TeamViewer Internal Systems Accessed by APT Hackers

0
[ad_1]

TeamViewer, a leading provider of remote access software, announced that attackers had compromised its internal corporate IT environment.

The company’s security team detected the breach, who noticed an “irregularity” in their internal systems, prompting an immediate response.

Swift Response and Investigation

Upon detecting the irregularity, TeamViewer activated its incident response procedures and enlisted external cybersecurity experts to investigate and implement remediation measures.

In a statement, TeamViewer emphasized that its corporate IT environment is “completely independent” from its product environment, assuring customers that there is no evidence the breach affected customer data or the TeamViewer product itself.

However, investigations are still ongoing. “Security is of utmost importance to us; it is deeply rooted in our DNA,” TeamViewer stated.

Scan Your Business Email Inbox to Find Advanced Email Threats - Try AI-Powered Free Threat Scan

“We value transparent communication and will continuously update the status of our investigations as new information becomes available.”

Marked as no-follow

Hidden Page and APT Group Involvement

Interestingly, TeamViewer seems to have deliberately hidden the page detailing the breach from Google searches, although the reason for this action remains unclear.

While the company has not provided specific details on the nature of the attack, NCC Group, a cybersecurity firm, alerted its customers about a “significant compromise of the TeamViewer remote access and support platform by an APT group.”

APT stands for Advanced Persistent Threat, typically referring to sophisticated, state-sponsored hacking groups.

NCC Group circulated the alert citing the “widespread usage” of TeamViewer, though the firm did not disclose its sources and said it is still investigating the incident.

Millions of users worldwide rely on TeamViewer for remote access and support.

The company asserts that its primary focus remains ensuring the integrity of its systems as it continues to investigate the full scope of the breach.

This incident underscores the ongoing cybersecurity challenges faced by major technology providers.

Users of TeamViewer are advised to monitor for any updates from the company regarding potential impacts or required actions.

As the investigation unfolds, TeamViewer’s commitment to transparency and security will be crucial in maintaining user trust and mitigating any potential fallout from this breach.

Stay in the loop with the latest in cybersecurity by following us on Linkedin and X for daily updates!


[ad_2]
Source link

Feast your eyes on Galaxy Z Fold 6 & Flip 6 renders in every color

0
[ad_1]

Yesterday, a flurry of leaks gave us a closer look at all of Samsung‘s upcoming products slated to debut at Unpacked on July 10. From the Galaxy Z Fold 6 and Galaxy Z Flip 6 to the Galaxy Watch 7, Galaxy Watch Ultra, and the Galaxy Buds 3 series, we saw official-looking renders of them all. A fresh leak shows us the two foldables in additional colors, leaving nothing to the imagination.

Galaxy Z Fold 6 and Flip 6 renders leaked in all colors

Leaks have already revealed that Samsung will release the Galaxy Z Fold 6 in three colors: Navy, Silver, and Pink. The Galaxy Z Flip 6 is said to come in four colors: Blue, Mint, Silver, and Yellow. These are the standard color options sold widely, with the company expected to offer additional colorways exclusively through its official website. Those may be Black and White for the Fold and Black, White, and Peach for the Flip.

If history is any indication, Samsung will come up with some fancy names for these shades. But that doesn’t change the appearance of the devices. Yesterday’s leak gave us visuals of the Galaxy Z Fold 6 in Silver and Navy colors and the Galaxy Z Flip 6 in Blue and Silver colors. Today, we have renders of both upcoming Samsung foldables in the remaining shades, i.e., the Fold in Pink and the Flip in Mint and Yellow.

Shared by Roland Quandt of Winfuture, the images were allegedly posted online by the Australian retailer Harvey Norman. The retailer seems to have taken down those premature product listings from its website, but not before the internet saved the images. In the gallery below, we can see the Galaxy Z Fold 6 in all three colors, with the Pink variant first up. We have attached the Galaxy Z Flip 6’s images at the end of the article.

The new foldables bring a minor redesign

At first glance, Samsung’s upcoming foldables don’t look different from their predecessors. But some minor design differences become apparent when you watch closely or put them side-by-side. The Galaxy Z Fold 6 is more boxy with sharper corners, like the Galaxy S24 Ultra. It is also slightly shorter and wider than the Fold 5. Rumors say Samsung will offer a titanium frame on the new book-style foldable.

