Tag Archives: Hackers

Hackers who breached casino giants MGM, Caesars also hit 3 other firms, Okta says – Reuters

  1. Hackers who breached casino giants MGM, Caesars also hit 3 other firms, Okta says Reuters
  2. MGM losing up to $8.4M per day as cyberattack paralyzes slot machines, hotels for 8th straight day: analyst New York Post
  3. Tennessee couple canceled their trip to Las Vegas after news of the cybersecurity issues KTNV 13 Action News Las Vegas
  4. 2 Las Vegas casinos fell victim to cyberattacks, shattering the image of impenetrable casino security Fox 5 Las Vegas
  5. Employee at MGM Resorts property says some paychecks short amid cybersecurity breach Fox 5 Las Vegas
  6. View Full Coverage on Google News

Read original article here

Hackers who breached casino giants MGM, Caesars also hit 3 other firms, Okta says – Yahoo Canada Finance

  1. Hackers who breached casino giants MGM, Caesars also hit 3 other firms, Okta says Yahoo Canada Finance
  2. MGM losing up to $8.4M per day as cyberattack paralyzes slot machines, hotels for 8th straight day: analyst New York Post
  3. Tennessee couple canceled their trip to Las Vegas after news of the cybersecurity issues KTNV 13 Action News Las Vegas
  4. 2 Las Vegas casinos fell victim to cyberattacks, shattering the image of impenetrable casino security Fox 5 Las Vegas
  5. Employee at MGM Resorts property says some paychecks short amid cybersecurity breach Fox 5 Las Vegas
  6. View Full Coverage on Google News

Read original article here

Russian military hackers take aim at Ukrainian soldiers’ battle plans, US and allies say – CNN

  1. Russian military hackers take aim at Ukrainian soldiers’ battle plans, US and allies say CNN
  2. GRU hacking tools targeting Ukrainian military devices detailed by Five Eyes The Record from Recorded Future News
  3. ‘Five Eyes’ nations release technical details of Sandworm malware ‘Infamous Chisel’ CyberScoop
  4. UK and allies support Ukraine calling out Russia’s GRU for new malware campaign National Cyber Security Centre
  5. Gamaredon hackers target Ukrainian military orgs amid counteroffensive efforts The Record from Recorded Future News
  6. View Full Coverage on Google News

Read original article here

Genshin Impact Kaveh hack explained as videos show hackers causing permanent damage to co-op players – Sportskeeda

  1. Genshin Impact Kaveh hack explained as videos show hackers causing permanent damage to co-op players Sportskeeda
  2. Genshin Impact: New “Kaveh Hack” Threatens Co-op Worlds with Permanent Object Deletion AFK Gaming
  3. Genshin Impact: A Kaveh Glitch is reportedly deleting in-game content permanently in Co-op GamingonPhone
  4. Genshin Impact exploit allows hackers to remove important objects ‘permanently’ from co-op world Sportskeeda
  5. Genshin Impact players believe hackers are “bricking” progress by deleting in-game exploration points Eurogamer.net
  6. View Full Coverage on Google News

Read original article here

Polish diplomat’s BMW advert was turned into lure by Russian hackers – Financial Times

  1. Polish diplomat’s BMW advert was turned into lure by Russian hackers Financial Times
  2. Belarus-linked hacks on Ukraine, Poland began at least a year ago, report says The Record from Recorded Future News
  3. Crowdsourced Cyber Warfare: Russia and Ukraine Launch Fresh DDoS Offensives Center for European Policy Analysis
  4. EXCLUSIVE-Russian hackers lured embassy workers in Ukraine with an ad for a cheap BMW Reuters
  5. Russian hackers targeted diplomats at nearly 2 dozen embassies in Ukraine with ad for a cheap BMW: report Fox Business
  6. View Full Coverage on Google News

Read original article here

T-Mobile Says Hackers Stole Data on About 37 Million Customers

T-Mobile

TMUS -0.52%

US Inc. said hackers accessed data, including birth dates and billing addresses, for about 37 million of its customers, the second major security lapse at the wireless company in two years.

