February 10, 2023
3 minute read
A team of white hat hackers broke into a device manufactured by OneKey, a Hong Kong-based firm that produces open source wallets. OneKey confirm the existence of the exploit and has since provided an update to patch the vulnerability. OneKey paid the company USD 10,000 in the form of a "bug bounty"—a term that describes a reward system, offered by many tech and crypto companies, to encourage white hackers to report and share vulnerabilities in a responsible manner.
Intelligence agencies of South Korea and the United States on Friday issued a joint security advisory against illicit North Korean cyber activities aimed at stealing cryptocurrencies through ransomware attacks. They warned that North Korea and its affiliated hacking groups are known to engage in shutdowns of networks of key institutions through malware attacks using fake domains through virtual private networks. The hacking groups then destroy and encrypt systems with malicious codes in order to extort cryptocurrencies as part of conditions to return the systems back to normal. The advisory was the first of its kind issued by intelligence branches of the South Korean and U.S. governments.
Australian authorities sentenced an attacker to 18 months for attempting to blackmail 92 victims whose data was stolen in the Optus breach. The attacker, who was 19 years of age at the time of the arrest, demanded AUD 2,000 in payment and threatened to leak victims’ personal data if the amount was not paid. The SMS-based scam earned the culprit an 18-month Community Correction Order, 100 hours of community service, and a conviction recorded for attempting to blackmail.
New ESXiArgs ransomware attacks are now encrypting more extensive amounts of data, making it much harder, if not impossible, to recover encrypted VMware ESXi virtual machines. Last Friday, a massive and widespread automated ransomware attack encrypted over 3,000 Internet-exposed VMware ESXi servers using a new ESXiArgs ransomware. The second wave of ESXiArgs ransomware includes a modified encryption routine that encrypts far more data in large files. It also prevents the previous recovery tools from successfully recovering machines, as the flat files will have too much encrypted data to be usable.
In a thread posted to the official r/reddit community on Thursday, a company representative explained that a phishing attack had taken place on the evening of Feb. 5. The threat actor tricked a Reddit employee into clicking on a cloned website of Reddit’s intranet gateway to steal credentials and two-factor authentication tokens. These were then used to access Reddit's internal documents, code, internal dashboards, and business systems.