Tag Archive for: form

Yogurt Heist Reveals a Rampant Form of Online Fraud


The Journal’s story reveals that cargo hijacking fraud remains a serious problem—one that cost $500 million in 2023, quadruple the year before. Victims say load board operators need to do more to verify users’ identities, and that law enforcement and regulators also need to do more to address the thefts.

Multifactor authentication (MFA) has served as a crucial safeguard against hackers for years. In Apple’s case, it can require a user to tap or click “allow” on an iPhone or Apple Watch before their password can be changed, an important protection against fraudulent password resets. But KrebsOnSecurity reports this week that some hackers are weaponizing those MFA push alerts, bombarding users with hundreds of requests to force them to allow a password reset—or at the very least, deal with a very annoying disruption of their device. Even when a user does reject all those password reset alerts, the hackers have, in some cases, called up the user and pretended to be a support person—using identifying information from online databases to fake their legitimacy—to social engineer them into resetting their password. The solution to the problem appears to be “rate-limiting,” a standard security feature that limits the number of times someone can try a password or attempt a sensitive settings change in a certain time period. In fact, the hackers may be exploiting a bug in Apple’s rate limiting to allow their rapid-fire attempts, though the company didn’t respond to Krebs’ request for comment.

Israel has long been accused of using Palestinians as subjects of experimental surveillance and security technologies that it then exports to the world. In the case of the country’s months-long response to Hamas’ October 7 massacre—a response that has killed 31,000 Palestinian civilians and displaced millions more from their homes—that surveillance now includes using controversial and arguably unreliable facial recognition tools among the Palestinian population. The New York Times reports that Israel’s military intelligence has adopted a facial recognition tool built by a private tech firm called Corsight, and has used it in its attempts to identify members of…

Source…

Thousands of Asus routers taken over by malware to form new proxy service


Thousands of old, outdated Asus routers are being targeted by a new version of “TheMoon” malware botnet, turning them into a network of devices used by a criminal residential proxy service.

Researchers from Black Lotus Labs claim the campaign started in early March 2024 and within 72 hours, compromised roughly 6,000 Asus routers. 

Source…

Russian-Ukraine: New form of warfare in the form of cyberattacks


People hold Ukraine’s national flags and placards during a demonstration, as they line up to cast ballots in a mock referendum about on whether Poland should annex Russia’s embassy in Warsaw – Copyright AFP SAUL LOEB

The Russian invasion and occupation of Ukraine is not only market by military warfare and needless fatalities. Another feature of the campaign appears to be cyberwarfare, at least in terms of Russian activities directed towards Ukrainian services with the aim of causing additional disruption.

A phishing attack has taken place, hitting various Ukrainian government agencies and the state railway (Ukrzaliznytsia). Considering the implications of this event is Joe Gallop, Cyber Threat Intelligence Manager at Cofense.

According to Gallop the likely origin of the incident was Russia: “Though there is no confirmation yet, it is likely that DolphinCape is a Russian operation, designed to interrupt Ukraine’s railway systems while Russia loses ground in the war.”

In terms of the form of attack, this was aimed at addressing so-termed ‘human factors’, according to Gallop: “Phishing, as a threat vector, targets the habits, concerns, and interests of humans. Phishing attacks are common in Ukraine, accounting for about 70 percent of all cybercrimes. In the last year, the country has been hit with various phishing attacks from Russia, including one in April from the threat actor Armageddon that baited Ukrainian and Latvian government officials with information about the Ukraine-Russian war.”

The latest attack was relatively sophisticated, notes Gallop: “The unfortunate irony in this particular attack is that the phishing emails included warnings on how to identify a kamikaze drone while unsuspecting Ukrainians remained unassuming about the real attack that was taking place.”

In terms of how these attacks work, Gallop explains: “Lure design is one of the critical components of a phishing email. Threat actors like to play the fear factor in commonplace phishing campaigns, drawing on fears raised by unpaid invoices, account security notices, IRS inquiries, termination notices, etc.”

With the specific incident, Gallop adds: “In this campaign targeting Ukrainian…

Source…

SHENGDA NETWORK TECHNOLOGY, INC. MANAGEMENT’S DISCUSSION AND ANALYSIS OR PLAN OF OPERATION (form 10-Q)


FORWARD LOOKING STATEMENTS

Statements made in this Form 10-Q that are not historical or current facts are
"forward-looking statements" made pursuant to the safe harbor provisions of
Section 27A of the Securities Act of 1933 (the "Act") and Section 21E of the
Securities Exchange Act of 1934. These statements often can be identified by the
use of terms such as "may," "will," "expect," "believe," "anticipate,"
"estimate," "approximate" or "continue," or the negative thereof. We intend that
such forward-looking statements be subject to the safe harbors for such
statements. We wish to caution readers not to place undue reliance on any such
forward-looking statements, which speak only as of the date made. Any
forward-looking statements represent management's best judgment as to what may
occur in the future. However, forward-looking statements are subject to risks,
uncertainties and important factors beyond our control that could cause actual
results and events to differ materially from historical results of operations
and events and those presently anticipated or projected. We disclaim any
obligation subsequently to revise any forward-looking statements to reflect
events or circumstances after the date of such statement or to reflect the
occurrence of anticipated or unanticipated events.



Overview of the Business


The Company was incorporated on March 14, 2018, under the laws of the State of
Nevada
. The Company’s principal business is the development of internet and
personal computer security software products. The Company is engaged in
E-Commerce business.




Results of Operations



Three Months Ended September 30, 2022, Compared to the Three Months Ended
September 30, 2021

The following table summarizes the results of our operations for the three
months ended September 30, 2022 and 2021, respectively, and provides information
regarding the dollar and percentage increase or (decrease) from the current
three-month period to the prior three-month period:



                                                                                              Percentage
                                    Three months       Three months         Increase           Increase
          ...

Source…