go to sections menu

The Technology blog and podcast

This is for the technology blog and podcast Commentary, articles, and podcasts

header picture for Ingegno theme

You are here: article commentary

Go to Homepage [0], contents or to navigation menu

Sans Institute gets breached, investigation in progress

This morning, we’re learning about the Sans Institute, an edducation portal for cybersecurity professionals and people interested in the field like myself got breached.

Since they’re an institution, they charge for their courses and they recently added some new ones. I receive Sans News Bites which I’ve read for quite awhile although not of late. Some of the things may be blogged, while others not so much.

According to cyberscoop, The SANS Institute, which trains cybersecurity professionals around the world, was hacked, resulting in the compromise of 28,000 records of personally
identifiable information, the organization said Tuesday.

The Maryland-based research and educational outfit said the breach was the result of a single phishing email sent to a SANS employee, which led to more
than 500 of the organization’s emails being forwarded. The breached data included names, email addresses, and physical addresses — information submitted
by attendees of a recent SANS virtual training event.

After discovering the breach on Aug. 6, SANS said it “quickly stopped any further release of information” from the compromised email account, which was forwarding the data to an “unknown external email
address.” The institute did not identify who was responsible for the hack.

The fact that Phishing was the leading cause is not surprising according to the article. Even the best make mistakes, and its bound to happen.

Can the institute learn from this mistake? The news is that they were right on it after discovering there was a problem, and that is what you want. If I see anything else, I’ll be sure to pass it along as I think people should see this.

Cyberscoop: SANS Institute, which drills cyber professionals in defense, suffers data breach is where you can read more. Today they just released new courses and hopefully new students won’t be effected.

Comments (0)

Patch Tuesday, I’ve been rebooted

This morning, I went ahead nd rebooted before the Security Box, as the computer indicated it had updates to install. I read the article on Krebs on Security, and this is the only article out at this time. This month, 120 security bugs have been patched. This makes the 6th straight month of over 100 patches during this trying time for the Washington based company.

At least 17 of the bugs squashed in August’s patch batch address vulnerabilities Microsoft rates as “critical,” meaning they can be exploited by miscreants
or malware to gain complete, remote control over an affected system with little or no help from users. This is the sixth month in a row Microsoft has shipped
fixes for more than 100 flaws in its products.

For complete information including links to several CVE’s, please check out Microsoft Patch Tuesday, August 2020 Edition for complete details. If I see more, I’ll be sure to pass it along!

Comments (0)

Looking for a job? Not so fast according to North Korea

The Koreas are at it. First we had South Korea getting Tik Tok in to some trouble, and now we have North Korea in the phishing game. I’ve seen numerous job offers in my email before, and even offers sent through my web site forms telling me that the supposed company has all these devlopers and they’re in China or some other country and they can do my site for cheap.

While some of this may be spam, some of it may be legitimate job offers. I’m unaware of a company that sends job offers to people randomly however, I believe that most legit job offers you have to go seek unless you call the company first.

Here is what I’d do.

  • If I got a job offer from what looks like a legit company, see if you can find a point of contact.
  • Contact them through the point of contact and ask if the company sends job offers by email.
  • Depending on what you get as an answer, proceed with caution, and remember to check the URL if clicking.

Macafee detected malware after job offers were sent, and this is why I highlighted some potentials to check. My hunch is that this isn’t normal to receive job offers by email, and we should be aware of that.

There are a lot of links within this article, so quoting it is going to be a little bit difficult, so I’ll leave you by putting the article to read if you’re in the market.

For North Korea, phishing with fake job-recruitment emails never gets old

I read this article on the 30th of July, and it isn’t completely old. It can be shared any time. That time is now.

Comments (0)

A scammer threatens to put data online unless paid

On the 20th of July, I read a very interesting article about a scammer that decided that it would be a good idea to ask for more than he probably deserved. Not only did he get paid for ransomware attacks, he decided to ransom more money for not publishing the stolen data he had.

The government of Cyprus has extradited a 21-year-old accused cybercriminal to the United States after he was accused of breaching a number of U.S. companies
as part of a years-long extortion effort.

Joshua Epifaniou, a Cypriot national, arrived in New York City on Friday, more than two years after he was initially arrested in connection with a corporate
hacking spree.

