Search Results for “Zack Whittaker”


May 8, 2020
Zack Whittaker / TechCrunch

Zack Whittaker / TechCrunch  
Coronavirus Tracing Database Belonging to Spyware Maker NSO Group Found Exposed on Unsecured AWS Server, Shows Plans to Store Users’ Location Data

Infamous Israeli spyware maker NSO Group, known for making mobile hacking tools often used by repressive regimes, is leading one of Israel’s coronavirus contact-tracing efforts, codenamed Fleming, security researcher Bob Diachenko discovered. He found one of NSO’s contact-tracing systems on the internet, unprotected and without a password in an AWS server, for anyone to access. However, he believed the database contained dummy data. After he contacted the company, NSO pulled the unprotected database offline. NSO told TechCrunch that the system was only to demonstrate its technology, and it is awaiting government approval to feed real data into the system. Fleming is designed to “pour” in confirmed coronavirus test data from the health authorities and phone location data from the cell networks to identify people who may have been exposed to a person with the virus. A dozen other nations are reportedly also testing Fleming.

Tweets:@zackwhittaker @zackwhittaker @zackwhittaker @zackwhittaker @zackwhittaker @zackwhittaker @zackwhittaker

@zackwhittaker: New: Spyware firm NSO Group secured an unprotected server after it was found online. NSO says it was a demo for its coronavirus contact-tracing system. But experts say any centralized database of citizens' location data poses a security and privacy risk.
@zackwhittaker: The system, codenamed Fleming, is designed to use cell location data to pinpoint possible coronavirus infections. But NSO is still waiting for the Israeli government’s approval to feed cell records into the system. The login page asks for a password. The database didn't.
@zackwhittaker: Without the authority to obtain cell records, evidence suggests NSO used location data from an advertising data broker. (NSO denied this.) When mapped out, we found vast numbers of location data points scattered across not only Israel, but also Rwanda, Saudi Arabia and the UAE.
@zackwhittaker: Whether the data is "real" or not, experts expressed major concerns over the use of centralized location data, fearing that it could become a target for hackers. Also, @jsrailton told me that location data isn't even that good for contact tracing! More: https://tcrn.ch/2WEdMLU
@zackwhittaker: And even if it appears to be anonymous, location data can still track people from their homes to their workplaces. Here's what @ProfWoodward said.
@zackwhittaker: And @tehillaaltshul1 , who I spoke to this week, said location data is a "huge infringement" of a person's privacy. Israel is bucking the trend in terms of using location-based contact tracing. Nearly every other country are favoring privacy-friendly solutions, such as Bluetooth.
@zackwhittaker: NSO is also accused of selling advanced mobile spyware used by the Saudis to hack into Jeff Bezos' phone (which NSO denies) and allegedly developing a WhatsApp exploit that targeted 1,400 users (which NSO also denies!). Anyway, here's the story for more.


May 18, 2020
David Shortell, Evan Perez / CNN

David Shortell, Evan Perez / CNN  
FBI Claims to Have Broken the Encryption on Pensacola Shooter’s iPhones Substantially Weakening the Government’s Push for Encryption Backdoors

Mohammed Alshamrani, a member of the Royal Saudi Air Force in training at Naval Air Station Pensacola who killed three U.S. sailors and wounded others at the base, was in touch with a suspected al Qaeda operative, according to the FBI broke which broke through the encryption protecting the Saudi attacker’s iPhones, sources say. If the Bureau did achieve this encryption breakthrough, the case made by the FBI and Attorney General William Barr for demanding backdoors into encrypted communications services and devices appears to be substantially weakened. Law enforcement said they had initially been unable to retrieve data stored on two iPhones belonging to the shooter, and they cited that hurdle in trying to complete their investigation of the attacker’s ideology and his radicalization.

