23andMe Discloses Prolonged Account Intrusions, North Korea Expands Hacking Tactics, and Privacy Risks Emerge from Surveillance Tools

https://icaro.icaromediagroup.com/system/images/photos/16018048/original/open-uri20240127-18-1u7ua6g?1706389564
ICARO Media Group
Politics
27/01/2024 21h04

In recent cybersecurity news, genetic and ancestry company 23andMe has revealed that it failed to detect malicious account access for several months, impacting 6.9 million users. The breach, previously disclosed in October, was a result of attackers compromising approximately 14,000 user accounts, which granted them access to personal data shared by users in a social feature called DNA Relatives.

The company initially blamed users for the account intrusions, stating that weak or reused passwords were the root cause of the breach. However, a state-mandated filing in California shed light on the incident, disclosing that attackers began compromising customers' accounts as early as April and continued their malicious activities until September. It was further revealed that the attackers attempted to guess and brute-force users' passwords.

Meanwhile, an official from South Korea's National Intelligence Service has highlighted North Korea's expanding use of generative artificial intelligence (AI) in its state-backed hacking endeavors. Although North Korea has yet to incorporate generative AI into active offensive operations, officials are closely monitoring the situation. Experts express concerns about the country's development and use of AI tools for various purposes.

In another development concerning privacy risks, 404 Media has brought attention to Patternz, a global smartphone surveillance tool capable of monitoring billions of devices by drawing data from advertisements in countless popular mainstream apps. The tool has reportedly been marketed to governments worldwide, intending to integrate with intelligence agencies' surveillance capabilities. Ad industry giants like Google and PubMatic have already severed ties with a company linked to the surveillance firm.

Additionally, researchers from MIT's Computer Science and Artificial Intelligence Laboratory have devised an algorithm that can convert data from smart devices' ambient light sensors into images of the surrounding environment. While ambient light sensors are primarily intended to adjust screen brightness, bad actors could potentially abuse these sensors, turning smart devices into surveillance tools without users' knowledge. These sensors commonly have automatic permissions within operating systems without requiring explicit user approval, leaving users with limited recourse to block unauthorized data streams.

The evolving landscape of cybersecurity underlines the need for heightened vigilance and robust security measures. Users are advised to ensure they have upgraded their iPhone to iOS 17.3 and enable Apple's new Stolen Device Protection feature to enhance digital security.

The views expressed in this article do not reflect the opinion of ICARO, or any of its affiliates.

Related