<?xml version="1.0" encoding="utf-8"?>
<!-- generator="FeedCreator 1.7.2" -->
<rss version="2.0">
    <channel>
        <title>Lowyat.NET: Latest topics in Security &amp;amp; Privacy</title>
        <description></description>
        <link>http://forum.lowyat.net/</link>
        <lastBuildDate>Sat, 04 Apr 2026 16:16:58 +0800</lastBuildDate>
        <generator>FeedCreator 1.7.2</generator>
        <item>
            <title>Axios npm package hacked, </title>
            <link>http://forum.lowyat.net/topic/5560033</link>
            <description>[YOUTUBE]AT7x16mqGMc[/YOUTUBE]&lt;br /&gt;&lt;br /&gt;&lt;!--QuoteBegin--&gt;&lt;div class='quotetop'&gt;QUOTE&lt;/div&gt;&lt;div class='quotemain'&gt;&lt;!--QuoteEBegin--&gt;In late March and early April 2026, the Axios npm package was the victim of a high-impact supply chain attack, while the npm registry itself was not &amp;quot;hacked&amp;quot; in the traditional sense. Instead, an attacker gained control of a lead maintainer&amp;#39;s account to publish malicious versions of the library.&lt;!--QuoteEnd--&gt;&lt;/div&gt;&lt;!--QuoteEEnd--&gt;&lt;br /&gt;&lt;br /&gt;&lt;!--QuoteBegin--&gt;&lt;div class='quotetop'&gt;QUOTE&lt;/div&gt;&lt;div class='quotemain'&gt;&lt;!--QuoteEBegin--&gt;Safe versions: Anything 1.14.0 or lower, or 0.30.3 or lower.&lt;br /&gt;&lt;br /&gt;&lt;span style='font-size:16pt;line-height:100%'&gt;&lt;span style='color:red'&gt;Malicious versions: 1.14.1 or 0.30.4&lt;/span&gt;&lt;/span&gt;&lt;!--QuoteEnd--&gt;&lt;/div&gt;&lt;!--QuoteEEnd--&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;in my case, i don&amp;#39;t have npm container running, but it does auto update image.....&lt;br /&gt;&lt;br /&gt;&lt;!--QuoteBegin--&gt;&lt;div class='quotetop'&gt;QUOTE&lt;/div&gt;&lt;div class='quotemain'&gt;&lt;!--QuoteEBegin--&gt;If a Docker image containing the malicious Axios versions (1.14.1 or 0.30.4) was downloaded but never run as a container, you are likely safe from the Remote Access Trojan (RAT) that triggers during the package&amp;#39;s execution. However, the presence of the image on your system is a significant risk that must be addressed immediately to prevent accidental activation.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;u&gt;Why You Are Likely Safe (For Now)&lt;/u&gt;&lt;br /&gt;&lt;br /&gt;    Execution-Based Trigger: The 2026 npm hack involving Axios relies on a postinstall script in the plain-crypto-js@4.2.1 dependency. This script only runs when npm install is executed—typically during a docker build or when a container starts if it&amp;#39;s configured to install dependencies at runtime.&lt;br /&gt;    Dormant Threat: If the image was pulled (downloaded) rather than built locally, and the container was never started, the malicious code remains dormant as a static file in your Docker storage. &lt;br /&gt;&lt;br /&gt;&lt;u&gt;Immediate Actions to Take&lt;/u&gt;&lt;br /&gt;Even if the container hasn&amp;#39;t run, you must sanitize your environment to ensure no one accidentally deploys it.&lt;!--QuoteEnd--&gt;&lt;/div&gt;&lt;!--QuoteEEnd--&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;using truenas&lt;br /&gt;&lt;br /&gt;so what i did was, go to truenas shell...&lt;br /&gt;&lt;br /&gt;&lt;!--c1--&gt;&lt;div class='codetop'&gt;CODE&lt;/div&gt;&lt;div class='codemain'&gt;&lt;!--ec1--&gt;Grep Search&amp;#58; If you have a long list of images, you can search for a specific ID&amp;#58;&lt;!--c2--&gt;&lt;/div&gt;&lt;!--ec2--&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;summary&lt;br /&gt;&lt;!--c1--&gt;&lt;div class='codetop'&gt;CODE&lt;/div&gt;&lt;div class='codemain'&gt;&lt;!--ec1--&gt;Find the Container ID&amp;#58;&lt;br /&gt;docker ps -a &amp;#124; grep &amp;#60;IMAGE_ID_OR_NAME&amp;#62;&lt;br /&gt;&lt;br /&gt;Remove the Container&amp;#58;&lt;br /&gt;docker rm &amp;#60;CONTAINER_ID&amp;#62;&lt;br /&gt;&lt;br /&gt;Now Delete the Image&amp;#58;&lt;br /&gt;docker rmi &amp;#60;IMAGE_ID&amp;#62;&lt;!--c2--&gt;&lt;/div&gt;&lt;!--ec2--&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;because i use dockge, i just click stop, inactivate. this releases it.&lt;br /&gt;&lt;br /&gt;then i can do the&lt;br /&gt;&lt;br /&gt;&lt;!--c1--&gt;&lt;div class='codetop'&gt;CODE&lt;/div&gt;&lt;div class='codemain'&gt;&lt;!--ec1--&gt;docker rmi -f &amp;#60;IMAGE_ID&amp;#62;&lt;!--c2--&gt;&lt;/div&gt;&lt;!--ec2--&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;then&lt;br /&gt;&lt;br /&gt;&lt;!--c1--&gt;&lt;div class='codetop'&gt;CODE&lt;/div&gt;&lt;div class='codemain'&gt;&lt;!--ec1--&gt;docker image prune -a&lt;!--c2--&gt;&lt;/div&gt;&lt;!--ec2--&gt;&lt;br /&gt;&lt;br /&gt;This removes all images that are not currently associated with a running container.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;for safest,&lt;br /&gt;&lt;br /&gt;Option 3: Nuclear Cleanup (Best for Security)&lt;br /&gt;Since you are dealing with a potential npm hack, it is safer to wipe all stopped containers and unused images at once:&lt;br /&gt;&lt;br /&gt;&lt;!--c1--&gt;&lt;div class='codetop'&gt;CODE&lt;/div&gt;&lt;div class='codemain'&gt;&lt;!--ec1--&gt;docker system prune -a&lt;!--c2--&gt;&lt;/div&gt;&lt;!--ec2--&gt;&lt;br /&gt;&lt;br /&gt;(This will ask for confirmation and then delete all stopped containers and all images not currently running.)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;lastly, for my docker compose, since i use watch towerr for auto updates, just add this to stop watch towerr from auto updating npm.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;3. Use Environment Variables (Docker Compose)&lt;br /&gt;If you use Docker Compose, add this environment variable to your Watchtower service to stop all automatic updates globally:&lt;br /&gt;yaml&lt;br /&gt;&lt;br /&gt;&lt;!--c1--&gt;&lt;div class='codetop'&gt;CODE&lt;/div&gt;&lt;div class='codemain'&gt;&lt;!--ec1--&gt;services&amp;#58;&lt;br /&gt;  watchtower&amp;#58;&lt;br /&gt;    image&amp;#58; containrrr/watchtower&lt;br /&gt;    volumes&amp;#58;&lt;br /&gt;      - /var/run/docker.sock&amp;#58;/var/run/docker.sock&lt;br /&gt;    environment&amp;#58;&lt;br /&gt;      - WATCHTOWER_MONITOR_ONLY=true&lt;!--c2--&gt;&lt;/div&gt;&lt;!--ec2--&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;can remove later once this issues dies down (or not). Or set watchtowerr to not update daily, and defer updates to every 2-3 weeks to avoid a situation like this the next time.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style='font-size:16pt;line-height:100%'&gt;&lt;span style='color:red'&gt;if you are a homelabber and u use npm for your docker container, take action NOW if you haven&amp;#39;t already&lt;/span&gt;&lt;/span&gt;  &lt;!--emo&amp;:sweat:--&gt;&lt;img src='http://static.lowyat.net/style_emoticons/default/sweat.gif' border='0' style='vertical-align:middle' alt='sweat.gif' /&gt;&lt;!--endemo--&gt;&lt;br /&gt;&lt;br /&gt;In my situation, i didn&amp;#39;t have the container actively running, so dodged a bullet narrowly. but it did make me rethink the auto update for npm that has been targeted more than once. so either a longer deferred update, or not auto update might be in order  &lt;!--emo&amp;:sweat:--&gt;&lt;img src='http://static.lowyat.net/style_emoticons/default/sweat.gif' border='0' style='vertical-align:middle' alt='sweat.gif' /&gt;&lt;!--endemo--&gt;&lt;br /&gt;&lt;br /&gt;Also this is another reminder, WHY, you need to pay close attention to how you deploy your docker containers. so it&amp;#39;s not running as root. so create a docker user, then use that for docker containers for deployment. hopefully that will limit any issues.&lt;br /&gt;&lt;br /&gt;[YOUTUBE]RxxYESQ7rW0[/YOUTUBE]&lt;br /&gt;</description>
            <author>Moogle Stiltzkin</author>
            <pubDate>Wed, 01 Apr 2026 17:28:23 +0800</pubDate>
        </item>
        <item>
            <title>android removing ability to install apk?, </title>
            <link>http://forum.lowyat.net/topic/5557675</link>
            <description>[YOUTUBE]Qfo6xdVMFmM[/YOUTUBE]&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;install apk aka sideload (i call this installing.....) seems like google will be removing the ability to install apks manually if i am not mistaken? watch the youtube.&lt;br /&gt;&lt;br /&gt;that is crazy if true. then what is the point of going android if you can&amp;#39;t do that?  &lt;!--emo&amp;:hmm:--&gt;&lt;img src='http://static.lowyat.net/style_emoticons/default/hmm.gif' border='0' style='vertical-align:middle' alt='hmm.gif' /&gt;&lt;!--endemo--&gt;  may as well go ios (which was one of the main reasons people went android to begin with).&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;so why is this bad?&lt;br /&gt;&lt;br /&gt;ok, imagine u have a project on github to install an apk. Sounds like you may not be able to use something like obtainium to install an apk from your favourite android app project. cause they are removing the ability to do so  &lt;!--emo&amp;:puke:--&gt;&lt;img src='http://static.lowyat.net/style_emoticons/default/puke.gif' border='0' style='vertical-align:middle' alt='puke.gif' /&gt;&lt;!--endemo--&gt;&lt;br /&gt;&lt;br /&gt;i hope i am misunderstanding, but i dont think i am. watch the youtube. &lt;br /&gt;&lt;br /&gt;if u r an android user, you should be very concerned. not all good apps are on googleplay. this is anti competition by forcing people to be locked into googleplay ecosystem.</description>