Related: New York Times, Wall Street Journal, Forbes, Justice Department, MacRumors, Associated Press, Task & Purpose, Capital Gazette, The Sun, Business Insider, AOL, GANNETT Syndication Service, Newsweek, Yahoo! News, Bloomberg, RT USA, The Crime Report, Axios, Cult of Mac, USATODAY, AppleInsider, NBC News, Wired, The Register – Security, Cyberscoop, CNET, News : NPR, iDownloadBlog.com, Fortune, WCCFtech, ZDNet Security, AppleInsider, iMore, Cult of Mac, Patently Apple, Business Insider, The Sun, BuzzFeed News, Newsweek, iDownloadBlog.com, Appleosophy, MacRumors, Homeland Security Today, Zero Hedge, CBSNews.com,TechSpot, iPhone Hacks, The Mac Observer,Cult of Mac, The Guardian, UPI.com, TIME, Ars Technica, USATODAY, New York Post, AppleInsider, The Huffington Post , Capital Gazette, TIME, Heavy.com, Engadget, Slashdot, Daily Dot, Cyberscoop, Multichannel, Vox, WCCFtech, POLITICO, The Sun, USNI News, Business Insider, Fortune, Input, TribLIVE, emptywheel, PhoneArena, Channel News Asia, RT USA, Algemeiner.com, MacDailyNews, Reuters: U.S., France 24, The New Daily, The Verge, Slashdot, Washington Post, New York Times

Tweets:@dnvolz @adamgoldmanNYT @kevincollier @nakashimae @zackwhittaker @zackwhittaker @zackwhittaker @iblametom @karaswisher @macrumors @zackwhittaker @iblametom @dotmudge @DevlinBarrett @ahmed

