Cybercriminal Twins Nabbed After Accidentally Leaving Microsoft Teams Recording On

The troubling aftermath of an iPhone theft may not merely lie in the loss itself but in the ensuing phishing threats aimed at contacts within the device. Recent investigations have uncovered a robust infrastructure enabling criminals to bypass iPhone security, subsequently exploiting the personal information of the phone’s owner.

In another significant incident, Foxconn, the prominent electronics manufacturer linked with iPhone production, has disclosed that it fell victim to a cyberattack. The ransomware group known as Nitrogen has claimed responsibility, asserting that it exfiltrated around 8 TB of sensitive data. Although confirmation of this data breach is pending, it underscores Foxconn’s status as a continued target for cybercriminals, and the urgency for enhanced security measures within their operations cannot be overstated.

This fall, the airspace along the United States-Canada border is poised for increased activity as the Department of Homeland Security, in collaboration with Defense Research and Development Canada, plans to test 5G-equipped drones. These drones are intended for the collection of real-time battlefield intelligence, marking a notable development in military technology integration.

Meanwhile, in the Strait of Hormuz, Iranian military forces, specifically the Revolutionary Guard Corps, are effectively obstructing a vital shipping route using a “mosquito fleet” of small vessels. This development unfolds amid ongoing military operations by US and Israeli forces targeting the region, highlighting the dynamic nature of maritime security challenges.

In the realm of cybersecurity lessons, Muneeb and Sohaib Akhter, two brothers and former employees of a federal contractor, recently pleaded guilty to charges involving the destruction of 96 government databases. This destruction occurred shortly after they were terminated from their positions due to undisclosed criminal histories, which included previous hacking and fraud offenses. It serves as a stark reminder for would-be offenders about the importance of maintaining operational security, particularly in the digital domain, as their actions were inadvertently documented during the Teams meeting in which they learned of their firing.

The response from the tech industry continues to evolve as Instructure, the creator of the educational platform Canvas, has announced a resolution with the hackers known as ShinyHunters. These attackers disrupted services across thousands of US educational institutions, leaving ransom messages on victim screens. While the details of any potential ransom remain ambiguous, Instructure claimed that data associated with over 275 million students was successfully recovered and subsequently destroyed by the attackers, eliminating the threat of further extortion against its clients.

In a broader context, Owe Martin Andresen, the alleged administrator of the now-defunct Dream Market, has been arrested more than seven years after the dark web platform ceased operations. Reportedly responsible for generating substantial illicit revenue through drug sales, Andresen’s arrest concludes one of the longest ongoing investigations into dark web activities, shedding further light on the complex ecosystem surrounding cybercrime.

Furthermore, OpenAI has acknowledged a supply chain attack that impacted two employees involving an open-source project called TanStack, a well-known library for web application development. Although the company confirmed unauthorized access to certain internal repositories, there was no evidence to suggest user data compromised. The response to this incident emphasizes the necessity of stringent supply chain security, particularly in the wake of rising attacks targeting open-source software.

Lastly, Findem, a prominent American data broker, recently disclosed its rectification efforts after being found concealing its data-deletion page from Google for three years. The company attributed this oversight to a former employee’s actions, which prevented consumers from accessing necessary opt-out controls. The delayed accessibility highlights the ongoing challenges companies face in maintaining transparency and ethical data practices in a landscape increasingly susceptible to regulatory scrutiny.

Source