            <author>Moogle Stiltzkin</author>
            <pubDate>Tue, 10 Mar 2026 08:29:27 +0800</pubDate>
        </item>
        <item>
            <title>MY Internet Ads Are Hacking Your Phone Now, </title>
            <link>http://forum.lowyat.net/topic/5557371</link>
            <description>[YOUTUBE]lnaZ6bRyTF8[/YOUTUBE]&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;malvertising was always a thing... where ads load up, and u get malware. they said ads are harmless and needed to keep sites up, but at user expense.&lt;br /&gt;&lt;br /&gt;use adblockers. pfsense blocker at router better. &lt;br /&gt;&lt;br /&gt;&lt;!--QuoteBegin--&gt;&lt;div class='quotetop'&gt;QUOTE&lt;/div&gt;&lt;div class='quotemain'&gt;&lt;!--QuoteEBegin--&gt;Yes, pfBlockerNG is a powerful tool for network-wide ad blocking on the pfSense firewall. It functions by preventing your devices from connecting to known ad-serving domains and IP addresses. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;How it Blocks Ads&lt;br /&gt;&lt;br /&gt;    DNSBL (DNS Blackhole List): This feature intercepts DNS requests for ad-serving domains. If a device on your network tries to load an ad from a domain on a blocklist, pfBlockerNG prevents the connection.&lt;br /&gt;&lt;br /&gt;    IP Filtering: It can block entire ranges of IP addresses associated with malicious activity, trackers, or specific geographical regions (GeoIP).&lt;br /&gt;&lt;br /&gt;    Feeds and Lists: You can subscribe to popular, community-maintained blocklists like EasyList or The Firebog to keep your protections up to date. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Key Limitations&lt;br /&gt;&lt;br /&gt;    Encrypted Traffic (DoH/DoT): Some modern devices and browsers use DNS over HTTPS (DoH) to bypass local DNS filters. You may need to manually block known DoH servers within pfBlockerNG to ensure its effectiveness.&lt;br /&gt;&lt;br /&gt;    Same-Domain Ads (YouTube/Hulu): pfBlockerNG struggle to block ads served from the same domain as the content (e.g., YouTube video ads), as blocking the ad would also block the video itself.&lt;br /&gt;&lt;br /&gt;    Visual Layout: Unlike browser-based extensions (e.g., uBlock Origin), pfBlockerNG cannot &amp;quot;hide&amp;quot; the empty space left behind by a blocked ad; it simply prevents the content from loading. &lt;br /&gt;&lt;br /&gt;For the most comprehensive protection, many users combine pfBlockerNG with a browser-based extension for a &amp;quot;layered&amp;quot; approach. &lt;!--QuoteEnd--&gt;&lt;/div&gt;&lt;!--QuoteEEnd--&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;or router where you can use an ad filter list.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;also if possible, use ublock origin on firefox for browser.&lt;br /&gt;&lt;br /&gt;&lt;!--QuoteBegin--&gt;&lt;div class='quotetop'&gt;QUOTE&lt;/div&gt;&lt;div class='quotemain'&gt;&lt;!--QuoteEBegin--&gt;Yes, uBlock Origin prevents ads from being downloaded to your hard drive. &lt;br /&gt;&lt;br /&gt;&lt;span style='color:red'&gt;&lt;span style='font-size:14pt;line-height:100%'&gt;Unlike &amp;quot;cosmetic&amp;quot; blockers that merely hide an ad once it arrives, uBlock Origin is a network request blocker. It intercepts and cancels the request for an ad before it leaves your browser, meaning the ad data never reaches your network or your computer&amp;#39;s storage. &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;How it Protects Your Storage&lt;br /&gt;&lt;br /&gt;&lt;span style='color:red'&gt;    Network Request Blocking: When a website tries to fetch an ad, tracker, or malware from a remote server, uBlock Origin identifies that server on its blocklists and &amp;quot;nips the request in the bud&amp;quot;. This saves both bandwidth and disk space.&lt;br /&gt;&lt;br /&gt;    Preventing Local Caching: Because the ad content (images, video files, scripts) is never downloaded, it cannot be stored in your browser&amp;#39;s temporary cache files on your hard drive.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;    Efficiency: It is designed to be lightweight, using less CPU and memory than other blockers while preventing the accumulation of &amp;quot;junk&amp;quot; data from advertising scripts. &lt;br /&gt;&lt;br /&gt;Important Distinction&lt;br /&gt;&lt;br /&gt;While uBlock Origin stops the ad data from being written to your disk, the extension itself and its filter lists do occupy a small amount of space on your hard drive to function. However, this is negligible compared to the amount of data saved by blocking video ads and heavy tracking scripts over time.&lt;!--QuoteEnd--&gt;&lt;/div&gt;&lt;!--QuoteEEnd--&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;some good filterlists are like Hagezi ultimate. this is more than enough for most things  &lt;!--emo&amp;:lol:--&gt;&lt;img src='http://static.lowyat.net/style_emoticons/default/laugh.gif' border='0' style='vertical-align:middle' alt='laugh.gif' /&gt;&lt;!--endemo--&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;for ads on youtube on android, you may need to use something like newpipepipe where the ads wont load at all but you can still use youtube.&lt;br /&gt;</description>
            <author>Moogle Stiltzkin</author>
            <pubDate>Sat, 07 Mar 2026 09:20:40 +0800</pubDate>
        </item>
        <item>
            <title>Which Malaysia website support PASSKEY login?, </title>
            <link>http://forum.lowyat.net/topic/5556925</link>
            <description>I can only think of AirAsia</description>
            <author>Skylinestar</author>
            <pubDate>Tue, 03 Mar 2026 17:11:13 +0800</pubDate>
        </item>
        <item>
            <title>7zip Malware: Beware 7zip.com, </title>
            <link>http://forum.lowyat.net/topic/5555274</link>
            <description>[YOUTUBE]bpLxXH37Hs8[/YOUTUBE]&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;So how do you know whats the actual og site?&lt;br /&gt;&lt;br /&gt;well, you can go to wikipedia and search for the app, then there is the actual site linked there.&lt;br /&gt;&lt;br /&gt;And once you know the actual site, go there then ADD a bookmark star e.g. firefox. So whenever u visit the sites you verified, it would have that star to indicate it&amp;#39;s bookmarked. meaning at a glimpse you can check if it&amp;#39;s bookmarked, then you know you are at the correct site. If you don&amp;#39;t see it, be on your toes as you may have simply googled then it brought you to a fake site due to careless web browsing  &lt;!--emo&amp;:sweat:--&gt;&lt;img src='http://static.lowyat.net/style_emoticons/default/sweat.gif' border='0' style='vertical-align:middle' alt='sweat.gif' /&gt;&lt;!--endemo--&gt; &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;also in google search, the other trick is the search results at top usually will be shown as a google ad, and that usually points to some malware site which uses the same name as the app site. google doesn&amp;#39;t seem to care about that apparently  &lt;!--emo&amp;:rolleyes:--&gt;&lt;img src='http://static.lowyat.net/style_emoticons/default/rolleyes.gif' border='0' style='vertical-align:middle' alt='rolleyes.gif' /&gt;&lt;!--endemo--&gt; so just because something appears at the very top don&amp;#39;t be too trusting. check if it&amp;#39;s an advert firstly, because that is the most sus.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Or what i would suggest instead for installing apps, is to use unigetui which can download apps using winget&lt;br /&gt;&lt;a href='https://github.com/marticliment/UniGetUI' target='_blank'&gt;https://github.com/marticliment/UniGetUI&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;!--QuoteBegin--&gt;&lt;div class='quotetop'&gt;QUOTE&lt;/div&gt;&lt;div class='quotemain'&gt;&lt;!--QuoteEBegin--&gt;&lt;u&gt;How Signature &amp;amp; Integrity Checking Works&lt;/u&gt;&lt;br /&gt;&lt;br /&gt;Because UniGetUI is a &amp;quot;manager of managers,&amp;quot; it inherits the security protocols of whichever tool is actually downloading the software: &lt;br /&gt;&lt;br /&gt;    WinGet (Microsoft): Primarily uses SHA256 hash validation. When a package is submitted, Microsoft runs automated scans (including SmartScreen and static analysis) to ensure the file&amp;#39;s hash matches the one in the verified manifest. While WinGet does not strictly require every package to be digitally signed by the developer, it validates that the file has not been tampered with since its official review.&lt;br /&gt;&lt;br /&gt;    Chocolatey: Uses checksums (hashes) to verify that the installer you download is exactly what was intended. It does not mandate digital signatures for all packages but relies on maintainers to provide correct hashes.