The attackers organized a fake distribution of cryptocurrency, offering users to send bitcoins to an unknown address and receive twice as much in return.
Hackers gained unauthorized access to the information resource Bitcoin.org and placed an advertisement on it about a fake cryptocurrency distribution, informs rbc.ru.
Visitors to the Bitcoin Foundation website – bitcoin.org – noticed an unusual pop-up window (Chinese version is known, there may have been variants in other languages).
On the home page of the world’s most popular cryptocurrency, it was reported that the Bitcoin Foundation is allegedly ready to immediately return a double amount to users who sent bitcoins to a wallet number hidden behind a QR code. It was reported that the offer is limited and only applies to the first 10,000 users.
The operator of the site Bitcoin.org said that the developers are already figuring out how the attackers managed to gain access to the resource.
Facebook Papers Sheds Light on Social Media Moderation Issues
The media, to which the company’s internal documents were leaked, claim that the company prioritizes profits over users.
The so-called Facebook Papers (an array of documents released to the public by former Facebook product director Francis Haugen) shed light on the problems with content moderation and the fight against disinformation on the platform. Major media outlets to which Haugen handed the documents, including Reuters, Bloomberg and The Washington Post, argue that the company prioritizes profit over user safety, although Facebook employees have repeatedly warned it of the potential risks.
For example, The Washington Post accuses Facebook head Mark Zuckerberg of downplaying the importance of reports that the site contributed to incitement to hatred, while addressing the US Congress. According to the newspaper, Zuckerberg knew that the problem was actually much more serious than it was reported to the public.
According to internal company documents, the platform removes less than 5% of hateful posts, and senior management (including Zuckerberg) was well aware of the platform dividing people into opposing camps. Facebook denies the allegations and claims its internal documents were misinterpreted.
Zuckerberg is also allegedly responsible for the decision not to suppress misinformation about COVID-19 in the early stages of the pandemic, as there could be a “significant trade-off with the influence of MSI” (meaningful social interaction – an internal Facebook metric). Facebook denies this, claiming that the documents have been misunderstood.
In turn, the news agency Reuters accused Facebook of regularly neglecting developing countries, which were allowed to publish publications inciting hatred and calling for extremist action. In other words, the company did not hire enough moderators with knowledge of the language and culture of these countries to effectively remove such content. Instead, it unjustifiably relied on its automatic moderation systems, which are ineffective in non-English-speaking countries. Again, Facebook denies these allegations.
According to reports from The New York Times, Facebook was well aware that the “Like” and “Share” functions (key elements of the social network) contributed to the spread of hate speech. As stated in a document titled “What Is Collateral Damage”, Facebook’s failure to address this issue will ultimately result in the company “actively (not necessarily knowingly) promoting such activity.” Again, Facebook claims the document was misinterpreted because the company would not harm its users.
Discourse team has released an urgent patch to fix a critical vulnerability
The vulnerability allows remote code execution using a specially crafted request.
Discourse is a popular open source Internet forum and mailing list management software with a client base of over 2,000 customers, including Amazon Seller Central, which has a monthly audience of 30 million users.
The vulnerability (CVE-2021-41163) is a validation error in the aws-sdk-sns gem upstream stream that can be exploited to remotely execute code using a specially crafted request. The highest severity vulnerability (CVSS 10) exists due to a lack of validation in the subscribe_url values.
The issue was fixed in Discourse 2.7.9 (stable) and 2.8.0.beta7. The Discourse team did not provide full information about the problem, but the information security expert who discovered the vulnerability, known as joernchen, published some details about her.
Developers are advised to upgrade to Discourse 2.7.9 and higher as soon as possible, and if this is not yet possible, apply protective measures, in particular, block requests containing the / webhooks / aws path at the upstream proxy level.
The skimmer on the SCUF Gaming website stole the data of 33 thousand bank cards
The company warned its customers about possible suspicious activity with their bank cards.
Major manufacturer of custom gaming PCs and console controllers SCUF Gaming International notified its users that in February of this year, attackers hacked into his website and introduced a malicious script that steals bank card data.
In this case, the script was injected into the online store SCUF Gaming after hackers gained access to the company’s backend server on February 3 using credentials belonging to a third-party vendor. Three weeks later, on February 18, the payment processor notified SCUF Gaming of unusual activity related to in-store credit cards. A month later, a skimmer was discovered on the site, which was subsequently removed.
“The investigation found that orders processed through PayPal were not compromised, and the incident is limited to payments and attempted payments using credit cards between February 3 and March 16,” the company said in a notice sent to affected users.
According to the notification, the names and surnames of cardholders, their email and billing addresses, card numbers, their expiration dates and CVVs could have been compromised.
The notification did not indicate the number of victims, but a letter to the attorney general says that the incident affected 32,645 people.
“This notification does not mean that fraud with your account has already taken place. You should monitor your account and notify the card issuer of any unusual or suspicious activity. As a precautionary measure, we recommend that you request a new payment card number from the issuer,” the notification says …
Xiaomi showed the third custom color Redmi Note 11
Xiaomi has tried to diversify the color scheme of Redmi Note 11 smartphones with non-standard colors. We have already written...
Google Pixel 6 Pro vs iPhone 13 Pro Max. Which camera is better?
Google Pixel 6 and Pixel 6 Pro reviews are finally allowed to be published, and a lot of them have...
Nikon Nikkor Z 100-400mm f / 4.5-5.6 IS S first image arrives
The source posted a photo of the Nikkor Z 100-400mm f / 4.5-5.6 IS S lens. This model is featured...
Facebook Papers Sheds Light on Social Media Moderation Issues
The media, to which the company’s internal documents were leaked, claim that the company prioritizes profits over users. The so-called...
Security6 days ago
Acer was cyberattacked for the second time in a week
Software6 days ago
What Google was silent about at the presentation of the Google Pixel 6 and Pixel 6 Pro: the new flagships did not receive unlimited space in Google Photos
Security7 days ago
Chinese hackers attack ten medical facilities in Israel
Security5 days ago
Taiwanese tech giant Gigabyte fell victim to ransomware twice in three months