New York Times: F.B.I. Is Said to Find Links Between Pensacola Gunman and Al Qaeda
Wall Street Journal: FBI Discovers al Qaeda Link in Pensacola Attack
Forbes: Feds Hack iPhones In Pensacola Terrorist Shooting Case, But Still Slam Apple For Not Helping
Justice Department: Attorney General William P. Barr and FBI Director Christopher Wray Announce Significant Developments in the Investigation of the Naval Air Station Pensacola Shooting
MacRumors: FBI Reportedly Gained Access to iPhone Used by Mass Shooter in Florida After Apple Refused to Help
Associated Press: Pensacola gunman’s cellphones reveal meticulous planning for attack, FBI says
Task & Purpose: The FBI has evidence linking Al Qaeda to the NAS Pensacola shooting
Capital Gazette: Gunman accused of killing 3 sailors at Pensacola military base linked to al-Qaida, US official says
The Sun: Saudi student who shot dead 3 US sailors on Florida Naval Base ‘had been in contact with Al Qaeda’ in days before attack
Business Insider: The FBI found links to Al Qaeda after cracking the phones of the Saudi gunman who attacked a Florida naval base
AOL: Official: FBI finds link between Pensacola gunman, al-Qaida
GANNETT Syndication Service: Official: FBI finds link between NAS Pensacola gunman, al-Qaida
Newsweek: FBI Finds Florida Gunman Who Killed U.S. Sailors Was Linked to Al Qaeda After Breaking iPhone Encryption
Yahoo! News: FBI finds Al Qaeda link to Pensacola naval base shooting suspect: US official
Bloomberg: FBI Gets Into Pensacola Shooter’s iPhone, Finds an Al-Qaeda Tie
RT USA: Saudi pilot who went on gun rampage at Florida naval base linked to ‘Al-Qaeda operative’
The Crime Report: FBI Finds Link Between Pensacola Shooter, Al-Qaeda
Axios: FBI finds links between Pensacola gunman and Al Qaeda
Cult of Mac: FBI cracks alleged al-Qaida shooter’s iPhone without Apple’s help
USATODAY: Feds connect al Qaeda contacts to deadly Pensacola Naval Air Station shooting
AppleInsider: FBI breaks iPhone security to uncover Pensacola shooter & Al Qaeda link
NBCNews: FBI: Pensacola gunman prodded by al Qaeda to attack
Wired: The FBI Backs Down Against Apple—Again
The Register – Security: Attorney General: We didn’t need Apple to crack terrorist’s iPhones – tho we still want iGiant to do it in future
Cyberscoop: U.S. officials say they’ve cracked Pensacola shooter’s iPhones, blast Apple
CNET: FBI slams ‘Apple problem’ as it unlocks Pensacola shooter’s iPhones – CNET
News : NPR: FBI: New iPhone Evidence Shows Pensacola Shooter Had Ties To Al-Qaida
iDownloadBlog.com: The FBI has reportedly bypassed the security on the Pensacola mass shooter’s iPhone
Fortune: FBI: “We received effectively no help from Apple” in accessing Pensacola Shooter’s iPhones
WCCFtech: FBI Hacks Florida Shooter’s iPhones without Apple’s Help & Finds al Qaeda Link
ZDNet Security: FBI criticizes Apple for not helping crack Pensacola shooter’s iPhones
AppleInsider: Apple rejects ‘false claims’ by Justice Department regarding Pensacola investigation
iMore: Apple denies “false claims” by Justice Department over Pensacola attack
Cult of Mac: FBI attacks Apple for ‘no help’ unlocking Florida attacker’s iPhone; Apple rejects ‘false’ claims
Patently Apple: DOJ and FBI described crucial data found on the Pensacola Terrorist’s iPhones today in a news Conference, without Apple’s Assistance
Business Insider: The FBI found links to Al Qaeda after cracking the phones of the Saudi gunman who attacked a Florida naval base
The Sun: Saudi student who shot dead 3 US sailors on Florida Naval Base ‘had been in contact with Al Qaeda’ in days before attack
BuzzFeed News: The Pensacola Naval Base Shooter Had Longtime “Significant Ties” To Al-Qaeda
Newsweek: FBI Finds Florida Gunman Who Killed U.S. Sailors Was Linked to Al Qaeda After Breaking iPhone Encryption
iDownloadBlog.com: The FBI has reportedly bypassed the security on the Pensacola mass shooter’s iPhone
Appleosophy: Apple Fires Back at FBI and Attorney General William Barr Regarding Florida Shooter’s iPhone
MacRumors: FBI Reportedly Gained Access to iPhone Used by Mass Shooter in Florida After Apple Refused to Help
Task & Purpose: The FBI has evidence linking Al Qaeda to the NAS Pensacola shooting
MacRumors: Apple Calls FBI Comments on Lack of Help Unlocking Florida Shooter’s iPhone an ‘Excuse to Weaken Encryption’
SlashGear » security: Apple blasts Barr over iPhone lock “false claims” in Pensacola shooter case
Homeland Security Today: FBI: Pensacola Shooter Tied to AQAP Before Coming to the U.S., Discussed Attack
Zero Hedge: FBI Cracks Into Pensacola Shooter’s iPhone, Find “Significant Ties” To Al Qaeda
CBSNews.com: Saudi shooter in Florida air base attack had ties to al Qaeda
TechSpot: Officials still want backdoor into cellphones after cracking two iPhones without help
Yahoo! News: U.S. Supreme Court heaps more damages on Sudan in embassy bombing cases
iPhone Hacks: FBI Has Reportedly Unlocked One of the iPhones Used by Mass Shooter in Florida Last Year
The Mac Observer: FBI Bypasses Encryption on Pensacola Attacker’s iPhones
Cult of Mac: FBI cracks alleged al-Qaida shooter’s iPhone without Apple’s help
The Guardian: Pensacola gunman’s cellphones reveal meticulous planning for attack, FBI says
UPI.com: FBI: Agents unlocked phones to tie Pensacola gunman Mohammed Saeed Alshamrani to al-Qaida
TIME: Gunman in Deadly Pensacola Military Base Attack Linked to al-Qaida, FBI Says
Ars Technica: iPhone crypto hid al-Qaida link to naval base shooting, AG fumes
USATODAY: Feds connect al Qaeda contacts to deadly Pensacola Naval Air Station shooting
New York Post: FBI found al Qaeda’s link to Pensacola shooter through iPhones
AppleInsider: FBI breaks iPhone security to uncover Pensacola shooter & Al Qaeda link [u]
The Huffington Post : FBI Says It Found Links Between Pensacola Gunman And Al-Qaeda
Capital Gazette: Gunman accused of killing 3 sailors at Pensacola military base linked to al-Qaida, US official says
Stars and Stripes: FBI: Shooter at Naval Air Station Pensacola had link to al-Qaida
TIME: Gunman in Deadly Pensacola Military Base Attack Linked to al-Qaida, FBI Says
Ars Technica: iPhone crypto hid al-Qaida link to naval base shooting, AG fumes
Heavy.com: Pensacola, Florida Gunman Mohammed Alshamrani Link to Al-Qaida Found
Engadget: AG Barr seeks ‘legislative solution’ to make companies unlock phones
Daily Dot: FBI unlocks Pensacola shooter’s iPhone despite Apple’s opposition
Multichannel: AG Barr Hammers Apple in Terrorism Case Announcement
Vox: Why Attorney General Bill Barr is mad at Apple
Heavy.com: Pensacola, Florida Gunman Mohammed Alshamrani Link to Al-Qaida Found
POLITICO: Pensacola gunman was working with al Qaeda, FBI finds
USNI News: FBI Says Unlocked iPhone Messages Link NAS Pensacola Shooter to Al Qaeda; AG Barr Says Incident was ‘Act of Terrorism’
Input: FBI breaks into Pensacola shooter’s iPhone after six months, revealing al Qaeda links
TribLIVE: FBI: Shooter at Pensacola military base linked to al-Qaida
emptywheel: Bill Barr and Chris Wray Schedule a Press Conference to Admit Trump Let an Al Qaeda Terrorist onto Our Military Base
PhoneArena: Who is lying, Apple or Attorney General William Barr?
Channel News Asia: FBI phone probe links al Qaeda to Saudi who killed 3 at Florida base
RT USA: Saudi pilot who went on gun rampage at Florida naval base linked to ‘Al-Qaeda operative’
Algemeiner.com: FBI Phone Probe Links Al Qaeda to Saudi Shooter Who Killed Three at Florida Navy Base
MacDailyNews: Apple rejects ‘false claims’ by Justice Department regarding Islamic terrorist attack in Pensacola
Reuters: U.S.: FBI phone probe links al Qaeda to Saudi who killed three at Florida base, Barr says
France 24: FBI says al Qaeda linked to Saudi shooter at Florida naval base
The New Daily: FBI links al-Qaeda to US base shooting
MacDailyNews: FBI cracks iPhone encryption, links al Qaeda to Islamic terrorist who killed three at Florida naval base
MacDailyNews: Apple rejects ‘false claims’ by Justice Department regarding Islamic terrorist attack in Pensacola
CNN.com: FBI delivers to America a chilling reminder about al Qaeda
Input: FBI breaks into Pensacola shooter’s iPhone after six months, revealing al Qaeda links
The Verge: The FBI successfully broke into a gunman’s iPhone, but it’s still very angry at Apple
Washington Post: Attorney general and FBI director blast Apple after tracing Pensacola gunman’s phone to al-Qaeda
New York Times: F.B.I. Finds Links Between Pensacola Gunman and Al Qaeda