&lt;br /&gt;&lt;br /&gt;    UniGetUI Internal Integrity: Recent updates (version 3.3.1+) added self-healing mechanisms. If UniGetUI’s own executable files are corrupted or show integrity violations, the app will prompt you to reinstall itself to ensure its own safety. &lt;br /&gt;&lt;br /&gt;&lt;u&gt;Security Caveats&lt;/u&gt;&lt;br /&gt;&lt;br /&gt;    Third-Party Risk: UniGetUI, Microsoft, and Scoop do not host the software themselves; they provide the scripts to download them from third parties. Theoretically, if a third-party server is compromised, a package could be at risk if the hash isn&amp;#39;t updated accordingly.&lt;br /&gt;&lt;br /&gt;    Official Signature Check: The UniGetUI tool itself is digitally signed by its developer (Martí Climent). You can verify this by right-clicking the installer and checking the Digital Signatures tab to ensure it is authentic. &lt;br /&gt;&lt;br /&gt;Summary: UniGetUI uses checksum/hash verification via its package managers to ensure you get the correct, untampered file, but it doesn&amp;#39;t always mandate a &amp;quot;digital signature&amp;quot; from the software publisher unless that specific package manager requires it.&lt;!--QuoteEnd--&gt;&lt;/div&gt;&lt;!--QuoteEEnd--&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;So rather than go to the app site, just use unigetui, download via the winget (or the other options). That seems to be safest. It also makes updating apps easier as well. Because it will notify you on updates, and with few clicks you can immediately update all your apps on windows.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;well you could always go direct to the app site as long as you properly verified it&amp;#39;s the actual one. but updating for so many apps can be annoying since you have to do this for ALL the apps you installed. this is why i use unigetui it makes things much easier, and safer while at it.&lt;br /&gt;&lt;br /&gt;[YOUTUBE]_tLDcyMWWmQ[/YOUTUBE]&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;And just another reminder, even if you regularly update, doesn&amp;#39;t always mean you are safe. take the notepad++ issue i recently posted here&lt;br /&gt;&lt;a href='https://forum.lowyat.net/topic/5554168' target='_blank'&gt;https://forum.lowyat.net/topic/5554168&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;in that scenario, the app update mechanism was hacked into and went undetected for 6 months or so. so people who updated thinking they were safe, were not necessarily so. welcome to the insane world of the internet in 2026  &lt;!--emo&amp;:sweat:--&gt;&lt;img src='http://static.lowyat.net/style_emoticons/default/sweat.gif' border='0' style='vertical-align:middle' alt='sweat.gif' /&gt;&lt;!--endemo--&gt;  if you use the internet you have to be on-guard and read the tech news regularly least you realize too late that something is wrong.</description>
            <author>Moogle Stiltzkin</author>
            <pubDate>Sat, 14 Feb 2026 06:32:34 +0800</pubDate>
        </item>
        <item>
            <title>popular notepad++ got hacked for 6months, </title>
            <link>http://forum.lowyat.net/topic/5554168</link>
            <description>&lt;img src='https://i.imgflip.com/aj367r.jpg' border='0' alt='user posted image' /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;[YOUTUBE]uz3s401d42E[/YOUTUBE]&lt;br /&gt;&lt;br /&gt;&lt;a href='https://arstechnica.com/security/2026/02/notepad-updater-was-compromised-for-6-months-in-supply-chain-attack' target='_blank'&gt;https://arstechnica.com/security/2026/02/no...ly-chain-attack&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;so the popular notepad++ got hacked for 6 months. so if you use this app, you may want to do something about it.&lt;br /&gt;&lt;br /&gt;the dev said, update directly from the website using the latest version.&lt;br /&gt;&lt;br /&gt;other things you may want to do is kaspersky removal tool, scan. malwarebytes, scan. windows defender offline scan.&lt;br /&gt;&lt;br /&gt;in the most extreme, a clean reinstall of windows 11 (the nuclear option. why? rather than finding a needle in a hay stack, just nuke it all. then you can be sure it&amp;#39;s fixed)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;do you really need to go that far? it&amp;#39;s up to you. just know that notepad++ got compromised.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;usually the signs of a compromised system&lt;br /&gt;&lt;br /&gt;- system feels sluggish even when not doing much&lt;br /&gt;- high cpu usage? when not doing much&lt;br /&gt;- lots of network traffic&lt;br /&gt;- and other signs</description>
            <author>Moogle Stiltzkin</author>
            <pubDate>Tue, 03 Feb 2026 08:59:51 +0800</pubDate>
        </item>
        <item>
            <title>Sh0pee i am not a robot, </title>
            <link>http://forum.lowyat.net/topic/5550874</link>
            <description>IF shopee AI abuse security protection system keep showing up anti robot, that is u web browser behaviour are like a robot&lt;br /&gt;&lt;br /&gt;Until it give up&lt;br /&gt;&lt;br /&gt;and just blocked you&lt;br /&gt;&lt;br /&gt;problem solve&lt;br /&gt;&lt;br /&gt;ha ha ha&lt;br /&gt;&lt;br /&gt;vpn&lt;br /&gt;randomised mac address&lt;br /&gt;privacy web browser&lt;br /&gt;blocked tracker ads&lt;br /&gt;IPv6 EUI-64 (Extended Unique Identifier)&lt;br /&gt;&lt;br /&gt;&lt;a href='https://pictr.com/image/xT3ZRv' target='_blank'&gt;&lt;img src='https://pictr.com/images/2026/01/01/xT3ZRv.md.png' border='0' alt='user posted image' /&gt;&lt;/a&gt;</description>
            <author>JLA</author>
            <pubDate>Thu, 01 Jan 2026 07:31:39 +0800</pubDate>
        </item>
        <item>
            <title>You can&amp;#39;t fully sign out Outlook email, </title>
            <link>http://forum.lowyat.net/topic/5548918</link>
            <description>UPDATE:&lt;br /&gt;Day6 - still receive new mail notification&lt;br /&gt;&lt;br /&gt;==========&lt;br /&gt;&lt;br /&gt;TLDR:&lt;br /&gt;1. hacker got your email login info &amp;amp; signed into his/her device.&lt;br /&gt;2. you change password and sign out everywhere.&lt;br /&gt;3. hacker still receives your emails, including new ones.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;I just found out this Microsoft Outlook email security risk. you can&amp;#39;t fully &amp;quot;sign out everywhere else&amp;quot;. if someone have signed in your email on his/her devices, you are basically phucked forever.&lt;br /&gt;&lt;br /&gt;this is how you can test/reproduce:&lt;br /&gt;&lt;br /&gt;1. install outlook &lt;b&gt;app&lt;/b&gt; on your phone (I&amp;#39;m on Android) and sign in. mail is now downloaded into the phone.&lt;br /&gt;&lt;br /&gt;2. open &lt;b&gt;web&lt;/b&gt; browser, go to outlook website, sign in.&lt;br /&gt;&lt;br /&gt;3. in outlook &lt;b&gt;web&lt;/b&gt;, go to your security settings and &amp;quot;sign out everywhere&amp;quot;.&lt;br /&gt;&lt;br /&gt;4. wait for 24 hours (that&amp;#39;s what Ms said). I&amp;#39;ve tried checking new emails in the mobile &lt;b&gt;app&lt;/b&gt; within 6 hours and everything still works like normal (not being signed out yet &lt;!--emo&amp;:(--&gt;&lt;img src='http://static.lowyat.net/style_emoticons/default/sad.gif' border='0' style='vertical-align:middle' alt='sad.gif' /&gt;&lt;!--endemo--&gt; ).&lt;br /&gt;&lt;br /&gt;5. after 24 hours, check outlook &lt;b&gt;app&lt;/b&gt; again. it will tell you to sign in (this is actually false hope by Ms). of course, you can still view previously cached email. I wonder how many mails are downloaded by default.&lt;br /&gt;&lt;br /&gt;6. on the outlook &lt;b&gt;web&lt;/b&gt;, send a mail to yourself.&lt;br /&gt;&lt;br /&gt;7. outlook &lt;b&gt;app&lt;/b&gt; (despite already &amp;quot;signed out&amp;quot;) will receive this new mail, and you get notification popup. this popup shows the sender name, the email title, and the content. this is the phuck up part.&lt;br /&gt;&lt;br /&gt;many websites login send a 2FA code to email. some have titles like &amp;quot;Use code 123456 for website XX&amp;quot;. this is just plain stupid.&lt;br /&gt;&lt;br /&gt;is there any sysadmin or email expert here who can confirm when will the outlook app fully disconnect from the server (therefore stop receiving new email)?&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;inb4 use 2FA TOTP via authenticator app but that is different discussion.&lt;br /&gt;inb4 old story but never fixed:  &lt;br /&gt;&lt;a href='https://learn.microsoft.com/en-us/answers/questions/1680162/still-recieveing-new-email-notifications-despite-s' target='_blank'&gt;https://learn.microsoft.com/en-us/answers/q...tions-despite-s&lt;/a&gt;</description>
            <author>Skylinestar</author>
            <pubDate>Fri, 12 Dec 2025 08:15:21 +0800</pubDate>
        </item>
        <item>
            <title>Privacy connections manager, </title>
            <link>http://forum.lowyat.net/topic/5523127</link>
