Official forum for Utopia Community
You are not logged in.
In order to collect private information contained in images, a new Android malware strain known as CherryBlos has been seen using optical character recognition (OCR) methods.
CherryBlos, according to Trend Micro, is spread through phony social media posts and has the ability to steal cryptocurrency wallet-related credentials as well as act as a clipper to replace wallet addresses when a victim copies a string that matches a predefined format to the clipboard.
Once installed, the apps ask for users' permission to grant them accessibility permissions, which enables it to automatically grant itself additional permissions as necessary. Users who try to kill or uninstall an app by going to the Settings app are sent back to the home screen as a defense evasion measure.
CherryBlos uses OCR to identify potential mnemonic phrases from images and photos stored on the device, with the results of which are routinely uploaded to a remote server.
CherryBlos displays fake overlays on top of legitimate cryptocurrency wallet apps to steal credentials and make fraudulent fund transfers to an attacker-controlled address.
The campaign's success depends on the likelihood that users will frequently screenshot the wallet recovery phrases on their devices.
The CherryBlos threat actors also released an app on the Google Play Store, according to Trend Micro, but it was free of malware. Google has since removed the Synthnet app.
Based on the use of shared network infrastructure and app certificates, the threat actors also seem to have overlaps with another activity set involving 31 fraudulent money-making apps called FakeTrade that are hosted on the official app marketplace.
It has been discovered that the majority of the apps, which were uploaded to the Play Store in 2021, are directed at Android users in Malaysia, Vietnam, Indonesia, the Philippines, Uganda, and Mexico.
According to Trend Micro, these apps represent purported e-commerce platforms that promise users will earn more money through recommendations and top-ups. But when users try to withdraw money, they won't be able to. ".
The revelation coincides with McAfee's disclosure of a SMS phishing campaign against Japanese Android users that poses as a power and water infrastructure company in order to infect the devices with SpyNote malware.
Early in June 2023 was the time of the campaign.
According to a McAfee researcher Yukihiro Okutomi, "after the malware has been launched, the app opens a fake settings screen and asks the user to enable the Accessibility feature.".
By allowing the Accessibility service, the malware turns off battery optimization so that it can operate in the background and automatically gives unknown source installation permission to install additional malware without the user's knowledge. ".
Malware for Android CherryBlos.
The constant evolution of the cyber threat landscape doesn't come as a surprise to malware developers, who are always looking for fresh ways to seduce victims and steal personal information.
By forbidding sideloaded apps from using accessibility features at all, Google started taking action last year to stop rogue Android apps from using accessibility APIs to covertly gather data from compromised devices.
However, stealers and clippers are only one of the many varieties of malware, including spyware and stalkerware, that are used to track targets and gather relevant information, posing serious risks to individual security and privacy.
According to recent research, SpyHide, an Android surveillance app, has been secretly gathering private phone data from nearly 60,000 Android devices worldwide since at least 2016.
According to a security researcher who goes by the name of maia arson crimew, some of the users (operators) have several devices connected to their accounts, with some having as many as 30 devices they've been monitoring over the course of several years, spying on everyone in their lives.
Therefore, in order to minimize risks, users must exercise caution when downloading apps from unreliable sources, check developer information, and carefully read app reviews.
Google has taken note of the fact that nothing is stopping threat actors from opening phony developer accounts on the Play Store in order to disseminate malware.
In an effort to increase user trust, the search engine giant announced earlier this month that it would require all new developer accounts registering as organizations to provide a valid D-U-N-S number assigned by Dun and Bradstreet before submitting apps. The modification is effective as of August 31, 2023.
oba;19782 wrote:thrive;19781 wrote:Transactions involving cryptocurrencies can be challenging to track down and tax, which makes it challenging for governments to collect the right taxes.
To ensure tax compliance, it's crucial to remember that tax laws and regulations are constantly changing to include provisions for cryptocurrencies.
The rise of cryptocurrencies promotes innovation and rivalry within the financial system.
As financial institutions are compelled to adjust to the shifting environment, this competition may eventually result in improvements to conventional currencies, payment methods, and banking services.
oba;19779 wrote:thrive;19778 wrote:Comparing cryptocurrency to conventional financial systems, transaction costs are frequently lower with cryptocurrencies.