The Galaxy Z Flip 6’s design changes aren’t as apparent. However, it might end up getting more notable hardware upgrades. We are expecting a bigger battery, a newer primary rear camera, more RAM, and other upgrades. If leaks are accurate, none of this is changing on the Fold. Thankfully, it won’t be long before Samsung takes wraps off the duo. The Unpacked event on July 10 will take place in Paris, the host city of the Summer Olympics 2024.


[ad_2]
Source link

Snowblind Abuses Android Seccomp Sandbox To Bypass Security Mechanisms

0
[ad_1]

A new Android banking trojan named Snowblind was discovered that exploits the Linux kernel feature seccomp, traditionally used for security, which installs a seccomp filter to intercept system calls and bypasses anti-tampering mechanisms in apps, even those with strong obfuscation and integrity checks. 

The novel attack vector allows the malware to steal login credentials, bypass 2FA, and exfiltrate data, making it highly versatile and dangerous, as it is believed that this technique has the potential to be used in many different ways to compromise apps. 

Android malware traditionally exploits accessibility services to steal user input or control applications, but apps can now detect malicious accessibility services, prompting attackers to use repackaging attacks to bypass detection. 

Working of Snowblind

Snowblind, a new malware, leverages seccomp, a Linux kernel security feature, to create a more sophisticated repackaging attack.

Scan Your Business Email Inbox to Find Advanced Email Threats - Try AI-Powered Free Threat Scan

Unlike FjordPhantom, which uses virtualization, Snowblind injects a native library with a seccomp filter before the app’s anti-tampering code runs, which redirects system calls, making the app unable to detect tampering and allowing malicious accessibility services to operate undetected.  

Seccomp is a Linux kernel functionality that allows user processes to define policies for system calls and acts as a sandboxing mechanism to reduce attack surfaces.

Introduced with two modes, strict mode only allows limited system calls, while seccomp-bpf offers fine-grained control through Berkeley Packet Filters. 

While traditionally fragmented across device manufacturers’ custom kernels, seccomp gained traction in Android 8 (Oreo), where Google implemented seccomp in Zygote to restrict apps’ system calls and added tests to the CTS (Compatibility Test Suite) to ensure broader adoption, which suggests that the seccomp-bpf is likely available on most devices running Android 8 and later, potentially even on earlier versions. 

Seccomp-bpf is a Linux kernel feature that allows processes to restrict the system calls they can make, which can be used to improve security by preventing processes from making unauthorized system calls. 

struct is defined

To use seccomp-bpf, a developer first defines a BPF (Berkeley Packet Filter) program that specifies which system calls are allowed, which can be based on the system call number, the arguments to the system call, or the calling process.

Once the BPF program is defined, it is applied to the process using the prctl() system call. 

Putting everything together

According to Promon, the prctl() system call with the PR_SET_SECCOMP option allows the process to install a seccomp filter, which is a pointer to a BPF program that defines which system calls are allowed. 

When a process tries to make a system call, the kernel first checks the seccomp filter, and if the filter allows the system call, the kernel makes the system call.

The kernel returns an error to the process if the filter does not allow the system call.

example of doing on arm64

Apps have adopted countermeasures like implementing their own system calls and obfuscation.

Snowblind injects a native library that installs a seccomp filter, allowing all system calls except open(). 

When the targeted anti-tampering library tries to open a file, the filter triggers a SIGSYS signal.

A custom signal handler injects the original app’s file path into the open() call before it’s re-executed, effectively bypassing the anti-tampering check.

Stay in the loop with the latest cybersecurity by following us on Linkedin and X for daily updates!


[ad_2]
Source link

OnePlus 12T twin launches with up to 24GB RAM, beefy battery & more

0
[ad_1]

The OnePlus 12T twin has just arrived the OnePlus Ace 3 Pro. This smartphone launched in China, as part of OnePlus’ latest press event. This phone will almost certainly be relaunched as the OnePlus 12T in global markets.

The OnePlus Ace 3 Pro has a familiar design

As you can see in the provided images, this phone has a recognizable OnePlus design. It has a curved display on the front, with a centered display camera hole, and very thin bezels. All of its physical buttons are included on the right side, while the alert slider sits on the left.

There are three cameras included on the back, all of which are part of a circular camera island. OnePlus’ logo is centered on the back, and the phone has rounded corners.

