Friday, March 31, 2023

It's all about technology

Hackers take advantage of TikTok’s Invisible Challenge to spread malware

    Information security researchers revealed that hackers are currently trying to exploit one of TikTok’s Invisible Challenge, to install malware on thousands of devices and steal passwords, Discord accounts, and possibly cryptocurrency wallets.

    A new and popular TikTok challenge requires a user to film themselves nude while using the service’s Invisible Body filter, which removes the body from a video and replaces it with a blurred background.

    The challenge led to users posting videos of themselves “naked” but the body obscured by the filter.

    Information security researchers revealed that hackers are currently trying to exploit one of TikTok's challenges, the Invisible Challenge, to install malware on thousands of devices and steal passwords, Discord accounts, and possibly cryptocurrency wallets.

    To take advantage of this challenge, hackers have posted videos claiming to offer a special filter that cancels the effect of the hidden body filter from TikTok, allowing anyone who wants to see the naked bodies of challenge participants.

    In reality, this program is fake and installs WASP Stealer malware that is capable of stealing Discord accounts, passwords, credit card credentials stored in browsers, cryptocurrency wallets, and even files from victims’ computers.

    According to a new report from cybersecurity firm Checkmarx, the videos posted by the two users, whose accounts have now been suspended, were viewed more than a million times shortly after they were posted.

    The hackers asked users to go to the Discord server to install the filter that eliminates the effect of the hidden body filter, and according to the report, the server saw more than 32,000 visits at one time.

    On the server, users see a link to a GitHub repository where the malware resides.

    According to the security researchers, the hackers used StarJacking technology which links their GitHub project to another popular project to make their software look legitimate.

    Checkmarx said in its report that these attacks show once again how online hackers have begun to focus their attention on the open-source software ecosystem, and it believes this trend will accelerate in 2023.

    Get notified whenever we post something new!

    Continue reading

    Celebrities Refuse to Pay for Blue Check Verification on Twitter’s New Subscription Service

    On April 1, Twitter announced that it will remove blue checks from “legacy verified” users who don’t sign up for a Twitter Blue subscription, a move that is part of new owner Elon Musk’s plan to make Twitter profitable

    Amazon Enables T-Mobile Customers to Make Hands-Free Calls with Alexa-Enabled Devices

    Amazon has recently introduced a new feature that allows T-Mobile customers to use their Alexa-enabled devices, such as Echo Dot or Echo Show, to make or receive hands-free Wi-Fi call

    German Regulator Launches Antitrust Review of Microsoft’s Market Power

    The German regulator responsible for enforcing antitrust laws is investigating Microsoft's market power, a move that may result in an examination of the tech giant's business practices and potential bans if they are deemed to damage competition