According to the article from Cyberscoop, the gentleman stole from multiple sites, than asked for more money to not publish the data.

To add insult to injury, the article states:

Epifaniou also hacked Ripoff Report, a business accountability site, and charged his clients between $3,000 and $5,000 to delete relevant complaints, prosecutors
contend. Epifaniou also allegedly worked with a search engine optimization firm to research companies disparaged on Ripoff Report that would be most likely
to pay for his services.

How does it feel to get caught now?

He was scheduled to appear in Georgia several days after this article was published, and I’d sure like to know what defense he has, seeing that the government has quite a bit on him.

Accused Cypriot scammer threatened to publish stolen data if victims didn’t pay huge extortion fees is the article from Cyberscoop, have fun!

Comments (0)

Here’s some very interesting phone stuff to chew on

Recently, I covered for one of our technology shows and mentioned bluetooth as part of a permission base that an app for Donald Trump had when you installed the app. I was later linked to a podcast which covered this aspect and bluetooth as a whole is not necessarily a bad thing over all.

After reviewing that, I remembered I had an article talking about researchers finding a vulnerability in the operating system when it came to Android and it is not an IOS bug as they tested it.

I don’t honestly know of the first way researchers targeted bluetooth, but the article in question talks about how the latest round can be used to get at very specific things.

It works by allowing attackers to disguise themselves as a trusted application, requesting permissions that allow one Bluetooth-enabled device to share
data with another device, such as a headset or car’s “infotainment” system. For the attack to run successfully, Bluetooth must be enabled on the target
device and victims must approve the attackers’ request for privileges. In the end, this action gives attackers access to data on the victim’s device, according
to the California-based company.

The good news is that you still need to approve this thing, so if you’re not looking for any connections on bluetooth especially when traveling, its recommended to turn off bluetooth so you’re not discoverable, or deny connections you’re not expecting.

Researchers found another way to hack Android cellphones via Bluetooth is the article here and I think its still worth a read.

In other news speaking of phones, who here would ever trust the NSA with giving advice when it comes to security? OIn an article I also read around the same time I read the first one linked above, the NSA is trying to go around telling us what to do about hiding our location even if we turn off location services.

In part, a paragraph says:

The NSA warns, for instance, that in addition to mobile devices storing location data in their own mobile device logs, cellular networks receive real-time
coordinates for cellphones every time they connect to the network. That communication with the network also can make location information vulnerable.

So you’re telling me that this isn’t part of how cell phones work, because if there ever an emergency and you needed to call emergency services that you couldn’t get it?

Another paragraph says:

Bad actors using devices that imitate legitimate cellular towers could also obtain sensitive location information even without providers’ cooperation,
the NSA warns.

I have heard of devices that are like cell phone towers, and can act like the real thing, but I am unaware if I’ve came across them. I don’t think we can ever know if we have come across them.

There are two headings that might be of interest. The first: The public is definitely in mind and the second Smart devices and social media. I’m sure that you might want to take a look at this if you’re interested in this type of thing. I hope I am not sharing my location with a bad actor, even if I had turned off my location services. Here’s the NSA’s advice for reducing the exposure of cellphone location data is the article from Cyberscoop here.

A third article is more in the “oopse, we’ve been targeted” department as it talks about robocalls. A company who is supposed to give legal aid to various companies got their database lifted and from my estimation, people won’t be too happy about this one.

Chew on this paragraph. It says:

A California company that helps telemarketing firms avoid getting sued for violating a federal law that seeks to curb robocalls has leaked the phone numbers,
email addresses and passwords of all its customers, as well as the mobile phone numbers and other data on people who have hired lawyers to go after telemarketers.

Big time problem much? I still wonder why these databases are stored online and in the clear? My database is stored in a folder, in many files. MENVI has its roster but it too, is in a file on the computer, not online for everyone to peruse and lift data.

While Dropbox was targeted in 2016 according to have I been powned but I’m not concerned because I have two factor on and my password is strong as it is anyway. I should think about changing it, but I’ve not been overly concerned.

Lawyers representing TCPA claimants typically redact their clients’ personal information from legal filings to protect them from retaliation and to keep
their contact information private. The Blacklist Alliance researches TCPA cases to uncover the phone numbers of plaintiffs and sells this data in the form
of list-scrubbing services to telemarketers.

