Tag Archive for: stealing

Hackers Stealing Steam Accounts Using This New Hack


steam account

Researchers at Group-IB, a leading provider of innovations and solutions for counteracting cyberattacks, have published a new report that demonstrates how hackers are using a new phishing technique called Browser-in-the-Browser, to target accounts of professional Steam gamers that are valued between $100,000 and $300,000.

For the unversed, a Browser-in-the-Browser (BitB) is a new phishing threat that is emerging worldwide. This method creates a fake browser window within the active parent browser window on a phishing resource, making it look like a sign-in pop-up page in order to steal login credentials.

This phishing kit was first discovered and shared by a researcher Mr.d0x in March 2022. Using this method, threat actors create fake login forms for Steam, Microsoft, Google, or any other service.

In order to analyze the significant threat that the Browser-in-the-Browser technology posed to significant users, Group-IB used an example of a phishing kit located on a resource that mimicked Steam.

How Does The Scheme Work?

Threat actors send direct messages to prospective victims on Steam and lure them with various appealing offers such as: inviting them to join a team for LoL, CS, Dota 2, or PUBG tournament, or voting for the user’s favorite team, or buying discounted tickets to cybersport events, and more.

The links that the threat actors share bring the victims to bait webpages mimicking organizations sponsoring and hosting e-sports competitions. The victims are then requested to log in via their Steam account in order to join a team and play in a competition.

“Almost any button on bait webpages opens an account data entry form mimicking a legitimate Steam window. It has a fake green lock sign, a fake URL field that can be copied, and even an additional Steam Guard window for two-factor authentication,” the researchers wrote in their report.

While traditional phishing resources display a phishing data entry form or redirect users to it, this type of attack opens a fake browser window in the same tab to convince users about its authenticity.

Users can even switch between 27 webpage interface languages, which are fully functional, and the selection is identical to the one…

Source…

Former Amazon employee convicted of stealing data from more than 100M people – WPXI


Former Amazon employee convicted of stealing data from more than 100M people (NCD)

SEATTLE — A former Amazon Web Services engineer was found guilty Friday of stealing data from more than 100 million people when she hacked Capital One three years ago.

Paige Thompson, who worked for the software giant until 2016, was convicted Friday of seven federal crimes, including wire fraud, illegally accessing a protected computer and damaging a protected computer, CNBC reported.

>> Read more trending news

While the wire fraud conviction carries up to 20 years in prison, the two lessor charges are each punishable by as many as five years in prison.

According to a news release issued by the U.S. Attorney’s Office’s western district of Washington, the jury found Thompson not guilty of aggravated identity theft and access device fraud. The panel deliberated for 10 hours.

Prosecutors argued at trial that Thompson created a tool to search for misconfigured AWS accounts, allowing her to hack into accounts from more than 30 Amazon clients, including Capital One. In addition to mining the data she found in the compromised accounts, Thompson was also accused of using her access to some of the retail behemoth’s servers to mine cryptocurrency for her personal benefit, CNBC reported.

“She wanted data, she wanted money, and she wanted to brag,” Assistant U.S. Attorney Andrew Friedman said of Thompson during his closing arguments, the network reported.

According to The Verge, Thompson’s breach, one of the largest on record, exposed the names, birth dates, social security numbers, email addresses and phone numbers of more than 100 million U.S. and Canadian residents.

Capital One has since been fined $80 million in regulatory fines for allegedly failing to secure users’ data and settled with affected customers for $190 million, the technology news outlet reported.

“Far from being an ethical hacker trying to help companies with their computer security, (Thompson) exploited mistakes to steal valuable data and sought to enrich herself,” U.S. Attorney Nick Brown stated in the news release confirming her conviction.

Thompson is slated to be sentenced Sept. 15.

Source…

Former Amazon employee convicted of stealing data from more than 100M people – KIRO 7 News Seattle


SEATTLE — A former Amazon Web Services engineer was found guilty Friday of stealing data from more than 100 million people when she hacked Capital One three years ago.

Paige Thompson, who worked for the software giant until 2016, was convicted Friday of seven federal crimes, including wire fraud, illegally accessing a protected computer and damaging a protected computer, CNBC reported.

>> Read more trending news

While the wire fraud conviction carries up to 20 years in prison, the two lessor charges are each punishable by as many as five years in prison.

According to a news release issued by the U.S. Attorney’s Office’s western district of Washington, the jury found Thompson not guilty of aggravated identity theft and access device fraud. The panel deliberated for 10 hours.

Prosecutors argued at trial that Thompson created a tool to search for misconfigured AWS accounts, allowing her to hack into accounts from more than 30 Amazon clients, including Capital One. In addition to mining the data she found in the compromised accounts, Thompson was also accused of using her access to some of the retail behemoth’s servers to mine cryptocurrency for her personal benefit, CNBC reported.

“She wanted data, she wanted money, and she wanted to brag,” Assistant U.S. Attorney Andrew Friedman said of Thompson during his closing arguments, the network reported.

According to The Verge, Thompson’s breach, one of the largest on record, exposed the names, birth dates, social security numbers, email addresses and phone numbers of more than 100 million U.S. and Canadian residents.

Capital One has since been fined $80 million in regulatory fines for allegedly failing to secure users’ data and settled with affected customers for $190 million, the technology news outlet reported.

“Far from being an ethical hacker trying to help companies with their computer security, (Thompson) exploited mistakes to steal valuable data and sought to enrich herself,” U.S. Attorney Nick Brown stated in the news release confirming her conviction.

Thompson is slated to be sentenced Sept. 15.

Source…

Chinese hackers attempted stealing Russian defence data: Report


Beijing [China], May 20 (ANI): Chinese hackers, reportedly sent emails with malware links to scientists and engineers at several of Russia’s military research and development institutes on March 23 in order to purportedly obtain critical data on the country’s security systems.

The emails, which were supposedly sent by Russia’s Ministry of Health and contained seemingly tantalizing information about a “list of persons under U.S. sanctions for invading Ukraine” were actually sent by state-sponsored hackers in China seeking to entice their Russian targets to download and open a document with malware, New York Times reported citing a report by Israeli-American cybersecurity firm Check Point.

Check Point’s research showed that despite the countries’ deepening ties, China appeared to view Russia as a legitimate target for the theft of sensitive military technological information, the report said.

The report provides new evidence of Chinese efforts to spy on Russia, pointing to the complexity of the relations between the two countries that have drawn closer in solidarity against the US.

It also underscores the sprawling, and increasingly sophisticated, tactics China’s cyber spies have used to collect information on an ever-expanding array of targets, including countries it considers friends, like Russia, the New York Times reported.

The Chinese espionage operation began as early as July 2021, before Russia invaded Ukraine, the Check Point report said. The March emails revealed that China’s hackers had quickly exploited narratives about the war in Ukraine for their purposes.

“This is a very sophisticated attack,” Itay Cohen, the head of cyber research at Check Point was quoted as saying. He added that it demonstrated capabilities “usually reserved for state-backed intelligence services.” The hackers used methods and codes similar to those used in previous attacks attributed to hacking groups affiliated with the Chinese state, he said.

The Chinese campaign targeted Russian institutes that research airborne satellite communications, radar and electronic warfare, Check Point said in its report.

Under China’s authoritarian leader, Xi Jinping, Beijing has refined its approach to cyberspying,…

Source…