Over 500 Million Facebook Users' Personal Data Dumped on Hacker Forum

FBI and CISA warn of Fortinet FortiOS VPN critical flaws, Applus attack prevents vehicle inspections in eight states, Criminals attacked Github cloud infrastructure for crypto-mining, much more

Start the week right and consider supporting Metacurity through a subscription. You’ll gain access to our archives and special premium subscriber content!

Facebook admits that data on 533 million of its users published in a hacker forum on Saturday morning came from a breach it experienced in 2019.

The exposed data includes phone numbers, Facebook IDs, full names, locations, birthdates, bios, and in some cases, email addresses for its users spanning 106 countries, including over 32 million records on users in the US, 11 million on users in the UK, and 6 million on users in India.

The data was first discovered by Alon Gal, CTO of cybercrime intelligence firm Hudson Rock. (Aaron Holmes / Insider)

Related: CyberNewsCybersecurity InsidersReuters: World NewsReddit - cybersecurityThe Hacker NewsAssociated Press TechnologyThe GuardianNews.com South China Morning PostPogoWasRight.orgTWCN Tech NewsPogoWasRight.orgHackReadIndia Today Latest StoriesDataBreaches.netBleeping ComputeriClarifiedPhoneArenaDAILYSABAHDeutsche WelleNDTV Gadgets360.comSlashdotZDNetGizmodoAsia One WorldBusiness StandardIB TimesThe HillZDNetTech XploreSecurity News | Tech TimesYle News | Tuoreimmat uutisetSecurity AffairsBGRZDNetThe Record by Recorded FutureDataBreachToday.comJapan TodayCapital GazetteRT NewsAppleInsiderNY PostTom's GuideGulf News TechnologySecureReadingInfosecurity.USHong Kong Free Press HKFPStartups News | Tech NewsCyber Kendra9to5MacSecurity AffairsThe Hacker NewsSlashdotTechDator, CNN

In a joint advisory, the FBI and the Cybersecurity and Infrastructure Security Agency warned that advanced hackers are likely exploiting critical vulnerabilities in the Fortinet FortiOS VPN in an attempt to lay the groundwork for breaching medium and large-sized businesses in later attacks.

CISA encourages users and administrators to review Joint CSA AA21-092A: APT Actors Exploit Vulnerabilities to Gain Initial Access for Future Attacks and implement the recommended mitigations. (Dan Goodin / Ars Technica)

Related: CRN, ThreatpostThe Record by Recorded FutureUS-CERT Current Activityisssource.comCyberscoopSecurity AffairsBleeping Computer, Dark Reading: Vulnerabilities / ThreatsSC Magazine, Tenable

The FBI used a wealth of surveillance technologies to track down and identify the rioters who stormed the U.S. Capitol on January 6, including social media posts, license plate scanners, facial recognition software, and cameras worn by police, according to more than 1,000 pages of arrest recordsFBI affidavits and search warrants reviewed by The Washington Post.

The documents provide insight into how far-reaching the digital fingerprints nearly everyone leaves behind in the digital era are. Government agents across the FBI’s 56 field offices have executed at least 900 search warrants in all 50 states and D.C., many of them for data held by the telecommunications and technology giants who maintain vast reservoirs of data on virtually all Americans. (Drew Harwell and Craig Timberg / Washington Post).

Related: Raw StoryAlterNet.org

A March 30 malware cyberattack on emissions testing company Applus Technologies is preventing vehicle inspections in eight states, including Connecticut, Georgia, Idaho, Illinois, Massachusetts, Utah, and Wisconsin.

Applus Technologies can’t say when it will restore service because state governments require them to undergo a rigorous mitigation and testing process. (Lawrence Abrams / Bleeping Computer)

Related: Security Affairs, Boston Globe

Code-hosting service GitHub is actively investigating a series of attacks that started in the fall of 2020 against its cloud infrastructure. The attacks allowed cybercriminals to implant and abuse the company’s servers for illicit crypto-mining operations.

The attacks have abused a GitHub feature called GitHub Actions, which allows users to automatically execute tasks and workflows once a certain event happens inside one of their GitHub repositories. Dutch security engineer Justin Perdok says that at least one threat actor is targeting GitHub repositories where GitHub Actions might be enabled. (Catalin Cimpanu / The Record)

Related: Security AffairsBleeping Computer, The Register - SecurityE Hacking NewsHealthITSecurity

Prompted by new findings while analyzing data stolen in a data breach announced in 2019, Capital One notified additional customers that their Social Security numbers were exposed in the breach.

Capital One says it is notifying customers of this additional exposed personal information even though there is no evidence that it was disseminated or used for fraud. (Sergiu Gatlan / Bleeping Computer)

The latest victim of hacker attacks on Accellion’s file sharing service, The University of California at Berkeley, warned students and staff that a ransomware group might have stolen and published their personal data and that of hundreds of other schools, government agencies, and companies nationwide.

In a statement, UC Berkeley said that the hacker or hackers also have been sending threatening mass emails threatening to publish data “in an attempt to scare people into giving them money.” The university also said that 300 organizations, including many other universities, have also been similarly breached through a vulnerability in the service. (Robert Jablon / Associated Press)

Related: The Daily Swig, Reddit - cybersecurityKTLAWashington Free BeaconAndroid CentralTechDator, The HillSecurity AffairsBleeping ComputerTech Insider

Photo by Thought Catalog on Unsplash