Celsius Clients’ Cryptocurrencies at Risk, Microsoft’s Accidental Leak, and Other Cybersecurity Events

Cybersec_Digest_3
Cybersec_Digest_3

We’ve collected the most important news from the world of cybersecurity this week.

  • Microsoft accidentally gave a link to 38 TB of employee data.
  • Crypto wallets of Celsius lenders were attempted to be hacked through phishing.
  • A bug in the T-Mobile app exposed customers’ payment information.
  • The PIILOPUOTI darknet marketplace has been liquidated.

Microsoft accidentally gave a link to 38 TB of employee data

Microsoft’s AI division, when publishing a set of training data on GitHub, accidentally gave full access to the company’s internal confidential information storage. Wiz researchers noticed this.

The link to Azure Storage published by the developers turned out to be configured using a token SAS to share the entire account. Thus, 38 TB of information was disclosed, including personal backup copies of the computers of two Microsoft employees.

The latter contained sensitive personal data, including passwords to company services, secret keys and more than 30,000 internal Microsoft Teams messages from 359 employees.

1695041383-05-graphic
Data: Wiz.

The incident occurred at the end of June. Two days after Wiz’s notification, Microsoft’s response team revoked the SAS token, and a month later replaced it with GitHub.

The company stressed that no customer data was exposed and no other internal services were at risk due to this issue.

Crypto wallets of Celsius lenders were hacked through phishing

In anticipation of the approval of the refund plan, clients of the bankrupt crypto-lending platform Celsius began receiving phishing emails. This is reported by Bleeping Computer.

The scammers are posing as the claims agent in the case, Stretto. In the letter, they offer creditors a seven-day period supposedly to return the frozen funds.

n87hndfjv
Data: Bleeping Computer.

The link provided in the message leads to a phishing site where the user is asked to connect his cryptocurrency wallet. With this connection, attackers gain full access to all assets on the balance sheet.

Since among the mailing recipients there are users who are not Celsius clients, journalists suggested that the hackers are using email addresses from old leaks of various cryptocurrency services. The scope of the phishing campaign is unclear at this time.

A bug in the T-Mobile app exposed customer payment information

T-Mobile customers were able to see third-party user data in the operator’s official mobile application. Numerous complaints appeared on Reddit and X.

The information available included customers’ names, phone numbers, addresses, account balances, and bank card information, including expiration date and last four digits.

According to T-Mobile representatives, the company’s systems were not hacked – the failure occurred during an application update. They added that the incident had a “limited impact” and affected fewer than 100 people.

However, outside experts warned that the leak could lead to SIM swapping attacks.

Darknet marketplace PIILOPUOTI liquidated

Finnish customs, together with Europol, stopped the operation of the darknet marketplace PIILOPUOTI and seized its domain.

dom.png
Data: Europol.

According to the department, the site has facilitated drug smuggling and sales in the country since May 2022.

At the moment, the investigation into the case continues, Finnish authorities are establishing the identities of the sellers and users of the site.

Experts have documented the exploitation of “atypical” AWS services for hidden mining

A group of Sysdig researchers has discovered a new cloud cryptojacking campaign, AMBERSQUID. It uses unusual Amazon Web Services (AWS), including AWS Amplify, AWS Fargate, and Amazon SageMaker.

Retargeting these services frees hackers from having to request additional resources from AWS, as would happen in a more typical attack on Amazon EC2.

Additionally, targeting multiple services requires identifying and destroying miners in each of them.

image1-75-1
Data: Sysdig.

Researchers have linked the campaign to Indonesian attackers. An analysis of wallets showed that hidden cloud mining has brought them about $18,300 to date.

A large casino chain from Las Vegas paid extortionists $15 million after being hacked

The attackers stole the database of the loyalty program of the large casino chain Caesars Entertainment, which, among other things, contained the driver’s licenses and social security numbers of customers. Under threat of publishing this information, the company paid the hackers $15 million.

According to filings in SEC According to documents, the attack was discovered on September 7. The investigation is still ongoing, but Caesars Entertainment said the incident did not impact the company’s operations or affect customer payment information.

According to researchers, the Scattered Spider group, which recently attacked another casino chain, MGM Resorts, could be behind the hack.

Virtual number services will begin to be blocked in the Russian Federation

The Russian government has recognized the use of virtual (DEF) numbers as a threat to national security in the field of communications and the Internet; services for issuing them will be blocked from September 1, 2024. TASS reports this with reference to the relevant resolution.

The document makes changes to the rules for centralized management of the public communications network. The list of threats in this area was supplemented with a clause on providing users with access to online resources and instant messengers without identification.

DEF numbers belong to foreign telecom operators, are rented and are in no way tied to the personal data of a particular person. Therefore, attackers can use them to create temporary accounts to post illegal information or commit fraudulent activities.

RKN proposed to block information about bypassing censorship

Roskomnadzor has developed criteria for restricting access to information about ways to bypass Internet blocking.

The new ban directly affects VPN services, the Tor browser, anonymizers, as well as any information about the benefits of bypassing censorship.

Public discussion of the draft relevant order will last until October 6. The changes will come into force on March 1, 2024.

Also on ForkLog:

What to read this weekend?

An excerpt from Gaspard Koenig’s book “The End of the Individual,” where the author examines whether AI can abolish the “new serfdom.”

Found an error in the text? Select it and press CTRL+ENTER

ForkLog newsletters: keep your finger on the pulse of the Bitcoin industry!

Leave a Reply