A massive data breach has hit Gravy Analytics, a major US location data broker, compromising precise smartphone location data and internal company information. Hackers claim to have gained access to the company’s systems since 2018, exposing sensitive coordinates that track individuals’ movements. The stolen data includes customer details from prominent firms like Uber, Apple, and government contractors.
Gravy Analytics, through its subsidiary Venntel, has previously sold large amounts of location data to US government agencies. The breach highlights significant security lapses, with the stolen data now at risk of being sold on the dark web. The precise latitude and longitude records could put individuals, especially those in vulnerable positions, in danger.
The incident has sparked fresh scrutiny over data brokers, who often collect and sell sensitive information with little transparency. In December, the FTC moved to restrict Gravy Analytics from selling location data except in cases of national security or law enforcement. Critics argue that these companies prioritise profits over privacy and have called for stricter regulations to hold them accountable.
The UK‘s prisons watchdog has warned that drones are becoming a serious national security threat due to a surge in the smuggling of weapons, drugs, and other contraband into high-security jails. Charlie Taylor, the chief inspector of prisons, called for immediate action from the police and government following investigations into two of England and Wales’ most dangerous prisons, HMP Manchester and HMP Long Lartin. Both facilities, holding notorious criminals and terrorism suspects, have seen an increase in illicit deliveries by drones, putting staff, inmates, and public safety at risk.
Taylor’s report highlights how gangs have exploited weaknesses in security, including the deterioration of basic anti-drone measures like protective netting and CCTV. At Long Lartin, inspectors found that large quantities of illicit items were being delivered, fueling violence and unrest among prisoners. At HMP Manchester, inmates were burning holes in windows to facilitate drone deliveries, raising concerns about potential escapes and further disruptions.
The growing use of sophisticated drones, capable of carrying large payloads and flying under the radar, has made it increasingly difficult for prison authorities to control the flow of contraband. While some prisons have deployed counter-drone technology, most do not block drones from approaching, leaving many vulnerable to this growing threat.
Prison officials are now under mounting pressure to confront this new challenge, with experts warning that the situation is a matter of national security. Taylor also highlighted the need for a more robust approach to tackling gang activity and reducing the supply of illegal items that undermine prison safety.
Unacast has informed Norwegian authorities of a data breach involving its subsidiary Gravy Analytics. The announcement was revealed in a notice published by Norwegian broadcaster NRK.
The breach involved a compromised web server using a misappropriated key, with some stolen files potentially containing personal data. Unacast’s legal representatives, BakerHostetler, confirmed the breach was discovered on 4 January, though the exact timing remains under investigation.
Repeated attempts to reach Unacast and its legal team for comment have gone unanswered. Norway’s data protection authority also could not be reached for further statements after business hours on Friday.
Chinese state-sponsored hackers, identified as the Salt Typhoon group, have breached multiple US telecommunications companies, including AT&T, Verizon, Charter Communications, and T-Mobile. These cyber-espionage operations exploited vulnerabilities in network devices from vendors such as Fortinet and Cisco Systems.
US National Security Adviser Jake Sullivan has stated that the United States has taken steps in response to these intrusions, sending clear messages to China about the consequences of disrupting American critical infrastructure.
The breaches have raised significant concerns about national security and the resilience of US critical infrastructure against sophisticated cyber threats. While companies like AT&T and Verizon have reported that their networks are now secure and are collaborating with law enforcement, the extent and impact of these breaches continue to be scrutinised.
China has denied involvement in these cyber activities, accusing the United States of disseminating disinformation. Nonetheless, the revelations have intensified discussions about the need for enhanced cybersecurity measures to protect sensitive communications and infrastructure from state-sponsored cyber espionage.
Litecoin’s X social media account fell victim to hackers on 11 January, briefly promoting a fake Litecoin token on the Solana network. The fraudulent post included a contract address and scam link but was deleted after Litecoin regained control of the account. According to the Litecoin team, the breach occurred due to a compromised delegated account, which has since been removed.
This incident highlights a troubling trend of account hacks on X, with scammers exploiting high-profile accounts to promote fake tokens and phishing links. Victims in recent months include EigenLayer, Wiz Khalifa, the Cardano Foundation, and Yat Siu, co-founder of Animoca Brands. Each hack involved fraudulent campaigns, some generating significant trading volumes before being uncovered.
As scams on social media platforms rise, users are urged to exercise caution and verify information before engaging with any token promotions.
OpenSea users are facing increased risks after over 7 million email addresses were exposed in a data breach dating back to 2022. The breach occurred when an employee of Customer.io, OpenSea’s email delivery partner, mishandled user data, sharing email addresses with an unauthorised third party. This data includes the emails of major figures in the crypto world, raising concerns about potential phishing attacks and scams.