            <description>&lt;a href='https://pictr.com/image/xMR92O' target='_blank'&gt;&lt;img src='https://pictr.com/images/2025/05/15/xMR92O.md.png' border='0' alt='user posted image' /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a href='https://pictr.com/image/xMRqiY' target='_blank'&gt;&lt;img src='https://pictr.com/images/2025/05/15/xMRqiY.md.png' border='0' alt='user posted image' /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a href='https://pictr.com/image/xMRtIZ' target='_blank'&gt;&lt;img src='https://pictr.com/images/2025/05/15/xMRtIZ.md.png' border='0' alt='user posted image' /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a href='https://pictr.com/image/xMRkjr' target='_blank'&gt;&lt;img src='https://pictr.com/images/2025/05/15/xMRkjr.md.png' border='0' alt='user posted image' /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;random mac address&lt;br /&gt;ipv6 EU164&lt;br /&gt;&lt;br /&gt;private dns&lt;br /&gt;&lt;a href='https://dnscheck.tools/' target='_blank'&gt;https://dnscheck.tools/&lt;/a&gt;</description>
            <author>JLA</author>
            <pubDate>Thu, 15 May 2025 14:30:02 +0800</pubDate>
        </item>
        <item>
            <title>New PC Cannot Open Certain Websites, Websites</title>
            <link>http://forum.lowyat.net/topic/5495654</link>
            <description>Hi guys,&lt;br /&gt;&lt;br /&gt;I have just bought a new PC, I have tried Edge and Chrome, I could not open certain webistes (such as crypto exchange, movie site, japan av site). I can open all of these in my old PC no issue.&lt;br /&gt;&lt;br /&gt;May I know what would be the problem? Security Setting?&lt;br /&gt;&lt;br /&gt;Any solution?&lt;br /&gt;&lt;br /&gt;The error message = hmmm......can&amp;#39;t reach this page</description>
            <author>tkyong1</author>
            <pubDate>Thu, 21 Nov 2024 08:28:01 +0800</pubDate>
        </item>
        <item>
            <title>Enable Password-less for your Windows Account ASAP, </title>
            <link>http://forum.lowyat.net/topic/5482788</link>
            <description>&lt;a href='https://pictr.com/image/xmcWdQ' target='_blank'&gt;&lt;img src='https://pictr.com/images/2024/09/15/xmcWdQ.md.jpg' border='0' alt='user posted image' /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Just checked my mail and received ransom attempt to expose me, &lt;br /&gt;wanted me to pay 1700 USD in lite coin lol...&lt;br /&gt;&lt;br /&gt;then i got curious and checked my account login attempt, welp, they tried to bruteforce login&lt;br /&gt;just dont be lazy and enable password -less sign in now,</description>
            <author>1024kbps</author>
            <pubDate>Sun, 15 Sep 2024 01:12:45 +0800</pubDate>
        </item>
        <item>
            <title>Best VPN For Streaming, Security and Privacy</title>
            <link>http://forum.lowyat.net/topic/5454304</link>
            <description>I am looking to subscribe to a decent VPN. I have used a couple of free VPNs but they throttle the speed so much that I can’t stream. Nord VPN and Express have been recommended to me but I can’t get their sign up processes to work for me. I keep getting error messages. Can anyone recommend a good, reliable VPN that is good for streaming please?</description>
            <author>MattSally</author>
            <pubDate>Sun, 28 Apr 2024 19:47:53 +0800</pubDate>
        </item>
        <item>
            <title>if u buying sercurity app and dont wanna use card, </title>
            <link>http://forum.lowyat.net/topic/5411117</link>
            <description>when my bitdefender sub is about end soon, i looking for new security software and definitely not that shit.&lt;br /&gt;&lt;br /&gt;initially decided on getting fsecure, but online payment keep failed, call bank tell me card security code fail, which i verify is not.&lt;br /&gt;&lt;br /&gt;at the end, bought eset, no need using card, online bank transfer, no need worry fucking auto-renewal.</description>
            <author>Kravo</author>
            <pubDate>Mon, 02 Oct 2023 15:57:42 +0800</pubDate>
        </item>
        <item>
            <title>New hacking forum leaks data of 478,000, RaidForums members</title>
            <link>http://forum.lowyat.net/topic/5383144</link>
            <description>&lt;!--QuoteBegin--&gt;&lt;div class='quotetop'&gt;QUOTE&lt;/div&gt;&lt;div class='quotemain'&gt;&lt;!--QuoteEBegin--&gt;A database for the notorious RaidForums hacking forums has been leaked online, allowing threat actors and security researchers insight into the people who frequented the forum.&lt;br /&gt;&lt;br /&gt;RaidForums was a very popular and notorious hacking and data leak forum known for hosting, leaking, and selling data stolen from breached organizations.&lt;br /&gt;&lt;br /&gt;Threat actors who frequented the forum would hack into websites or access exposed database servers to steal customer information. The threat actors then attempted to sell the data to other threat actors, who use it for their campaigns, such as phishing attacks, cryptocurrency scams, or distributing malware.&lt;br /&gt;&lt;br /&gt;In many cases, if data was not sold or some time had passed, the stolen data would be leaked for free on RaidForums to gain a reputation among the community.&lt;br /&gt;&lt;br /&gt;In April 2022, the RaidForums website and infrastructure were seized in an international law enforcement operation, with the site&amp;#39;s administrator, Omnipotent, and two accomplices arrested.&lt;br /&gt;&lt;br /&gt;After Raidforums closed, users flocked to a new forum called Breached to continue trading stolen databases. However, Breached shut down in March 2023 after its founder and owner, Pompompurin, was arrested by the FBI, and the site&amp;#39;s other admin became concerned that law enforcement had access to their servers.&lt;br /&gt;&lt;br /&gt;&lt;span style='font-size:14pt;line-height:100%'&gt;RaidForums database leaked online&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Earlier this month, a forum called &amp;#39;Exposed&amp;#39; was launched, aiming to fill the void left behind by the closure of Breached, and it has quickly become popular.&lt;br /&gt;&lt;br /&gt;Today, one of the site&amp;#39;s admins, &amp;#39;Impotent,&amp;#39; leaked the RaidForums member database, exposing a wealth of information to other threat actors, researchers, and, potentially, law enforcement.&lt;br /&gt;&lt;br /&gt;BleepingComputer has seen the leaked data, and it consists of a single SQL file for the &amp;#39;mybb_users&amp;#39; table used by RaidForums&amp;#39; forum software to store registration information.&lt;br /&gt;&lt;br /&gt;This table contains the registration information for 478,870 RaidForums members, including their usernames, email addresses, hashed passwords, registration dates, and a variety of other information related to the forum software.&lt;br /&gt;&lt;br /&gt;The leaked table contains member information for users who registered between March 20th, 2015, and September 24th, 2020, likely when the database was dumped.&lt;br /&gt;&lt;br /&gt;Impotent says that some RaidForums members have been removed from the database and that it is unknown when and why the dump was originally created.&lt;br /&gt;&lt;br /&gt;BleepingComputer has confirmed that the information for numerous accounts in the database contain known registration information. Additionally, members of the Exposed forum have also confirmed that their information is in the MySQL table, indicating that the leaked table is legitimate.&lt;br /&gt;&lt;br /&gt;While it&amp;#39;s likely that the database is already in the hands of law enforcement after the forum was seized, this data could still be useful for security researchers who commonly build profiles of threat actors.&lt;br /&gt;&lt;br /&gt;Using the leaked registration information, researchers can learn more about the threat actors and potentially link them to other malicious activities.&lt;br /&gt;&lt;br /&gt;Update 5/30/23: Exposed&amp;#39;s admin, Impotent, told BleepingComputer that the RaidForums data dump was originally not meant to be public, but they decided to leak it yesterday.&lt;br /&gt;&lt;br /&gt;However, while the admin states they know where the data came from, they promised not to disclose any details about the source.&lt;br /&gt;&lt;br /&gt;Impotent says the member database table still contains 99% of the original lines, with some removed to &amp;quot;cause no drama.&amp;quot;&lt;br /&gt;&lt;br /&gt;&lt;!--QuoteEnd--&gt;&lt;/div&gt;&lt;!--QuoteEEnd--&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href='https://www.bleepingcomputer.com/news/security/new-hacking-forum-leaks-data-of-478-000-raidforums-members/' target='_blank'&gt;https://www.bleepingcomputer.com/news/secur...forums-members/&lt;/a&gt;</description>
            <author>daisiesdontdoit92</author>
            <pubDate>Wed, 31 May 2023 10:13:14 +0800</pubDate>
        </item>
        <item>
            <title>Sirius XM flaw could’ve let hackers, remotely unlock and start cars</title>
            <link>http://forum.lowyat.net/topic/5336960</link>