There is a 6.78-inch 2780 x 1264 8T LTPO AMOLED display in use here. That panel’s refresh rate goes up to 120Hz, while the peak brightness is 4,500 nits, in theory. This panel also has a high-frequency PWM dimming (2,160Hz), and a 360Hz touch sampling rate. Dolby Vision is also supported, while the panel is protected by the Gorilla Glass Victus 2.

Qualcomm’s most powerful SoC is used, and up to 24GB of RAM

The Snapdragon 8 Gen 3 SoC fuels the device. Variants with 12GB, 16GB, and 24GB of LPDDR5X RAM are on offer. Those three models come with 256GB, 512GB, and 1TB of UFS 4.0 flash storage.

OnePlus also included a 6,100mAh battery inside of this smartphone. The company refers to this battery as a ‘Glacier Battery’. It has a 3% reduction in volume. 100W SuperVOOC charging is also supported here, and it can fully charge the battery in only 36 minutes.

OnePlus also talked about battery health. OnePlus’ Glacier Battery is said to have a battery level greater than or equal to 80% after four years of use. That’s not bad at all considering 100W charging is in use.

OnePlus Ace 3 Pro official image 2

Three cameras sit on the back, while the device is IP65 certified

A 50-megapixel main camera (Sony’s IMX890 sensor, f/1.8 aperture, OIS) is in use here. An 8-megapixel ultrawide camera (Sony’s IMX355 sensor, f/2.2 aperture) also sits on the back. The third camera on the back is a 2-megapixel macro unit (Howe OV02B sensor, f/2.4 aperture). On the front, you’ll find a 16-megapixel camera (Samsung S5K3P9 sensor, f/2.4 aperture).

The phone comes with an in-display fingerprint scanner, and an infrared sensor too. It has stereo speakers and Dolby Atmos support. The phone is IP65 certified for dust and splash resistance. It supports Bluetooth 5.4, and the same goes for Wi-Fi 7.

The OnePlus Ace 3 Pro comes in variants with different backplates

Android 14 comes pre-installed on the device, with ColorOS 14.1. There are two SIM card slots included here, both are of the nano SIM variety. The device comes in Titanium Silver (glass back), Green (vegan leather back), and Ceramic White (ceramic back) variants.

The OnePlus Ace 3 Pro measures 163.3 x 75.27 x 8.85mm (glass) / 8.95mm (leather) / 8.69mm (ceramic). Those three variants weigh 212 grams, 207 grams, and 225 grams, respectively.

The phone’s pricing in China starts at CNY3,199 ($440), while the most expensive model will set you back CNY4,699 ($646). The OnePlus 12T is expected to arrive later this year, though it probably won’t be available in a 24GB RAM model.


[ad_2]
Source link

Google Vids AI video generator is now available, but not for everyone

0
[ad_1]

Tools based on generative AI are proving capable of practically everything. Lately, the AI-powered video niche has been constantly growing and receiving new options. Now, Google is getting on the bandwagon by launching Google Vids, which members of the Workspace Labs program can test now. However, this tool is more focused on the work or business environment.

Google Vids is an AI-powered tool for video creation. According to the company, the goal of Vids is “telling stories in work environments.” In essence, it works the same as other video generators. But its focus on the business environment gives it some additional capabilities to intervene in the creation of the video.

Workspace Labs-enabled users can now test Google Vids

People can use the tool to, for example, create a video that shows the achievement of a company’s goals. It can also generate a video that shows the employee training process for different positions. The media files can even describe the day-to-day lives of the different departments of the company. In all cases, with a professional-style presentation.

google vids featured

People enrolled in Workspace Labs can now test Google Vids to generate their first videos. Like other similar tools, it all starts with a prompt. According to Google, the prompt should describe “your idea with goal, audience, and length.” With the prompt ready, you’ll get a base storyboard to work on. From there, you can tweak it according to the output you are looking for. You can even include documents or files directly from your Google Drive account.

You can even add your own voice to the video

During this stage, you can also add specific points about what you are looking for. You can also choose a specific style for the video. After completing this stage, you will see a video UI edition with a timeline. There, you can explore all the multimedia content available to add to the video timeline. You can also add voice, either your own or a default one.

