Leaky Weekly Newsletter: Stealer Logs, Hacktivists, and Unauthorized Third-Party Access

Leaky Weekly Newsletter: Stealer Logs, Hacktivists, and Unauthorized Third-Party Access

There’s so much to keep up with in the world of cybercrime…especially for security practitioners.

Leaky Weekly is a bi-weekly podcast hosted by security researcher Nick Ascoli as he dives into the most pressing stories on data leaks, cybercrime, and the dark web in the last week or so.

Tune in for current events every other week with short and sweet episodes in about 15 minutes, or check out this newsletter for the highlights.?

Important disclaimer: When a company is possibly the victim of a breach, that may not necessarily be the case for various reasons, such as if threat actors may not actually have the information they claim to. Security practitioners should be supportive of organizations/security teams addressing breaches and never shame them.


AT&T Breach

Billions of text and call records stolen?

A threat actor reached out to a security researcher to share a sampling of the researcher’s call records. After the researcher confirmed that those were their call records, the threat actor reveals that they leveraged a Snowflake account that didn’t have MFA turned on, and accessed the information in that tenant.

This threat actor sent the information to a few people including a member of ShinyHunters, a threat actor group.?

The original security researcher informed Mandiant, which then notified AT&T, which then filed an SEC filing and claimed that the threat actor associated with the breach has been arrested.?

The original threat actor had been arrested but was actually arrested in relation to a T-Mobile breach, a few years ago.?

AT&T attempted to contact ShinyHunters through the original security researcher:

  1. AT&T paid ShinyHunters five bitcoins to delete the data (with the security researcher also receiving a cut).
  2. ShinyHunters sent AT&T a video deleting the data (though it’s possible they may have other copies).
  3. WIRED also gets a hold of this video.
  4. ShinyHunters told several news outlets that the original threat actor shared the data with multiple people, including a ShinyHunters member (so it’s possible there are multiple copies of this information out there).?

This is a developing story , and it’s unclear how many copies of this information may be floating around. There are many theories of how malicious actors can exploit this data as they include information such as cell tower local pings that can geolocate where a call took place.


Snowflake Tenant Breaches

Unauthorized third parties breaching major Snowflake tenants have been in the news for the past few weeks such as with Ticketmaster, Santander Bank, and more.?

How these breaches have been playing out: threat actors (such as ShinyHunters) are abusing infostealer logs that contain login information to various Snowflake tenants.

How do infostealers work?

An independent contractor may have had access to a Snowflake tenant. They may have been working on a personal device, and downloaded a cracked version of design software. This design software could function, but also have brought an infostealer in the installer. This infostealer malware can steal all of the logins saved to this person’s browser, cookie sessions, browsing history, and more. This can get uploaded to a forum or illicit Telegram channel.?

This is not necessarily Snowflake’s fault but rather they are issues of human error.?

Mandiant and Snowflake have published a report together that can be useful to understand the scope of this problem, and best practices in moving forward.


SiegedSec

SiegedSec is a hacktivist group that targeted the Heritage Foundation , a conservative American think tank, and shared stolen information in their Telegram channel. However, they disbanded shortly after, stating that there’s a lot of attention on them and they should lay low for some time.

In the last few years, SiegedSec selects a cause to rally behind and hits target companies relevant to that campaign. These target organizations include companies that have donated to a certain political cause, or stand in firm political opposition to the hacktivist group’s values.?

SiegedSec’s leader posted in their Telegram channel (screenshot below) that they disbanded due to, “[their] own mental health, the stress of mass publicity, and to avoid the eye of the FBI.”?

This is a major shakeup in the hacktivist realm.?


Message from SiegedSec leader about quitting in their Telegram channel


Disney Hack

The hacktivist group NullBulge, which claims to protect artists’ rights, hacked into Disney’s internal Slack messages in a protest over AI-generated art.?

NullBulge claimed there were two prominent methods of hacking:

  • An insider supposedly gave the group access to Disney’s internal Slack. However, this insider cut off NullBulge’s access, and the group responded by doxxing this individual.?
  • The WIRED article mentions infostealers may have been involved.?

The leak revealed 1.1 terabytes of messages, unreleased projects, code, documentation, and more across 10,000 Slack channels. NullBulge posted this information on their blog.?


Screenshot from NullBulge's blog with information from Disney's Slack


These are all developing stories that we covered very briefly, so check out cybersecurity news outlets to stay up-to-date. We couldn’t cover everything in the last few weeks or so, and we’ll look into new stories and developments in two weeks.

Brought to you by Flare, the Threat Exposure Management solution that empowers organizations to proactively detect, prioritize, and mitigate types of exposures commonly exploited by threat actors. Sign up for our free trial here .


要查看或添加评论,请登录

社区洞察

其他会员也浏览了