The company said in a regulatory filing Thursday that it discovered the problem on Jan. 5 and was working with law-enforcement officials and cybersecurity consultants. T-Mobile said it believes the hackers had access to its data since Nov. 25 but that it has since been able to stop the malicious activity.

The cellphone carrier said it is currently notifying affected customers and that it believes the most sensitive types of records—such as credit card numbers, Social Security numbers and account passwords—weren’t compromised. T-Mobile has more than 110 million customers.

The company said its preliminary investigation indicates that data on about 37 million current postpaid and prepaid customer accounts was exposed. The company said hackers may have obtained names, billing addresses, emails, phone numbers, birth dates and account numbers. Information such as the number of lines on the account and plan features could have also been accessed, the company said.

“Some basic customer information (nearly all of which is the type widely available in marketing databases or directories) was obtained,” T-Mobile said in a statement. “No passwords, payment card information, social security numbers, government ID numbers or other financial account information were compromised.”

The company said its systems weren’t breached but someone was improperly obtaining data through an API, or application programming interface, that can provide some customer information. The company said it shut down the activity within 24 hours of discovering it.

The company’s investigation into the incident is ongoing. T-Mobile warned that it could incur significant costs tied to the incident, though it said it doesn’t currently expect a material effect on the company’s operations. The company is set to report fourth-quarter results on Feb. 1.

T-Mobile acknowledged a security lapse in 2021 after personal information regarding more than 50 million of its current, former and prospective customers was found for sale online. T-Mobile later raised its estimate and said about 76.6 million U.S. residents had some sort of records exposed.

A 21-year-old American living in Turkey claimed credit for the 2021 intrusion and said the company’s security practices cleared an easy path for the theft of the data, which included Social Security numbers, birth dates and phone-specific identifiers. T-Mobile’s chief executive later apologized for the failure and said the company would improve its data safeguards.

T-Mobile proposed paying $350 million to settle a class-action lawsuit tied to the 2021 hack. As part of the settlement, the company also pledged to spend $150 million for security technology in 2022 and this year.

Write to Will Feuer at Will.Feuer@wsj.com

Corrections & Amplifications
T-Mobile US Inc. acknowledged a security lapse in 2021. An earlier version of this article incorrectly said it was last year. (Corrected on Jan. 19)

Copyright ©2022 Dow Jones & Company, Inc. All Rights Reserved. 87990cbe856818d5eddac44c7b1cdeb8

Read original article here

CircleCI says hackers stole encryption keys and customers’ secrets • TechCrunch

CircleCi, a software company whose products are popular with developers and software engineers, confirmed that some customers’ data was stolen in a data breach last month.

The company said in a detailed blog post on Friday that it identified the intruder’s initial point of access as an employee’s laptop that was compromised with malware, allowing the theft of session tokens used to keep the employee logged in to certain applications, even though their access was protected with two-factor authentication.

The company took the blame for the compromise, calling it a “systems failure,” adding that its antivirus software failed to detect the token-stealing malware on the employee’s laptop.

Session tokens allow a user to stay logged in without having to keep re-entering their password or re-authorizing using two-factor authentication each time. But a stolen session token allows an intruder to gain the same access as the account holder without needing their password or two-factor code. As such, it can be difficult to differentiate between a session token of the account owner, or a hacker who stole the token.

CircleCi said the theft of the session token allowed the cybercriminals to impersonate the employee and gain access to some of the company’s production systems, which store customer data.

“Because the targeted employee had privileges to generate production access tokens as part of the employee’s regular duties, the unauthorized third party was able to access and exfiltrate data from a subset of databases and stores, including customer environment variables, tokens, and keys,” said Rob Zuber, the company’s chief technology officer. Zuber said the intruders had access from December 16 through January 4.