            <description>&lt;!--QuoteBegin--&gt;&lt;div class='quotetop'&gt;QUOTE&lt;/div&gt;&lt;div class='quotemain'&gt;&lt;!--QuoteEBegin--&gt;A vulnerability affecting Sirius XM’s connected vehicle services could’ve let hackers remotely start, unlock, locate, flash the lights, and honk the horn on cars. Sam Curry, a security engineer at Yuga Labs, worked with a group of security researchers to discover the flaw and outlined their findings in a thread on Twitter.&lt;br /&gt;&lt;br /&gt;In addition to providing a satellite radio subscription, Sirius XM also powers the telematics and infotainment systems used by a number of auto manufacturers, including Acura, BMW, Honda, Infiniti, Jaguar, Land Rover, Lexus, Nissan, Subaru, and Toyota. These systems collect a whole lot of information about your car that’s easy to overlook — and could pose potential privacy implications. Last year, a report from Vice called attention to a spy firm, called Ulysses, which collected and planned to sell over 15 billion telematics-based car locations to the US government.&lt;br /&gt;&lt;br /&gt;While telematics systems obtain data about your car’s GPS location, speed, turn-by-turn navigation, and maintenance requirements, certain infotainment setups might track call logs, voice commands, text messages, and more. All of this data allows vehicles to provide “smart” features, like automatic crash detection, remote engine start, stolen vehicle alerts, navigation, and the ability to remotely lock or unlock your car. Sirius XM offers all these features and more, and says over 12 million vehicles on the road use its connected vehicle systems.&lt;br /&gt;&lt;br /&gt;However, as Curry demonstrates, bad actors can take advantage of this system if the proper safeguards aren’t in place. In a statement to Gizmodo, Curry says Sirius XM “built infrastructure around the sending/receiving of this data and allowed customers to authenticate to it using some form of mobile app,” like MyHonda or Nissan Connected. Users can log into their accounts on these apps, which are linked to their vehicle’s VIN number, to execute commands and obtain information about their cars.&lt;br /&gt;&lt;br /&gt;It’s this system that could give bad actors access to someone’s car, Curry explains, as Sirius XM uses the VIN number linked with a person’s account to relay information and commands between the app and its servers. By creating an HTTP request to fetch a user’s profile with the VIN, Curry says he was able to obtain the vehicle owner’s name, phone number, address, and car details. He then tried executing commands using the VIN and discovered that he could remotely control the vehicle, allowing him to lock or unlock it, start the car, and perform other functions.&lt;br /&gt;&lt;br /&gt;Curry says he alerted Sirius XM of the flaw and that the company quickly patched it. In a statement to The Verge, company spokesperson Lynnsey Ross said the vulnerability “was resolved within 24 hours after the report was submitted,” adding that “at no point was any subscriber or other data compromised nor was any unauthorized account modified using this method.”&lt;br /&gt;&lt;br /&gt;Separately, Curry uncovered another flaw within the MyHyundai and MyGenesis apps that could also potentially let hackers remotely hijack a vehicle, but says he worked with the automaker to fix the issue. In a statement shared with The Verge by Hyundai spokesperson Ira Gabriel, the company confirmed that “Hyundai worked diligently with third-party consultants to investigate the purported vulnerability as soon as the researchers brought it to our attention.” It also notes that “no customer vehicles or accounts — for either Hyundai or Genesis — were accessed by others as a result of the issues raised by the researchers,” and makes it clear that its vehicles weren’t affected by the Sirius XM vulnerability.&lt;br /&gt;&lt;br /&gt;White hat hackers have found similar exploits in the past. In 2015, a security researcher uncovered an OnStar hack that could’ve let bad actors locate a vehicle remotely, unlock its doors, or start the car. Around the same time, a report from Wired showed how a Jeep Cherokee could be remotely hacked and controlled with someone at the wheel.&lt;br /&gt;&lt;!--QuoteEnd--&gt;&lt;/div&gt;&lt;!--QuoteEEnd--&gt;&lt;br /&gt;&lt;a href='https://www.theverge.com/2022/12/3/23491259/sirius-xm-hack-remotely-unlock-start-cars' target='_blank'&gt;https://www.theverge.com/2022/12/3/23491259...lock-start-cars&lt;/a&gt;</description>
            <author>daisiesdontdoit92</author>
            <pubDate>Thu, 08 Dec 2022 06:22:03 +0800</pubDate>
        </item>
        <item>
            <title>Beijing people’s facial recognition was broken, Taiwan hackers stole 1.9 million deposit</title>
            <link>http://forum.lowyat.net/topic/5292345</link>
            <description>Source: &lt;a href='https://taiwan.postsen.com/world/10810/Beijing-people%E2%80%99s-facial-recognition-was-broken-Taiwan-hackers-stole-19-million-deposits--TechNews-Technology-News.html' target='_blank'&gt;https://taiwan.postsen.com/world/10810/Beij...ology-News.html&lt;/a&gt; (and several other multiple sources)&lt;br /&gt;&lt;br /&gt;&lt;!--QuoteBegin--&gt;&lt;div class='quotetop'&gt;QUOTE&lt;/div&gt;&lt;div class='quotemain'&gt;&lt;!--QuoteEBegin--&gt; If the face recognition system can be unlocked with photos, it may indicate a huge hidden worry in the current situation where cameras are all over the place.&lt;!--QuoteEnd--&gt;&lt;/div&gt;&lt;!--QuoteEEnd--&gt;&lt;br /&gt;&lt;br /&gt;Face recognition technology is widely used by the Bank of China, and various drawbacks have emerged. The facial recognition of some people in Beijing was breached, and nearly 430,000 RMB (about NT&amp;#036;1.892 million) was withdrawn from the bank account, but the IP of the registrant was displayed in Taiwan.&lt;br /&gt;&lt;br /&gt;The latest report from China News Weekly describes what happened to Li Hong (pseudonym). The incident happened on June 19. She fell into the trap of fraudsters, her mobile phone text messages were intercepted, and her mobile phone number was set to call forwarding, so that her verification code fell into the hands of others, and she was unable to answer the bank’s confirmation call.&lt;br /&gt;&lt;br /&gt;More seriously, her “face recognition” was broken. The backstage of the China Bank of Communications system shows that when resetting the password and transferring large amounts of money, “Li Hong” performed 6 face recognition comparisons, all of which showed “successful biopsy”.&lt;br /&gt;&lt;br /&gt;But in fact, these face recognitions were not operated by Li Hong who was in Beijing. After investigation by the police, the IP address of the registrant was displayed in Taiwan, and the mobile phone model used was Motorola XT1686, which was also different from the Xiaomi Mi 8 used by Li Hong.&lt;br /&gt;&lt;br /&gt;&lt;!--SPOILER BEGIN--&gt;&lt;div class=&quot;spoilertop&quot; onClick=&quot;openClose('9c9b704ed79eb325ecd0eb9107ffa36b')&quot; style=&quot;font-weight: bold&quot;&gt;&lt;u&gt;&amp;raquo; Click to show Spoiler - click again to hide... &amp;laquo;&lt;/u&gt;&lt;/div&gt;&lt;div class=&quot;spoilermain&quot; id=&quot;9c9b704ed79eb325ecd0eb9107ffa36b&quot; style=&quot;display:none&quot;&gt;&lt;!--SPOILER END--&gt;Li Hong doubted the security of the Bank of Communications’ facial recognition system, and took the Bank of Communications to court on the grounds of a “debit card dispute”, demanding compensation. However, on June 30 this year, the Fengtai District People’s Court in Beijing rejected all Li Hong’s claims in the first instance. She is going to continue to appeal.&lt;br /&gt;&lt;br /&gt;Banks believe that they have done their due diligence. Bank of Communications Beijing Changxindian Branch stated in court that “transaction passwords, dynamic passwords and customer authentication modes that assist face recognition” meet regulatory requirements, and they are in the process of Li Hong’s transfer. , the bank gave her a risk warning. After the big data analysis of the internal system found an abnormality, it called Li Hong’s mobile phone to verify the identity of the transferor and the transfer situation.&lt;br /&gt;&lt;br /&gt;But Li Hong said that the bank claimed to have sent 22 SMS passwords and SMS risk alerts, but she only received 11 of them, and she did not receive the bank’s call. The reason behind this is that her text messages were intercepted by the scammers, and the calls were also transferred to the scammers’ mobile phones.&lt;br /&gt;&lt;br /&gt;The report quoted Lao Dongyan, an expert who has long been concerned about personal information protection and a professor at the Law School of Tsinghua University in Beijing, who pointed out, “Facial recognition was introduced by banks as a participant in risk creation, and banks benefit more from this method. , should bear the risk responsibility proportional to the benefit it receives.”&lt;br /&gt;&lt;br /&gt;She also pointed out that with the development of artificial intelligence, fraudulent methods are more high-tech, and banks should keep pace with the times so that their security technology exceeds that of criminal methods. If banks are held accountable for vulnerabilities in facial recognition technology, it will help urge banks to plug technical security loopholes and prevent possible fraud.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;The report also pointed out that the difficulty of cracking facial recognition technology is sometimes unexpectedly simple. In 2019, several primary school students in Zhejiang used photos to crack the express cabinets in residential areas and easily take other people’s express delivery. In October 2021, a team of students from Tsinghua University successfully unlocked 20 mobile phones using only face photos.&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Guo Bing, an associate professor at the School of Law and Politics of Zhejiang Sci-Tech University, believes that “photos of human faces are too easy to obtain.” If the face recognition system can be unlocked with photos, it may indicate a huge hidden worry in the current situation where cameras are all over the place.&lt;!--SPOILER DIV--&gt;&lt;/div&gt;&lt;!--SPOILER DIV--&gt;&lt;br /&gt;&lt;br /&gt;</description>
