Top 10 Cyber Incidents in April’23

Ensar Seker
10 min readMay 5, 2023

--

Cyber threats continue to grow and pose severe risks to people, businesses, and even countries as the globe becomes more linked. Several major cyber incidents made headlines around the world in April 2023. These occurrences, which range from ransomware assaults to data breaches, show how critical it is to have robust cybersecurity procedures in place. In this article, we’ll go further into some of April’s most notable cyber events, discussing their aftermath and any lessons we may draw from them.

http://ow.ly/G4ib50O7OE7
http://ow.ly/G4ib50O7OE7

Top 10 Ransomware Groups in April’23

Ransomware with Numbers in April’23

What Happened in the Dark Web in April’23?

Top 10 Threat Actors in April’23

Top 10 Cyber Incidents in April’23

Title: FBI says you shouldn’t use public phone charging stations

Summary: The Federal Bureau of Investigation (FBI) has issued a warning against using public phone charging stations. The notice was given on April 10, 2023, due to the rising risk of cyberattacks and data theft through these stations. The FBI advises people to carry their own chargers and avoid using public USB ports for charging. They also recommend using power banks or portable chargers to reduce the risk of data breaches and maintain privacy.

Title: Three Samsung employees reportedly leaked sensitive data to ChatGPT

Summary: Three Samsung employees were caught leaking sensitive company data to ChatGPT, an AI language model. The incident occurred on February 19, 2023, and involved the employees sharing confidential information with the AI, potentially compromising the company’s trade secrets. To prevent such leaks in the future, companies can invest in strengthening their cybersecurity measures, implementing strict access controls for sensitive data, and conducting regular employee training on data protection and privacy practices.

Key Points:

  • Background: OpenAI’s ChatGPT is a widely used AI language model based on the GPT-4 architecture. It is designed to generate human-like text based on given inputs. ChatGPT has previously been embroiled in controversies surrounding its potential use for disinformation and malicious purposes.
  • Leaked data: It is unclear what specific data was leaked by Samsung employees, but it is believed to include sensitive trade secrets and other confidential company information.
  • Arrests and investigation: The three accused employees have been arrested and are currently under investigation by authorities. The motive behind the leak and the extent of the damage caused to Samsung is yet to be determined.
  • Samsung’s response: The company has not provided specific details about the leaked data but expressed concern over the potential impact on its business and reputation. Samsung has also reportedly launched an internal investigation to assess the extent of the leak and prevent any further breaches of confidentiality.
  • Implications: The incident highlights the risks associated with the misuse of AI technology, particularly when combined with unauthorized access to sensitive information. As AI continues to advance, there is a growing need for improved security measures and ethical guidelines to prevent misuse and protect intellectual property.

Title: Attackers Hide RedLine Stealer Behind ChatGPT, Google, Bard, Facebook Ads

Summary: Cyber attackers have been hiding the RedLine Stealer malware behind ChatGPT, Google, Bard, and Facebook ads. The attackers leveraged these platforms to distribute the malware, compromising users’ sensitive data and credentials. To prevent such attacks in the future, companies can strengthen their security measures, invest in advanced threat detection systems, and educate users about the risks of clicking on suspicious links or downloading unknown files from the internet. Additionally, online platforms can enhance their ad review processes to identify and remove malicious content.

Key Points:

  • Malicious advertising campaigns: The attackers use malicious ads to distribute the RedLine Stealer malware. They design these ads to appear legitimate and display them on trusted platforms such as ChatGPT, Google, Bard, and Facebook Ads, making it difficult for users to identify them as threats.
  • RedLine Stealer capabilities: The malware is designed to harvest sensitive information from the victim’s device, including passwords, credit card details, and browser data. It has the ability to bypass common antivirus and security solutions, making it a dangerous threat.
  • Social engineering techniques: The attackers rely on social engineering techniques to manipulate victims into clicking on malicious ads. By leveraging the trust users have in popular platforms, the attackers can effectively reach a large number of potential victims.
  • Mitigating the threat: Security researchers recommend that users and organizations take a multi-layered approach to security, including regularly updating security infrastructure and educating users about potential threats. In addition, they suggest the use of ad blockers, which can prevent malicious ads from being displayed on users’ devices.
  • Impact on trusted platforms: The use of well-known platforms to spread malware poses a significant challenge for the platforms themselves. As cybercriminals continue to adapt their tactics, it becomes increasingly important for these platforms to invest in robust security measures and educate users about potential risks.

Title: YouTube phishing scam uses an authentic email address

Summary: A phishing scam targeting YouTube users was discovered that leverages an authentic-looking email address to trick users into providing sensitive information. The scammers sent phishing emails that appeared to come from a legitimate YouTube email address, making it harder for users to recognize the threat. To counter such scams, users are advised to be cautious of unsolicited emails, double-check the sender’s address, and avoid clicking on suspicious links. Additionally, organizations can implement security measures to detect and block phishing attempts and educate their users about potential threats.

Title: Change of tactic in DDoS attackers: Now use VPS for improved botnet attacks

Summary: In a change of tactics, DDoS attackers have started using Virtual Private Servers (VPS) to launch improved botnet attacks. This shift allows attackers to scale their attacks, making them more efficient and difficult to mitigate. Organizations should invest in advanced DDoS protection solutions to combat this new approach, monitor network traffic for unusual patterns, and establish incident response plans. Additionally, VPS providers can take proactive measures to identify and block potential threats originating from their infrastructure.

