BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
US Sees Iranian Hackers Working Closely With Ransomware Groups
/in General NewsIranian state-sponsored APT Lemon Sandstorm is working closely with ransomware groups on monetizing network intrusions.
The post US Sees Iranian Hackers Working Closely With Ransomware Groups appeared first on SecurityWeek.
SecurityWeek – Read More
French Authorities Charge Telegram CEO with Facilitating Criminal Activities on Platform
/in General NewsFrench prosecutors on Wednesday formally charged CEO Pavel Durov with facilitating a litany of criminal activity on the popular messaging platform and placed him under formal investigation following his arrest Saturday.
Russian-born Durov, who is also a French citizen, has been charged with being complicit in the spread of child sexual abuse material (CSAM) as well as enabling organized crime,
The Hacker News – Read More
CrowdStrike Estimates the Tech Meltdown Caused by Its Bungling Left a $60 Million Dent in Its Sales
/in General NewsMassive outage spooked customers that had been expected to close deals totaling $60 million during the final few weeks of CrowdStrike’s fiscal Q2.
The post CrowdStrike Estimates the Tech Meltdown Caused by Its Bungling Left a $60 Million Dent in Its Sales appeared first on SecurityWeek.
SecurityWeek – Read More
South Korean APT Exploits 1-Click WPS Office Bug, Nabs Chinese Intel
/in General NewsThe most popular office software suite in China actually has two critical vulnerabilities, which allowed hackers the opportunity for remote code execution. Time to patch.
darkreading – Read More
BlackByte Ransomware Exploits New VMware Flaw in VPN-Based Attacks
/in General NewsBlackByte ransomware group is leveraging a newly discovered VMware ESXi vulnerability and VPN access to launch a new…
Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – Read More
When Get-Out-The-Vote Efforts Look Like Phishing
/in General NewsMultiple media reports this week warned Americans to be on guard against a new phishing scam that arrives in a text message informing recipients they are not yet registered to vote. A bit of digging reveals the missives were sent by a California political consulting firm as part of a well-meaning but potentially counterproductive get-out-the-vote effort that had all the hallmarks of a phishing campaign.
Image: WDIV Detroit on Youtube.
On Aug. 27, the local Channel 4 affiliate WDIV in Detroit warned about a new SMS message wave that they said could prevent registered voters from casting their ballot. The story didn’t explain how or why the scam could block eligible voters from casting ballots, but it did show one of the related text messages, which linked to the site all-vote.com.
“We have you in our records as not registered to vote,” the unbidden SMS advised. “Check your registration status & register in 2 minutes.”
Similar warnings came from an ABC station in Arizona, and from an NBC affiliate in Pennsylvania, where election officials just issued an alert to be on the lookout for scam messages coming from all-vote.com. Some people interviewed who received the messages said they figured it was a scam because they knew for a fact they were registered to vote in their state. WDIV even interviewed a seventh-grader from Canada who said he also got the SMS saying he wasn’t registered to vote.
Someone trying to determine whether all-vote.com was legitimate might visit the main URL first (as opposed to just clicking the link in the SMS) to find out more about the organization. But visiting all-vote.com directly presents one with a login page to an online service called bl.ink. DomainTools.com finds all-vote.com was registered on July 10, 2024. Red flag #1.
The information requested from people who visited votewin.org via the SMS campaign.
Another version of this SMS campaign told recipients to check their voter status at a site called votewin.org, which DomainTools says was registered July 9, 2024. There is little information about who runs votewin.org on its website, and the contact page leads to generic contact form. Red Flag #2.
What’s more, Votewin.org asks visitors to supply their name, address, email address, date of birth, mobile phone number, while pre-checking options to sign the visitor up for more notifications. Big Red Flag #3.
Votewin.org’s Terms of Service referenced a California-based voter engagement platform called VoteAmerica LLC. The same voter registration query form advertised in the SMS messages is available if one clicks the “check your registration status” link on voteamerica.org.
VoteAmerica founder Debra Cleaver told KrebsOnSecurity the entity responsible for the SMS campaigns telling people they weren’t registered is Movement Labs, a political consulting firm in San Francisco.
Cleaver said her office had received several inquiries about the messages, which violate a key tenet of election outreach: Never tell the recipient what their voter status may be.
“That’s one of the worst practices,” Cleaver said. “You never tell someone what the voter file says because voter files are not reliable, and are often out of date.”
Reached via email, Movement Labs founder Yoni Landau said the SMS campaigns targeted “underrepresented groups in the electorate, young people, folks who are moving, low income households and the like, who are unregistered in our databases, with the intent to help them register to vote.”
Landau said filling out the form on Votewin.org merely checks to see if the visitor is registered to vote in their state, and then attempts to help them register if not.
“We understand that many people are jarred by the messages – we tested hundreds of variations of messages and found that these had the largest impact on someone’s likelihood to register,” he said. “I’m deeply sorry for anyone that may have gotten the message in error, who is registered to vote, and we’re looking into our content now to see if there are any variations that might be less certain but still as effective in generating new legal registrations.”
Cleaver said Movement Labs’ SMS campaign may have been incompetent, but it wasn’t malicious.
“When you work in voter mobilization, it’s not enough to want to do good, you actually need to be good,” she said. “At the end of the day the end result of incompetence and maliciousness is the same: increased chaos, reduced voter turnout, and long-term harm to our democracy.”
Krebs on Security – Read More
Chrome bug hunters can earn up to $250,000 for serious vulnerabilities now – how’s how
/in General NewsGoogle is bumping up the cash prizes for its Vulnerability Reward Program across all of its current categories.
Latest stories for ZDNET in Security – Read More
BlackByte Targets ESXi Bug With Ransomware to Access Virtual Assets
/in General NewsThe pivot is one of several changes the groups using the malware have used in recent attacks.
darkreading – Read More
CCTV Zero-Day Exposes Critical Infrastructure to Mirai Botnet Campaign
/in General NewsCISA warned about the RCE zero-day vulnerability in AVTECH IP cameras in early August, and now vulnerable systems are being used to spread malware.
darkreading – Read More
Attackers Exploit Critical Atlassian Confluence Flaw for Cryptojacking
/in General NewsNovel attack vectors leverage the CVE-2023-22527 RCE flaw discovered in January, which is still under active attack, to turn targeted cloud environments into cryptomining networks.
darkreading – Read More