Zuber said that while customer data was encrypted, the cybercriminals also obtained the encryption keys able to decrypt customer data. “We encourage customers who have yet to take action to do so in order to prevent unauthorized access to third-party systems and stores,” Zuber added.

Several customers have already informed CircleCi of unauthorized access to their systems, Zuber said.

The post-mortem comes days after the company warned customers to rotate “any and all secrets” stored in its platform, fearing that hackers had stolen its customers’ code and other sensitive secrets used for access to other applications and services.

Zuber said that CircleCi employees who retain access to production systems “have added additional step-up authentication steps and controls,” which should prevent a repeat-incident, likely by way of using hardware security keys.

The initial point of access — the token-stealing on an employee’s laptop — bears some resemblance to how the password manager giant LastPass was hacked, which also involved an intruder targeting an employee’s device, though it’s not known if the two incidents are linked. LastPass confirmed in December that its customers’ encrypted password vaults were stolen in an earlier breach. LastPass said the intruders had initially compromised an employee’s device and account access, allowing them to break into LastPass’ internal developer environment.

Updated headline to better reflect the customer data that was taken.

Read original article here

Hackers reportedly leak email addresses of more than 200 million Twitter users | Twitter

Hackers stole the email addresses of more than 200 million Twitter users and posted them on an online hacking forum, a security researcher said Wednesday.

The breach “will unfortunately lead to a lot of hacking, targeted phishing and doxxing”, Alon Gal, co-founder of Israeli cybersecurity monitoring firm Hudson Rock, wrote on LinkedIn. He called it “one of the most significant leaks I’ve seen”.

Twitter has not commented on the report, which Gal first posted about on social media on 24 December, nor responded to inquiries about the breach since that date. It was not clear what action, if any, Twitter has taken to investigate or remediate the issue.

Reuters could not independently verify if the data on the forum was authentic and came from Twitter. Screenshots of the hacker forum, where the data appeared on Wednesday, have circulated online.

Troy Hunt, creator of breach notification site Have I Been Pwned, viewed the leaked data and said on Twitter that it seemed “pretty much what it’s been described as”.

There were no clues to the identity or location of the hacker or hackers behind the breach. It may have taken place as early as 2021, which was before Elon Musk took over ownership of the company last year.

Claims about the size and scope of the breach initially varied with early accounts in December saying 400m email addresses and phone numbers were stolen.

A major breach at Twitter may interest regulators on both sides of the Atlantic. The data protection commission in Ireland, where Twitter has its European headquarters, and the US Federal Trade Commission have been monitoring the Elon Musk-owned company for compliance with European data protection rules and a US consent order respectively.

Messages left with the two regulators were not immediately returned on Thursday.

Read original article here

Apple Plans New Encryption System to Ward Off Hackers and Protect iCloud Data

Apple Inc.

AAPL -1.38%

is planning to significantly expand its data-encryption practices, a step that is likely to create tensions with law enforcement and governments around the world as the company continues to build new privacy protections for millions of iPhone users.

The expanded end-to-end encryption system, an optional feature called Advanced Data Protection, would keep most data secure that is stored in iCloud, an Apple service used by many of its users to store photos, back up their iPhones or save specific device data such as Notes and Messages. The data would be protected in the event that Apple is hacked, and it also wouldn’t be accessible to law enforcement, even with a warrant.

While Apple has drawn attention in the past for being unable to help agencies such as the Federal Bureau of Investigation access data on its encrypted iPhones, it has been able to provide much of the data stored in iCloud backups upon a valid legal request. Last year, it responded to thousands of such requests in the U.S., according to the company. 

With these new security enhancements, Apple would no longer have the technical ability to comply with certain law-enforcement requests such as for iCloud backups—which could include iMessage chat logs and attachments and have been used in many investigations.

Apple has added additional methods to help users recover their end-to-end encrypted data.



Photo:

Apple

The company said the security enhancements, which were announced Wednesday, are designed to protect Apple customers from the most sophisticated attackers.