Being focused on the workplace, Vids is not as creative as Sora or Kling. In fact, the final output will be composed of stock videos, images, and music. However, the result is quite suitable for a professional presentation. Lastly, if you are not enrolled in Workspace Labs, you will be able to test Google Vids in the coming weeks. The tool will be part of the Gemini for Workspace suite.

 


[ad_2]
Source link

U.S. Dep. of Justice Announced $10M Reward For Russian Hacker

0
[ad_1]

The U.S. Department of Justice has announced a $10 million reward for information leading to the arrest of Amin Timovich Stigal (Амин Тимович Стигал), a 22-year-old Russian citizen charged with conspiracy to hack into and destroy computer systems and data.

A federal grand jury in Maryland returned the indictment, highlighting Stigal’s alleged involvement in cyberattacks targeting Ukrainian government systems and, later, countries supporting Ukraine, including the United States.

Cyberattacks on the Ukrainian Government

According to the U.S. Department of Justice, Stigal and members of the Main Intelligence Directorate of the General Staff (GRU) of the Russian Federation conspired to use a U.S.-based company’s services to distribute malware known as “WhisperGate” to dozens of Ukrainian government entities’ computer systems.

The attacks, which began in January 2022, aimed to destroy these systems and related data in advance of the Russian invasion of Ukraine.

On January 13, 2022, the Conspirators attacked multiple Ukrainian government networks, including the Ministry of International Affairs, the State Treasury, and the Ministry of Education and Science, among others.

The malware, designed to look like ransomware, was a cyberweapon intended to destroy the target computer and related data.

Scan Your Business Email Inbox to Find Advanced Email Threats - Try AI-Powered Free Threat Scan

The Conspirators also exfiltrated sensitive data and defaced websites to instill fear among the Ukrainian population.

Targeting Allies of Ukraine

The indictment further alleges that in August 2022, the Conspirators hacked the transportation infrastructure of a Central European country supporting Ukraine.

From August 2021 through February 2022, they also probed computers belonging to a federal government agency in Maryland, using the same infrastructure as in the Ukraine-related attacks.

Attorney General Merrick B. Garland stated, “The Justice Department will continue to stand with Ukraine on every front in its fight against Russia’s war of aggression, including by holding accountable those who support Russia’s malicious cyber activity.”

Assistant Attorney General Matthew G. Olsen added, “The Department will do its part to prevent and disrupt such malicious behavior that relies upon online services or infrastructure in the U.S., or that targets U.S. victims.”

FBI Deputy Director Paul Abbate emphasized the FBI’s commitment to combating malicious cyber activities by adversaries.

“Today’s indictment demonstrates the FBI’s unwavering commitment to combat malicious cyber activities by our adversaries, and we will continue to work with our international partners to thwart attempts to undermine and harm our allies,” Abbate said.

Special Agent in Charge William J. DelBagno of the FBI Baltimore Field Office reiterated the FBI’s dedication to pursuing justice and disrupting malicious cyber actors.

“To those adversaries who seek to compromise our international partners’ systems, know you will be identified and you will face consequences for your actions,” DelBagno stated.

If convicted, Stigal faces a maximum penalty of five years in prison.

The FBI Baltimore Field Office is investigating the case, with Assistant U.S. Attorneys Aaron S.J. Zelinsky and Robert I. Goldaris for the District of Maryland prosecuting.

The National Security Division’s National Security Cyber Section supports the investigation.

The U.S. Department of Justice’s announcement underscores the ongoing international efforts to combat cyber threats and hold cybercriminals accountable for their actions.

Stay in the loop with the latest in cybersecurity by following us on Linkedin and X for daily updates!


[ad_2]
Source link

Chinese Hacker Groups Using Off-The-Shelf Tools

0
[ad_1]

Cyberespionage actors are increasingly using ransomware as a final attack stage for financial gain, disruption, or to cover their tracks, as the report details previously undisclosed attacks by a suspected Chinese APT group, ChamelGang, who used CatB ransomware against a major Indian healthcare institution and the Brazilian Presidency in 2022.

ChamelGang also targeted other government and critical infrastructure organizations.

Another intrusion cluster using common encryption tools like BestCrypt and BitLocker hit various industries across North America, South America, and Europe, with a focus on US manufacturing.

