<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security news March 2021</title>
	<atom:link href="http://www.epanorama.net/blog/2021/02/28/cyber-security-news-march-2021/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2021/02/28/cyber-security-news-march-2021/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 05 Apr 2026 12:03:14 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/02/28/cyber-security-news-march-2021/comment-page-7/#comment-1707631</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 04 Apr 2021 11:17:30 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=187874#comment-1707631</guid>
		<description><![CDATA[Google&#039;s top security teams unilaterally shut down a counterterrorism operation
MIT Technology Review ($): Bombshell of the week. Google shut down a nine-month counterterrorism operation by an unknown Western government. The government was using 11 zero-day vulnerabilities targeting Chrome, Android, but also iOS and Windows. Google&#039;s logic to shut down the operation was that the vulnerabilities &quot;will eventually be used by others,&quot; and took action. But the move sent alarm bells ringing in both Google and the U.S. intelligence community. This was a monster scoop, and one that will likely have ramifications for a while.
More: Google Project Zero &#124; @chronic &#124; @thegrugq 

Google’s top security teams unilaterally shut down a counterterrorism operation
https://www.technologyreview.com/2021/03/26/1021318/google-security-shut-down-counter-terrorist-us-ally/

The decision to block an “expert” level cyberattack has caused controversy inside Google after it emerged that the hackers in question were working for a US ally.

by Patrick Howell O&#039;Neillarchive page
March 26, 2021
Google office
UNSPLASH
Google’s security teams publicly exposed a nine-month hacking operation
What wasn’t disclosed: The move shut down an active counter-terrorist operation being conducted by a Western government
The decision has raised alarms inside Google and elsewhere
Google runs some of the most venerated cybersecurity operations on the planet: its Project Zero team, for example, finds powerful undiscovered security vulnerabilities, while its Threat Analysis Group directly counters hacking backed by governments, including North Korea, China, and Russia. And those two teams caught an unexpectedly big fish recently: an “expert” hacking group exploiting 11 powerful vulnerabilities to compromise devices running iOS, Android, and Windows.

But MIT Technology Review has learned that the hackers in question were actually Western government operatives actively conducting a counterterrorism operation. The company’s decision to stop and publicize the attack caused internal division at Google and raised questions inside the intelligence communities of the United States and its allies.]]></description>
		<content:encoded><![CDATA[<p>Google&#8217;s top security teams unilaterally shut down a counterterrorism operation<br />
MIT Technology Review ($): Bombshell of the week. Google shut down a nine-month counterterrorism operation by an unknown Western government. The government was using 11 zero-day vulnerabilities targeting Chrome, Android, but also iOS and Windows. Google&#8217;s logic to shut down the operation was that the vulnerabilities &#8220;will eventually be used by others,&#8221; and took action. But the move sent alarm bells ringing in both Google and the U.S. intelligence community. This was a monster scoop, and one that will likely have ramifications for a while.<br />
More: Google Project Zero | @chronic | @thegrugq </p>
<p>Google’s top security teams unilaterally shut down a counterterrorism operation<br />
<a href="https://www.technologyreview.com/2021/03/26/1021318/google-security-shut-down-counter-terrorist-us-ally/" rel="nofollow">https://www.technologyreview.com/2021/03/26/1021318/google-security-shut-down-counter-terrorist-us-ally/</a></p>
<p>The decision to block an “expert” level cyberattack has caused controversy inside Google after it emerged that the hackers in question were working for a US ally.</p>
<p>by Patrick Howell O&#8217;Neillarchive page<br />
March 26, 2021<br />
Google office<br />
UNSPLASH<br />
Google’s security teams publicly exposed a nine-month hacking operation<br />
What wasn’t disclosed: The move shut down an active counter-terrorist operation being conducted by a Western government<br />
The decision has raised alarms inside Google and elsewhere<br />
Google runs some of the most venerated cybersecurity operations on the planet: its Project Zero team, for example, finds powerful undiscovered security vulnerabilities, while its Threat Analysis Group directly counters hacking backed by governments, including North Korea, China, and Russia. And those two teams caught an unexpectedly big fish recently: an “expert” hacking group exploiting 11 powerful vulnerabilities to compromise devices running iOS, Android, and Windows.</p>
<p>But MIT Technology Review has learned that the hackers in question were actually Western government operatives actively conducting a counterterrorism operation. The company’s decision to stop and publicize the attack caused internal division at Google and raised questions inside the intelligence communities of the United States and its allies.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/02/28/cyber-security-news-march-2021/comment-page-7/#comment-1707614</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 03 Apr 2021 19:14:26 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=187874#comment-1707614</guid>
		<description><![CDATA[Clothes retailer Fatface: Someone&#039;s broken in and accessed your personal data, including partial card payment details... Don&#039;t tell anyone
&#039;Strictly private and confidential&#039;? SERIOUSLY?
https://www.theregister.com/2021/03/24/fatface/

