Thursday 6th February 2025

Thursday 6th February 2025

Good morning! If you thought hackers were just after your passwords, think again—they’re eyeing everything from your crypto wallets to government databases. ???♂???

In today’s edition, we’re looking into the wild world of cybersecurity: Spanish police just nabbed a hacker who targeted NATO and the US Army, AWS users are facing a sneaky threat to their S3 buckets, and a new wave of malicious apps is swiping crypto wallet recovery phrases right from your phone.

Enjoy!


Spanish Police Nab Alleged Hacker Behind 40 Cyberattacks

In a cybercrime thriller fit for a Netflix special, Spanish police arrested a suspected hacker in Alicante accused of launching 40 cyberattacks on high-profile targets, including NATO, the US Army, and Spain’s Ministry of Defence. The suspect reportedly used multiple aliases to breach critical databases, leaking sensitive information about government employees and internal documents, some of which were sold on dark web forums like BreachForums.

Authorities began investigating in early 2024 after a Madrid business association reported a data leak, eventually tracing the suspect with help from Europol, the US Homeland Security Investigations (HSI), and Spain’s National Cryptologic Center. A raid at the suspect’s home uncovered numerous electronic devices and 50 crypto accounts.

Despite the severity of the charges, which could land the hacker up to 20 years in prison, the suspect was released after a court hearing with his passport confiscated to prevent escape. Authorities haven’t ruled out additional charges—or accomplices.


The Hidden Threat Lurking in Your AWS S3 Buckets

If you’re storing data on AWS S3, you might want to double-check your bucket names. A rising cybersecurity threat known as S3 bucket namesquatting exploits predictable naming patterns, allowing bad actors to hijack buckets before legitimate users can claim them. This can lead to data breaches, traffic redirection, or even the creation of unauthorised admin accounts.

One recent incident saw hackers exploiting static S3 buckets and Amazon Route 53 to redirect users to shady websites, damaging customer trust and forcing security teams into crisis mode. Many companies aren’t even aware they’re vulnerable until it’s too late.

AWS recommends customizing S3 bucket names and locking down public access, but tools like Varonis take it a step further. Varonis automates the detection and remediation of misconfigured buckets, ensuring sensitive data stays secure. In the era of cloud-first strategies, neglecting these vulnerabilities could cost more than just data—it could cost your reputation.


Malicious SDK in Popular Apps Targets Crypto Wallets

If you've recently downloaded apps from Google Play or the App Store, you might want to double-check your phone. Security researchers at Kaspersky uncovered a malicious software development kit (SDK) embedded in Android and iOS apps, designed to steal cryptocurrency wallet recovery phrases using optical character recognition (OCR) stealers. Dubbed “SparkCat,” this is the first known case of such malware being found on the App Store.

On Google Play alone, infected apps like ChatAi were downloaded over 242,000 times before being removed. The malicious SDK, disguised as an analytics tool, scans your photos for wallet recovery phrases and uploads sensitive data to command-and-control servers.

While some of the 28 infected apps are region-specific, experts warn the malware could operate globally. If you’ve downloaded any suspicious apps recently, uninstall them immediately and consider a factory reset. And whatever you do, don’t store your recovery phrases in screenshots—stick to offline storage to keep your crypto safe.

要查看或添加评论,请登录

Aidan Dickenson的更多文章

  • Wednesday 12th March 2025

    Wednesday 12th March 2025

    Good morning everyone, happy Hump Day! Today we're focusing on a new botnet called Ballista that is running wild on…

  • Tuesday 11th March 2025

    Tuesday 11th March 2025

    Good morning! If you’ve ever wished you could report cybersecurity incidents as easily as you report bad drivers on the…

    2 条评论
  • Monday 10th March 2025

    Monday 10th March 2025

    Good morning everyone and a very happy Monday to you all. Today's edition is looking in to: ESP32 chips used in…

  • Sunday 9th March 2025

    Sunday 9th March 2025

    Good morning. If your internet has been acting up, it might not just be your router—a massive IoT botnet is wreaking…

  • Saturday 8th March 2025

    Saturday 8th March 2025

    Good morning! It's finally the weekend, however Today’s news proves that hackers are getting way too creative. From…

  • Friday 7th March 2025

    Friday 7th March 2025

    Good morning everyone and a very happy Friday to you all. Apologies for my tardiness in launching today's edition.

  • Thursday 6th March 2025

    Thursday 6th March 2025

    Good morning everyone and thank you for joining me for the latest instalment of Cyber Daily. If you’ve ever dreamed of…

    1 条评论
  • Wednesday 5th March 2025

    Wednesday 5th March 2025

    Good morning and happy Hump Day! Today's edition is focusing on Google who have just rolled out new AI-powered fraud…

  • Tuesday 4th March 2025

    Tuesday 4th March 2025

    Good morning, thank you for joining me for the latest instalment of Cyber Daily. In a world where cybercriminals can’t…

  • Monday 3rd March 2025

    Monday 3rd March 2025

    Good morning everyone, I hope you all had a great weekend, thank you for joining me for the latest instalment of Cyber…

    2 条评论

社区洞察

其他会员也浏览了