Signal creator Moxie Marlinspike in a blog post said “surprised to find that very little care seems to have been given to Cellebrite’s own software security,” He went on and said that it will take a specially crafted file to install in a phone to derail Cellebrite. Cellebrite specializes in assisting law enforcement agencies to copy data off of smartphones. Signal, a privacy-focused app, clashed with Cellebrite when it claimed to upgrade itself to scoop up Signal messages.
Two groups of hackers, having links to the Chinese govt, used a vulnerability in American networking devices to spy on the USA defence industry, researchers and the devices’ manufacturer claimed. IT firm Ivanti said that the hackers exploited the flaw in Pulse Connect Secure suite of VPN networking devices to spy on “a very limited number of customers.” Ivanti said a fix for the issue will be in early May.
SolarWinds hackers have got access to email accounts of the Trump administration’s head of the Department of Homeland Security and other key members, the department responsible for eliminating threats emanating from foreign soil, news agency AP said. The intelligence value of hacking is not known yet. The hack, however, raises serious questions over the USA govt’s ability to protect individuals, firms and institutions, if it can’t protect itself.
A China-based hacking group is targeting telecom service provider across the globe in an attempt to steal 5G tech and related sensitive information. Telcos in Southeast Asia, Europe and the US are attacked by cybercriminals, which was discovered by the researchers at McAfee. At least 23 telecom firms, so far, have come under attack, but it is not clear how many of these attempts were successful. The group behind the campaign is known as Operation Dianxun.
Cybersecurity firm ESET, in a blog post, claimed that at least 10 different hackers groups in the world are using the flaw in the widely used Microsoft mail server software to break into organisations across the globe. The recently discovered security gap in the commonly used mail and calendar platform left the door wide open for a global cyber espionage campaign, allowing cybercriminals to steal emails from vulnerable servers.
Microsoft has warned customers about new China state-sponsored threat actors prying on the vulnerability of four previously undisclosed security flaws in the Exchange Server. The company said, the hacking group, which it calls Hafnium, exploited the security vulnerabilities, fix patches of those are released by Microsoft, to break into exchange email servers running on company networks, and allowing attackers to steal data from a victim’s organisation.
National Power Grid took all possible measures to protect its network from hacking by Chinese state-backed hackers when CERT-In in Nov detected ShadowPad malware, one of the largest supply chain vector. The national grid operator and its other units were alerted about the malware along with the possibility of a cyberattack. In Feb, another cybersecurity agency detected an attempt by Red Echo, a Chinese group, trying to break into the grid control system.
Two Indian vaccine makers, Bharat Biotech and the Serum Institute of India, whose coronavirus shots are being used in the country, were the target of a cyberattack by Chinese hackers, according to a cyber intelligence firm, Cyfirma. The Chinese state backend hacking group also known as APT10, found vulnerabilities in the IT infrastructure and supply chain software of these companies.
The Solarwinds hackers gained access to Microsoft’s secret source code for authenticating customers, potentially aiding one of their main attack methods. Microsoft reported that the hacker has studied and copied source code instructions for its Azure cloud programs related to identity and security, its Exchange email programs which allowed them to hunt for security vulnerabilities, create copies with new flaws, or examine the logic for ways to exploit customer installations.