Blockchain security expert 23pds highlighted the growing threat, warning that the leaked information had been circulated multiple times before becoming public. OpenSea had previously alerted users about phishing risks following the breach, advising them to be cautious with email links and attachments.
Phishing scams targeting OpenSea users have been a persistent issue, with attackers using fake websites and fraudulent email campaigns to exploit vulnerabilities. One such scam in January 2024 promised exclusive access to an NFT event, only to direct victims to a malicious site designed to steal funds and wallet information.
Experts continue to advise users to stay vigilant, verify email sources, enable two-factor authentication, and never share sensitive wallet details to protect themselves from ongoing phishing threats.
Education technology provider PowerSchool has suffered a major data breach, exposing the personal information of millions of students and teachers. Hackers gained access to its systems by exploiting stolen credentials, using a tool within the company’s PowerSource support portal to export sensitive data.
The stolen records include names, addresses, and potentially more sensitive details such as Social Security numbers and medical information in the US and Canada. PowerSchool, which manages academic records for over 60 million K-12 students, assured customers that not all users were affected. However, the breach has left schools scrambling to assess the damage.
PowerSchool insists the hack wasn’t due to a flaw in its software but was a result of unauthorised access using legitimate credentials. The company has engaged cybersecurity experts to investigate and taken steps to improve security, including deactivating compromised accounts and strengthening password controls.
Critics argue that PowerSchool was slow to inform customers, potentially putting students, parents, and educators at greater risk of identity theft. While PowerSchool is offering affected users credit monitoring and identity protection services, the incident has sparked calls for stricter regulations on data security in the education sector.
President Joe Biden is preparing to introduce a new executive order aimed at strengthening cybersecurity standards for federal agencies and contractors. The proposed measures address growing threats from Chinese-linked cyber operations and criminal cyberattacks, which have targeted critical infrastructure, government emails, and major telecom firms. Under the draft order, contractors must adhere to stricter secure software development practices and provide documentation to be verified by the Cybersecurity and Infrastructure Security Agency (CISA).
The order highlights vulnerabilities exposed by recent cyber incidents, including the May 2023 breach of US government email accounts, attributed to Chinese hackers. New guidelines will also focus on securing access tokens and cryptographic keys, which were exploited during the attack. Contractors whose security practices fail to meet standards may face legal consequences, with referrals to the attorney general for further action.
While experts like Tom Kellermann of Contrast Security support the initiative, some criticise the timeline as insufficient given the immediate threats posed by adversaries like China and Russia. Brandon Wales of SentinelOne views the order as a continuation of efforts across the past two administrations, emphasising the need to enhance existing cybersecurity frameworks while addressing a broad range of threats.
The order underscores Biden’s commitment to cybersecurity as a pressing national security issue. It comes amid escalating concerns about foreign cyber operations and aims to solidify protections for critical US systems before the transition to new leadership.
Authorities in Thailand have confiscated 996 Bitcoin mining rigs in Chon Buri province, accusing operators of illegally tapping into the power grid. The raid, conducted on 8 January in the Phanat Nikhom district, targeted JIT Co., a digital asset trading firm that allegedly tampered with power meters to avoid electricity charges. Losses to local providers are estimated in the hundreds of millions of baht.
Despite solar panels being present on the site, investigators revealed they were not connected to the equipment, which relies on immense computing power to mine Bitcoin. Thai officials highlighted the heavy energy demands of mining, which can cost hundreds of thousands of baht per Bitcoin, compared to the typical household electricity bill of 750 baht.
The case underscores the growing global challenge of managing crypto mining’s resource demands. Thai regulators reiterated the need to safeguard public utilities as they continue investigating the scheme and identifying additional parties involved.
Brazilian President Luiz Inácio Lula da Silva has condemned Meta’s decision to discontinue its fact-checking program in the United States, calling it a grave issue. Speaking in Brasília on Thursday, Lula emphasised the need for accountability in digital communication, equating its responsibilities to those of traditional media. He announced plans to meet with government officials to discuss the matter.
Meta’s recent decision has prompted Brazilian prosecutors to seek clarification on whether the changes will affect the country. The company has been given 30 days to respond as part of an ongoing investigation into how social media platforms address misinformation and online violence in Brazil.
Justice Alexandre de Moraes of Brazil’s Supreme Court, known for his strict oversight of tech companies, reiterated that social media firms must adhere to Brazilian laws to continue operating in the country. Last year, he temporarily suspended X (formerly Twitter) over non-compliance with local regulations.
Meta has so far declined to comment on the matter in Brazil, fueling concerns over its commitment to tackling misinformation globally. The outcome of Brazil’s inquiry could have broader implications for how tech firms balance local laws with global policy changes.