Crypto influencers promote fake US treasury XRP wallet

Several high-profile crypto influencers are facing backlash after amplifying the story of a purported US Treasury XRP wallet, which has now been exposed as a scam. On 22 January, influencers shared the wallet’s details, claiming it was linked to major institutions like JPMorgan and Bank of America. The story gained momentum on social media platforms but was soon debunked through on-chain analysis, which revealed the wallet was based in the Philippines, not the US Treasury.

The fraudulent wallet, identified by the address ‘rfHhX6hA54LBqA3j7r7EnCs6qyaRK2Lyfq’, was even KYC-verified, which added to its legitimacy. Critics within the crypto community have called out influencers for spreading misinformation, citing examples of previous false claims, including one about Ripple being a Central Bank Digital Currency.

This incident highlights the increasing number of crypto-related scams, which have been rising in tandem with the popularity of social media platforms like X. Recent data shows a dramatic spike in impersonation accounts and phishing schemes, with scammers hijacking major company handles and exploiting technical vulnerabilities in blockchain systems.

The rise in crypto scams serves as a stark reminder for users to be cautious and stay vigilant online.

New scam targets jobseekers with malware

Jobseekers are being targeted by a sophisticated scam that disguises malware as interview invitations. Masquerading as legitimate offers, these fraudulent emails claim to originate from reputable companies like CrowdStrike, a cybersecurity firm. However, the links they contain redirect victims to malicious websites, leading to the download of cryptomining software.

The malware, once installed, hijacks a computer’s CPU and GPU to mine cryptocurrency. This process severely degrades system performance, causing unresponsiveness, overheating, and increased energy consumption. The software also runs covertly, making it challenging to detect until significant harm is done.

CrowdStrike has acknowledged the scam, urging jobseekers to verify recruitment emails and avoid downloading files from unknown sources. Experts advise using robust antivirus software and remaining vigilant against unsolicited links or downloads during the job application process.

As cybercriminals continually innovate, individuals must exercise caution online. Even scams aimed at exploiting system resources can pave the way for far more invasive attacks, including financial theft and personal data breaches.

Teachers fight back against AI misuse

Educators are embracing AI to tackle academic dishonesty, which is increasingly prevalent in digital learning environments. Tools like ChatGPT have made it easier for students to generate entire assignments using AI. To counter this, teachers are employing AI detection tools and innovative strategies to maintain academic integrity.

Understanding AI’s capabilities is crucial in detecting misuse. Educators are advised to familiarise themselves with tools like ChatGPT by testing it with sample assignments. Collecting genuine writing samples from students early in the semester provides a baseline for comparison, helping identify potential AI-generated work. Tools designed specifically to detect AI writing further assist in verifying authenticity.

Requesting rewrites is another effective approach when AI usage is suspected. By asking an AI tool to rewrite a suspected piece, teachers can highlight the telltale signs of machine-generated text, such as a lack of personal style and overuse of synonyms. Strong evidence of AI misuse strengthens cases when addressing cheating with students and school administrators.

The rise of AI in education underscores the need for vigilance. Teachers must balance scepticism with evidence-based methods to ensure fairness. Maintaining a collaborative and transparent approach can help foster a culture of learning over shortcuts.

Russian hackers target global officials with WhatsApp phishing campaign

Russian state-linked hackers, operating under the unit Star Blizzard, have launched a new phishing campaign targeting the WhatsApp accounts of government ministers and officials worldwide. According to Britain’s National Cyber Security Centre (NCSC), Star Blizzard, linked to Russia’s FSB spy agency, aims to undermine political trust in the UK and other similar nations.

Victims receive an email impersonating a US government official, inviting them to join a WhatsApp group. The email contains a QR code that, when scanned, links the victim’s WhatsApp account to an attacker-controlled device or WhatsApp Web, granting the hacker access to sensitive messages. Microsoft confirmed that this tactic allows hackers to exfiltrate data but did not specify whether data was successfully stolen.

The campaign has targeted individuals involved in diplomacy, defence, and Ukraine-related initiatives. This marks the latest attempt by Star Blizzard, which had previously targeted British MPs, universities, and journalists. Microsoft noted that while the campaign seemed to have wound down by November, the use of QR codes in phishing attacks, or ‘quishing,’ shows the hackers’ continued efforts to gain access to sensitive information.

WhatsApp, owned by Meta, emphasised that users should avoid scanning suspicious QR codes and should only link their accounts through official services. Experts also recommend verifying suspicious emails by contacting the sender directly through a known, trusted email address.

Telegram scammers exploit new malware tactics

Crypto scammers have increasingly turned to Telegram malware scams, with reports revealing a staggering 2,000% rise in such incidents since November. Unlike traditional phishing scams, these schemes involve fake verification bots within bogus trading, airdrop, and alpha groups, tricking users into downloading malware. Once installed, the malware allows attackers to steal passwords, crypto wallet keys, and browser data.

Security experts have noted this shift as scammers adapt to user awareness of phishing links. Malware tactics, such as fake Cloudflare verification pages and copied text injection, now dominate the landscape. Security firm Scam Sniffer highlighted that these scams target legitimate communities and rely on sophisticated social engineering to lure victims.