Several people wrote into The Register to let us know about the personal data leak, with reader Terry saying: &quot;You will notice the Fatface email is marked as confidential. This annoyed me.&quot;

Chief exec Liz Evans wrote in an email titled &quot;Strictly private and confidential – Notice of security incident&quot; sent to users yesterday:

Please do keep this email and the information included within it strictly private and confidential.]]></description>
		<content:encoded><![CDATA[<p>Clothes retailer Fatface: Someone&#8217;s broken in and accessed your personal data, including partial card payment details&#8230; Don&#8217;t tell anyone<br />
&#8216;Strictly private and confidential&#8217;? SERIOUSLY?<br />
<a href="https://www.theregister.com/2021/03/24/fatface/" rel="nofollow">https://www.theregister.com/2021/03/24/fatface/</a></p>
<p>Several people wrote into The Register to let us know about the personal data leak, with reader Terry saying: &#8220;You will notice the Fatface email is marked as confidential. This annoyed me.&#8221;</p>
<p>Chief exec Liz Evans wrote in an email titled &#8220;Strictly private and confidential – Notice of security incident&#8221; sent to users yesterday:</p>
<p>Please do keep this email and the information included within it strictly private and confidential.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/02/28/cyber-security-news-march-2021/comment-page-7/#comment-1707593</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 03 Apr 2021 10:38:42 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=187874#comment-1707593</guid>
		<description><![CDATA[https://therecord.media/hackers-backdoor-php-source-code-after-internal-repo-hack/]]></description>
		<content:encoded><![CDATA[<p><a href="https://therecord.media/hackers-backdoor-php-source-code-after-internal-repo-hack/" rel="nofollow">https://therecord.media/hackers-backdoor-php-source-code-after-internal-repo-hack/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/02/28/cyber-security-news-march-2021/comment-page-7/#comment-1707592</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 03 Apr 2021 10:38:21 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=187874#comment-1707592</guid>
		<description><![CDATA[A new Android spyware masquerades as a ‘system update’
The malware can take complete control of a victim&#039;s device
https://techcrunch.com/2021/03/26/android-malware-system-update/]]></description>
		<content:encoded><![CDATA[<p>A new Android spyware masquerades as a ‘system update’<br />
The malware can take complete control of a victim&#8217;s device<br />
<a href="https://techcrunch.com/2021/03/26/android-malware-system-update/" rel="nofollow">https://techcrunch.com/2021/03/26/android-malware-system-update/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/02/28/cyber-security-news-march-2021/comment-page-7/#comment-1707591</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 03 Apr 2021 10:32:29 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=187874#comment-1707591</guid>
		<description><![CDATA[Buffer overruns, license violations, and bad code: FreeBSD 13’s close call
40,000 lines of flawed code almost made it into FreeBSD&#039;s kernel—we examine how.
https://arstechnica.com/gadgets/2021/03/buffer-overruns-license-violations-and-bad-code-freebsd-13s-close-call/]]></description>
		<content:encoded><![CDATA[<p>Buffer overruns, license violations, and bad code: FreeBSD 13’s close call<br />
40,000 lines of flawed code almost made it into FreeBSD&#8217;s kernel—we examine how.<br />
<a href="https://arstechnica.com/gadgets/2021/03/buffer-overruns-license-violations-and-bad-code-freebsd-13s-close-call/" rel="nofollow">https://arstechnica.com/gadgets/2021/03/buffer-overruns-license-violations-and-bad-code-freebsd-13s-close-call/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/02/28/cyber-security-news-march-2021/comment-page-7/#comment-1707588</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 03 Apr 2021 10:29:13 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=187874#comment-1707588</guid>
		<description><![CDATA[Hackers backdoor PHP source code after breaching internal git server
Code gave code-execution powers to anyone who knew the secret password: &quot;zerodium.
https://arstechnica.com/gadgets/2021/03/hackers-backdoor-php-source-code-after-breaching-internal-git-server/]]></description>
		<content:encoded><![CDATA[<p>Hackers backdoor PHP source code after breaching internal git server<br />
Code gave code-execution powers to anyone who knew the secret password: &#8220;zerodium.<br />
<a href="https://arstechnica.com/gadgets/2021/03/hackers-backdoor-php-source-code-after-breaching-internal-git-server/" rel="nofollow">https://arstechnica.com/gadgets/2021/03/hackers-backdoor-php-source-code-after-breaching-internal-git-server/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/02/28/cyber-security-news-march-2021/comment-page-7/#comment-1707587</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 03 Apr 2021 10:28:41 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=187874#comment-1707587</guid>
		<description><![CDATA[https://www.bleepingcomputer.com/news/security/microsoft-exchange-attacks-increase-while-wannacry-gets-a-restart/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.bleepingcomputer.com/news/security/microsoft-exchange-attacks-increase-while-wannacry-gets-a-restart/" rel="nofollow">https://www.bleepingcomputer.com/news/security/microsoft-exchange-attacks-increase-while-wannacry-gets-a-restart/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/02/28/cyber-security-news-march-2021/comment-page-7/#comment-1707563</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 03 Apr 2021 07:55:17 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=187874#comment-1707563</guid>
		<description><![CDATA[Credit Card Hacking Forum Gets Hacked, Exposing 300,000 Hackers’ Accounts
Credit card hacking forum Carding Mafia is the latest victim of the age-old hackers on hackers crime.
https://www.vice.com/en/article/v7m9jx/credit-card-hacking-forum-gets-hacked-exposing-300000-hackers-accounts