Cryptocurrencies can lower transaction fees by doing away with middlemen like banks or payment processors, making it more affordable to send money across borders or complete online transactions.
For tax authorities, some cryptocurrencies can be difficult to use because of their decentralized and anonymous nature.
Transactions involving cryptocurrencies can be challenging to track down and tax, which makes it challenging for governments to collect the right taxes.
oba;19776 wrote:thrive;19775 wrote:By providing an alternate form of payment that is not governed by a single entity, decentralization challenges the monopoly of conventional currencies.
Those who are not currently served by traditional banking systems may be able to access financial services thanks to cryptocurrencies.
Cryptocurrencies can empower people in places with limited access to traditional banking services by allowing peer-to-peer transactions without the need for middlemen.
Comparing cryptocurrency to conventional financial systems, transaction costs are frequently lower with cryptocurrencies.
oba;19773 wrote:Vastextension;19586 wrote:Yes, Cryptocurrencies does have the potential to combat the monopoly of traditional currencies and challenge the existing taxation systems in various ways.
Central banks or governments frequently control traditional currencies, giving them complete control over currency issuance and circulation.
On the other hand, cryptocurrencies run on decentralized, open, transparent, and distributed networks and are decentralized.
By providing an alternate form of payment that is not governed by a single entity, decentralization challenges the monopoly of conventional currencies.
Vastextension;19770 wrote:thrive;19769 wrote:It is worth noting that there can be a spectrum of motivations and approaches when it comes to balancing financial gain and helping others.
Some individuals and businesses may prioritize profit above all else, while others strive to make a positive impact on society alongside generating revenue.
Ultimately, individual perspectives and motivations can vary greatly.
Some people may be driven primarily by financial gain, while others may prioritize making a positive impact and helping others, even if it means accepting lower financial returns.
Vastextension;19767 wrote:thrive;19766 wrote:In the context of business and entrepreneurship, the concept of creating value and making money from providing goods or services is often intertwined with helping others.
Many successful businesses are built on the premise of addressing a need or solving a problem for customers.
By doing so, they can achieve financial success while also benefiting their customers and society at large.
It is worth noting that there can be a spectrum of motivations and approaches when it comes to balancing financial gain and helping others.
Vastextension;19764 wrote:thrive;19763 wrote:While there are certainly individuals who prioritize helping others even when financial gain is not involved, the motivation to help others can vary from person to person.
In some cases, the desire to help may be driven by personal values, empathy, or a sense of social responsibility.
However, it is also true that there are instances where people may prioritize financial gain over altruistic motives.
In the context of business and entrepreneurship, the concept of creating value and making money from providing goods or services is often intertwined with helping others.
The world is actually growing fast and fast that things doesn't comes so free this days, people don't actually don't want to have things done or help people when its does not involved making the money. So the only way to grow wealth is by using your money to buy assets in a recommeded revenue providing knowledge.
While there are certainly individuals who prioritize helping others even when financial gain is not involved, the motivation to help others can vary from person to person.
The Zen 2 architecture-based processors from AMD have a new security flaw that could be used to extract private information like encryption keys and passwords.
The Zenbleed bug, code-named by Google Project Zero researcher Tavis Ormandy and tracked as CVE-2023-20593 (CVSS score: 6.5), permits data exfiltration at a rate of 30 kb per core, per second.
The problem is a part of a larger class of flaws known as speculative execution attacks, in which the widely used optimization method in contemporary CPUs is abused to access cryptographic keys from CPU registers.
A register in "Zen 2" CPUs "may not be written to 0 correctly" under certain microarchitectural conditions, according to AMD's advisory. "This could result in data from another process and/or thread being saved in the YMM register, potentially allowing an attacker to access sensitive data. ".
The web infrastructure provider Cloudflare pointed out that the attack could even be executed remotely through JavaScript on a website, negating the need for physical access to the computer or server.
Researchers at Cloudflare Derek Chamorro and Ignat Korchagin found that vectorized operations could be carried out very effectively using the YMM registers. Applications that process a lot of data have a lot to gain from them, but malicious activity is increasingly focusing on them. ".