“TCPA predators operate like malware,” The Blacklist explains on its website. “Our Litigation Firewall isolates the infection and protects you from harm.
Scrub against active plaintiffs, pre litigation complainers, active attorneys, attorney associates, and more. Use our robust API to seamlessly scrub these
high-risk numbers from your outbound campaigns and inbound calls, or adjust your suppression settings to fit your individual requirements and appetite
for risk.”

Wonder if anyone will trust these guys again?

Found anything in this space we should talk about on any of the podcasts? Drop me a line!

Comments (0)

Phony covid and unemployment claims to boot

I’ve been sitting on stuff, and its time to try and catch up. We know that thieves have been taking advantage of our situation of not being able to work for some time now, and even before the pandemic, we’ve gotten the various phishing emails, sms messages, and even the telephone calls.

One phone call that I got within the past while had to do with someone claiming to call from the police department. They wanted me to donate $10 to help the police. While I support the police department, we are not responsible to pay the police department, they get paid by our taxes and other funding I may not be familiar with.

If the guy calling me was from the police department, the police department would probably be happy to send me information on what the money donated was to be used for. I told the guy to send me the packet, and he never asked for my address. I don’t believe police departments ask for money from the general public, they are paid again through the fines you pay and other means.

In June, KrebsOnSecurity was contacted by a cybersecurity researcher who discovered that a group of scammers was sharing highly detailed personal and financial
records on Americans via a free web-based email service that allows anyone who knows an account’s username to view all email sent to that account — without
the need of a password.

The source, who asked not to be identified in this story, said he’s been monitoring the group’s communications for several weeks and sharing the information
with state and federal authorities in a bid to disrupt their fraudulent activity.

The source said the group appears to consist of several hundred individuals who collectively have stolen tens of millions of dollars from U.S. state and
federal treasuries via phony loan applications with the U.S. Small Business Administration (SBA) and through fraudulent unemployment insurance claims made against several states.

This is only the first few paragraphs of this very interesting article I recently read from Krebs. Lets all be informed.

Comments (0)

This week in security news, news ending August 8, 2020

I’m a little bit late with this one but this week in security news for this past week has some very inteeresting things in it.

I think the big thing for this past week’s news is in regards to programming industrial systems to do jobs. There’s now a thing called Smart Factories, and its only going to get worse if the programming for them is not going to be updated. I’ve not read the article, but if this interests you, click on through.

The other big news is Water Nue Phishing Campaign Targets C-Suite’s Office 365 Accounts which really talks about this particular threat. Trend Micro named this threat, and the article really goes in to their MO.

As part of our discussion of Phishing for tomorrow, we’ll have to talk about Business Email Compromise, and its effect. Because of the pandemic, its not going to be going away any time soon.

A third item is talking about … what else? Covid-19 and the landscape we nbow live in. Instead of going after the individual, cyberactors are going after the companies with the big bucks, and it is only going to get worse as this year progresses.

If you’re interested in the big time deal with many articles talking about the industrial aspect of our security, than this last week’s security news is where you’ll want to go. This Week in Security News: Robots Running the Industrial World Are Open to Cyber Attacks and Industrial Protocol Translation Gone Wrong is the blog post, and I urge people to check out the new phishing attack if nothing else. Thanks so much for reading!

Comments (0)

a twitter update worth reading: there’s more to the masterminds than we once knew

One week ago, one of my twitter followers posted a story they read through Wired talking about how the masterminds were caught in the twitter hack. MO stands for Motis Operanda, and of course, they talk about the social engineering ploy which these guys and others have done for many many years.

We later learn that Kurt is not a twitter employee, but possibly another persona of one of the elledged 3 that mastermined this scheme. To learn more, please feel free to check out the article: How the Alleged Twitter Hackers Got Caught with the subtitle: Bitcoin payments and IP addresses led investigators to two of the alleged perpetrators in just over two weeks.. While my post will be short and to the point, you need to read the article to get the complete story. As I say, better late than never. Have fun!

Comments (0)

Finally a line on election security? Maybe this is the beginning of cleaning this up

The blog and its various itterations have talked about election security. We know that 2016 was mettled with, and this year has the potential of the same thing. With the corona virus, its going to get interesting

The article I read last night talks about one company who is updating their policies to allow the good guys to find and report issues which the company will fix, and I think it is a long time in the making.

