{"id":18845,"date":"2024-11-23T07:00:00","date_gmt":"2024-11-23T05:00:00","guid":{"rendered":"https:\/\/forklog.com\/en\/usdt-promo-codes-onecoin-queens-trail-in-south-africa-and-other-cybersecurity-events\/"},"modified":"2024-11-23T07:00:00","modified_gmt":"2024-11-23T05:00:00","slug":"usdt-promo-codes-onecoin-queens-trail-in-south-africa-and-other-cybersecurity-events","status":"publish","type":"post","link":"https:\/\/u1f987.com\/en\/usdt-promo-codes-onecoin-queens-trail-in-south-africa-and-other-cybersecurity-events\/","title":{"rendered":"USDT Promo Codes, OneCoin Queen&#8217;s Trail in South Africa, and Other Cybersecurity Events"},"content":{"rendered":"<p>We have compiled the most important cybersecurity news of the week.<\/p>\n<div class=\"wp-block-text-wrappers-keypoints article_keypoints\">\n<ul class=\"wp-block-list\">\n<li>Apple released a patch for two vulnerabilities that allow cryptocurrency theft.<\/li>\n<li>Germany has begun searching for the creator of OneCoin in South Africa&#8217;s capital.<\/li>\n<li>Crypto scammers have settled in BlueSky amid the social network&#8217;s growing audience.<\/li>\n<li>Reddit users complained about strange voices coming from iPhone speakers.<\/li>\n<\/ul>\n<\/div>\n<h2 class=\"wp-block-heading\"><strong>Apple Releases Patch for Two Cryptocurrency Theft Vulnerabilities<\/strong><\/h2>\n<p>Apple <a href=\"https:\/\/support.apple.com\/en-us\/121753\">fixed<\/a> two zero-day vulnerabilities that hackers exploited to target Intel-based Mac computers.<\/p>\n<p>One vulnerability caused the JavaScriptCore engine to run malware without the user&#8217;s knowledge. The other involved a &#8220;cross-site scripting attack&#8221; via the WebKit framework, allowing malicious code to be injected into web pages or applications.<\/p>\n<p>Former Binance CEO Changpeng Zhao highlighted these vulnerabilities as they could lead to cryptocurrency theft. He urged users to update to the patched OS version as soon as possible.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">If you use a Macbook with Intel based chip, update asap! <\/p>\n<p>Stay SAFU!<a href=\"https:\/\/t.co\/mk2Jsicnte\">https:\/\/t.co\/mk2Jsicnte<\/a><\/p>\n<p>\u2014 CZ ? BNB (@cz_binance) <a href=\"https:\/\/twitter.com\/cz_binance\/status\/1859287351757078958?ref_src=twsrc%5Etfw\">November 20, 2024<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>The number of successful attacks and affected users remains unknown, as Apple did not provide details of the incident.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Germany Searches for OneCoin Founder in South Africa<\/strong><\/h2>\n<p>Ruja Ignatova, the founder of the OneCoin cryptocurrency pyramid, has been on the FBI&#8217;s top 10 most wanted list since 2022. She is believed to be alive and hiding in Cape Town. German police are currently verifying this information, reports <a href=\"https:\/\/www.dailymaverick.co.za\/article\/2024-11-17-wanted-global-cryptoqueen-ruja-ignatova-may-be-in-sa-german-cops\/\">Daily Maverick<\/a>.<\/p>\n<p>The possibility of Ignatova&#8217;s presence in South Africa was suggested in a <a href=\"https:\/\/www.ardmediathek.de\/serie\/die-kryptoqueen\/staffel-1\/Y3JpZDovL3dkci5kZS9kaWVrcnlwdG9xdWVlbg\/1\">documentary<\/a> <span data-descr=\"\"Cryptoqueen\"\" class=\"old_tooltip\">Die Kryptoqueen<\/span> aired by the regional German broadcaster WDR.<\/p>\n<p>Authorities stated that due to the lack of credible information about her death, they consider her alive. The investigation and search continue, with no further details disclosed by the police.<\/p>\n<p>The US is currently offering a <a href=\"https:\/\/u1f987.com\/en\/news\/us-increases-reward-for-information-on-onecoin-founder-to-5-million\">$5 million reward<\/a> for assistance in capturing Ignatova.