            <author>FlierMate1</author>
            <pubDate>Tue, 19 Jul 2022 19:14:26 +0800</pubDate>
        </item>
        <item>
            <title>QNAP Deadbolt, QNAP Deadbolt</title>
            <link>http://forum.lowyat.net/topic/5290985</link>
            <description>Hi , My company QNAP got deadbolt. May i know if paying the ransom 0.05 bitcoin will help us to retrieve back all the files? or is there any ways to solve the issue? thank you</description>
            <author>Vanessatan97</author>
            <pubDate>Fri, 15 Jul 2022 12:56:40 +0800</pubDate>
        </item>
        <item>
            <title>Capital One identity theft hacker, finally gets convicted</title>
            <link>http://forum.lowyat.net/topic/5284103</link>
            <description>&lt;!--QuoteBegin--&gt;&lt;div class='quotetop'&gt;QUOTE&lt;/div&gt;&lt;div class='quotemain'&gt;&lt;!--QuoteEBegin--&gt;Remember the Capital One breach?&lt;br /&gt;&lt;br /&gt;We did, though we felt sure it had happened a long time ago.&lt;br /&gt;&lt;br /&gt;Indeed, when we checked, it had: the story first broke almost three years ago, back in July 2019.&lt;br /&gt;&lt;br /&gt;At the time, the company reported:&lt;br /&gt;&lt;br /&gt;Capital One Financial Corporation announced […] that on July 19, 2019, it determined there was unauthorized access by an outside individual who obtained certain types of personal information relating to people who had applied for its credit card products and to Capital One credit card customers.&lt;br /&gt;&lt;br /&gt;And we noted that:&lt;br /&gt;&lt;br /&gt;So far, there are no details to suggest what sort of vulnerability was exploited, and therefore no indication of what has now been changed and how permanent or effective the fixes might be.&lt;br /&gt;&lt;br /&gt;Was the breach down to an unpatched security bug, poor password choice, incorrrect access control, a cloud-related configuration blunder, or what?&lt;br /&gt;&lt;br /&gt;All we knew back then was that this was a huge breach by any standards, affecting at least:&lt;br /&gt;&lt;br /&gt;100,000,000 users in the USA&lt;br /&gt;6,000,000 users in Canada&lt;br /&gt;Any consumer or small business who applied for a credit card in the previous 14 years.&lt;br /&gt;Personal data including names, addresses, zip codes, phone numbers, email addresses, dates of birth, and income.&lt;br /&gt;Some customers also lost yet more intimate personal information such as credit scores, credit limits, balances, payment history, contact information, social security numbers (SSNs) and bank account numbers.&lt;br /&gt;&lt;br /&gt;Fortunately, if that’s the right word in a case like this, “only” about 150,000 victims actually had their SSNs exposed (in the US, SSNs are effectively lifelong unique national ID numbers), meaning that about 99.9% of victims escaped that fate.&lt;br /&gt;&lt;br /&gt;The cost of the breach&lt;br /&gt;This breach cost Capital One dearly in more than one way.&lt;br /&gt;&lt;br /&gt;Even though the company was itself the victim of a cybercrime, it was ultimately hit with a &amp;#036;190,000,000 class action settlement plus an &amp;#036;80,000,000 fine from the US Office of the Comptroller of the Currency (OCC).&lt;br /&gt;&lt;br /&gt;The OCC noted:&lt;br /&gt;&lt;br /&gt;[We] took these actions based on the bank’s failure to establish effective risk assessment processes prior to migrating significant information technology operations to the public cloud environment and the bank’s failure to correct the deficiencies in a timely manner. In taking this action, the OCC positively considered the bank’s customer notification and remediation efforts.&lt;br /&gt;&lt;br /&gt;As you will notice from the OCC’s remarks above, the breach ultimately came down to poor cloud security, with data apparently exposed due to being shifted from a privately-controlled data store into the cloud.&lt;br /&gt;&lt;br /&gt;There’s no reason why a public cloud deployment can’t be done securely, of course, but the potential consequences if it isn’t are huge.&lt;br /&gt;&lt;br /&gt;A publicly visible cloud server is open to a much broader ranges of probes, attacks and hacks – what’s known in the jargon as “having a much larger and more exposed attack surface”.&lt;br /&gt;&lt;br /&gt;Intriguingly, the fact that this was a cloud-related breach was quickly revealed after Capital One notified its customers of the attack, because the alleged perpetrator was soon arrested.&lt;br /&gt;&lt;br /&gt;Cloud “anti-security” scanning&lt;br /&gt;Paige Thompson, who was 33 at the time, was accused of the attack, apparently using what you might call “anti-security” tools of her own devising to scan cloud providers for vulnerable and misconfigured services, and from there to recover access credentials, gain acccess, exfiltrate data and infiltrate malware.&lt;br /&gt;&lt;br /&gt;At the time, the US Department of Justice (DOJ) suggested that Thompson hadn’t tried to sell on the stolen data, but that she had used compromised services for what’s known as cryptojacking.&lt;br /&gt;&lt;br /&gt;That’s where crooks deliberately install cryptomining software on other people’s devices – all the way from laptops and mobile phones, through powerful gaming rigs, to physical and virtual servers.&lt;br /&gt;&lt;br /&gt;The victims end up paying for the electricity, cooling and server time, while the crimimals accumulate any cryptocurrency that gets earned in the process.&lt;br /&gt;&lt;br /&gt;Anyway, the DOJ has just announced that Thompson has now been convicted, though she will only be sentenced in September 2022:&lt;br /&gt;&lt;br /&gt;Thompson was found guilty of [w]ire fraud, five counts of unauthorized access to a protected computer and damaging a protected computer. The jury found her not guilty of access device fraud and aggravated identity theft.&lt;br /&gt;&lt;br /&gt;Using Thompson’s own words in texts and online chats, prosecutors showed how Thompson used a tool she built to scan Amazon Web Services accounts to look for misconfigured accounts. She then used those misconfigured accounts to hack in and download the data of more than 30 entities, including Capital One bank. With some of her illegal access, she planted cryptocurrency mining software on new servers with the income from the mining going to her online wallet. Thompson spent hundreds of hours advancing her scheme, and bragged about her illegal conduct to others via text or online forums.&lt;br /&gt;&lt;br /&gt;In the DOJ’s words, “Far from being an ethical hacker trying to help companies with their computer security, she exploited mistakes to steal valuable data and sought to enrich herself.”&lt;!--QuoteEnd--&gt;&lt;/div&gt;&lt;!--QuoteEEnd--&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href='https://nakedsecurity.sophos.com/2022/06/21/capital-one-identity-theft-hacker-finally-gets-convicted/#comments' target='_blank'&gt;https://nakedsecurity.sophos.com/2022/06/21...icted/#comments&lt;/a&gt;</description>
            <author>daisiesdontdoit92</author>
            <pubDate>Thu, 23 Jun 2022 00:36:50 +0800</pubDate>
        </item>
        <item>
            <title>Nintendo&amp;#39;s Big Piracy Case Is A Very Sad Story, </title>
            <link>http://forum.lowyat.net/topic/5279887</link>