This attack forces an incorrect command by modifying register files. The register file is shared by all processes running on the same physical core, so this exploit can be used to eavesdrop on even the most basic system operations by watching the data being transferred between the CPU and the rest of the computer, they added.
Although there is no proof that the bug has been used in the wild, it is crucial to apply the microcode updates as soon as they are made available through original equipment manufacturers (OEMs) in order to reduce potential risk.
Update.
Wiz, a cloud security company, has issued a warning that "62 percent of AWS environments are running EC2 instances with Zen 2 CPUs and may therefore be affected by Zenbleed.". In a separate alert, Google stated that the fixes had already been made to its fleet of servers for the Google Cloud Platform. The problem is anticipated to be fixed as soon as the process is finished by Amazon Web Services (AWS), which is currently "testing the stability" of the update
Apple has stated that in order to prevent the misuse of certain APIs for data collection, starting with the release of iOS 17, iPadOS 17, macOS Sonoma, tvOS 17, and watchOS 10 later this year, it will be necessary for developers to provide justification for using those APIs in their apps.
According to a statement from the business, "this will help ensure that apps only use these APIs for their intended purpose.". You must choose one or more authorized reasons that accurately describe how your app uses the API as part of this process, and your app can only use the API for the reasons you've chosen. ".
The APIs related to the following that demand justification for use are.
APIs for file timestamps.
APIs for system boot.
APIs for disk space.
APIs for active keyboards, and.
APIs that are set to the user's defaults.
The iPhone manufacturer claimed that it is taking this action to prevent app developers from abusing such APIs to gather device signals in order to perform fingerprinting, which could be used to individually identify users across various apps and websites for other purposes like targeted advertising.
Developers will be required to disclose the justifications for using these "required reason APIs" in their apps' privacy manifests as part of the policy enforcement, which takes effect in Fall 2023 and also applies to visionOS. Apps won't be accepted starting in the spring of 2024 if their privacy manifest file doesn't explain how they use the APIs.
In its developer documentation, Apple expressly states that fingerprinting is not permitted, regardless of whether a user grants your app permission to track them. "One or more approved reasons that accurately reflect your use of each of these APIs and the data derived from their use must be declared by your app or third-party SDK. ".
"You may use these APIs and the information obtained through their use only for the stated purposes. You cannot use the APIs or derived data for tracking, and the stated reasons must be consistent with the functionality of your app as it is displayed to users. ".
crpuusd;19608 wrote:Financial freedom is when your revenue is safe without any obstructions of high powers or finance institute and having no limitations in your funds transactions.
Well my definition of financial freedom is having financial asset that is high enough to carry you for a lifetime and also many times can be passed down.
Ok but when risk management comes to play the idea of having a single financial asset that's high to carry people for a lifetime is never a good decision though.
It has been discovered that a new malvertising campaign targets users looking for IT tools like AnyDesk, Cisco AnyConnect VPN, and WinSCP and tempts them into downloading trojanized installers with the goal of breaching enterprise networks and potentially launching future ransomware attacks.
According to a Wednesday analysis by Sophos, the "opportunistic" activity known as Nitrogen is intended to deploy second-stage attack tools like Cobalt Strike.
When Nitrogen was first discovered by eSentire in June 2023, it described a chain of infections that sent users to hacked WordPress sites hosting malicious ISO image files, which then resulted in the distribution of Python scripts and Cobalt Strike Beacons to the targeted system.
Later on in the month, Trend Micro discovered a similar attack chain in which a phony WinSCP application served as a springboard for a BlackCat ransomware attack.
According to researchers at Sophos Gabor Szappanos, Morgan Demboski, and Benjamin Sollman, "Throughout the infection chain, the threat actors use unusual export forwarding and DLL preloading techniques to mask their malicious activity and hinder analysis.".
Once activated, the Python scripts create a Meterpreter reverse TCP shell that enables threat actors to remotely execute code on the infected host and download a Cobalt Strike Beacon to aid in post-exploitation.
The researchers stated that threat actors have started to use pay-per-click advertisements that are displayed in search engine results frequently. The threat actors are attempting to attract unsuspecting users looking for specific IT utilities by casting a wide net. ".