Carding Mafia, a forum for stealing and trading credit cards has been hacked, exposing almost 300,000 user accounts, according to data breach notification service Have I Been Pwned.

https://haveibeenpwned.com/PwnedWebsites#CardingMafia

In  March 2021, the Carding Mafia forum suffered a data breach that exposed almost 300k members&#039; email addresses. Dedicated to the theft and trading of stolen credit cards, the forum breach also exposed usernames, IP addresses and passwords stored as salted MD5 hashes.]]></description>
		<content:encoded><![CDATA[<p>Credit Card Hacking Forum Gets Hacked, Exposing 300,000 Hackers’ Accounts<br />
Credit card hacking forum Carding Mafia is the latest victim of the age-old hackers on hackers crime.<br />
<a href="https://www.vice.com/en/article/v7m9jx/credit-card-hacking-forum-gets-hacked-exposing-300000-hackers-accounts" rel="nofollow">https://www.vice.com/en/article/v7m9jx/credit-card-hacking-forum-gets-hacked-exposing-300000-hackers-accounts</a></p>
<p>Carding Mafia, a forum for stealing and trading credit cards has been hacked, exposing almost 300,000 user accounts, according to data breach notification service Have I Been Pwned.</p>
<p><a href="https://haveibeenpwned.com/PwnedWebsites#CardingMafia" rel="nofollow">https://haveibeenpwned.com/PwnedWebsites#CardingMafia</a></p>
<p>In  March 2021, the Carding Mafia forum suffered a data breach that exposed almost 300k members&#8217; email addresses. Dedicated to the theft and trading of stolen credit cards, the forum breach also exposed usernames, IP addresses and passwords stored as salted MD5 hashes.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/02/28/cyber-security-news-march-2021/comment-page-7/#comment-1707499</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Apr 2021 11:47:51 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=187874#comment-1707499</guid>
		<description><![CDATA[Mandy Zuo / South China Morning Post:
Report: Chinese hackers have stolen videos from thousands of home security cameras in the country and are selling them as “home video packages” via social media

 Hackers are stealing videos from private security cameras and selling them as home video tapes
https://www.scmp.com/news/people-culture/article/3127659/hackers-are-stealing-videos-private-security-cameras-and

    Videos can cost as little as US$3 and the perpetrators offer ‘set meal’ packages with multiple live streams 
    One man claims 8,000 videos were shared in one group chat within 20 days in February 

Tens of thousands of hacked security videos are being sold online. Many are fairly boring, showing people just sitting around their homes or hotels. 

The video footage showcases clips from cameras
installed by homeowners for security reasons or others secretly installed by ill-intentioned people in hotels, fitting rooms and beauty salons.

The videos are priced based on how exciting they are and are sold via social media, according to an undercover investigative report aired by the television station on Monday.  

