06.01.25 Threat Report
Meta Fined €251 Million for 2018 Data Breach Impacting 29 Million Accounts
Meta Platforms, the parent company of Facebook, Instagram, WhatsApp, and Threads, has been fined €251 million (approximately $263 million) by the Irish Data Protection Commission (DPC). This penalty pertains to a significant data breach in 2018 that exposed the personal data of millions of users worldwide, including around 3 million in the EU and EEA. This incident is a stark reminder of the importance of embedding robust security and compliance processes within systems from the outset.
Incident Details
The breach stemmed from a vulnerability in Facebook's "View As" feature, introduced in July 2017. This flaw allowed threat actors to obtain user access tokens—effectively digital keys—that granted full access to user accounts. Exploiting this, attackers accessed:
Between September 14 and 28, 2018, attackers used automated scripts to access 29 million accounts globally, leveraging the flaw for malicious purposes.
Key Violations of GDPR Articles
The DPC's investigation highlighted failures under four key GDPR provisions:
The penalty reflects the severity of failing to integrate privacy by design and highlights the repercussions for organisations that do not prioritise compliance.
Impact Beyond the EU
Meta’s legal challenges extend globally. In Australia, the company agreed to a AU$50 million ($31.5 million) settlement related to the Cambridge Analytica scandal. This separate matter involved the unauthorised use of personal data for political profiling, affecting over 311,000 users indirectly.
Periculo’s Recommendations
Spyware Distributed through Amazon Appstore
As smartphones become an indispensable part of our daily routines, threat actors are increasingly using deceptive techniques to infiltrate our devices. One recent case involves a seemingly harmless health app, BMI CalculationVsn, found on the Amazon Appstore. Marketed as a simple BMI calculator, the app was secretly collecting sensitive information, including installed app data and incoming SMS messages. Prompt action by Amazon, following a report by McAfee, led to the app's removal from the platform.
Malicious Functionality Breakdown
Superficial Functionality
On the surface, BMI CalculationVsn presented a single-page interface where users could input their weight and height to calculate their Body Mass Index (BMI). The app's design appeared legitimate and consistent with standard health-related applications.
Malicious Activities Detected
Despite its benign appearance, further investigation revealed the following malicious capabilities:
Under-Development Malware
Analysis of the app's structure suggests it is still in development. The Firebase Installation API URL contains the term "testmlwr," indicating the app’s testing phase. Additionally, a timeline review via VirusTotal revealed that the app was initially developed in October 2024 as a screen recording app. Later iterations introduced the BMI calculator interface and added SMS-stealing functionality.
Threat Actor and Distribution
The developer is listed as “PT. Visionet Data Internasional,” a name associated with an Indonesian IT management service provider. This indicates the potential misuse of a legitimate brand name to gain users' trust.
The use of this branding suggests the malware author may have ties to Indonesia or knowledge of the region’s enterprises.
Indicators of Compromise (IoCs)
领英推荐
Periculo’s Recommendations
This incident highlights the evolving threat landscape in the mobile app ecosystem. Even seemingly harmless utilities, such as health apps, can serve as vectors for spyware. By remaining vigilant and implementing robust security practices, both individuals and organisations can better protect sensitive data from emerging threats.
Telemetry Data from 800,000 VW Group EVs Exposed Online
In yet another instance of cloud mismanagement, Volkswagen Group subsidiary Cariad inadvertently exposed telemetry data from approximately 800,000 electric vehicles (EVs) due to poorly secured web applications. According to reports from Der Spiegel, the breach exposed sensitive vehicle and driver data across VW brands, including VW, Seat, Audi, and Skoda.
Details of the Incident
Cariad, tasked with developing VW Group’s software platform for EVs, left internal application data accessible via unsecured web subpages. A whistleblower identified a memory dump file containing sensitive credentials and shared the information with Der Spiegel and the Chaos Computer Club (CCC).
Breach Response
The Chaos Computer Club reported the vulnerability to Cariad, which promptly secured the exposed data. According to the CCC, there is no evidence to suggest that unauthorised parties other than researchers accessed the data. VW Group has not indicated that customers need to take any action at this time.
Periculo’s Analysis and Recommendations
This incident reinforces the critical need for robust cloud security measures in the automotive and IoT sectors. Below are Periculo’s key recommendations:
Implications of Cloud Mismanagement
This case highlights the privacy risks of unsecured cloud resources and the potential reputational damage organisations face. For consumers, the possibility of having personal driving routes and geolocation data exposed raises serious concerns about surveillance and targeted attacks.
The VW Group incident serves as a caution for organisations that rely on cloud platforms to store and process sensitive telemetry data. Implementing robust cloud security practices and adopting proactive monitoring can significantly reduce the risk of data exposure.
Atos Denies Space Bears' Ransomware Claims – with a ‘But’
French IT giant Atos has denied claims by the Space Bears ransomware group that its systems were breached. However, Atos has acknowledged that an unrelated third-party infrastructure containing data referencing the company’s name was compromised. This incident raises concerns about supply chain vulnerabilities and the impact of third-party breaches on larger organisations.
Incident Details
Implications of Third-Party Breaches
This incident highlights the growing threat posed by supply chain vulnerabilities:
Periculo’s Recommendations
The Atos and Space Bears incident highlights how third-party breaches can impact organisations even when their own systems remain secure. In the era of interconnected digital ecosystems, securing internal systems is only one piece of the puzzle—third-party risk management is equally critical.
Stay ahead of emerging cyber threats with real-time insights from Periculo’s Weekly Threat Feed. Our updates provide you with critical information on the latest vulnerabilities, attacks, and security trends—all designed to help you protect your business and make informed decisions.
Sign up now to receive expert threat intelligence straight to your inbox and stay one step ahead of potential risks.
Your first line of defence starts with staying informed.