“As customers have put more and more of their personal information of their lives into their devices, these have become more and more the subject of attacks by advanced actors,” said

Craig Federighi,

Apple’s senior vice president of software engineering, in an interview. Some of these actors are going to great lengths to get their hands on the private information of people they have targeted, he said.

The FBI said it was “deeply concerned with the threat end-to-end and user-only-access encryption pose,” according to a statement provided by an agency spokeswoman. “This hinders our ability to protect the American people from criminal acts ranging from cyberattacks and violence against children to drug trafficking, organized crime and terrorism,” the statement said. The FBI and law enforcement agencies need “lawful access by design,” it said.

A spokesman for the Justice Department declined to comment.

Former Western law-enforcement and intelligence officials said they were surprised by Apple’s decision in part because the company had refrained in the past from rolling out such encryption settings for iCloud. The officials said Apple would sometimes point authorities to the iCloud as a possible means of collecting information that could be useful for criminal investigations.

Ciaran Martin,

former chief of the U.K.’s National Cyber Security Centre, said the announcement by Apple could pose legal complications for the company in multiple democracies that in recent years have adopted or weighed restrictions on technology that can’t be responsive to law-enforcement demands.

“Things will only be clearer when further technical details are given,” Mr. Martin said. “But on the face of it, existing legislation in Australia and looming legislation in the U.K. would seem to give those governments the power to tell Apple in those countries effectively not to do this.”

Last year, Apple proposed software for the iPhone that would identify child sexual-abuse material on the iPhone. Apple now says it has stopped development of the system, following criticism from privacy and security researchers who worried that the software could be misused by governments or hackers to gain access to sensitive information on the phone.

SHARE YOUR THOUGHTS

What do you think about Apple’s new security feature? Join the conversation below.

Mr. Federighi said Apple’s focus related to protecting children has been on areas such as communication and giving parents tools to protect children in iMessage. “Child sexual abuse can be headed off before it occurs,” he said. “That’s where we’re putting our energy going forward.”

Apple released a feature in December 2021 called “Communication Safety” in Messages, which offers tools for parents that warn their children when they have received or attempt to send photos that contain nudity. The option is part of Apple’s “Screen Time” parental-controls software.

The new encryption system, to be tested by early users starting Wednesday, will roll out as an option in the U.S. by year’s end, and then worldwide including China in 2023, Mr. Federighi said.

“This development will prompt questions at home and abroad, including whether the government of China will really accept a loss of data access,” said Sumon Dantiki, a former senior FBI and Justice Department official who worked on cyber investigations and is now a partner at the King & Spalding law firm. U.S. officials have long pointed to China’s increasingly strict demands for access to data on companies that operate within its borders as a national-security concern.

In addition to Advanced Data Protection, Apple is also modifying its Messages app to make it harder for messages to be snooped on, and it will now allow users to log in to their Apple accounts with hardware-based security keys made by other companies such as Yubico.

Privacy groups have long called on Apple to strengthen encryption on its cloud servers. But because the Advanced Protection encryption keys will be controlled by users, the system will restrict Apple’s ability to restore lost data. 

Apple has added additional methods to help users recover their end-to-end encrypted data.



Photo:

Uncredited

To set up Advanced Data Protection, users will have to enable at least one data-recovery method. This could be a recovery key—a long list of numbers and characters that users could print out and store in a secure location—or the user could assign a friend or family member as a recovery contact.  

Over the past two decades, businesses and consumers have moved much of their data off computer systems that they control and onto the cloud—data centers filled with servers that are operated by large technology companies. That trend has made these cloud systems an attractive target for cyber intruders. 

Mr. Federighi said that Apple isn’t aware of any customer data being taken from iCloud by hackers but that the Advanced Protection system will make things harder for them. “All of us in the industry who manage customer data are under constant attack by entities that are attempting to breach our systems,” he said. “We have to stay ahead of future attacks with new protections.”