Malvertising.
The findings also take place against a backdrop of an increase in cybercriminals using paid advertisements to trick users into visiting malicious websites and downloading various malware such as BATLOADER, EugenLoader (also known as FakeBat), and IcedID, which are then used to spread information stealers and other payloads.
The situation was made worse, according to Sophos, by sellers offering compromised Google Ads accounts and a "significant number of advertisements for, and discussion about, SEO poisoning, malvertising, and related services" on well-known criminal marketplaces.
This shows "marketplaces users have a keen interest in SEO poisoning and malvertising," and it also "negates the difficulty of trying to bypass email filters and convincing users to click a link or download and open an attachment.". ".
Two critical security flaws that could allow for local privilege escalation attacks have been found by cybersecurity researchers in the Ubuntu kernel.
According to a report provided to The Hacker News by cloud security company Wiz, 40% of Ubuntu users may be affected by the easily exploitable flaws.
Security researchers Sagi Tzadik and Shir Tamari claimed that affected Ubuntu versions are widely used in the cloud because many [cloud service providers] use them as their default operating systems.
The flaws, dubbed GameOver(lay) and tracked as CVE-2023-32629 and 2023-2640 (CVSS scores: 7.8), exist in a module called OverlayFS and result from insufficient permissions checks in some circumstances, allowing a local attacker to obtain elevated privileges.
An overlay filesystem is a type of union mount file system that enables the fusion of different directory trees or file systems into a single, integrated filesystem.
The two flaws are succinctly described below -.
On Ubuntu kernels with the bugfixes "UBUNTU: SAUCE: overlayfs: Skip permission checking for trusted" and c914c0e27eb0.
overlayfs.
* xattrs," a non-privileged user has the ability to set privileged extended attributes on mounted files, causing them to be set on upper files without the necessary security checks.
CVE-2023-32629 - Local privilege escalation vulnerability in Ubuntu kernels when calling overlayfs ovl_copy_up_meta_inode_data skips permission checks when calling ovl_do_setxattr.
In essence, GameOver(lay) enables the creation of executable files with scoped file capabilities and deceives the Ubuntu Kernel into copying them to different locations.
anyone who executes it will have root-like privileges due to its unscoped capabilities. ".
As of July 24, 2023, Ubuntu has patched the vulnerabilities as a result of responsible disclosure.
According to Wiz CTO and co-founder Ami Luttwak, the findings highlight the possibility that Ubuntu's subtle modifications to the Linux kernel may have unintended consequences.
According to the researchers, "Both vulnerabilities are unique to Ubuntu kernels since they were caused by Ubuntu's specific changes to the OverlayFS module." They added that the problems are similar to other flaws like CVE-2016-1576, CVE-2021-3493, CVE-2021-3847, and CVE-2023-0386.
Threat actors are promoting FraudGPT, an artificial intelligence (AI) tool that generates cybercrime, on various dark web marketplaces and Telegram channels, following in the footsteps of WormGPT.
This AI bot is only intended to be used for offensive activities like spear phishing emails, cracking tools, carding, etc. Rakesh Krishnan, a security researcher at Netenrich, stated in a report released on Tuesday.
The cybersecurity company claimed that the subscription costs $200 per month (or $1,000 for six months and $1,700 for a year) and has been available since at least July 22, 2023.
The actor, who uses the online alias CanadianKingpin, declares that the alternative to Chat GPT is "designed to provide a wide range of exclusive tools, features, and capabilities tailored to anyone's individuals with no boundaries.".
The tool could be used to write malicious code, produce undetectable malware, discover leaks, and find vulnerabilities, the author adds. There have also been more than 3,000 verified sales and reviews, he adds. At this time, it is unknown precisely which large language model (LLM) was used to create the system.
FraudGPT.
The change occurs at a time when threat actors are increasingly capitalizing on the introduction of OpenAI ChatGPT-like AI tools to create new adversarial variants that are specifically designed to encourage all forms of cybercriminal activity without any limitations.
Such tools, in addition to elevating the phishing-as-a-service (PhaaS) model, could serve as a jumping-off point for unskilled actors looking to launch convincing phishing and business email compromise (BEC) attacks at scale, resulting in the theft of confidential data and unauthorized wire transfers.
