once installed, the Trojan displays a fake Google Play update page through which the user clicks "Continue" to give the Trojan full access to the device. The malware can then steal your bank login details and private messages.

Antidot uses advanced techniques such as overlay attacks, creating fake websites that look like real banking applications to capture entered passwords and account number

Lost24

In 2013, a wallet was created secured with a long password generated by the RoboForm password manager. The owner couldn't guess the password he created because he only saw it for a fraction of a second. He only knew what the password consisted of, but he wasn't even sure about it. The wallet was secured with a password generated by the RoboForm program.


However, the old version of RoboForm had a bug that caused passwords to be based on the current time they were generated, making them less random. The owner of the Bitcoins, not remembering exactly when he generated the password, turned to the hacker to crack it. Using a brute force attack, the hacker checked all possible passwords over a specified period of time and discovered that the password was mAI

Thursday 30 May 2024, Safety Guide

Can AI lead to suicide?

Lost24

At the beginning of the year, Google introduced "Search Generative Experience" (SGE), aimed at simplifying information searches by generating short summaries of results through artificial intelligence. This was intended to replace the need to browse through multiple pages of information, but recently users have noticed that SGE often provides false and harmful advice. Examples include advising people to eat rocks during pregnancy, smoking cigarettes and staring at the sun, and using glue to stick cheese to pizza.


One of the strangest situations was when the AI ​​suggested jumping off the Golden Gate Bridge after entering "i'm feeling depressed" in the search field

Kris Kashtanova described an SGE test in which