@dnvolz: Sound familiar? FBI gets into iPhone belonging to dead terrorist that they said months ago they could not unlock.
@adamgoldmanNYT: The F.B.I. found the gunman, a Saudi Air Force cadet training with the American military, had communicated with a Qaeda operative who had encouraged the attacks
@kevincollier: "Breaking encryption" on an iPhone has a specific meaning and enormous consequences. I really hope those making that claim today wouldn't do so without backing it up.
@nakashimae: FBI Director Chris Wray: "We received effectively no help from Apple" in accessing the Pensacola shooter's iPhones.
@zackwhittaker: Apple in January: "The FBI only notified us on January 6 that they needed additional assistance—a month after the attack occurred. Only then did we learn about the existence of a second iPhone associated with the investigation and the FBI's inability to access either iPhone."
@zackwhittaker: Apple also said at the time it responded to six more legal requests for information between Dec. 7 and Dec. 14, and that it provided iCloud backups, account information and transactional data for multiple accounts.
@zackwhittaker: It's not that Apple provided "effectively no help" to the FBI. It's that Apple didn't acquiesce to the wants and wishes of the government and backdoor its own devices. We almost had an entire court case about this — but the FBI bottled it.
@iblametom: New - The FBI hacks into the iPhones of Pensacola shooter, finds links to Al Qaeda. But director Chris Wray still says Apple should've helped and its delays caused real problems.
@karaswisher: Looks like the government can do what it said it could not do
@macrumors: FBI Reportedly Gained Access to iPhone Used by Mass Shooter in Florida After Apple Refused to Help https://macrumors.com/2020/05/18/fbi-reportedly-accessed-alshamrani-iphone/ by @rsgnl
@zackwhittaker: ACLU statement is extremely Nail polish "The boy who cried wolf has nothing on the agency that cried encryption."
@iblametom: Source at FBI told me they chose the wrong battle with Pensacola too... they’ve been able to get into iPhone 5 and 7 for some time.
@dotmudge: Two things: 1 - AQAP (Al Qaeda Arabian Peninsula) linked terrorist attack on US soil, and it barely makes the news cycle 2 - investigations show accessing iPhones on one-off’s continues to negate necessity to drop user crypto protections at large
@DevlinBarrett: Attorney general and FBI director crank up their encryption fight with Apple, blasting the company after agents traced data on a Pensacola gunman’s phone to al-Qaeda
@ahmed: FBI says Saudi shooter at Pensacola base was in touch with al-Qaeda leaders, accuses Apple of wasting “valuable time” by refusing to unlock his phone to investigators


