Auth Lab Community

Auth Lab Weekly Security Report

The man was arrested for illegally cracking the no-fly and height limit of drones for profit

Recently in Dezhou, China, the police received reports that someone in Dezhou was suspected of buying a drone cracking certificate from a global hacker website and cracking the limitation on flying height and no-fly zone more than 100 times. The suspects have been under criminal detention.

Read More

AMD hacked to steal 450Gb of confidential data

Hacker group RansomHouse announced that it had stolen 450 GB of data from AMD. The hacker group said AMD had few security systems and many employees used simple passwords such as “password,” “123456,” or “amd123.” It is for this reason that hackers have stolen the aforementioned large amounts of data.

What the hackers demanded of AMD is currently unknown, and RansomHouse has threatened to release the data sometime in the near future unless AMD negotiates an agreement with RansomHouse and the hackers. AMD has yet to confirm the data breach, but provided RestorePrivacy with the following statement, “AMD is aware of a bad actor claiming to have stolen data from AMD and is currently investigating.”

Read More

High-risk worm is spreading through USB devices

Recently, Microsoft issued a warning that a high-risk worm is spreading through infected USB devices. Microsoft also noted that it has found the worm on hundreds of Windows networks across multiple departments, but has yet to detect any threat behavior.

Read More

HackerOne employees sell bug reports for profit

An employee of HackerOne, a well-known vulnerability public testing platform, took advantage of his job position to steal vulnerability reports submitted through the bug bounty platform to ask for cash rewards. The employee is understood to have contacted seven HackerOne customers and received bounties in a handful of disclosures.

Read More

Google patches new Chrome zero-day

Recently, Google released a security update to fix the fourth 0day in Chrome this year (CVE-2022-2294), and it has been monitored that the vulnerability has been exploited in the wild. In this regard, Google recommends that users install the latest Google Chrome update as soon as possible.

More on that, according to Google’s Threat Analysis Group (TAG), CVE-2022-0609, which was fixed in February, was exploited by North Korean-backed state hackers in the weeks before the February patch, and the earliest exploit in the wild was discovered on January 4 this year. . It was exploited by two North Korean-funded threat groups to spread malware through phishing emails, the use of fake job lures, and websites that served hidden iframes. Finally, for this vulnerability, Google recommends that users install the latest Google Chrome update as soon as possible.

Read More