Like full implications of Texas abortion law SB 8 comes into play, Internet infrastructure companies have become an unlikely focal point. Several hosting and domain registration providers have refused to offer services to an abortion “whistleblower” site for violating the terms of use related to the collection of data on third parties. The site, which aims to collect advice from people who have had, performed or facilitated abortions in Texas, has been down for more than a week.

Meanwhile, like Apple grappling with controversy on his proposal, but now on break– plans to scan iPhones for child pornography, WhatsApp moved this week to close its biggest end-to-end encryption flaw. The ubiquitous secure communication platform can’t peek at your messages at any point in their digital journey, but if you back up your chats to a third-party cloud service, like iCloud or Google Cloud, the messages are no longer end-to-end. end. end encrypted. With smart cryptography, the service was finally able to devise a method to encrypt the backup before it was sent to the cloud for storage.

After handing over an activist’s IP address to law enforcement, secure messaging service ProtonMail said this week that it was update its policies to specify the customer metadata that it may be legally compelled to collect. The service pointed out, however, that the actual content of emails sent to the platform is still end-to-end encrypted and unreadable, even to ProtonMail itself.

And 20 years after the attacks of September 11, 2001, privacy researchers still contemplate the continuation of the tragedy influence on attitudes towards surveillance in the USA.

But wait, there is more! Each week, we put together all the security news that WIRED hasn’t covered in depth. Click on the titles to read the full stories and stay safe.

Russian tech giant Yandex said this week that in August and September it was hit by the biggest denial of service or DDoS attack on the internet on record. The flood of unwanted traffic, destined to overwhelm and destroy systems, peaked on September 5, but Yandex successfully defended even against this larger roadblock. “Our experts were able to fend off a record attack of nearly 22 million requests per second,” the company said in a statement. “This is the biggest known attack in Internet history. “

A Russian national who believed to be working with the notorious TrickBot malware gang was arrested last week at Seoul International Airport. Known only as Mr. A in local media, the man was attempting to fly to Russia after spending more than a year and a half in South Korea. After arriving in February 2020, Mr. A was trapped in Seoul due to international travel restrictions linked to the COVID-19 pandemic. Meanwhile, his passport expired and Mr. A had to find an apartment in Seoul while working with the Russian Embassy on a replacement. At the same time, US law enforcement has opened an investigation into TrickBot’s activity, particularly related to a botnet the group developed and used to help a wave of ransomware attacks in 2020. Over the course of l ‘investigation, officials have gathered evidence of Mr. A’s alleged work with TrickBot, including the possible 2016 development of a malicious browser tool.

A bug in the UK version of the McDonald’s Monopoly VIP game exposed usernames and passwords from the game’s databases to all winners. The flaw caused data to be displayed on the game’s production and staging servers in award emails. The information exposed included the details and credentials of the Microsoft Azure SQL database. A winner who received the credentials likely could not have logged into the production server due to a firewall, but could have accessed the staging server and potentially enter the winning codes to redeem more prizes .

Hackers have released 500,000 Fortinet VPN IDs, usernames and passwords, apparently collected from vulnerable devices last summer. The bug they exploited to collect the data has since been patched, but some of the stolen credentials may still be valid. This would allow malicious actors to connect to organizations’ Fortinet VPNs and access their networks to install malware, steal data, or launch other attacks. The data dump, posted by a known branch of a ransomware gang called “Orange”, has been released for free. “CVE-2018-13379 is an old vulnerability that was resolved in May 2019,” Fortinet said in a statement to Beeping computer. “If customers haven’t, we urge them to immediately implement the upgrade and mitigation measures. “

More great WIRED stories



Please enter your comment!
Please enter your name here