May 25, 2020
Zack Whittaker / TechCrunch

Zack Whittaker / TechCrunch  
Thailand’s Largest Cell Network AIS Pulls Offline Unprotected Database Which Exposed Millions of Users’ DNS Queries and Netflow Data

Thailand’s biggest mobile operator AIS has pulled a database offline that was leaking billions of real-time internet records on millions of Thai internet users after security researcher Justin Paine discovered it unprotected without a password. The database contained DNS queries and Netflow data that could be used to reconstruct a user does in real-time. An AIS spokesperson confirmed and apologized for the security lapse after failing to respond to Paine’s attempts to contact the company and after Paine reported the apparent security lapse to Thailand’s national computer emergency response team, known as ThaiCERT.

Related: Reddit – cybersecurity, CyberSecurity Help s.r.o., Databreaches.net, Rainbowtabl.es

Tweets:@zackwhittaker @zackwhittaker @zackwhittaker @campuscodi


May 3, 2020
Zack Whittaker / TechCrunch

Zack Whittaker / TechCrunch  
Core Databases of Coronavirus Symptom Checker Developed by India’s Jio Were Exposed to the Internet Without a Password

A security lapse exposed core databases of a coronavirus symptom checker to the internet without a password, security researcher Anurag Sen discovered. The symptom checker was developed by India’s largest cell network Jio. Sen found the database on May 1, just after it was first exposed, and informed TechCrunch to notify the company. Jio quickly pulled the system offline after TechCrunch made contact. The database contains millions of logs and records starting April 17 through to the time that the database was pulled offline. The database contains millions of logs and records starting April 17 through to the time that the database was pulled offline, including vast numbers of user-generated self-test data. The database also included individual records of those who signed up to create a profile, allowing users to update their symptoms over time. These records contained the answers to each question asked by the symptom checker, including what symptoms they are experiencing, who they have been in contact with, and what health conditions they may have.

Related: Cyber Kendra, GBHackers On Security, Hindu Businessline, Databreaches.net

Tweets:@zackwhittaker @hak1mlukha


March 13, 2020
Zack Whittaker / TechCrunch

Zack Whittaker / TechCrunch  
Princess Cruises Says It Suffered Data Breach Last Year, Third Party Gained Access to Employee, Crew and Guest Personal Data

Princess Cruises, the cruise liner forced to halt its global operations after two of its ships confirmed on-board outbreaks of coronavirus, confirmed a data breach that gave unknown parties access to personal data. The breach occurred between April 11 and July 23, 2019, when, according to a company statement, an unsanctioned third party gained unauthorized access to some employee email accounts that contained personal information regarding our employees, crew, and guests. Among the data stolen were name, address, Social Security number, government identification number, such as passport number or driver’s license number, credit card and financial account information, and health-related information. The company said it has no evidence of misuse of the data but warned guests to be on the lookout for phishing emails or identity fraud threats.