The consequences are severe yet difficult to measure, with $2.3 billion stolen in 2024 across 165 incidents, according to Cyvers. Whilst losses in December were lower than usual, scammers continue to evolve their methods, making these attacks increasingly challenging to counter.

Polymarket clashes with Singapore’s gambling crackdown

Polymarket, a cryptocurrency-based prediction market, has come under fire for alleged violations of Singapore’s strict gambling laws. Authorities blocked access to the platform, deeming it an unlicensed gambling site. Those who attempt to bypass restrictions risk hefty fines and jail time under the Gambling Control Act 2022.

Further criticism erupted as Polymarket allowed users to bet on tragic events like the devastating Palisades wildfire in Los Angeles. The platform’s wildfire-related betting markets have been widely condemned as unethical, with accusations of profiting from human suffering. Polymarket’s attempts to defend its actions have done little to appease public outrage.

Meanwhile, Polymarket faces intense scrutiny in the US. The FBI recently raided CEO Shayne Coplan’s residence, seizing electronic devices, while the CFTC subpoenaed Coinbase for information on the platform’s activities. Despite its rapid growth during the US elections, with record-breaking trading volumes, Polymarket now grapples with plummeting activity and mounting regulatory challenges.

French woman scammed out of €830,000 by AI-generated Brad Pitt impostor

A French interior designer, identified as Anne, has fallen victim to a sophisticated scam in which she was tricked into believing she was in a relationship with actor Brad Pitt. Over the course of a year, the scammer, using AI-generated images and fake social media profiles, manipulated Anne into sending €830,000 for purported cancer treatment after a fabricated story involving the actor’s frozen bank accounts.

The scam began when Anne received messages from a fake ‘Jane Etta Pitt,’ claiming the Hollywood star needed someone like her. As Anne was going through a divorce, the AI-generated Brad Pitt sent declarations of love, eventually asking for money under the guise of urgent medical needs. Despite doubts raised by her daughter, Anne transferred large sums, believing she was saving a life.

The truth came to light when Anne saw Brad Pitt in the media with his current partner, and it became clear she had been scammed. However, instead of support, her story has been met with cyberbullying, including mocking social media posts from groups like Toulouse FC and Netflix France. The harassment has taken a toll on Anne’s mental health, and police are now investigating the scam.

The case highlights the dangers of AI scams, the vulnerabilities of individuals, and the lack of empathy in some online responses.

Hackers breach US location data broker

A massive data breach has hit Gravy Analytics, a major US location data broker, compromising precise smartphone location data and internal company information. Hackers claim to have gained access to the company’s systems since 2018, exposing sensitive coordinates that track individuals’ movements. The stolen data includes customer details from prominent firms like Uber, Apple, and government contractors.

Gravy Analytics, through its subsidiary Venntel, has previously sold large amounts of location data to US government agencies. The breach highlights significant security lapses, with the stolen data now at risk of being sold on the dark web. The precise latitude and longitude records could put individuals, especially those in vulnerable positions, in danger.

The incident has sparked fresh scrutiny over data brokers, who often collect and sell sensitive information with little transparency. In December, the FTC moved to restrict Gravy Analytics from selling location data except in cases of national security or law enforcement. Critics argue that these companies prioritise profits over privacy and have called for stricter regulations to hold them accountable.

Drones threaten safety in high-security UK jails

The UK‘s prisons watchdog has warned that drones are becoming a serious national security threat due to a surge in the smuggling of weapons, drugs, and other contraband into high-security jails. Charlie Taylor, the chief inspector of prisons, called for immediate action from the police and government following investigations into two of England and Wales’ most dangerous prisons, HMP Manchester and HMP Long Lartin. Both facilities, holding notorious criminals and terrorism suspects, have seen an increase in illicit deliveries by drones, putting staff, inmates, and public safety at risk.

Taylor’s report highlights how gangs have exploited weaknesses in security, including the deterioration of basic anti-drone measures like protective netting and CCTV. At Long Lartin, inspectors found that large quantities of illicit items were being delivered, fueling violence and unrest among prisoners. At HMP Manchester, inmates were burning holes in windows to facilitate drone deliveries, raising concerns about potential escapes and further disruptions.

The growing use of sophisticated drones, capable of carrying large payloads and flying under the radar, has made it increasingly difficult for prison authorities to control the flow of contraband. While some prisons have deployed counter-drone technology, most do not block drones from approaching, leaving many vulnerable to this growing threat.

Prison officials are now under mounting pressure to confront this new challenge, with experts warning that the situation is a matter of national security. Taylor also highlighted the need for a more robust approach to tackling gang activity and reducing the supply of illegal items that undermine prison safety.

Norwegian data authority notified after Unacast hack

Unacast has informed Norwegian authorities of a data breach involving its subsidiary Gravy Analytics. The announcement was revealed in a notice published by Norwegian broadcaster NRK.

The breach involved a compromised web server using a misappropriated key, with some stolen files potentially containing personal data. Unacast’s legal representatives, BakerHostetler, confirmed the breach was discovered on 4 January, though the exact timing remains under investigation.

Repeated attempts to reach Unacast and its legal team for comment have gone unanswered. Norway’s data protection authority also could not be reached for further statements after business hours on Friday.

Gravy Analytics had been at the centre of online speculation last week, with experts confirming the authenticity of leaked data. Investigations into the full extent of the breach are ongoing.