TWINN Security News December 27

Nerds On Site
Article Written By David Redekop

1995

Founded In

96,000+

5-Star Reviews

4.83 / 5

Satisfaction Rating

Welcome to this week in NerdNews (TWINN). Your weekly top 5 technical and security issues Nerds should pay attention to:

Hackers target crypto wallets through Telegram using Echelon malware. We regularly see Telegram as more than a messenger now. It is more like a user-friendly darkweb technology. It is too powerful for criminals to ignore, including how it is used for Command and Control operators that are traditionally hard to block. It needs to be said to be very careful about using Telegram, if you use it at all.

Lights Out: Cyberattacks Shut Down Building Automation Systems. The hackers turned a security feature against the owners. Even though the motivations are a bit of a mystery as no ransom note has been found, it goes to show that everything is hackable and therefore we must protect everything that connects.

Polish opposition senator hacked with spyware. This is another case of Toronto’s Citizen Lab finding Israeli Pegasus spyware in use on politicians.

Honeypot experiment reveals what hackers want from IoT devices. This is consistent with my honeypots as well. If remote access is gained in a non-targeted approach, and if the access is persistent, such compromised hosts are used for mining cryptocurrencies and participation in Botnets, ready to receive attack commands at any moment.

Phishing in Organizations: Findings from a Large-Scale and Long-Term Study. This really shows that globally we still have a major phishing problem. Not only that we are vulnerable but that a zero trust connectivity approach prevents users from even being able to visit not-yet-verified destinations.

Did you know?

My favourite security conference, RSA, has been delayed to June 2022.

For a video version of this see: https://youtu.be/dOZZER_g08o

You May Also Like…

TWINN #127 Ring’ing Privacy

TWINN #127 Ring’ing Privacy

TWINN #127 Ring'ing Privacy Sometimes technology is so convenient for both the users and vendors that exploitation...

TWINN #120 on Juice Jacking

TWINN #120 on Juice Jacking

TWINN #120 on Juice Jacking Threats come in all shapes and sizes. Not just in a digital sense but also in the...