
Blackpanda
April 14, 2023
•
2 minute read
The Singapore government has issued a warning about the risks of downloading mobile applications from untrusted sources. The warning follows the detection of several malware-infected applications that can compromise users' personal data and device security. The government has advised users to only download apps from official app stores, and to verify the authenticity of apps and their sources before downloading. It also recommends installing reputable anti-virus software on mobile devices and keeping operating systems and software updated to the latest versions to avoid vulnerabilities. The warning highlights the importance of practicing safe browsing habits to prevent cyberattacks and data breaches.
The Facebook page of the Department of Science and Technology (DOST) councils was hacked over the long Lenten holidays. The posting of photographs of unknown individuals on the council’s official Facebook page had drawn concern among members of the science and technology community and other stakeholders.
Hyundai has disclosed a data breach impacting Italian and French car owners and those who booked a test drive, warning that hackers gained access to personal data. No financial data or identification numbers were stolen. Hyundai is a South Korean multinational automotive manufacturer selling over half a million vehicles per year in Europe, with a market share of roughly 3% in France and Italy. It is unclear how many Hyundai customers this incident impacts, how long the network intrusion lasted, and what other countries might be affected.
Pakistan-based hacking group, Transparent Tribe, has been found to be using a new custom remote access trojan (RAT) called Crimson RAT. The group has been active since at least 2013 and has been known for targeting Indian defense and military sectors. According to a new report, Transparent Tribe has expanded its targets to include Afghanistan, Iran, and Saudi Arabia, among others. The Crimson RAT is being used to steal sensitive data, including login credentials, financial information, and military-related documents. The group has also been using spear-phishing attacks to distribute the RAT. The report suggests that the group is likely to continue its activities and expand its targeting to other countries.
Russian hackers have been linked to a series of cyberattacks targeting NATO and the European Union. The attacks, which were first discovered in 2017, used sophisticated malware to steal sensitive data and spy on government officials. The hackers, who are believed to be part of the Russian APT29 group, targeted government agencies, military organizations, and diplomatic missions in several European countries. The attacks involved a range of tactics, including spear-phishing emails and malicious software updates. The European Union and NATO have both condemned the attacks and have called for increased cybersecurity measures to prevent future incidents. The news highlights the ongoing threat posed by state-sponsored hacking groups and the need for robust cybersecurity defenses to protect against these threats.