A hacker group is selling data of 10 companies including online dating app Zoosk, US newspaper Star Tribune and food delivery service Chef that contains over 73 million user records over the Dark Web for $18,000 (nearly Rs 13.6 lakh).
Other companies are printing service Chatbooks, South Korean fashion platform SocialShare, online marketplace Minted, online newspaper Chronicle of Higher Education, South Korean furniture magazine GGuMim, health magazine Mindful and Indonesia online store Bhinneka, reports ZDNet. The listed databases have 73.2 million user records, with each database sold separately.
Please Follow NewsGram on Facebook To Get Latest Updates From Around The World!
The hacker group is known as ShinyHunters, the same group behind breaching private repositories on Microsoft-owned GitHub (the hacker is believed to have acquired around 1,200 private repositories) and Tokopedia, Indonesia’s largest online store where a database of over 90 million user records was sold. A Microsoft spokesperson was quoted as saying that the company is investigating the incident.
The same hacker group was also behind selling a database of 22 million user records form online learning platform Unacademy on the Dark Web. Bengaluru-based edtech firm Unacademy said the all the sensitive data of its users was safe and the company was addressing the security issue.
“We would like to assure our users that no sensitive information such as financial data or location has been breached,” said Hemesh Singh, Co- Founder and CTO, Unacademy. Encouraged by the profits from the Tokopedia sale, the same group has now listed the databases of 10 more companies.
“Some believe the ShinyHunters group has ties to Gnosticplayers, a hacker group that was active last year that sold more than one billion user credentials on dark web marketplaces, as it operates on a nearly identical pattern,” according to the report.
BleepingComputer reported that cyber intelligence firm ZeroFox informed them that Shiny Hunters had begun selling databases for the meal kit delivery service HomeChef, photo print service ChatBooks, and Chronicle.com, a news source for higher education. (IANS)
Russia on Saturday celebrated the 75th anniversary of the Soviet Union’s Victory over Nazi Germany in the 1941-1945 Great Patriotic War amid restrictions imposed due to the coronavirus pandemic.
Large-scale celebrations have been postponed to a later date, however, many of them will be held online, so Russians will be able commemorate the day without leaving their homes, reports TASS news agency.
Addressing the nation, President Vladimir Putin said: “We will necessarily celebrate the jubilee date as usual – widely and solemnly and will do it with dignity as our duty tells us with regard to those who went through sufferings, achieved and accomplished this Victory.
“We will have both our main parade on Red Square and the Immortal Regiment people’s march.”
Putin is slated to lay flowers at the Eternal Flame at the Tomb of the Unknown Soldier in the Alexander Gardens, Moscow.
The traditional Victory Day parade this year was supposed to be larger than usual in honour of the anniversary, but due to security reasons it was postponed to a later date after restrictions were lifted.
However, celebratory military air show will still be held this year in 47 Russian cities, involving about 600 aircraft and helicopters.
Meanwhile, Immortal Regiment’s march will be held online, said the TASS news agency report.
Cybersecurity researchers at UK-based Sophos on Tuesday revealed hackers are now targeting people across the world with sending emailed with links to fake Zoom HR and payroll discussion video meetings to steal your personal and other credentials.
Scammers have turned to employment worries as their latest lure for Zoom phishing scams and researchers from the ‘Naked Security’ team at SophosLabs witnessed several examples of such phishing emails, with subject line saying “You are invited to join the q2 meeting”.
“This is a reminder that your scheduled Zoom meeting with Human Resources and Payroll Administrative Head will start in few minutes. Your presence is crucial to this meeting and equally required to commence this Q1 perfomance review meeting. Join this Live Meeting,” says one such bogus Zoom message. “The subject lines, message layout and meeting descriptions vary slightly, but the basic idea is the same,” revealed the cybersecurity team. There is the link in the Zoom message and once you click it, you will be directed to a portal with a login window that looks similar to video meet app Zoom.
Please Follow NewsGram on Instagram To Get Latest Updates From Around The World!
“The phishers probably don’t care what password you enter as long as it’s a valid one they can use on one of your accounts, but you’ll notice they’ve put the suggestion text Email Address Password into the password field instead of just Password as you see on Zoom’s page,” explained Sophos.
“Remember that access to your email account is likely to be worth a lot more to the crooks than your Zoom account would be, for the important reason that your email account is probably the way you go about doing password resets for many of your other accounts”.
Whatever you enter as password on the fake site, you will end up redirected to a genuine and vaguely relevant Zoom help page, as though something went wrong and you should simply try again. “In this way, the crooks don’t need to simulate a successful login or to pretend that your login failed – they just leave you in one of those ‘I wonder what happened there’ moments where your inclination is simply to go back and start over,” said the researchers.
By the time you see the genuine Zoom help page, the email address and the password you entered have already been posted to the crooks instead of sent to Zoom. “If someone else is inviting you to a meeting, you shouldn’t need to login to Zoom first, given that they’re hosting. Don’t login after clicking links in emails,” advised the team.
Zoom was yet to comment on the report. Enable two-factor authentication if you can. Zoom supports 2FA, based on one-time codes generated by an app on your phone, and most email services do, too.
“If you were phished, change your password at once. Even if you fall for a phish at first, many phishes are obvious after you put in your password because you don’t end up where you should and the deception stands out,” said the Sophos team. (IANS)