Robot Dogs, Ivanti, SonicWall, Banshee, Telegram, Motorola, Aaran Leyland, and more. – SWN #441
Full Audio
View Show IndexSegments
1. Robot Dogs, Ivanti, SonicWall, Banshee, Telegram, Motorola, Aaran Leyland, and more. – SWN #441
Bad Cameras, Robot Dogs, Ivanti, SonicWall, Banshee, Telegram, Motorola, Aaran Leyland, and More, on this edition of the Security Weekly News.
Hosts
- 1. Ivanti warns of new Connect Secure flaw used in zero-day attacks
- 2. SonicWall urges admins to patch exploitable SSLVPN bug immediately
- 3. White House rushes to finish cybersecurity executive order after China hacks
- 4. New Banshee Stealer variant continues attacks on macOS devices
- 5. Backdooring Your Backdoors – Another $20 Domain, More Governments
- 6. Telegram Shared Data of Thousands of Users After CEO’s Arrest
- 7. If TikTok Is Banned, Can I Still Use It?
- 8. Misconfigured license plate readers are leaking data and video in real time
- 1. A Day in the Life of a Prolific Voice Phishing Crew
The article “A Day in the Life of a Prolific Voice Phishing Crew” on KrebsOnSecurity provides a detailed look into the operations of a sophisticated voice phishing gang. Here are the key points a cybersecurity expert would find valuable:
Phishing Techniques: The gang abuses legitimate services from Apple and Google to send emails, automated phone calls, and system-level messages to users. They use these methods to create a sense of urgency and legitimacy.
Case Study - Tony: A cryptocurrency investor named Tony was robbed of over $4.7 million through an elaborate voice phishing attack. The attackers initially contacted him via Google Assistant and used various Google services to send phishing emails and account recovery prompts.
Phishing Domain: The domain used to steal from Tony was verify-trezor[.]io, which was part of a larger operation by a group called "Crypto Chameleon". This group targeted employees at the U.S. Federal Communications Commission (FCC) and cryptocurrency exchanges like Coinbase and Binance.
Phishing Kit: The group used a phishing kit that mimicked single sign-on pages for authentication providers like Okta. This kit is operated by a cybercriminal known as “Perm” or “Annie,” who is the administrator of the Star Fraud community on Telegram.
Internal Conflicts: The article also highlights internal conflicts within the phishing group, particularly between “Perm” and another cybercriminal known as “Stotle.” Stotle shared detailed videos and tutorials revealing how the phishing panels operate.
Division of Spoils: The division of spoils from each robbery is decided in advance by all participants, indicating a highly organized and collaborative effort.