            <description>There&amp;#39;s a human element to these stories that is rarely seen by the public&lt;br /&gt;&lt;!--QuoteBegin--&gt;&lt;div class='quotetop'&gt;QUOTE&lt;/div&gt;&lt;div class='quotemain'&gt;&lt;!--QuoteEBegin--&gt;Back in February, Gary Bowser—who in most media reports has been described as a ‘hacker’—was sentenced to 40 months in prison for his role in selling cheat and modification devices for Nintendo hardware. Being a court case, most of the reporting dealt only with names on a page and cold facts, but a transcript of Bowser’s sentencing hearing has just been released, giving us all a reminder that this was a very human case where the motivations, actions and outcomes were more complex than has mostly been reported.&lt;br /&gt;&lt;br /&gt;The transcript—first reported by Axios— records everything that was said at Bowser’s sentencing, including statements by his lawyer, representatives from the United States Attorney’s Office and Department of Justice, Nintendo’s General Counsel, and the judge himself.&lt;br /&gt;&lt;br /&gt;I’m not going to reprint the entire thing here, but there were a number of passages that I think paint this case in a more human light than we’d have otherwise been able to see through the lens of “Crime + Verdict” reporting. I thought these were worth sharing.&lt;br /&gt;&lt;br /&gt;This is Anand Patel from the Department of Justice, pointing out how much Bowser made during his time with the hacking group Team Xecuter after his previous business had gone bust:&lt;br /&gt;&lt;br /&gt;While he might have been an unlucky businessman, that doesn’t condone his actions here. The stipulated loss amount was the foreseeable result of the enterprise’s and Mr. Bowser’s conduct. But even if you do look at Mr. Bowser’s gain, the &amp;#036;320,000 over the course of seven years, it did provide a very comfortable lifestyle. That equates to about &amp;#036;3,800 a month, all of which was disposal income that would not have been available to him but for his involvement in the conspiracy. And you have to keep in mind that this was in the Dominican Republic, where the lifestyle is a little bit different than some of the other co-defendants in the case. That amount allowed Mr. Bowser to live a comfortable life. He bought a car, he was living in a nice apartment, after basically losing everything.&lt;br /&gt;&lt;br /&gt;These are comments from Bowser’s lawyer, explaining the kind of conditions he has been detained in since he was first arrested, and which Nintendo were only so keen to send out a congratulatory press release boasting about back in February:&lt;br /&gt;&lt;br /&gt;Your Honor, when I met with Mr. Bowser, when Mr. Sanders and I met with Mr. Bowser this morning in the lockup — it’s really interesting how you learn new things all the time, even after you have been with someone for a year — and we were just discussing the journey he took when he arrived in New Jersey, was taken into custody, and then went from one federal prison to another and ended up in Nevada. And he told me when he came in, he weighed 410 pounds — I didn’t know that he weighed that much — and by the time he got to the FDC, he was down to 320. He had lost 90 pounds. So I asked him, “Well, how did that happen?” Well, he said he wasn’t getting adequate treatment for the elephantiasis in his leg. And the one thing you have to really worry about is you have to worry about skin breakage, and when that happens, you’re very susceptible to a bad infection. He had a bad infection, they took him to a hospital in Pahrump, Nevada, and he got past that. But, you know, I asked him how he was doing this morning. He says, “Well, you know, I had this little break in my skin this morning.” I said, “Well, how are you dealing with that?” He said, “Well, I had some coffee and I made a little paste, and I’ve heard that that’s really good to take care of your skin.” And I think it just brought home for me that the physical challenges he has — they’re not life threatening; you know, the BOP will try to do the best they can to take care of him — it is a big challenge to get adequate medical care, and he has to essentially care for himself.&lt;br /&gt;&lt;br /&gt;This is a picture of a typical cell at the detention center at SeaTac. Two people live in this space. I showed this to Mr. Bowser this morning — because this is not his cell — and he said, “Well, you know, I’m in a somewhat special cell. Mine is about 18-inches wider because it’s a special cell to accommodate the wheelchair that I was using much of the time, and I get the bottom bunk because of my problem.” But there are two people here. For six months of the last 16 months, he has been locked in this sized cell, plus 18 inches, for at least 23 hours a day. During the height of COVID, they only let people out every three days to go out to take a shower for maybe a half an hour and come back. So, you know, he gets out a little bit, but this is where he spent six months.&lt;br /&gt;&lt;br /&gt;Bowser’s lawyer also took the opportunity to remind everyone that, while the defendant was commonly known now as a “hacker” thanks to news reports covering the case, his exact role with Team Xecuter was actually as a salesman and support guy:&lt;br /&gt;&lt;br /&gt;One of the things that has happened over time is that facts get embellished when we’re talking about what the group did and what Mr. Bowser’s role was, and I think it’s important to keep those two things separate. Without Mr. Bowser, this enterprise would have gone on. There would have been another Mr. Bowser. Without Mr. Chen, without Mr. Louarn [the leaders of Team Xecuter], that’s not true. Mr. Bowser was not a developer. The developers, the people who actually made these devices and fixed them when Nintendo responded to it, they were paid very handsomely, much more than Mr. Bowser. He was not a reseller. He was not one of those independent contractors who was making a lot of money for that. That being said, the comments about Mr. Bowser’s role as being significant are accurate, and we’re not disputing that.&lt;br /&gt;&lt;br /&gt;Bowser himself also took the stand, mostly to apologise to developers and publishers for his actions, but also to provide some further background as to what his 16 months in custody had been like:&lt;br /&gt;&lt;br /&gt;It has been a very traumatic experience for me getting arrested, coming here, going through this. This is my first time actually in a jail going through the court process and everything. And the amount of time I’ve spent already, 16 months in custody, a lot of that time — I spent six months, basically, locked up due to COVID. I went through all three of the COVID waves before there was even a vaccine available. I personally haven’t got the vaccine, and the reason, I am skeptical with my medical condition, how it will affect me, and I haven’t been able to actually have proper medical treatment because I haven’t been able to have a one-on-one with a doctor to see if the vaccine would be possible with my health conditions. When I first got arrested, I was 410 pounds. I had to use a wheelchair. I spent my life drinking, since I was age 15, after my mom died, and this is the longest time I have been sober in my life.&lt;br /&gt;&lt;br /&gt;This is Nintendo’s General Counsel Ajay Singh, repeating the same fallacy you always see in piracy cases—the false equivalence that every pirated game equals a lost sale, which is simply not true—before getting to the real meat of Nintendo’s pursuit: he claims that Team Xecuter, the group Bowser was part of, had been such a pain in Nintendo’s ass that the company had to release entirely new models of hardware, which seems like a much more likely motivating factor in this lawsuit than the games themselves:&lt;br /&gt;&lt;br /&gt;With respect to Nintendo, the defendant and the government have stipulated to damages greater than &amp;#036;65 million. On top of that, Nintendo has spent enormous resources trying to stop Team Xecuter. We have been working on this for decades — well, at least for a decade, I would say. Nintendo has had to update its hardware to prevent Team Xecuter devices from working. That included releasing a new version of our console. It has also spent significant resources on software updates and, of course, on IP enforcement around the world.&lt;br /&gt;&lt;br /&gt;And finally, here is the judge sentencing Bowser, saying that he’s somehow going hard on the defendant (by “sending a message”) while also simultaneously going easy on him (by saying under “normal circumstances” he would be sent to prison for “five years”):&lt;br /&gt;&lt;br /&gt;...I always tell the jurors, “Your role is not to send a message. Your role is to decide guilt or innocence on the facts.” But my role sometimes does entail sending a message. For a long time, you know, white-color crime was considered not real crime and it flourished. We, in this community, still remember the Washington Mutual Bank disaster where nobody went to prison, nobody went to jail, nobody got criminally prosecuted, for what should have been serious criminal offenses. And when people do start getting charged with things, it does have an impact and provides general deterrence that this is not a joke, these are serious criminal offenses, with real victims and significant financial impacts on communities. So I think there is a role to be played here in terms of a message being sent out, and I want the message to be clear that, under normal circumstances, I would send Mr. Bowser to prison for five years. I don’t want to send any kind of mixed message to France. If Mr. Louarn [a more prominent figure in the piracy scene] comes in front of me for sentencing, he may very well be doing double-digit years in prison for his role and his involvement, and the same with the other individual. But we do have a situation here where Mr. Bowser, as terrible as his crimes were, is the least culpable of the three, and he has serious medical issues and challenges, and he’s been incarcerated under very difficult conditions for a significant period of time. So taking all of those things into consideration, I’m going to agree with Ms. Whaley here that a 40-month sentence is appropriate, and I will impose the 40 months.&lt;br /&gt;&lt;br /&gt;None of this changes the fundamentals of the story, or Bowser’s guilt. The man committed a crime, knows he did and has been punished for it. But like I said, it does provide some context for the events beyond “man does crime,” and maybe helps show that cases like this are more complicated than press releases sent out by Nintendo and federal authorities are capable of getting across.&lt;!--QuoteEnd--&gt;&lt;/div&gt;&lt;!--QuoteEEnd--&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href='https://kotaku.com/nintendo-piracy-case-bowser-xecuter-team-prison-pirate-1849026479' target='_blank'&gt;https://kotaku.com/nintendo-piracy-case-bow...rate-1849026479&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;</description>