“Hackers are going to hack, researchers are going to research, whether or not there’s a policy in place,” Chris Wlaschin, ES&S’s vice president of systems
security, told CyberScoop. “We think it’s important to have that safe harbor language out there to set expectations.”

I can’t agree more. The article has other links and things, and its only going to get more interesting from here. Top voting vendor ES&S publishes vulnerability disclosure policy is the article, and lets see if more vendors get on board!

Comments (0)

More Zoom issues, settings not set correctly, judge terminates proceedings and the meeting

Yesterday, I was alerted to an article from Krebs on Security that talks about the teenager in Florida that is part of the attempted hack on Twitter that took place on July 15th. The article doesn’t necessarily talk about anything new, since the judge or whoever set up the meeting didn’t set things correctly, so it wouldn’t surprise you if you heard that porn was streamed in to the conference and people were able to unmute themselves and cause havoc.

The incident occurred at a bond hearing held via the videoconferencing service Zoom by the Hillsborough County, Fla. criminal court in the case of Graham
Clark. The 17-year-old from Tampa was arrested earlier this month on suspicion of social engineering his way into Twitter’s internal computer systems and
tweeting out a bitcoin scam through the accounts of high-profile Twitter users.

Notice of the hearing was available via public records filed with the Florida state attorney’s office. The notice specified the Zoom meeting time and ID
number, essentially allowing anyone to participate in the proceeding.

Even before the hearing officially began it was clear that the event would likely be “zoom bombed.” That’s because while participants were muted by default,
they were free to unmute their microphones and transmit their own video streams to the channel.

Sure enough, less than a minute had passed before one attendee not party to the case interrupted a discussion between Clark’s attorney and the judge by
streaming a live video of himself adjusting his face mask. Just a few minutes later, someone began interjecting loud music.

It became clear that presiding Judge Christopher C. Nash was personally in charge of administering the video hearing when, after roughly 15 seconds worth
of random chatter interrupted the prosecution’s response, Nash told participants he was removing the troublemakers as quickly as he could.

To add insult to injury, the information was available to the public which could be a good thing, just like court hearings are available for anyone to come in if they want. But my question is whether or not its possible to change settings while a meeting is in session for people not to be allowed to unmute, and other critical settings to have a successful meeting or court proceeding in this case?

The article goes on to talk about the defendants history including sim swapping and social engineering. In 2019, according to the article, the defendant was responsible for lifting 160 bitcoin from someone, and when he was arrested, they were able to recover 100 of those bitcoin and I believe returned it back to the rightful owner.

For more on this including an article linked within, please read Porn Clip Disrupts Virtual Court Hearing for Alleged Twitter Hacker from Krebs on Security, and make it a great day!

Comments (0)

Twitter prepared to pay a large amount of money

Many years ago, Twitter said that they would use mobile phone numbers as part of two-factor and making sure we can get in to our accounts. I know that during this major mistake where an individual was tricked in turning over credentials to a internal tool which eventually let other people take over big time accounts there. We also have learned that some passwords were changed either through reset, or through the tool.

In an article entitled Twitter prepares to pay up to $250 million for using security data for advertising it talks about this and the recent events as well.

Twitter acknowledged it could pay up to $250 million to the U.S. Federal Trade Commission for directing targeted advertising to users based off data submitted
for security purposes.

In a financial filing
submitted to the Securities and Exchange Commission,
Twitter estimated it would pay between $150 million and $250 million to the FTC. The penalty comes after the FTC drafted a complaint on July 28 alleging that Twitter used “phone number and/or email address data provided for safety and security purposes for targeted advertising during periods between 2013 and 2019,” Twitter said in the SEC filing.

The complaint suggests Twitter violated a 2011 FTC consent order that required the company to establish a data security program, which required them to
be transparent with users about the security and privacy measures in place. In October 2019,
the company said it used email addresses and phone numbers to improve targeted advertising efforts.

There is more to this story The company even says that they don’t know how many people were used for targeted advertising. As the breach isn’t bad enough, we’re finding out about this problem too?

I believe during the incident in July, Twitter was as transparent as possible under the circumstances. Why not earlier? I’m leaving my twitter, but now I’m really wondering about this.

“The matter remains unresolved, and there can be no assurance as to the timing or the terms of any final outcome,” Twitter said in its SEC filing.

