Israel says Iran is hacking security cameras for spying
During Israeli air strikes The imminent threat of further escalation by the US this week; Iran has begun to strictly limit internet connections for citizensrestricting access to important information for Iranians and deliberately pushing to domestic apps that may not be secure. Meanwhile, Israel is known as a tied hacking group Predatory sparrows are fighting a cyber war in Iran’s financial systemattacked Iran’s Sepa Bank and destroyed more than $90 million in cryptocurrency held by Iran’s crypto exchange nobitex.
The US is still shaking Violent shooting in Minnesota last weekend Targeting democratic state lawmakers and their families, the FBI affidavit shows that The suspicious archer Reportedly, they used the data broker site to find the target address Potentially other personal information about them. This finding highlights the potential dangers of widely available personal data.
This week, Wired released it How to win a fight Packages containing roundups Tools to track Trump administration’s attacks on civil libertiesand the latest version A guide to protecting yourself from government surveillance, We will safely protest in the age of surveillanceand Protect yourself from phone searches at US borders. Don’t forget while you’re in it Print your own copy of how to win the Fight Gin! Better yet, print two and leave one at your local coffee shop or library.
And there’s more. Each week we compile security and privacy news that we didn’t cover ourselves in depth. Click on the heading to read the complete story. And stay safe there.
Israeli officials said this week that Iran is compromising civil security cameras around Israel and is espionage to exchange missile strikes after Israel’s first barrage of Israel. A former Israeli cybersecurity official warned on public radio this week that Israelis should ensure that their home security cameras are protected by strong passwords or shut down. “We know that for the past two or three days, Iranians have been trying to connect to cameras and understand what happened and where the missiles will be accurately improving,” said Rifael Franco, former deputy director of the Israeli National Cyber Bureau. Like many internet devices, surveillance cameras are It is known for being vulnerable to takeovers If they are not protected by strong account protection. They have previously been targeted in other conflicts for Intelligence Newsletter.
Kyiv Post reported this week that a hacker from Ukraine’s major intelligence agency (HUR) has launched a cyberattack on Orion Telecom, a Russian internet service provider that has disabled 370 servers, defeated around 500 network switches, wiped up backup systems and cleaned up the recovery. The attack reportedly caused an internet and television outage. Orion Telecom reportedly said it was recovering from a massive DDOS attack and would soon recover its services. The attack took place on June 12th, a national holiday known as Russia Day. “Happy Holiday, rude Russians,” the attacker wrote in a message distributed to the telegram group. “At a moment you will live in the Stone Age. And we will help you get there. Glory to Ukraine.” The attackers claim to be part of the Ukrainian BO Team Hacking Group. Sources told the Kiev Post that Russian security agencies, which are working on the war with Ukraine, used Orion Telecom and were affected by the outage of connectivity.
Bloomberg reported this week that satellite communications company ViaSat discovered a violation earlier this year by a hacking group focusing on China’s Salt Typhoon Spionage. In early December, US officials revealed that Salt Typhoon Hackers were embedded in major US communications, including AT&T and Verizon. rear Last year’s revelation A salt typhoon in February was a massive turmoil over the group’s widespread communication hacking in the US and elsewhere. Still actively infringing new victims. Viasat says it is working with federal authorities to investigate the violation.
The UK Intelligence Commission (ICO) said it issued £2.31 million ($3.1 million) this week. I was troubled Genetic testing company 23andMe as a result of the company Damage to the 2023 data breach. The attacker was able to access the user account and its data using the stolen login credentials. This states that 23AndME did not require users to set up two-factor authentication, which means that the ICO violated UK data protection laws. Since then, the company has required this protection for all users. More than 155,000 UK residents said they stole the data in violations. This stated that 23andMe “did not have additional validation steps to access and download raw genetic data for users” when the violation occurred.