A series of intrusions targeting Chrome browser extensions has compromised multiple companies since mid-December, experts revealed. Among the victims is Cyberhaven, a California-based data protection company. The breach, confirmed by Cyberhaven on Christmas Eve, is reportedly part of a larger campaign aimed at developers of Chrome extensions across various industries.
Cyberhaven stated it is cooperating with federal law enforcement to address the issue. Browser extensions, commonly used to enhance web browsing, can also pose risks when maliciously altered. Cyberhaven’s Chrome extension, for example, is designed to monitor and secure client data within web-based applications.
Experts identified other compromised extensions, including those involving AI and virtual private networks. Jaime Blasco, cofounder of Texas-based Nudge Security, noted that the attacks appear opportunistic, aiming to harvest sensitive data from numerous sources. Some breaches date back to mid-December, indicating an ongoing effort.
Federal authorities, including the US cyber watchdog CISA, have redirected inquiries to the affected companies. Alphabet, maker of the Chrome browser, has yet to respond to requests for comment.
AT&T and Verizon have confirmed cyberattacks linked to a Chinese hacking group known as “Salt Typhoon,” but assured the public on Saturday that their US networks are now secure. Both companies acknowledged the breaches for the first time, stating they are cooperating with law enforcement and government agencies to address the threat. AT&T disclosed that the attackers targeted a small group of individuals tied to foreign intelligence, while Verizon emphasised that the activities have been contained following extensive remediation efforts.
The attacks, described by US officials as the most extensive telecommunications hack in the nation’s history, reportedly allowed Salt Typhoon operatives to access sensitive network systems, including the ability to geolocate individuals and record phone calls. Authorities have linked the breaches to several telecom firms, with a total of nine entities now confirmed as compromised. In response, the Cybersecurity and Infrastructure Security Agency has urged government officials to transition to encrypted communication methods.
US Senators, including Democrat Ben Ray Luján and Republican Ted Cruz, have expressed alarm over the breach’s scale, calling for stronger safeguards against future intrusions. Meanwhile, Chinese officials have denied the accusations, dismissing them as disinformation and reaffirming their opposition to cyberattacks. Despite assurances from the companies and independent cybersecurity experts, questions remain about how long it will take to fully restore public confidence in the nation’s telecommunications security.
Hackers are using fake job offers from well-known crypto firms to trick victims into installing malware that grants them access to devices and wallets. According to blockchain expert Taylor Monahan, these scams begin with the hackers posing as recruiters offering high-paying roles, with salaries ranging from $200,000 to $350,000. Instead of sharing documents or software, victims are led through a series of steps to “fix” technical issues with their microphone and camera, which results in malware installation.
Monahan explained that the scam unfolds during lengthy interviews where the final step involves the victim being instructed to resolve an access issue. Following the given instructions prompts a fake browser update that compromises their system. The malware can provide attackers with backdoor access to steal crypto funds or cause other damage, and it works across Mac, Windows, and Linux platforms.
These fake recruiters approach victims on LinkedIn, freelancer platforms, and chat apps like Discord and Telegram, advertising roles at major crypto firms like Gemini and Kraken. Monahan advised those who suspect exposure to the malware to wipe their devices and urged everyone in the crypto space to remain vigilant against such tactics.
Hackers temporarily disrupted around ten official websites in Italy on Saturday, including those of the Foreign Ministry and Milan’s two airports, according to the country’s cybersecurity agency. The pro-Russian group Noname057(16) claimed responsibility on Telegram, describing the attack as a retaliation against what it called Italy’s ‘Russophobia.’
The attack, a Distributed Denial of Service (DDoS) operation, flooded networks with excessive data traffic, paralysing their functionality. Italy’s cybersecurity agency acted swiftly, mitigating the impact within two hours. A spokesperson confirmed that assistance was provided to affected institutions and companies.
Despite the disruptions, flights at Milan’s Linate and Malpensa airports were unaffected, and the airports’ mobile apps continued to operate normally, according to SEA, the company managing the airports. Authorities continue to investigate the incident, highlighting ongoing threats from cyber groups linked to geopolitical tensions.
A power provider in Siberia’s Irkutsk region has been caught illegally leasing land to crypto miners, with the plot originally designated for public utilities. The Irkutsk Region Prosecutor-General’s Office announced that the unnamed power company had facilitated the establishment of a crypto mining farm, leading to a fine of 330 thousand rubles (approximately $3,120) and an ongoing administrative case against the firm.
This case highlights the ongoing issue of illegal crypto mining in Russia, particularly in Siberia, where miners are drawn to cheap electricity and low temperatures that reduce cooling costs. However, the increased demand for power has led to grid instability and power outages in the region, prompting Moscow to implement temporary mining bans in some areas. Despite these measures, illegal mining continues to thrive, especially in Irkutsk.