Twitter submitted the SEC filing days after it’s second-quarter earnings report, in which the company said its number of daily users had grown by 12% to
186 million people, though its revenue fell by 19% from one year earlier to $683 million.

The boards await you and there’s more. Go on, read more. It was a very interesting article. Thoughts welcome.

Comments (0)

Yet Another booting problem found by researchers

In the Security Now podcast taped on August 4th, 2020: you will learn about yet another booting issue or yet, a booting problem similar to how Meltdown and Specter were headlines in 2018-2019.

In June, the antivirus company ESET stumbled across an insidious strain of ransomware that prevents a computer from loading and locks its data.

A saving grace was that, in order for the attack to work, a ubiquitous feature known as UEFI Secure Boot, which protects computers from getting malicious
code slipped on their systems, would have to be disabled.

This bootable problem effects the booting process of every Linux-based computer to date.

The article I’m going to be linking to comes from Cyberscoop. New bug in PC booting process could take years to fix, researchers say is the article. While this doesn’t effect Windows as far as we can tell like the others, we should be aware of what is going on with different operating systems. Feel free to take a read of this one if this interests you.

If I’m wrong and even though I read its linux-based, if it does effect windows, please leave a comment to clarify. I know it talked about UEFI, and the secure boot, but all or most machines have this in their bios. This type of work i don’t do, so my knowledge may not be correct. I’d love clarification, so comment away!

Comments (1)

Don’t make mistakes like the Twitter employees did

While looking for tik tok specific things, CNET has an article Protect yourself from phishing scams so you don’t fall prey to the next Twitter hacker which talks about Spear Phishing. Hopefully next week, we’ll be talking on the Security box about the different types of phishing. This article highlights what happened with twitter, and lays the groundwork on what you, the average consumer, can do to protect yourself.

  • Look at the “from” field. Is the person or business’s name spelled correctly, and does the email address actually match the name of the sender? Or are
    there a bunch of random characters in the email address instead?
  • While we’re at it, does the email address seem close, but a little off? E.g. Microsft.net, or Microsoft.co.
  • Hover your mouse over any links in the email to see the true URLs they will send you to. Do they look legitimate? Remember not to click!
  • Check the greeting. Does the sender address you by name? “Customer” or “Sir” would be red flags.
  • Read the email closely. Is it generally free from spelling errors or odd grammar?
  • Think about the tone of the message. Is it overly urgent or trying to get you to do something you normally wouldn’t?
  • There’s more to the article that might help you. If the common tactics don’t help you, look at the address, even if it is spelled more correctly than other messages you could easily spot. We’ll be talking about this more hopefully next week. If not next week, on a future show.

    Comments (1)

    Tiktok, its fun for you, not for lawmakers

    I’ve been asked about what is going on in Tik Tok land. this CNET article entitled: TikTok: For you, it’s fun, but for Trump and lawmakers, it’s a security threat goes in to great detail about what is going on including the reported rumor that Microsoft may be buying this troubled app. There are articles reguarding the buying of this app, and they’re linked within this article.

    According to Michael in Indiana, they have until August 15th to make a deal, or the rumor is that the app will be banned in the United States.

    If they are that much of a threat, just ban it and be done with it.

    Comments (1)

    What do you think about when you charge your credit or debit card?

    The blog title is asking a question. What do you think about when you charge something to your credit or debit card? Thinking about whether or not the transaction is as secure as possible? Probably not. I don’t blame you.

    In two different articles recently published by Krebs on Security, I started to think about some of what he is saying, especially when you read one of them.

    In the first article, Brian talks about why credit card fraud is still the thing. A well-known card shop, whose name was Brians Club, sold quite a number of stolen cards, but yet, a lot were still unsold. The amount of money made by this shop alone is staggering. Here’s Why Credit Card Fraud is Still a Thing is the article.

    This is a research project by New York University and I really think its worth the read.

    There is also a second artoicle about the security of chip cards. While a lot more merchants of late are installing chip based readers, we still stripe if there is a problem with the chip, yet the chip is more secure if used properly. Researchers found a very interesting work around if some banks don’t do the proper verification that is required. Is Your Chip Card Secure? Much Depends on Where You Bank is the article that goes in to all of the juicy details.

    Thanks for reading.