"Organizations can develop ChatGPT (and other tools) with ethical safeguards, but it isn't a difficult feat to reimplement the same technology without those safeguards," Krishnan said.
"Finding these quick-moving threats before phishing emails can evolve into ransomware or data exfiltration requires the implementation of a defense-in-depth strategy using all the security telemetry available for fast analytics. ".
The US Securities and Exchange Commission (SEC) on Wednesday approved new regulations that mandate publicly traded companies disclose information about a cyber attack within four days of realizing it has a "material" impact on their finances. This represents a significant change in the way that data breaches are disclosed.
"It may be material to investors," SEC chair Gary Gensler said.
"Whether a company loses a factory in a fire—or millions of files in a cybersecurity incident.". "At the moment, a lot of publicly traded companies inform investors about cybersecurity. However, I believe that if this disclosure were made in a manner that was more standardized, comparable, and useful for making decisions, both companies and investors would benefit. ".
In order to achieve this, the new obligations require businesses to disclose the incident's nature, scope, timing, and impact. However, if it is found that disclosing these details "would pose a substantial risk to national security or public safety," this disclosure may be postponed for an additional period of up to 60 days. ".
They also require registrants to annually describe the methods and approaches used for evaluating, identifying, and managing material risks from cybersecurity threats, describe the material effects or risks resulting from those events, and share details about ongoing or completed remediation efforts.
Saket Modi, CEO of Safe Security, told The Hacker News that the word "material" is crucial in this context because it must be understood. "Most organizations are unable to determine materiality, a crucial component of shareholder protection, so they are not ready to comply with the SEC guidelines. Systems to calculate risk at both the broad and specific levels are lacking. ".
The rules, however, do not apply to "specific, technical information about the Registrant's planned response to the incident or its cybersecurity systems, related networks and devices, or potential system vulnerabilities in such detail as would prevent the Registrant from responding to or remediating the incident. ".
The policy, which was initially proposed in March 2022, is seen as an effort to increase transparency regarding the threats that nation-state actors and cybercrime pose to US companies, close the gaps in cybersecurity defense and disclosure practices, and harden the systems against data theft and intrusions.
According to Kroll, a ransomware gang known as Cl0p has been responsible for a recent wave of cyber attacks that have affected more than 500 businesses. These attacks have been made possible by the exploitation of serious flaws in software that is frequently used in enterprise environments, and the threat actors are using new exfiltration techniques to steal data.
Amit Yoran, CEO and Chairman of Tenable, said the new regulations on cyber risk management and incident disclosure are "right on the money" and represent a "dramatic step toward greater transparency and accountability. ".
Investors should have the right to know about an organization's cyber risk management initiatives "when cyber breaches have real-life repercussions and reputational costs," Yoran continued.
However, given that it could take businesses weeks or even months to thoroughly investigate a breach, there have been concerns raised that the time frame is too short, which could result in inaccurate disclosures. Premature breach notification could alert additional attackers to a vulnerable target, increasing security risks, further complicating the situation.
According to James McQuiggan, a security awareness advocate at KnowBe4, the new SEC requirement requiring organizations to report cyber attacks or incidents within four days seems aggressive but falls within a more lenient time frame than other nations.
Companies have 72 hours to report a cyber incident within the European Union, the United Kingdom, Canada, South Africa, and Australia. There are 24 hours in some other nations, including Singapore and China. Within six hours, India is required to report the breach. ".
"In either case, organizations should have repeatable and well-documented incident response plans with communication plans, procedures, and requirements on who is brought into the incident and when," McQuiggan further stated.
KAMSI_UG;19416 wrote:Well I think it's time we bring the cryptocurrency terminology into the forum many newbies need to go and read the terminology and this would help them be able to use it correctly.
Yes, cryptocurrency terminology is essential on talk.u.is as it is a platform that focuses on discussions and information sharing related to Utopia, which includes the usage of cryptocurrencies like Crypton and Utopia USD.
I believe having a common understanding of the terminology will facilitate effective communication and discussions among users.
thrive;19581 wrote:Vastextension;19580 wrote:Yes, that's correct. UtopiaP2P is focused on creating secure and privacy-focused tools for communication and finance.
