Hackers Are Pretending To be Chipotle In Poisoned Emails

Chipotle recently reported that an account used by their company’s marketing department had been hacked. A currently active campaign is underway leveraging this account. The hackers are sending out phishing emails containing poisoned links. A recipient clicking on these links will be directed to a malicious website designed to prompt users for a wide range of personal information so the hackers can harvest it.

Leveraging legitimate compromised email accounts is the preferred routine for hackers. Statistics show that only 2-3 percent of phishing emails sent from spoofed accounts are effective in luring recipients to click links. Hacking a legitimate email account and using it for the same purpose more than doubles the likelihood that a recipient will click embedded links and/or download attached files.

Most of the hackers launching these types of campaigns include the Chipotle hackers. They send emails pretending to be a Microsoft Team Member and usually associated with Office 365.

The poisoned links included in such messages point back to a dummy Microsoft login page controlled by the hackers. Anything a recipient enters on this page will be harvested by the hackers and used against those who fall victim to this ploy later.

The email security company Inky reported that the Chipotle email address in question had been used to send more than a hundred tightly targeted phishing emails over a three day period. A spokesman for Inky observed that salmost everyone has a Microsoft login and a significant portion of internet users use the same password across multiple websites. Hacking the Microsoft login is the option of choice for most hackers.

Chipotle has since regained control over that account but the threat remains. Given the sheer number of corporate email addresses in use today it is all too easy for one of them to become compromised and put hundreds or even thousands of people at risk.

Bug Fixes Available With Update For iOS Device Users

Apple delayed the release of iPadOS 14.7 and iOS 14.7. Both updates are now available. Users of both are advised to update immediately as the new versions patch a variety of high severity security flaws and offer an impressive array of enhancements.

According to the release notes, the update includes the following improvements:

  • Apple’s “MagSafe Battery Pack”‌ supports iPhone 12, iPhone 12 mini, iPhone 12 Pro and iPhone 12 Pro Max.
  • Apple Card‌ Family adds the option to combine credit limits and share one co-owned account with an existing ‌Apple Card‌ user.
  • The home app adds the ability to manage timers on ‌HomePod‌.
  • Air quality information is now available in Weather and Maps for Canada, France, Italy, Netherlands, South Korea and Spain.
  • The podcasts library allows you to choose to see all shows or only followed shows.
  • Share playlist menu option missing in Apple Music.
  • Dolby Atmos and ‌Apple Music‌ lossless audio playback may unexpectedly stop.
  • The battery service message that may have disappeared after reboot on some iPhone 11 models is restored.
  • Braille displays could show invalid information while composing Mail messages.

Apple has addressed more than two dozen bugs with this update. The largest and most severe of these is a fix for the Wi-Fi bug. This bug was initially discovered by independent security researcher Carl Schou. The bug made it possible to permanently disable the WiFi capabilities of any iOS device which makes it a serious issue indeed.

The update is well worth getting for the WiFi bugfix alone but several of the items mentioned in the release notes are high value additions. If you have machines running iOS in your office then you will want to install this one as soon as possible in order to minimize your risk of exposure.

DNS Issue Caused Major Website Outage

The Akamai Corporation reported a major outage on Thursday (7/22/2021) that caused major disruptions on the internet in the United States for a period of several hours. A tweet from the company confirmed that the outage was caused by a software update. The update triggered a bug in the DNS system which caused the outage.

The good news is that the outage was not the result of a hack as had initially been feared.

The outage impacted a number of high-profile companies in the US, including:

  • AT&T
  • Costco
  • Capital One
  • And Delta Airlines

The websites owned by these companies simply displayed “DNS error” messages during the course of the outage. This prevented customers who rely on those sites from being able to access needed data.

The bug was tracked back to its source and the issue corrected. All of the companies that had been impacted now report that their sites are working properly.

This latest incident only serves to underscore how fragile the internet is. There have been a number of high-profile attacks so far this year that have targeted critical infrastructure like the main gas pipeline that serves the Southeastern United States.

Given that information it is understandable that many who witnessed the outage in real time were concerned that it may have been caused by hackers seeking to bring down large portions of the web. Fortunately that proved not to be the case in this instance. We may not be so lucky next time.

This incident also underscores the importance of having robust backup plans prior to applying updates to critical infrastructure. Had that been done in this case the outage may well have been avoided.

Akamai has apologized for the scare and any inconvenience the outage may have caused and we can all now breathe a collective sigh of relief. At least for now.

New Malware Live Streams Your Private Computer Activity

There is a new highly unusual and potentially embarrassing strain of malware that you need to be aware of.

It has been dubbed BIOPASS by the Trend Micro researchers who first discovered it. The new malware will live stream your computer activities all while allowing the whole world to tune in and watch whatever you happen to be doing.

The hackers responsible for BIOPASS recently compromised a number of online gambling sites and are using them to infect unsuspecting victims if they venture onto the online support chat page of a compromised gambling site.

At the root BIOPASS is a Remote Access Trojan. Despite its unusual live streaming feature it can do everything that most RATs can do. So once it has found its way onto your computer in addition to potentially embarrassing you the hackers controlling it can make off with a wide range of personal and sensitive data on your system.

Trend Micro had this to say bout the newly discovered threat:

If the script confirms that the visitor has not yet been infected, it will then replace the original page content with the attackers’ own content. The new page will show an error message with an accompanying instruction telling website visitors to download either a Flash installer or a Silverlight installer, both of which are malicious loaders.”

This is a serious threat. According to Trend the malicious code is actively being refined and further developed. At this point there’s no clear indication exactly who is behind the code. The researchers said that it was most likely the work of a well-heeled Chinese hacking group called Winnti also known as APT41.

If you or anyone you know frequents online gambling sites be especially vigilant or the whole world might get a first hand look at whatever you’re doing on your computer.

Popular Ring Doorbells To Get Encryption Option

Do you have a Ring Doorbell? They are offered by Amazon and they’re a wildly popular smart device that allows you to keep tabs on who’s coming to or walking by your door. The doorbell’s camera records video and saves it to the cloud so you can review it at your leisure.

Unfortunately there’s a problem. The videos on the cloud aren’t secured and it’s not difficult for hackers to gain access to them. It is easy for law enforcement to access them too for that matter. This is something that privacy advocates around the world have been complaining about since the Ring was first introduced. Now Amazon has done something about it.

Recently the company added E2EE (End to End Encryption) to the Ring but they’ve included it as an optional security feature. If you’re concerned about privacy and you want to make use of the new feature you’ll need to install the latest version of the Ring application on your phone then specifically opt in to using E2EE. If you opt in you’ll be required to set a password and you’ll need to remember it because AWS won’t keep a copy or store it anywhere.

Unfortunately E2EE isn’t fully integrated into the product line and specifically it won’t work with the company’s best-selling and lowest-priced unit. You should also be aware that although law enforcement won’t automatically have access to your doorbell’s videos they can still request access to the footage. If your town’s police force has partnered with Ring you can expect to get email requests from local law enforcement officials any time a crime is committed in your immediate area.

Although the new encryption feature isn’t perfect it is a powerful step in the right direction. Kudos to Amazon for taking steps to make the Ring doorbell and the video it takes more secure.