Categories
Business News Tech Top News World

Nationwide Telecoms Downtime Sparks Suspicions of Major Chinese Cyberattack Test on US Infrastructure.

On Thursday, February 22, 2024, a massive cellular phone service outage hit thousands of users across the United States, affecting all major telecoms, including AT&T, Verizon, T-Mobile, USCellular, Cricket Wireless, and Boost Mobile.

The outage disrupted calls, text messages, and emergency services in major cities, including San Francisco, and lasted for at least five hours.

 

The supposed nationwide outage has raised concerns about the reliability of telecommunications infrastructure and its resilience in the face of unexpected disruptions. While there is no official confirmation of a cyberattack, the possibility of a major hack cannot be ruled out.

Screenshot of the suspicious nationwide telecoms outage. Image/Courtesy

The Federal Communications Commission (FCC) has announced that it will investigate the incident, and the US Cybersecurity and Infrastructure Security Agency (CISA) is working closely with AT&T to understand the cause of the outage and offer any assistance needed.

 

The outage affected more than 73,000 incidents around 8:15 a.m. ET, and reports suggest that the disruption was caused by a cyberattack on the telecoms’ infrastructure. The suspicion of a cyberattack has sparked concerns about the vulnerability of critical infrastructure to cyber threats and the need for stronger cybersecurity measures to protect against such attacks.

 

In conclusion, the nationwide telecoms downtime has raised serious concerns about the reliability and security of telecommunications infrastructure in the United States. The possibility of a major cyberattack underscores the need for stronger cybersecurity measures to protect against such threats and ensure the resilience of critical infrastructure.

 

Categories
Tech Top News World

Wave of Cyberattacks Targeting US Telecoms: Third-Party Vendors Allegedly to Blame.

Since the start of the year, cyberattacks targeting US telecommunications companies have been relentless, with over 74 million private records tied to customers of AT&T, T-Mobile, U.S. Cellular, and Verizon spilling onto the dark web.

 

In report posted by Cyble Research and Intelligence Labs, six previously reported data breaches impacting telecoms since the start of the year were carried out by exploiting security weaknesses on third-party vendor networks.

The vast majority of these breaches were caused by third-party vendors, software, and MSPs (managed service providers).

The breaches have led to targeted SIM swapping attacks on Google Fi, which uses T-Mobile as its primary service provider.

 

Another concern is that telecom networks “are widely used for multi-factor authentication and for sharing of business data (making them attractive targets,” said Bud Broomhead, CEO at Viakoo. The timing of when a breach is reported matters: the faster, the better to shrink the vulnerability window.

 

In response to the breaches in the telecommunications sector, the FCC issued a statement pushing for a change in current breach notification guidelines, proposing the removal of the compulsory seven-day waiting period before customers are notified of breaches, as well as expanding the scope of federal agencies that receive breach notifications to include the FCC, FBI, and the U.S. Secret Service. The threat landscape has shifted to more diverse types of threats, with adversaries interested in telco customer data to perpetrate additional crimes such as SIM jacking.

 

Third-party security risks are often hard to identify by downstream firms, and these risks have resulted in some of the past years’ biggest cyberattacks.

Telecoms companies must take third-party risks seriously and implement organization-wide zero-trust policies to minimize supply chain compromise.

The forthcoming National Cyber Strategy is expected to push for stronger public incident reporting, including in incident reporting.

Categories
Business Tech Top News World

Vusi Thembekwayo’s Facebook Hacked: A Cautionary Tale and Cybersecurity Guide

Vusi Thembekwayo, a prominent South African figure in the business world, recently fell victim to a Facebook hack, resulting in the unauthorized posting of irrelevant and misleading content on his account. This incident serves as a stark reminder of the prevalence of cyber threats and the importance of robust online security measures.

 

Among the misleading posts was a rumor falsely claiming the death of Jamie Foxx. This incident, as reported by Precious Chukwuemeka Nwosu, highlighted the malicious nature of the hack, as the content shared was not in line with Thembekwayo’s typical posts.

The dissemination of false information about Jamie Foxx’s death serves as a poignant example of the potential consequences of such breaches, emphasizing the need for robust cybersecurity measures and heightened vigilance on social media platforms.

 

As a renown venture capitalist and bestselling author, Thembekwayo’s experience sheds light on the risks individuals face in the digital landscape.

 

The unauthorized access to Thembekwayo’s account underscores the need for individuals to remain vigilant and proactive in safeguarding their online presence. While specific details of the actions taken to secure his account have not been publicly disclosed, it is imperative for individuals to report such breaches, change their passwords, and implement additional security measures, such as two-factor authentication.

 

In an era where social media plays a pivotal role in personal and professional branding, the implications of a hack can be far-reaching.

The incident involving Thembekwayo’s Facebook account is as a cautionary tale, prompting anyone online in this day and age to prioritize cybersecurity and stay informed about best practices for protecting their online identities.

Categories
Features Tech Top News World

Anonymous Hackers: The Story of Commander X.

Anonymous is a decentralized international hacktivist group that has been responsible for some of the most high-profile cyberattacks in recent history. The group is known for its use of denial-of-service attacks, website defacements, and the release of confidential information.

 

Anonymous has no central leadership or structure, and its members operate anonymously. This makes it difficult to track down and prosecute members of the group.

Anonymous has been involved in a wide range of activities, including:

  • Hacking government websites: Anonymous has hacked into the websites of governments around the world, including the United States, the United Kingdom, and China.
  • Leaking classified information: Anonymous has leaked classified information from governments and corporations, such as the Pentagon and Sony Pictures.
  • Launching denial-of-service attacks: Anonymous has launched denial-of-service attacks against websites and online services, such as PayPal and Mastercard.
  • Defacing websites: Anonymous has defaced the websites of governments and corporations, such as the FBI and the Church of Scientology.

 

Anonymous has been praised by some for its activism and its ability to hold governments and corporations accountable. However, the group has also been criticized for its destructive activities and its lack of transparency.

 

Commander X

Commander X, Christopher Doyon.
Hacker Christopher Doyon at the Santa Cruz County Superior Courthouse in 2010. (Bill Lovejoy — Santa Cruz Sentinel file)

Commander X was a prominent member of Anonymous who was known for his leadership and his technical skills. He was involved in some of the group’s most high-profile attacks, including the hack of the Pentagon and the release of classified information from Sony Pictures.

 

Commander X‘s real name is Christopher Doyon. He was born in Maine in 1983 and became interested in computers at a young age. He began hacking in his early teens and quickly became one of the most skilled hackers in the world.

 

In 2008, Doyon joined Anonymous. He quickly rose through the ranks of the group and became one of its most respected leaders. He was known for his strategic thinking and his ability to plan and execute complex attacks.

 

In 2011, Doyon was arrested by the FBI and charged with hacking and conspiracy. He was sentenced to three years in prison and was released in 2014.

 

Since his release from prison, Doyon has become a vocal advocate for internet freedom and privacy. He has also spoken out against the use of mass surveillance by governments.

 

Commander X’s Legacy

Commander X is one of the most important figures in the history of hacktivism. He was a pioneer of the movement and helped to shape it into what it is today.

 

Doyon’s story is also one of personal transformation. He went from being a homeless teenager to one of the most feared hackers in the world. He then used his skills to fight for what he believes in.

 

Commander X is an inspiration to many people, and his legacy is likely to live on for many years to come.