Video clips involving nudity or sexual acts are priced at 50 yuan (US$8) each, while those “normal ones shot in hotel rooms” are 20 yuan (US$3), said an unidentified seller of these videos in the report.

Real-time viewing is also available at “set meal” prices. People can buy the IDs and passwords of cameras in 10 households for just 70 yuan (US$11), while 10 hotels plus 10 households costs 150 yuan (US$23), and 20 hotels plus 20 households for 258 yuan (US$39), according to another seller.

They came from cameras located across the country, with Guangdong, Hunan and Hubei province being the most prominent sources.]]></description>
		<content:encoded><![CDATA[<p>Mandy Zuo / South China Morning Post:<br />
Report: Chinese hackers have stolen videos from thousands of home security cameras in the country and are selling them as “home video packages” via social media</p>
<p> Hackers are stealing videos from private security cameras and selling them as home video tapes<br />
<a href="https://www.scmp.com/news/people-culture/article/3127659/hackers-are-stealing-videos-private-security-cameras-and" rel="nofollow">https://www.scmp.com/news/people-culture/article/3127659/hackers-are-stealing-videos-private-security-cameras-and</a></p>
<p>    Videos can cost as little as US$3 and the perpetrators offer ‘set meal’ packages with multiple live streams<br />
    One man claims 8,000 videos were shared in one group chat within 20 days in February </p>
<p>Tens of thousands of hacked security videos are being sold online. Many are fairly boring, showing people just sitting around their homes or hotels. </p>
<p>The video footage showcases clips from cameras<br />
installed by homeowners for security reasons or others secretly installed by ill-intentioned people in hotels, fitting rooms and beauty salons.</p>
<p>The videos are priced based on how exciting they are and are sold via social media, according to an undercover investigative report aired by the television station on Monday.  </p>
<p>Video clips involving nudity or sexual acts are priced at 50 yuan (US$8) each, while those “normal ones shot in hotel rooms” are 20 yuan (US$3), said an unidentified seller of these videos in the report.</p>
<p>Real-time viewing is also available at “set meal” prices. People can buy the IDs and passwords of cameras in 10 households for just 70 yuan (US$11), while 10 hotels plus 10 households costs 150 yuan (US$23), and 20 hotels plus 20 households for 258 yuan (US$39), according to another seller.</p>
<p>They came from cameras located across the country, with Guangdong, Hunan and Hubei province being the most prominent sources.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2021/02/28/cyber-security-news-march-2021/comment-page-7/#comment-1707485</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Apr 2021 08:28:51 +0000</pubDate>
		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=187874#comment-1707485</guid>
		<description><![CDATA[What&#039;s being changed this time?

Companies Must Quickly Report Hacks to U.S. Under Proposed Order
https://www.bloomberg.com/news/articles/2021-03-31/companies-must-report-hacks-to-u-s-within-days-in-draft-order

Companies doing business with the federal government would be required to report hacks of their computer networks within a few days, according to a draft executive order that the Biden administration is urgently trying to complete, people familiar with the matter said.

President Joe Biden hasn’t yet signed off on the executive actions, which are likely to reach his desk in the next two weeks, one of the people said.

The executive order, when signed, would mandate important cybersecurity improvements, but it also would push basic changes that could deter cyber-attacks in both the government and private sector, according to people familiar with it. They requested anonymity to speak about actions the administration hasn’t yet announced.]]></description>
		<content:encoded><![CDATA[<p>What&#8217;s being changed this time?</p>
<p>Companies Must Quickly Report Hacks to U.S. Under Proposed Order<br />
<a href="https://www.bloomberg.com/news/articles/2021-03-31/companies-must-report-hacks-to-u-s-within-days-in-draft-order" rel="nofollow">https://www.bloomberg.com/news/articles/2021-03-31/companies-must-report-hacks-to-u-s-within-days-in-draft-order</a></p>
<p>Companies doing business with the federal government would be required to report hacks of their computer networks within a few days, according to a draft executive order that the Biden administration is urgently trying to complete, people familiar with the matter said.</p>
<p>President Joe Biden hasn’t yet signed off on the executive actions, which are likely to reach his desk in the next two weeks, one of the people said.</p>
<p>The executive order, when signed, would mandate important cybersecurity improvements, but it also would push basic changes that could deter cyber-attacks in both the government and private sector, according to people familiar with it. They requested anonymity to speak about actions the administration hasn’t yet announced.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