Scan Your Business Email Inbox to Find Advanced Email Threats - Try AI-Powered Free Threat Scan

While the source of this second cluster is unclear, there are overlaps with past intrusions linked to suspected Chinese and North Korean APT groups. 

BestCrypt & BitLocker targets

Researchers analyzed two APT clusters targeting governments and critical infrastructure sectors globally between 2021 and 2023. One cluster is linked to ChamelGang, a suspected Chinese APT group. 

In 2023, ChamelGang targeted a government organization in East Asia and an aviation organization in the Indian subcontinent, using their known tools and techniques. 

They are also suspected to be behind the 2022 ransomware attacks on the Presidency of Brazil and the All India Institute of Medical Sciences, likely using their CatB ransomware, which is based on overlaps in code, staging mechanisms, and malware artifacts with other ChamelGang intrusions.  

There were intrusions between 2021 and 2023, during which attackers abused legitimate disk encryption tools, Jetico BestCrypt and Microsoft BitLocker, to encrypt victim endpoints for ransom. Thirty-seven organizations, primarily in North America’s manufacturing sector, were affected. 

The attackers leveraged compromised access to deploy the encryption tools, impacting the education, finance, healthcare, and legal sectors as well.

Cyberespionage actors are increasingly using ransomware for more than just financial gain, while the data encryption can destroy forensic artifacts, hindering attribution and deflecting blame. 

Additionally, the urgency of data recovery can distract security teams, allowing further espionage activities to go unnoticed, and this convergence of cybercrime and espionage tactics creates challenges. 

Siloed information sharing between law enforcement (ransomware focus) and intelligence agencies (espionage focus) can lead to missed opportunities to identify threats, assess risks, and maintain a clear understanding of the overall cyber landscape. 

SentinelLabs stresses collaboration on cybercrime/espionage incidents, which includes sharing data, examining artifacts, and analyzing the bigger picture of ransomware attacks by improving the identification of attackers, their goals, and motivations.

They are actively tracking cyberespionage groups that blur the lines between traditional categories and aim to share knowledge to help organizations defend against these threats.

Stay in the loop with the latest in cybersecurity by following us on Linkedin and X for daily updates!


[ad_2]
Source link

YouTube might be brewing up new Premium plans

0
[ad_1]
Google just dropped a bunch of new features for YouTube Premium subscribers, like skipping straight to the good parts of a video, watching Shorts in a Picture-in-Picture (PiP) window, and more. But that is not all – there is talk that Google might roll out new Premium plans soon.

YouTube explores new Premium subscription plans


In a YouTube community forum post, Team YouTube mentioned plans to introduce more paid tiers and ways for Premium users to share their perks with others.

– Hazel, YouTube team member, June 2024

Right now, YouTube offers three monthly paid plans: the standard Premium subscription for $13.99, a family plan that lets you add up to five members for $22.99, and a student plan for $7.99 per month. By subscribing, you get perks like:
  • Ad-free videos
  • The ability to download videos for offline viewing
  • Access to YouTube Music
  • 4K video quality on phones and tablets
  • Videos in 1080p Premium
  • Exclusive original content

However, that is not all, as YouTube’s just got some sweet upgrades for Premium members. Android users can now use an AI-powered “jump ahead” feature, and it is coming to iOS in the next few weeks. Plus, you will soon be able to watch YouTube Shorts in picture-in-picture mode on Android, just like TikTok.
Video Thumbnail

Video credit – YouTube

YouTube is also working on making the download experience smoother and tackling those annoying storage issues users keep running into.


Team YouTube hasn’t spilled the beans on what new tiers the platform might roll out, but it does plan to make its current membership plans available in more regions.

YouTube could potentially introduce a more affordable, ad-free tier without all the extra Premium perks. Honestly, I’d jump on that plan in a heartbeat. While the other perks are cool, having an ad-free experience is what matters most to me, at least.

But putting personal preferences aside, with YouTube Premium prices going up over the past year, the company cracking down on ad-blocking tools, and tightening its grip on hacky ways to snag cheaper subscriptions, a more affordable tier with fewer features might be a hit with a lot of people.

[ad_2]
Source link

Former IT Employee Stolen 1M Geisinger Patient’s Personal Data

0
[ad_1]

Geisinger Health System discovered a data breach involving the personal information of over one million patients.

The breach was traced back to a former employee of Nuance Communications Inc., an external vendor providing IT services to Geisinger.