Other parts of Russia, like Tyumen and the Komi Republic, are emerging as alternative hotspots for crypto mining, with new facilities being developed to attract miners. In addition to these developments, Russia’s largest industrial mining firm, BitRiver, is building a new 100MW data centre in Buryatia, set to become the largest in the Far Eastern Federal District. These moves reflect the growing demand for crypto mining infrastructure across the country, despite the regulatory challenges.
Manually created Windows 11 installer media for October and November 2024 patches could leave systems unable to install future security updates. The issue impacts USB or CD installers for version 24H2 and may affect businesses, schools, and PC enthusiasts.
Microsoft clarified that systems receiving October and November updates via Windows Update or the Update Catalog remain unaffected. However, media-created installations require rebuilding with the December 2024 update, followed by a full reinstallation. Microsoft recommends ensuring December’s patch is included in new installation media.
The company acknowledged the issue on its known problems page and is actively developing a permanent fix. Other bugs in version 24H2 have also emerged, affecting audio devices, Outlook with outdated Google Workspace Sync, and certain Ubisoft games.
New research by The Guardian reveals that ChatGPT Search, OpenAI’s recently launched AI-powered search tool, can be misled into generating false or overly positive summaries. By embedding hidden text in web pages, researchers demonstrated that the AI could ignore negative reviews or even produce malicious code.
The feature, designed to streamline browsing by summarising content such as product reviews, is susceptible to hidden text attacks—a well-known vulnerability in large language models. While this issue has been studied before, this marks the first time such manipulation has been proven on a live AI search tool.
OpenAI did not comment on this specific case but stated it employs measures to block malicious websites and is working to improve its defences. Experts note that competitors like Google, with more experience in search technology, have developed stronger safeguards against similar threats.
Indian tax authorities have uncovered a complex money laundering scheme involving hawala networks and cryptocurrency transactions in Jaipur. The investigation, triggered by raids on local wedding planners, led to the seizure of $2 million (₹20 crores) in cash and jewellery. Officials also recovered three crypto wallets linked to the operation, including one tied to a major global exchange.
The scheme involved clients making unreported cash payments exchanged for cryptocurrencies like Bitcoin and Tether through hawala operators in Gujarat and Rajasthan. Hawala, an illegal payment system, allows funds to be transferred abroad without moving money physically. Authorities believe the perpetrators exploited crypto exchanges with weak KYC policies or intermediaries to launder funds.
Records of these activities, including WhatsApp messages, emails, and spreadsheets, reveal the network extends beyond Jaipur to cities like Mumbai, Hyderabad, and Delhi. The operation also implicated resorts, hotels, and event service providers who accepted cash or bank payments. The tax department plans further raids across India to tackle tax evasion in the wedding and events industry.
Elder fraud scams are becoming increasingly sophisticated, as illustrated by a recent case where an 82-year-old woman lost her life savings to criminals posing as the FBI. After depleting her accounts, the scammers coerced her into withdrawing funds via a Bitcoin machine and kept her isolated in a hotel under the guise of ‘protection.’ Despite her family’s intervention, the scammers struck again, convincing her to hand over $20,000 by exploiting false hopes of recovering a promised reward.
Elderly individuals are prime targets for such schemes, often due to their savings, trust in others, and unfamiliarity with modern technology. Fraudsters employ tactics like intimidation, urgency, and psychological manipulation to exploit their victims. According to recent statistics, seniors lose billions annually to scams, with the emotional toll leaving many feeling ashamed and fearful.
To combat these threats, experts recommend verifying unsolicited requests, limiting personal information sharing, using strong security measures, and reporting suspicious activity. Education and vigilance are key to protecting vulnerable individuals and ensuring scammers are outsmarted.
The Indian government has launched several initiatives to strengthen consumer protection, focusing on leveraging technology and enhancing online safety. Key developments include the introduction of the AI-enabled National Consumer Helpline, the e-Maap Portal, and the Jago Grahak Jago mobile application, all designed to expedite the resolution of consumer complaints and empower citizens to make informed choices.
The government of India also highlighted the significant progress made through the three-tier consumer court system, resolving thousands of disputes this year. In the realm of e-commerce, major platforms like Reliance Retail, Tata Sons, and Zomato pledged to enhance online shopping security, reflecting the government’s commitment to ensuring consumer confidence in the digital marketplace.
The e-Daakhil Portal has been expanded nationwide, achieving 100% adoption in states like Karnataka, Punjab, and Rajasthan, making it easier for consumers to file complaints online. The Consumer Protection Authority (CCPA) is also drafting new guidelines to regulate surrogate advertising and has already taken action against 13 companies for non-compliance with existing rules.
The importance of these initiatives was underscored at the National Consumer Day event, where key officials, including Minister of State for Consumer Affairs B L Verma and TRAI Chairman Anil Kumar Lahoti, were present. The event highlighted the government’s ongoing efforts to foster a safer and more transparent consumer environment, especially in the rapidly evolving digital landscape.