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Crypto Scammers Thrive on BlueSky Amid User Growth<\/strong><\/h2>\n<p>The decentralized microblogging service <a href=\"https:\/\/u1f987.com\/en\/news\/bluesky-opens-to-the-public-inside-jack-dorseys-decentralized-social-network\">BlueSky<\/a> has seen a rise in cryptocurrency scams as its user base surpassed 20 million. This was noted by <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/now-bluesky-hit-with-crypto-scams-as-it-crosses-20-million-users\/\">Bleeping Computer<\/a>.<\/p>\n<p>One such post featured an AI-generated image of Mark Zuckerberg and promoted a presale of fake coins &#8220;MetaChain&#8221; and &#8220;MetaCoin.&#8221; The scammers used Meta&#8217;s branded logo and font to create a phishing site.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-qw.googleusercontent.com\/docsz\/AD_4nXeEhe8cG7H5Cl4mWmjM2r6WU7EEgt0UM9Z98go6_sOaFR5fCcF6gTo1CzIXtFpij6l6-2Irm_8T50WumMhWawhL1PJyHZZKGbObRHQ87AFZiGOszv16chKuTqbxDNd_sJVDqrK5Rg?key=UAyFgOSf9VlTD9E8qzsg10Z8\" alt=\"USDT \u043f\u043e \u043f\u0440\u043e\u043c\u043e\u043a\u043e\u0434\u0443, \u0441\u043b\u0435\u0434\u044b \u043a\u043e\u0440\u043e\u043b\u0435\u0432\u044b OneCoin \u0432 \u042e\u0410\u0420 \u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u0441\u043e\u0431\u044b\u0442\u0438\u044f \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438\"\/><figcaption class=\"wp-element-caption\">Source: Bleeping Computer.<\/figcaption><\/figure>\n<p>Another type of fraudulent post offers cryptocurrency giveaways, such as &#8220;free Satoshi Bitcoin worth $900,000&#8221; or &#8220;1000 USDT with a promo code.&#8221;<\/p>\n<p>The links lead to malicious websites, complemented by clips from popular TV shows and hashtags like #musk, #tesla, and #blockchain to increase engagement.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-qw.googleusercontent.com\/docsz\/AD_4nXcGQwinm5MXCxFeZCi22qi7GxUnK9nsojDhW4zaXZh71wkP2R4XQ4JPUFuPMjtJoOJo4pJsnjnV_WJTR4jmQghqsiGioF7M-Woj6oGdea-XNhSsJLf3EOoXoBuA27G_07O-eRkt?key=UAyFgOSf9VlTD9E8qzsg10Z8\" alt=\"USDT \u043f\u043e \u043f\u0440\u043e\u043c\u043e\u043a\u043e\u0434\u0443, \u0441\u043b\u0435\u0434\u044b \u043a\u043e\u0440\u043e\u043b\u0435\u0432\u044b OneCoin \u0432 \u042e\u0410\u0420 \u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u0441\u043e\u0431\u044b\u0442\u0438\u044f \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438\"\/><figcaption class=\"wp-element-caption\">Source: Bleeping Computer.<\/figcaption><\/figure>\n<p>The BlueSky team promised in a comment to the publication to &#8220;maximize moderator engagement&#8221; to combat the growing number of complaints about unwanted content.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Spotify Playlists Become Source of Phishing Links<\/strong><\/h2>\n<p>Malefactors are using playlists and podcasts on Spotify to distribute pirated software, game cheat codes, spam links, and phishing sites.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">? Cybercriminals exploit Spotify for <a href=\"https:\/\/twitter.com\/hashtag\/malware?src=hash&#038;ref_src=twsrc%5Etfw\">#malware<\/a> distribution. ?<\/p>\n<p>Why? Spotify has a strong reputation and its pages are easily indexed by search engines, making it an effective platform to promote malicious links. <a href=\"https:\/\/t.co\/MGloGZykCp\">pic.twitter.com\/MGloGZykCp<\/a><\/p>\n<p>\u2014 Karol Paciorek (@karol_paciorek) <a href=\"https:\/\/twitter.com\/karol_paciorek\/status\/1858477716456005923?ref_src=twsrc%5Etfw\">November 18, 2024<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Keywords are placed in the playlist&#8217;s title and description. Due to Spotify&#8217;s link indexing, these dubious online resources appear at the top of search engine results.<\/p>\n<p>Podcasts consist of short episodes created with synthesized speech, promoting spam links, &#8220;torrents,&#8221; and fraudulent Telegram channels.<\/p>\n<p>All malicious playlists and podcasts are uploaded to Spotify via a third-party service, allowing them to bypass the platform&#8217;s automatic blocks.