Phishing campaigns have doubled over the previous 3 months since the groups behind COVID-based phishing scams have started distributing again. In other cybersecurity news, over 300,000 Toyota customers have been affected by a leak that was open for over 5 years.
Toyota reveals data leak for 300,000 customers
Officials for Toyota Motor Corp have recently discovered an access key to an internal data server was publicly exposed on GitHub when a portion of source code was mistakenly posted. The key was accessible for almost 5 years and may have been used to compromise some personal information for roughly 300,000 customers. Officials are also warning any T-Connect users to be wary of possible phishing attempts on email accounts that were tied to T-Connect.
Everest ransomware group offers full access to South African electricity company
Nearly 7 months after the Everest ransomware group first claimed responsibility for compromising the South African state-owned electricity company, Eskom, the group has updated the demanded price from $125,000 to $200,000 in cryptocurrency. Alongside the increased price, the group is offering full root access to most of Eskom’s servers for Windows and Linux systems, and many of the POS (Point of Sale) systems that are used to take customer payments.
Hackers compromise Australian telecom subsidiary
Just weeks after the Optus hack exposed the sensitive information of 2.1 million Australians, officials for the telecommunications firm Singtel have revealed that one of their subsidiary companies had been breached. The subsidiary in question is the IT firm Dialog, which was acquired by Singtel earlier this year, and began noticing unauthorized activity in their systems over the weekend of September 10th. This is not the first cyberattack that Dialog has faced in recent years, but Singtel staff have confirmed that this breach didn’t spread to any of their systems.
AI system uses finger heat to guess passwords
Researchers have created a new AI computer system that uses machine learning and thermal imaging to identify login credentials based on the heat signatures found on keyboards after being used. By using thermal imaging to see the heat on the different keys, the AI can make assumptions based on how warm each key is and use that to determine the order each key was pressed and compare that to a previously input list of passwords. While using longer passwords made the process take a bit longer, the AI was able to correctly identify most passwords if the thermal image was taken within 20 seconds of making the keystrokes.
COVID-related malspam campaigns back on the climb
After several months of relative silence, the groups behind COVID-19 phishing campaigns have begun distributing again, with numbers doubling from the prior 3 months. This latest campaign is exploiting Google Forms to create phishing pages under the guise of the U.S. Small Business Administration (SBA), with the hopes of stealing credentials and other sensitive information from business owners. Many of these emails include relief keywords to entice recipients into giving up any information that would be needed to enroll in such a program.