    Comments (1)

    Mirai is back, its really getting bad now

    Mirai has really taken on new twists. In a little bit of a dated article, its the beginning of an investigation in to this updated malware that takes advantage of a 2020 flaw. In a more recent post, more details about how this thing works now.

    The first article is Mirai Botnet Exploit Weaponized to Attack IoT Devices via CVE-2020-5902 which seems in hinesite pretty bad. The second, New Mirai Variant Expands Arsenal, Exploits CVE-2020-10173 which I think is the older one.

    No matter how you read it, both articles are quite interesting, and you should catch yourself up if this interests you. Its only going to get worse. I’m not looking forward in this.

    Comments (0)

    This week in Security news, news ending August 1, 2020

    Welcome to August! I can’t believe we’re already in August. Where has this year gone? This week in security news was quite interesting, and even the big news we talked about in this blog post was covered.

    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This
    week, read about how Trend Micro found an IoT Mirai botnet downloader that can be added to new malware variants to scan for exposed Big-IP boxes for intrusion.
    Also, learn about how the Vermont Department of Taxes may have been exposing taxpayer data for more than three years.

    • Ransomware is still a problem to business and I covered this on this blog post.
    • In an article, we are now learning that the Garmin attack was the work of ransomware, in case you didn’t know already.
    • We covered Enciko this blog post and it is definitely in the news for this week. This was the blog post where a specific name used within the code killed PHP along with other things along the web server front.
    • We’ve got a boot hole threatening lynux and windows devices.

    These are some of the items this week. Did you read the post by John Clay? If you answered yes, what did you think? If you said no, would you like to see if something interested you? If you said yes to that question head on over to trend micro’s blog and read: This Week in Security News: Mirai Botnet Exploit Weaponized to Attack IoT Devices via CVE-2020-5902 and Vermont Taxpayers Warned of Data Leak Over the
    and I’m sure there will be something of interest that you’ll want to read. Thanks for supporting my work, and I hope to see you on another edition of another tech related program really soon!

    Comments (0)

    Cyberscoop has some more news on twitter: Krebs adds to it too

    There are two articles on Cyberscoop. The first, names the 17-year-old as Graham Ivan Clark . While the news sources that cover main stream news didn’t name the 17-year-old, we know that this individual will apparentlly be charged as an adult, so I don’t see why I need to keep that silent.

    Members of the scheme allegedly communicated on the messaging app Discord, advertising illicit access to Twitter accounts and promising to provide other
    users with access to any account in exchange for a fee.

    Tweets from the high-profile victims resulted in 415 bitcoin transfers into a cryptocurrency account controlled by the attackers, according to a criminal
    complaint. The suspects earned more than $117,000 as part of the effort, according to the DOJ.

    I’ve heard of discord, but I’ve never used it. I don’t remember the other articles mentioning this, and I found this of interest.

    This first article is entitled Hackers breached Twitter accounts by targeting employees by phone and is only the beginning of what could get interesting.

    The last, Hackers breached Twitter accounts by targeting employees by phone talked about the Spear Phishing attempt. Read more about phishing via Wikipedia which has a heading for Spear Phishing.

    The attackers targeted a “small number of employees through a phone spear phishing attack,” Twitter said in a statement. Thursday. Not all the affected employees had access to account management tools, the company said, but hackers used their credentials to gather information
    about Twitter’s internal processes. They then used that reconnaissance data to inform attacks on Twitter personnel with deeper access.

    “This attack relied on a significant and concerted attempt to mislead certain employees and exploit human vulnerabilities to gain access to our internal
    systems,” the company said in a blog post.

    I’m sure people will want to talk about this, and the boards and my email await you. This is definitely getting interesting.

    Brian Krebs also just published today Three Charged in July 15 Twitter Compromise which I thought he would.

    I have not yet read Kreb’s take on this as of yet. I know I will enjoy it, but there are some more sources on this.

    The first https://technology.jaredrimer.net/2020/07/31/florida-teenager-arrested-in-massive-twitter-hack-two-adults-also-charged/”>blog post on this subject takes it from mainstream media sources. This post takes it from the tech sources I read. One of the posts was from a tech source, but here is some more. Enjoy!