            <author>daisiesdontdoit92</author>
            <pubDate>Fri, 10 Jun 2022 01:21:08 +0800</pubDate>
        </item>
        <item>
            <title>Cybercriminals Are More Likely Than Ever, To Get Caught</title>
            <link>http://forum.lowyat.net/topic/5278843</link>
            <description>&lt;!--QuoteBegin--&gt;&lt;div class='quotetop'&gt;QUOTE&lt;/div&gt;&lt;div class='quotemain'&gt;&lt;!--QuoteEBegin--&gt;Cyberattacks have become so common and costly that it has been easy to feel like cybercriminals are getting away with murder. But the truth is somewhat less glamorous — for the criminals — with authorities reporting dozens of high-profile takedowns this year alone.&lt;br /&gt;&lt;br /&gt;If you’re prepared to do the crime, the old saying goes, you’d better be prepared to do the time — and, as the ever-growing list of takedowns on Cybercrime Magazine’s Hack Blotter has shown, many cybercriminals are doing just that after being tracked down online and in the real world.&lt;br /&gt;&lt;br /&gt;And while ransomware may have become big business for cybercriminals — global ransomware damages are predicted to exceed &amp;#036;265 billion by 2031, according to Cybersecurity Ventures — but authorities have gotten better at disrupting the campaigns and identifying their perpetrators.&lt;br /&gt;&lt;br /&gt;In mid-January, for one, Ukrainian authorities arrested five members of a Kyiv-based ransomware gang that had made more than &amp;#036;1 million infecting over 50 companies in Europe and the Americas.&lt;br /&gt;&lt;br /&gt;A day later, reports came in that Russian authorities had launched a massive operation across 25 locations — at the request of US authorities — to shut down REvil, an aggressive ransomware criminal group responsible for compromising targets including meat processor JBS and Colonial Pipeline.&lt;br /&gt;&lt;br /&gt;That attack had a chilling effect in the ransomware community, where reports of unusual US-Russian cooperation had many cybercriminals concerned they were no longer safe within Russia’s borders.&lt;br /&gt;&lt;br /&gt;Neither was 16-year-old Nikita Uvarov, who was arrested and imprisoned for five years by Russian authorities who alleged his construction of a Minecraft version of FSB headquarters constituted “training for terrorist activities.”&lt;br /&gt;&lt;br /&gt;Video games were also no longer fun and games for Gary Bowser, a hacker who was imprisoned for over three years for selling devices that enabled customers to play pirated video games on a variety of consoles.&lt;br /&gt;&lt;br /&gt;Ransomware gang affiliate Sebastien Vachon-Desjardins was sentenced to seven years’ imprisonment after being implicated in 17 ransomware attacks that caused over &amp;#036;2.8 million in damages in Canada, while US authorities charged four Russian hackers for running a campaign of cyber attacks against global oil, gas, and nuclear power organizations around the world.&lt;br /&gt;&lt;br /&gt;Thanks to better collaboration around the world, cybercriminal investigations are now reaching every corner of the globe — as with Interpol’s December takedown of a Nigerian business email compromise (BEC) gang that had been hoarding victim credentials and targeted more than 50,000 organizations.&lt;br /&gt;&lt;br /&gt;Airport authorities are proving highly effective at nabbing wanted persons as they transit into and out of the US, with Simon &amp;amp; Schuster UK employee Filippo Bernardini arrested at New York’s JFK airport in January after using identity fraud and email addresses with typos to trick authors into sending him hundreds of unpublished book manuscripts.&lt;br /&gt;&lt;br /&gt;Meanwhile, a 14-year-old Croatian was arrested for hacking communication company Tele Operator A1 and stealing around 10 percent of its user data. Seven UK teenagers were arrested for being part of the Lapsus&amp;#036; hacking group, while an Estonian man was imprisoned for more than five years after being convicted of at least 13 ransomware attacks costing victims around &amp;#036;53m.&lt;br /&gt;&lt;br /&gt;Corrupt government employees were also being picked up left, right and center — including a US Department of Defense employee who used other people’s identities to secure over &amp;#036;244,500 in loans, and the wife of a US Navy engineer who conspired with her husband to sell secret data about nuclear submarine programs to a foreign government.&lt;br /&gt;&lt;br /&gt;And the horse you logged in on&lt;br /&gt;&lt;br /&gt;As well as arresting the people committing ransomware offenses, authorities are also getting better at taking down the infrastructure they rely on — including an underground VPN provider called VPNLab.net shut down by Europol — and investigating the low-level mechanisms used to hide the proceeds of cybercrime.&lt;br /&gt;&lt;br /&gt;Law enforcement agencies are also refining their techniques for identifying the operators of supposedly-hidden dark web sites, with Canadian authorities shutting down a dark web marketplace called Canadian HeadQuarters that marketed malware services — and fined its operators more than &amp;#036;300,000.&lt;br /&gt;&lt;br /&gt;The international composition of authorities like Interpol — which has 194 member countries — has proven uniquely valuable for investigating online cybercrime, which rapidly and regularly spans international borders and is suited to multi-agency investigations.&lt;br /&gt;&lt;br /&gt;“I’m viewed as someone from Interpol who is neutral,” Interpol director of cybercrime Craig Jones told Cybercrime Magazine, noting that cybercrime “is a transactional crime type and we need global solutions to this.”&lt;br /&gt;&lt;br /&gt;Thanks to Interpol’s remit, Jones said, “I can go into any of our 194 member countries, and I’m working on behalf of Interpol — and our only aim is around prevention of crime.”&lt;br /&gt;&lt;br /&gt;“It doesn’t matter who a threat actor is,” he said. “If the threat actors are causing harm to a community, using a prevention methodology we can then prevent crimes — whether it’s drug smuggling or cybercrime.”&lt;br /&gt;&lt;br /&gt;Increasing global collaboration has also helped authorities improve their pursuit of cryptocurrency thieves, thanks to improved methods for tracing criminal transactions across the blockchain.&lt;br /&gt;&lt;br /&gt;In January, for example, authorities indicted the former operator of cryptocurrency exchange Cryptsy for embezzling over &amp;#036;1 million in cryptocurrency from its users.&lt;br /&gt;&lt;br /&gt;Justice Department authorities seized more than &amp;#036;3.6 billion worth of cryptocurrency that had been stolen from Hong Kong cryptocurrency exchange Bitfinex in 2016, arresting two suspects for trying to launder the money.&lt;br /&gt;&lt;br /&gt;UK authorities recovered &amp;#036;5.4 million in cryptocurrency funds stolen from victims in a cryptocurrency scam, while the founder of Indian cryptocurrency exchange BitConnect was charged over a Ponzi scheme that took &amp;#036;2.4 billion from investors to whom he promised “substantial profits and guaranteed returns.”&lt;br /&gt;&lt;br /&gt;Sometimes authorities use roundabout methods to convict cybercriminals — such as an action by Her Majesty’s Revenue and Customs to seize numerous NFTs from suspects that used fake identities and shell companies to avoid &amp;#036;1.8 million in value-added taxes on the NFTs.&lt;br /&gt;&lt;br /&gt;“It might be that in a geopolitical sense, some countries are not able to have those conversations or carry out those investigations directly,” he said.&lt;br /&gt;&lt;br /&gt;“That’s where Interpol steps into that space as a neutral organization on the crime side, and helping to be that neutral interlocutor between those countries. If we get the prevention piece right, then that will negate the crimes and the impact on our communities effectively.”&lt;!--QuoteEnd--&gt;&lt;/div&gt;&lt;!--QuoteEEnd--&gt;&lt;br /&gt;&lt;a href='https://cybersecurityventures.com/cybercriminals-are-more-likely-than-ever-to-get-caught/' target='_blank'&gt;https://cybersecurityventures.com/cybercrim...-to-get-caught/&lt;/a&gt;</description>
            <author>daisiesdontdoit92</author>
            <pubDate>Tue, 07 Jun 2022 03:33:09 +0800</pubDate>
        </item>
    </channel>
</rss>
