Codecov Supply Chain Hack Worse Than Initially Estimated
Tag Barnakle malware operation breached more than 120 ad servers, Chinese hacking group reportedly breached more than 200 Japanese organizations, Geico breach exposed drivers licenses, more
If you like Metacurity, please ask your organization about a bulk subscription with savings of up to 50%! Contact firstname.lastname@example.org or click below. Thank you.
Hackers who infiltrated the software development tool from code auditing company Codecov used the program to gain restricted access to hundreds of networks belonging to the San Francisco firm’s customers, investigators say. The hackers used stored credentials for various internal software accounts, making the extra effort to gain access to other makers of software development programs, including industry giant IBM.
Dozens of likely victims were notified yesterday of what might be shaping up to be a supply chain hack on the scale of SolarWinds’ breach. (Joseph Menn, Raphael Satter / Reuters)
Researchers at Confiant report that a malvertising operation dubbed Tag Barnakle has breached more than 120 ad servers over the past year and inserted malicious code into legitimate ads to redirect them to scam and malware sites.
The group uses known exploits for vulnerabilities in the Revive software to breach servers and then tamper with legitimate ads managed by a particular victim ad company. An estimated tens to hundreds of millions of users have seen Tag Barnakle ads. (Catalin Cimpanu / The Record)
Some cybersecurity experts and leaders, including Representative Jim Langevin (D-RI)) and former State Department cybersecurity coordinator Chris Painter, say the U.S. has overreached in sanctioning Russia for the SolarWinds hack given that Russia’s efforts appear to be on par with how the U.S. and other nations engage in espionage, albeit on a much larger scale.
The U.S. also sanctioned Russia for a basket of offenses, including years-long efforts to meddle in U.S. elections. (Dustin Volz / Wall Street Journal)
According to sources close to a police investigation, a Chinese hacking group known as Tick has conduct cyberattacks on nearly 200 Japanese research institutions and firms.
Investigators discovered that China’s Communist Party made contracts under a false name for rental servers in Japan used in the attacks on the Japanese space agency JAXA in 2016 and that the two men involved in the contracts have left Japan. A Chinese system engineer was reportedly referred to prosecutors over his alleged involvement in the attacks. (Isabel Reynold / Bloomberg)
Internet security researcher Rajshekhar Rajaharia discovered a new WhatsApp scam that promises a pink makeover for the app on Android is in reality data-stealing malware.
Clicking on the scams could give hackers access to your device, as well as spreading to your contacts via messages. (Shabana Arif / Tom’s Guide)
In a data breach notification filed with the California Attorney General's office, car insurance giant Geico said that threat actors stole policyholders’ drivers’ licenses between January 21, 2021, and March 1, 2021.
Geico said it believes that the hackers plan to use the driver's license number to apply for unemployment benefits under the policy holder's name. (Lawrence Abrams / Bleeping Computer)
According to cybercrime researcher Alon Gal, a threat actor claims to have hacked Domino's India and stolen 13TB of internal data, including details of over 250 employees across verticals such as IT, Legal, Finance, Marketing, Operations, among others.
The hackers also claim to have access to all customer details and 180 million order details which include details such as customer’s names, phone numbers, email IDs, delivery address, payment details, among others. (Sneha Saha / BGR)
“Smart prison” company Renwei Electronics, which helps authorities in China track prisoners and detainees even down to monitoring their heart rhythms, was awarded a product innovation award by an Amazon-backed joint innovation center last November.
Amazon and its AWS arm, which runs the joint innovation center with local Shanghai government and business organizations, refused to comment on giving the award to the oppressive technology company. (Megha Rajagopalan and Alison Killing / Buzzfeed)
The White House is standing down the Cyber Unified Coordination Group, which consisted of the FBI, the Cybersecurity and Infrastructure Security Agency, the Office of the Director of National Intelligence with support from the National Security Agency. The UCG was created in the aftermath of the SolarWinds and Microsoft Exchange breaches.
“Due to the vastly increased patching and reduction in victims, we are standing down the current UCG surge efforts and will be handling further responses through standard incident management procedures,” Deputy National Security Advisor for Cyber and Emerging Technology Anne Neuberger said in a statement Monday. (Mariam Baksh / NextGov)
In a bid to provide improved identity services as e-commerce sales continue to surge, Mastercard announced it would acquire identity verification firm Ekata for $850 million.
The acquisition goal is “to secure every transaction and instill trust in every interaction,” said Ajay Bhalla, president of cyber and intelligence solutions at Mastercard. (PYMNTS.COM)