Paul Kunert reports: Emma Sleep Company has confirmed to The Reg that it suffered a Magecart attack which enabled ne’er-do-wells to skim customers’ credit or debit card data from its website. Customers were informed of the breach by the mattress maker via email in the past week, with the business saying it was “subject to a cyber…
Category: Business Sector
Fake Trezor data breach emails used to steal cryptocurrency wallets
Lawrence Abrams reports: A compromised Trezor hardware wallet mailing list was used to send fake data breach notifications to steal cryptocurrency wallets and the assets stored within them. Trezor is a hardware cryptocurrency wallet that allows you to store your crypto assets offline, rather than using cloud-based wallets or wallets stored on your PC that…
Honda’s Keyless Access Bug Could Let Thieves Remotely Unlock and Start Vehicles
Ravie Lakshmanan reports: A duo of researchers has released a proof-of-concept (PoC) demonstrating the ability for a malicious actor to remote lock, unlock, and even start Honda and Acura vehicles by means of what’s called a replay attack. The attack is made possible, thanks to a vulnerability in its remote keyless system (CVE-2022-27254) that affects…
GitLab issues critical update after hard-coding passwords into accounts
Thomas Claburn reports: GitLab on Thursday issued security updates for three versions of GitLab Community Edition (CE) and Enterprise Edition (EE) software that address, among other flaws, a critical hard-coded password bug. The cloud-hosted software version control service released versions 14.9.2, 14.8.5, and 14.7.7 of its self-hosted CE and EE software, fixing one “critical” security…
Blockchains Have a ‘Bridge’ Problem, and Hackers Know It
Lily Hay Newman reports: This week, the cryptocurrency network Ronin disclosed a breach in which attackers made off with $540 million worth of Ethereum and USDC stablecoin. The incident, which is one of the biggest heists in the history of cryptocurrency, specifically siphoned funds from a service known as the Ronin Bridge. Successful attacks on “blockchain bridges” have…
An Interview with AgainstTheWest
They are anonymous, but they are not Anonymous. Meet the individuals who are using their skills to take on the West’s enemies. Names can be misleading. When I first read about a group called “AgainstTheWest,” I assumed they were working against the west. But while threat actors from Russia, China, Belarus, and North Korea attack…