The ex-employee accessed the data just two days after being terminated.

Upon this discovery, Geisinger promptly notified Nuance, permanently revoking the former employee’s access to their records.

An immediate investigation was launched, and law enforcement was engaged to handle the situation.

Nuance’s investigation revealed that the former employee might have accessed and taken various personal details of Geisinger patients.

The compromised information included names, dates of birth, addresses, medical record numbers, phone numbers, and other sensitive data.

Scan Your Business Email Inbox to Find Advanced Email Threats - Try AI-Powered Free Threat Scan

However, no financial information, Social Security numbers, or insurance details were accessed.

Law enforcement requested Nuance to delay notifying the affected patients to avoid impeding their investigation.

The former employee has since been arrested and is now facing federal charges.

Geisinger’s Chief Privacy Officer, Jonathan Friesen, expressed his concern and regret over the incident. “Our patients’ and members’ privacy is a top priority, and we take protecting it very seriously,” Friesen stated.

“We continue to work closely with the authorities on this investigation, and while I am grateful that the perpetrator was caught and is now facing federal charges, I am sorry that this happened.”

Patient Guidance and Support

Geisinger has begun notifying the affected patients and is urging them to review the information provided in the notice.

Patients are encouraged to contact the dedicated support line at 855-575-8722, available Monday through Friday from 9 a.m. to 9 p.m. Eastern Time, excluding major U.S. holidays.

The engagement number B124651 should be provided when calling.

Additionally, patients are advised to carefully review their health plan statements and report any unauthorized services to their health insurer immediately.

This proactive approach aims to mitigate any potential misuse of the compromised data.

Geisinger remains committed to safeguarding patient information and is taking all necessary steps to prevent such incidents in the future.

The collaboration with law enforcement and ongoing investigation underscores their dedication to maintaining the trust and security of their patient’s personal information.

Stay in the loop with the latest cybersecurity by following us on Linkedin and X for daily updates!


[ad_2]
Source link

an affordable phone with glasses-free 3D display

0
[ad_1]

ZTE has expanded its Voyage series of Android smartphones by launching the ZTE Voyage 3D in its home market of China. The phone has arrived as an affordable offering with a glasses-free immersive 3D display. The handset comes after the company released the ZTE nubia Pad 3D II tablet with a similar screen at MWC 2024. ZTE is touting the Voyage 3D as the “world’s first AI naked-eye 3D mobile phone”.

The key selling point of the ZTE Voyage 3D is the conversion of 2D content to 3D in real-time

The ZTE Voyage 3D’s biggest selling point is its Neovision 3D Anytime display technology. The phone is capable of converting 2D content into 3D in real-time. The device relies on stereoscopic eye-tracking tech, which offers a 60-degree viewing angle. Besides, the phone sports a built-in “micron-level” multidimensional glasses-free 3D system. This tech can adjust the screen’s algorithm to provide the best 3D display state in real-time.

The new Voyage offering gets the brand’s self-developed AI 2D to 3D conversion functionality. The feature supports all major media apps to switch to 3D mode with a click of a button. The device also gets a dedicated physical key, which can open a specific content app with one click. Furthermore, the phone offers AI intelligent real-time translation, voice translation, and a series of other AI features.

The budget offering gets a 50MP dual camera system, 5G, and 33W fast-charging

As for the other features, the ZTE Voyage 3D gets a 6.58-inch FHD+ LCD lenticular 3D display. Powering the phone is an octa-core Unisoc T760 6nm EUV processor, which is accompanied by 6GB of RAM and a Mali-G52 GPU. There’s plenty of 128GB of native storage onboard the device. Software-wise, it boots MyOS 13 that’s based on Android 13. There’s also a side-mounted fingerprint sensor for security.

For imaging, the ZTE Voyage 3D sports a 50MP primary camera at the rear, which is aided by a 5MP secondary snapper. There’s also a 5MP front-facing camera for selfies and video calling purposes. A 4,500mAh battery with 33W fast charging technology keeps the 5G smartphone alive.

The ZTE Voyage 3D has been priced at 1,499 Yuan, which roughly translates to $200. The phone comes in a single Star Black color variant and is already on sale in China. There’s no word when the brand is planning to launch the 3D handset in other markets at the moment.


[ad_2]
Source link