Android may soon warn about fake phone towers


In recent years, North Korea is deployed Thousands of so-called IT workers infiltrated Western companiesreceive your salary and send back money to support the administration. As the scheme became more successful, they grew It’s getting more and more sophisticated And we adopted new tactics to avoid detection.

But this week, the US Department of Justice revealed one of its biggest tactics to tackle IT workers so far. DOJ says it has We have identified six Americans who are allegedly assisted in enabling it Arrested the scheme and one of them. Law enforcement officials searched 29 “laptop farms” in 16 states and seized more than 200 computers, as well as web domains and financial accounts.

Meanwhile, a group of young cybercriminals is causing chaos around the world, leaving grocery stores empty and temporarily ground several flights. After the quiet period of 2024, The scattered spider hackers are back this year It mercilessly targets retailers, insurance companies and airlines.

Also, this week we explained in detail how to do that. LGBTIQ+ Organizations in El Salvador They help activists document attacks on their communities and better protect themselves from state surveillance.

And there’s more. Each week we compile security and privacy news that we didn’t cover ourselves in depth. Click on the heading to read the complete story. And stay safe there.

Often known cell site simulator Stintray or IMSI catchersome of today’s most stealthy and powerful surveillance tools. Devices that impersonate cell towers and intercept communications can collect metadata, location and other traffic about what they do with the device. They are increasingly being used By law enforcement and immigration officers.

However, according to the report Android Authority and Ars TechnicaWith future hardware advancements, Google has improved its efforts to combat potential snooping. Let’s start with Android 16,compatible devices can identify when the network requests a device identifier, such as a device or SIM ID, and alert when it connects to an unencrypted cell network. Example alerts show a warning that “calls, messages, and data are vulnerable to interception” when connecting to an unstable network. You will also receive notifications when you return to the encrypted network. The options to turn on these notifications are displayed on the Mobile Network Security Settings page, along with the option to bypass 2G networks. This will help some IMSI catchers connect to the device. However, although the settings are reportedly available on Android 16, it may take some time to widely use the hardware that Android devices require.

He was linked to Iran in November last year ahead of the presidential election. The hacker attacked He stole a number of emails on Donald Trump’s presidential campaign and apparent bids to influence the election outcome. Some emails are written by journalists. Biden Campaign. Following the Israeli-Iran conflict and US intervention this week “Bunker Buster” bombhackers behind the email compromises have come out again, Tell Reuters The possibility of disclosure or selling stolen emails.

The cybercriminal allegedly stole a 100 GB email, including a portion of White House Chief of Staff Susie Wills. The email cache is said to include Trump’s lawyer Lindsay Harrigan, advisor Roger Stone, and adult movie star Stormy Daniels. The hacker who used the name Robert told Reuters that he “want to broadcast this issue.” It is unclear whether they will act on threats.

In response, US officials argued that the threat from hackers was a “calculated smear campaign” by foreign forces. “Hospitable foreign enemies are threatening to illegally exploit material that has been distracted, discredited, and allegedly stolen to split,” said Marci McCarthy, a spokesman for the Cybersecurity and Infrastructure Security Agency. said in a statement.

Over the past few years, Chinese hacker group salt typhoon It has hacking lumpages against the US telecom network, breaking into at least nine companies and now has access to American texts and phone calls. Brett Leatherman, recently appointed leader in the FBI’s cyber division; Telling about cybercoup Chinese hackers are currently “mainly contained” in the network and are lying “door dormant.” The group has not been kicked out of the network, Leatherman said. Because the longer the system is, the more ways there are “create persistence points.” “Now we are very focused on resilience and deterrence, and we provide great support for our victims,” ​​Leatherman said.

A deepfake platform in recent years that allows people to create unconsensual, often illegal and harmful images of undressed women. Currently a former whistleblower and document leaked from the largest so-called one Nudify AppKurodoff claims that the service has a budget of millions of euros and plans an aggressive expansion to create unconsensually explicit images of celebrities and influencers. Spiegel’s German Publishing. The suspected expansion has a marketing budget of 150,000 euros (approximately $176,000) per country to promote images of celebrities and influencers, according to the report. “Over three dozen people” say they are working for Croffoff, and the publication has identified some of the platform’s potential key operators. The document, published online, also revealed the customer’s email address. A spokesman who claimed to represent Closed Off denied that there were more than 30 people as part of the central team. He told Der Spiegel There is no multi-million euro budget.

Leave a Reply

Your email address will not be published. Required fields are marked *