Their flagship product, UtopiaP2P, provides users with secure instant messaging, encrypted email, voice communication, and private web browsing.
Furthermore, UtopiaP2P provides an anonymous cryptocurrency known as Crypton and Utopia USD, which allows for secret and untraceable transactions inside the ecosystem.
The UtopiaP2P network is decentralized and built on a peer-to-peer architecture, which ensures its users' privacy and security.
crpuusd;19517 wrote:Lanistergame2;19428 wrote:It is aosmot impossible to meet the needs and demands of everyone but Utopia comes very close to delivering that.
The team is in sync with the demands of the community and tries its best to meet those demands by providing the most robust ecosystem in the crypto space.The Utopia p2p ecosystem has deliver a well creative secured tools for all aspiring users in the for a safer space of work, they also tend to create more entertaining values to all available users to situate the community with fun and protection.
Yes, that's correct. UtopiaP2P is focused on creating secure and privacy-focused tools for communication and finance.
Their flagship product, UtopiaP2P, provides users with secure instant messaging, encrypted email, voice communication, and private web browsing.
thrive;19573 wrote:Vastextension;19572 wrote:It is important to note that while there are legitimate and reputable crypto recovery services available, the cryptocurrency industry is also prone to scams and fraudulent activities.
It is crucial to exercise caution and thoroughly research any service before entrusting them with sensitive information or funds.
Looking for well-established companies with a solid reputation, positive reviews, and a transparent track record will be the best.
Additionally, consider seeking recommendations from trusted sources, such as crypto communities or professionals in the field.
thrive;19571 wrote:Vastextension;19564 wrote:They often have expertise in blockchain technology and may use advanced recovery methods base on their knowledge about blockchain technology and wallet.
They often have expertise in blockchain technology and may use advanced recovery methods base on their knowledge about blockchain technology and wallet.
It is important to note that while there are legitimate and reputable crypto recovery services available, the cryptocurrency industry is also prone to scams and fraudulent activities.
It is crucial to exercise caution and thoroughly research any service before entrusting them with sensitive information or funds.
KAMSI_UG;18307 wrote:Is there any registered crypto recovery services around? And how or what is the process like to employ some of their services
Yes, there are registered crypto recovery services that specialize in helping individuals recover lost or inaccessible cryptocurrencies.
These services employ various techniques and tools to assist in recovering lost private keys, passwords, or access to crypto wallets.
IyaJJJ;19461 wrote:Kelechi;19392 wrote:I have a question guys, if it was True that Utopia p2p had worked with a project that ended up being a scam does that mean Utopia p2p is liable for anything.
It's important to note that Utopia P2P is a decentralized peer-to-peer network that aims to provide secure and private communication and financial transactions. So, if scammers make use of their privacy service UtopiaP2P is not to be blamed.
Yes, UtopiaP2P is just like any other network or platform, there may be individuals or groups who attempt to use it for malicious purposes, including scams.
This is why it is always important to exercise caution and verify the legitimacy of any activity or offers on any platform.
IyaJJJ;19458 wrote:thrive;19457 wrote:Additionally, cryptocurrencies often provide new opportunities for investment and fundraising, which can fuel economic development and job creation.
The US government acknowledges the potential benefits of this technology and has taken steps to establish regulatory frameworks that balance consumer protection and market stability with innovation.
However, it is important to note that the regulatory landscape for cryptocurrencies in the US is still evolving, and there are ongoing discussions and debates about how to effectively regulate and oversee this emerging sector.
It is crucial for individuals and businesses to comply with any applicable regulations and stay informed of any changes in the legal and regulatory environment.
IyaJJJ;19455 wrote:thrive;19454 wrote:One reason for the acceptance and implementation of cryptocurrencies in the US is the potential for innovation and economic growth.
Yes, since cryptocurrencies and blockchain technology have the potential to disrupt traditional financial systems, promote financial inclusion, and spur technological advancements.
Many US lawmakers and regulators have recognized the importance of fostering innovation in this space to remain competitive globally.
Additionally, cryptocurrencies often provide new opportunities for investment and fundraising, which can fuel economic development and job creation.