As Apple has locked down its systems, governments worldwide have become increasingly interested in the data stored on phones and cloud computers. That interest has led to friction between Apple and law-enforcement agencies, along with a growing market for iPhone hacking tools. In 2020, Attorney General

William Barr

pressured Apple for a way to crack the iPhone’s encryption to help with a terror investigation into a shooting that killed three people at a Florida Navy base.  

Advanced Protection will reduce the amount of iCloud information that Apple can provide to law-enforcement agencies, who frequently request iPhone data from Apple as part of their investigations. Apple received requests for information on 7,122 Apple accounts from U.S. authorities in the first six months of 2021, the last period for which the company has provided information.

Apple had already offered end-to-end encryption for some of its services, but the protection will now extend to 23 services, including iPhone backups and Photos. However, three services—Mail, Contacts and Calendar—won’t qualify for Advanced Protection because they use older technology protocols, Mr. Federighi said.

Mr. Federighi said Apple believes it shares the same mission as law enforcement and governments: keeping people safe. If sensitive information were to get in the hands of an attacker, a foreign adversary or some other bad actor, it could be disastrous, he said. 

“We’re giving users the option to keep that key only on their devices, which means that even if an attacker were to successfully breach the cloud and access all that data, it would be nonsense to them,” Mr. Federighi said. “They’d lack the key to decrypt it.”

Copyright ©2022 Dow Jones & Company, Inc. All Rights Reserved. 87990cbe856818d5eddac44c7b1cdeb8

Read original article here

Soul Hackers 2 version 1.02 update now available – adds ‘Dash’ function, ‘Speed Up’ battle mode, and four new demons

ATLUS [1,885 articles]” href=”https://www.gematsu.com/companies/atlus”>ATLUS has released the version 1.02 update for Soul Hackers 2 [32 articles]” href=”https://www.gematsu.com/games/soul-hackers-2″>Soul Hackers 2, which adds the “Dash” function, “Speed Up” mode for battles, various adjustment, and four new demons.

Get the details below.

Dash Function

  • A “Dash” function has been added to Ringo’s movement.
  • The user can toggle between “Normal” and “Dash” at will. While in Dash Mode, Ringo’s walking and slashing speeds will increase.
  • Due to the addition of the dash function, the effect of the Summoner Skill “Assassin’s Steps” has been changed to: “For a given distance, enemies will ignore Ringo.”

Fast Battle Mode

  • A “Speed Up” mode has been added to battles. Players may freely toggle between normal and high-speed combat.

Adjustments

  • Adjusted how long loading-screen tips are shown.
  • Changed the flow of on-screen prompts during soul level increase to reduce the risk of incorrect input from accidental button presses.
  • Added the ability to teleport directly to shops from the City Map.
  • Adjusted enemy spawn rate in dungeons.
  • Adjusted skill inheritance rates during demon fusion.
  • Other minor changes.

Other Changes

  • Added four new demons: Pixie (Soul Hackers Ver.), Neko Shogun, Aitvaras, and Isis.
  • Note: The above bonus demons do not count toward the Registration Percentage in the Demon Compendium or the achievement “Compendium Completionist.”

Soul Hackers 2 is available now for PS5 [3,762 articles]” href=”https://www.gematsu.com/platforms/playstation/ps5″>PlayStation 5, Xbox Series [2,927 articles]” href=”https://www.gematsu.com/platforms/xbox/xbox-series”>Xbox Series, PS4 [24,206 articles]” href=”https://www.gematsu.com/platforms/playstation/ps4″>PlayStation 4, Xbox One [11,586 articles]” href=”https://www.gematsu.com/platforms/xbox/xbox-one”>Xbox One, and PC [16,325 articles]” href=”https://www.gematsu.com/platforms/pc”>PC via Steam and Microsoft Store.

Watch a new trailer below.

Version 1.02 Update Trailer

English

Japanese

Read original article here