High quality spill of Chinese contractor tools

the United States He issued a warrant for the Starlink attack this week related to the Satellite Internet infrastructure used in the computer fraud in Myanmar. The action is part of a larger US law enforcement agency that has been called the District of Columbia Scam Center Strike Force.
Meanwhile, Google moved this week to sue 25 people for “surprising” and “perpetual” fraud tips for working on a popular criminal platform.
The Wire reported this week that the US Department of Homeland Security collected information on Chicago gang suspects to be tested if police files could match FBI records — again, they kept records for months of violations of domestic espionage laws.
And there is more. Each week, we cover security and privacy issues that we humbly cover ourselves. Click on the headlines to read the full stories. And stay safe there.
China’s Massigness Phristian Apple has never had its ice moment. So any subject that is high within its power and skill hacking shows a rare find. One of them has now arrived in the form of nearly 12,000 documents matured by the Chinese hacking firm, according to the Chinese Blog MXRN.NET and obtained by Western news outlets this week. The leaks include hacking tools such as far-reaching Trojans, as well as data extraction and analysis programs. More interesting, perhaps, is the target list of more than 80 organizations from hackers who claim to have added information. The stolen recorded data, according to MRXN, includes 95 GB of Indian migration data, three driving records from South Korea Telecom operator LG U PLUS, for example data obtained from Taiwan, for example. If there was any doubt as to who was tipped to do this hacking, the leak also reportedly includes details of its contracts with the Chinese government.
The cybersecurity community has warned for years that government-sponsored hackers will soon start using AI tools to streamline their infiltration campaigns. Now the first known AI-Run campaign for AI According to anthropic, hackers use Claude to write malware and extract and analyze stolen data “with minimal human interaction.” Although hackers are bypassing Claude’s guardrails by injecting risk money into its tools with whitehat protection and blocking, anthropic says it doesn’t get it. However, at that time, the reconnaissance mission had successfully breached four organizations.
Still, fully AI-based hacking isn’t prime-time, points out ARS Technica. Hackers have a low penetration rate, given that they target 30 organizations, according to anthropic. The AI startup also notes that the tools to recover stolen data were missing. Meanwhile, government-sponsored spies still have some job security.
North Koreans raise money for Kim Jong Un’s regime by finding jobs as remote IT workers with false identities working alone. Four Americans pleaded guilty this week to allowing North Koreans to pay to use their identities, as well as to receive and remotely control the company’s laptops for North Korean employees. Another man, Oleksandr DEENKO, pleaded guilty to stealing the identities of 40 Americans to sell to North Korea to use employee profiles.
A report from 404 media shows that the Customs and Border Protection App that uses facial recognition to identify immigrants is hosted by Google. The application may be used by local law enforcement to determine whether a person has a potential interest in the country’s operations and enforcement practices. While Platforming App the CBP app, Google has also recently demoted other apps on the Google Play Store that are used for public discussion about the work of Ice and the sight of Ice Agent. Google prepared these items for the Takedown application as required under the terms of service, because the company says that ice agents are a “vulnerable group.”