    Comments (0)

    Florida Teenager arrested in massive twitter hack, two adults also charged

    I’ve seen multiple sources that are reporting that a 17-year-old teenager has now been arrested on July 31, 2020 in connection with the massive attack that took control of multiple high profile accounts to send out a bitcoin scam. Florida law, according to a CNN article, allows for the prosecution of minors as adults in certain circumstances.

    Steve Gibson, the host of Security Now, sent out two links. The CNN article, Herbie, a past contributer to this podcast, was responsible for sending me.

    Steve Asks on a retweet of Tech Crunch,

    “The Twitter Hacker: A 17-year old minor? ”

    Somehow this doesn’t surprise me one bit anymore.

    According to Tech Crunch’s coverage, the teenager who was not named, will be charged in 30 different charges.

    The state attorney’s office said that the teen was arrested earlier today after an investigation by the Federal Bureau of Investigation and the U.S. Department
    of Justice, and that they will be tried as an adult. They face charges including one count of organized fraud (over $50,000) and 17 counts of communications
    fraud (over $300).

    Twitter has been transparent in the case to date, and I feel that it was an honest mistake. Two other people are named and have been arrested. One was based in the United Kingdom, the other, in Florida. The Florida man will be tried here in California.

    According to a Tampa news source Steve also retweeted, the teenager is being charged with the following:

    • • Organized fraud of over $50,000
    • • 17 counts of communications fraud of over $300
    • • Fraudulent use of personal information of over $100,000 or 30 or more victims
    • • 10 counts of fraudulent use of personal information
    • • Access to computer or electronic device without authority, scheme to defraud

    In all of the articles, if I haven’t mentioned it already, the teen is being charged with 30 felony charges.

    Also, the articles may say things a little bit differently, but all have the same type of information.

    One of the articles talks about the two adults and what they’re being charged with.

    Further Reading

    The following sources were either provided to me, or retweeted. They all pretty much say the same thing, read the one that you’d like to read. They say things a bit differently, and one may have more than another. Feel free to check them out.

    There may be other sources I’m not aware of, but if they have more than what I have here, I’ll be sure to blog again.

    Comments (0)

    This has to be the biggest breach to date

    Shaun Everiss, our other administrator, sent me a link to one of the worst hacks I think we’ve ever seen.

    While this is not surprising to some, this is not the first time anything has happened.

    Here is the entire Email Shaun sent me this afternoon on this.



    It was bound to happen eventually I mean lets face it we use gps devices and they are a target, never the less its still a shock even though you sort of expect this thing these days.

    If they can hack your smart watch and phone they can do just about everything else.

    I use a smart stereo and tv smart box here.

    These are in standbuy when not in use and are available to app control.

    Though I am secure on my end and so is everything else, if they can get in, there is a lot of dammage one could probably do.

    Gps data is one thing, and while a stereo is limited to playing random tracks and shoving volume up to the max, etc, if they got your passwords to spotify and other accounts then you would have a lot more trouble.

    This shows that if its used by the masses its a target.

    And no matter how secure you are the bad guys are watching for the slightest mistake.

    I remember seeing something earlier about this mess, and I wasn’t wrong.

    In 2018, the Guardian reported
    that fitness tracking app Strava gave away the location of secret U.S. army bases by releasing a data visualization map that detailed the activity of
    Strava users. The data visualization map could be used to identify U.S. bases by mapping the activity of military personnel using the app, which became
    apparent in places like Afghanistan and Syria where it appeared the app was almost exclusively used by those in the military.

    According to the article:

    Scott-Railton also noted that while many consumers may know Garmin for its wearable smartwatches and sports and fitness tracking systems, the company also
    has a full fleet of navigational products

    and I bet none of us really know what those products are.

    Each and every company always says that our privacy is their utmost priority. Even on the Securty Box’s coverage of Coppa, the question was asked about web sites in general and how verification of the data takes place. It can’t be done, I said, unless a human does it. That is why MENVI does all of our application sign ups manually, and it isn’t ever stored in any database accessed on the Internet. It is just too risky!

    The article I’m going to link to has a link to the company’s press release. To read more, The Garmin Ransomware Hack Is Horrifying from vice, part of motherboard. I want people to comment on this, as the company is well-known. This can’t be good. This can only get worse. Thank you Shaun for adding your comments and allowing us to use them. I think you’re spot on with them.

    Comments (0)

    Older Posts »

    go to sections menu

    navigation menu

    go to sections menu