May 26, 2020
Zack Whittaker / TechCrunch

Zack Whittaker / TechCrunch  
Strandhogg 2.0 Vulnerability Imitates Legit Apps to Steal Passwords, Sensitive Data and Affects Almost Every Version of Android

Security researchers have found a significant vulnerability, dubbed Strandhogg 2.0, in almost every version of Android, which lets malware imitate legitimate apps to steal app passwords and other sensitive data. The “evil twin” to an earlier bug of the same name, according to Norwegian security firm Promon, which discovered both vulnerabilities six months apart, Strandhogg 2.0 tricks a victim into thinking they’re entering their passwords on a legitimate app while instead interacting with a malicious overlay. It can also hijack other app permissions to siphon off sensitive user data, like contacts, photos, and track a victim’s real-time location. Promon and Google say they’ve found no evidence of Strandhogg 2.0’s exploitation. Promon said updating Android devices with the latest security updates will fix the vulnerability.

Related: fossBytes, ComputerWeekly: IT security, Neowin, TechNadu, Security News | Tech Times, SecurityWeek, The Hacker News, Promon

Tweets:@TheHackerNews @zackwhittaker


May 8, 2020
Jack Stubbs, Christopher Bing / Reuters

Jack Stubbs, Christopher Bing / Reuters  
Iran’s Charming Kitten Hacking Group Has Targeted Staff at Drugmaker Gilead Sciences as the Company Races to Develop COVID-19 Treatment

Hackers linked to Iran have targeted staff at U.S. drugmaker Gilead Sciences in recent weeks as the company races to develop a COVID-19 treatment, an antiviral drug called remdesivir, according to publicly-available web archives reviewed by Reuters and three cybersecurity researchers. A fake email login page designed to steal passwords was sent in April to a top Gilead executive involved in legal and corporate affairs according to an archived version of a website that searches for malicious links. The hacking infrastructure and the targeted phishing campaign used in the attempt to compromise the Gilead executive’s email account has previously been used in cyberattacks by a group of suspected Iranian hackers known as “Charming Kitten.” Iran has denied any involvement in the hacking effort.

March 27, 2020
Zack Whittaker / TechCrunch

Zack Whittaker / TechCrunch  
Cybersecurity Insurance Provider Chubb Suffered Data-Stealing Ransomware Attack Launched by Maze Group

Major cybersecurity insurance provider Chubb has itself suffered a data breach involving the unauthorized access to data belonging to an unnamed third-party. According to Brett Callow at security firm Emisoft, the security incident was a data-stealing ransomware attack launched by the Maze ransomware group. The attackers behind the incident posted a listing on their website claiming to have data stolen from Chubb in earlier in March. The listing included the names and email addresses of three senior executives, including CEO Evan Greenberg.

April 7, 2020
Zack Whittaker / TechCrunch

Zack Whittaker / TechCrunch  
Healthcare Security Startup CyberMDX Raises $20 Million in New Round of Venture Funding

U.S.-Israel healthcare security startup CyberMDX has raised $20 million in a growth round of venture financing led by Europe’s largest insurance and risk management provider Sham, a division of Relyens Group, with participation from existing investors Pitango Venture Capital and Qure Ventures. One of the more mature cybersecurity startups in the medical space, CyberMDX works primarily to secure medical devices and improve hospital network security through its cyber intelligence platform, which manages a hospital’s network-connected assets and devices, and monitors threats in real-time. CyberMDX last raised $10 million in a Series A round in July 2018, bringing its total funding to date to $30 million.

May 9, 2020
Zack Whittaker / TechCrunch

Zack Whittaker / TechCrunch  
Data Breach at U.S. Marshals Service Exposed Personal Information of Current and Former Prisoners

A data breach at the U.S. Marshals Service exposed the personal information of current and former prisoners. In a letter sent to those affected, the Justice Department notified the U.S. Marshals on December 30, 2019, of a data breach affecting a public-facing server storing personal information on current and former prisoners in its custody. The breach may have included their address, date of birth, and Social Security number.