Title: Google Authenticator’s syncing security concerns

Summary: Google Authenticator, a popular two-factor authentication (2FA) app, has raised security concerns due to its syncing feature. Users and experts have expressed worries that syncing data across multiple devices could potentially expose sensitive information, such as 2FA keys, to attackers. To address these concerns, users are advised to be cautious about syncing their 2FA data across devices and consider using alternative authentication apps with stronger security measures. Additionally, Google can work to enhance the security of its Authenticator app and provide clear guidance to users about potential risks.

Key Points:

  • Google Authenticator is an app that provides 2FA. This security process requires users to verify their identity using a second method, like a one-time password, in addition to their regular password.
  • The app recently introduced a syncing feature, allowing users to sync their 2FA codes across multiple devices to simplify the authentication process. This feature is designed to make it easier for users to access their accounts if they lose or replace their primary device.
  • However, security experts have raised concerns about the syncing feature, as it could expose users to potential threats. By syncing 2FA codes across devices, it becomes easier for hackers to access a user’s account if they can breach just one device.
  • The Google Authenticator app relies on Google Drive to store and sync the 2FA codes. This dependence on Google Drive creates an additional security risk, as any breach of the user’s Google account could lead to unauthorized access to their 2FA codes.
  • Security experts recommend users protect their Google accounts with strong, unique passwords and enable 2FA for their accounts. Additionally, they advise users to consider alternative authentication apps that do not rely on cloud-based syncing to reduce the risk of unauthorized access to 2FA codes.

Title: Zaraza Bot: New malware uses Telegram for command & control

Summary: A new malware, dubbed Zaraza Bot, has been discovered, which uses the Telegram messaging platform for command and control purposes. The malware can steal sensitive information, perform DDoS attacks, and download additional payloads. To protect against this threat, organizations should invest in robust security solutions, monitor network traffic for suspicious activity, and educate employees about the risks of downloading unknown files or clicking on suspicious links. Additionally, Telegram can take measures to detect and block malicious accounts used for command and control purposes.

Title: GoldOson Android malware found in apps with over 100 million downloads

Summary: GoldOson, a new Android malware, has been discovered in apps with over 100 million downloads, putting a significant number of users at risk. The malware can steal sensitive data, display intrusive ads, and download additional malicious payloads. To protect against this threat, users should only download apps from trusted sources, keep their devices updated, and use security software. Additionally, app stores can improve their app review processes to detect and remove malicious apps before they reach users.

Key Points:

  • Security researchers at Kaspersky Lab have discovered a new Android malware named GoldOson, which has been found in multiple applications on the Google Play Store and has been downloaded over 100 million times.
  • GoldOson is a trojan that can grant hackers access to users’ devices, enabling them to steal personal and financial information.
  • The malware can also sign victims up for premium subscription services without their knowledge or consent, leading to unexpected financial charges.
  • Google has removed the identified applications from the Play Store, but users are advised to uninstall any infected apps and monitor their financial statements for unauthorized charges.
  • The discovery of Goldoson highlights the importance of users remaining vigilant and cautious when downloading apps, even from trusted sources like the Google Play Store.
  • Users are encouraged to only download apps from reputable developers, read app reviews, and check app permissions before installation to help prevent falling victim to malware attacks.

Title: LockBit for Mac: How Real Is the Risk of macOS Ransomware?

Summary: The LockBit ransomware has expanded its targets to include macOS systems, increasing the risk for Mac users. This development highlights the growing threat of macOS ransomware and the need for greater awareness and protection. Mac users should keep their systems updated, use reputable security software, and regularly back up their data to mitigate the risk of ransomware attacks. Additionally, organizations should invest in employee training and establish incident response plans to react quickly to potential threats.

Title: Google Cloud Boosts Generative AI with New LLMS Tool

Summary: Google Cloud announced the launch of their new LLMS tool, aiming to improve generative AI performance. This tool will assist in model development, optimization, and deployment while lowering energy consumption and costs. Google Cloud introduced a new tool called Layer-wise Learning and Model Sparsification (LLMS) to boost generative AI performance. This tool is designed to help develop, optimize, and deploy AI models with reduced energy consumption and cost. Developers and organizations can utilize the new LLMS tool to create more efficient AI models that require less energy and are more cost-effective. By leveraging this tool, they can optimize and deploy AI models, potentially leading to better performance and more environmentally-friendly AI solutions.

I am thrilled to announce the launch of our brand new Discord server for the CTI (Cyber Threat Intelligence) community! This server is designed to bring together CTI analysts, researchers, and enthusiasts from around the world to share knowledge, insights, and best practices. Here, you can connect with like-minded professionals, engage in discussions, ask questions, and stay up-to-date with the latest news and developments in the CTI space. Our aim is to create a vibrant and inclusive community where members can collaborate and learn from each other, and we invite you to join us on this exciting journey. So, whether you are a seasoned CTI professional or just starting in the field, come and be a part of our Discord community and take your CTI expertise to the next level!

Join us: https://discord.gg/ekwWpAQR (Valid for 7 days)

--

--

Ensar Seker
Ensar Seker

Written by Ensar Seker

Cybersecurity | Artificial Intelligence | Blockchain

No responses yet