<\/p>\n<p>Amazon, Amazon Music, and the online service Audible are also flooded with fake listings promoting dubious &#8220;Forex trading&#8221; sites, Telegram channels, and suspicious links allegedly containing pirated software, writes <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/amazon-and-audible-flooded-with-forex-trading-and-warez-listings\/\">Bleeping Computer<\/a>.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Phobos Ransomware Operator Extradited to the US<\/strong><\/h2>\n<p>42-year-old Russian Evgeny Ptitsyn has appeared in a US court on charges of distributing and exploiting the Phobos ransomware. This was <a href=\"https:\/\/www.justice.gov\/opa\/pr\/phobos-ransomware-administrator-extradited-south-korea-face-cybercrime-charges\">reported<\/a> by the Department of Justice.<\/p>\n<p>According to the case materials, Ptitsyn, known by the aliases derxan and zimmermanx, not only managed the malware but also sold it on various hacker forums, creating a network of affiliates.<\/p>\n<p>From December 2021 to April 2024, approximately $16 million in ransom payments were received in the Russian&#8217;s cryptocurrency wallets from over 1,000 victims worldwide.<\/p>\n<p>The accused was extradited to the US from South Korea and placed in custody. Ptitsyn faces up to 35 years in prison on 13 charges.<\/p>\n<p>The US Treasury has also <a href=\"https:\/\/www.justice.gov\/usao-cdca\/pr\/5-defendants-charged-federally-running-scheme-targeted-victim-companies-phishing-text\">charged<\/a> five alleged members of the Scattered Spider cybercriminal group.<\/p>\n<p>Authorities report that from September 2021 to April 2023, they stole &#8220;tens of millions of dollars&#8221; from cryptocurrency wallets using credentials obtained through phishing SMS attacks. Their victims included individuals and companies.<\/p>\n<p>Each defendant faces up to 20 years in prison on multiple charges, with one facing an additional 20 years for internet fraud.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Reddit Users Report Strange Voices from iPhone Speakers<\/strong><\/h2>\n<p>Two users independently reported on Reddit that their iPhone speakers were playing voices of strangers. One user was scrolling through their feed and <a href=\"https:\/\/www.reddit.com\/r\/iphone\/comments\/1gs9opz\/scary_bug_voices_were_coming_from_my_iphone\/\">suddenly heard<\/a> what seemed like a conversation between warehouse workers.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;The first thing I did was check if any app was accidentally playing sound. But no. I closed all apps. It really felt like I was eavesdropping on someone&#8217;s conversation,&#8221; he wrote.<\/p>\n<\/blockquote>\n<p>Another Redditor <a href=\"https:\/\/www.reddit.com\/r\/iphone\/comments\/1gqwhvi\/heard_a_car_crash_on_my_phone\/\">heard<\/a> a man&#8217;s voice &#8220;as if he was talking to someone in a car on speakerphone.&#8221; According to the witness, there were no indicators of a playing video or call on the phone&#8217;s screen at the time. Then a sound &#8220;like a car crash&#8221; followed from the speaker, and everything stopped.<\/p>\n<p>The user noted that the voice came from the top speaker for phone calls, not the bottom one. He attributed it to &#8220;some glitch&#8221; of a background app, but a few days later, he again heard a man&#8217;s scream, which also abruptly ended.<\/p>\n<p>Apple has not commented on the situation.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Ghost Tap Attack Used NFC Payments for Theft<\/strong><\/h2>\n<p>Researchers at Threat Fabric discovered the Ghost Tap attack, which allows cashing out funds from bank cards linked to a mobile payment system.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">? New Blog: The &#8220;Ghost Tap&#8221; NFC Relay Tactic ?<\/p>\n<p>Criminals misuse Google Pay &#038; Apple Pay to relay tap-to-pay info globally within seconds\u2014no card or phone needed.<a href=\"https:\/\/t.co\/b0iK0Iu8tg\">https:\/\/t.co\/b0iK0Iu8tg<\/a><a href=\"https:\/\/twitter.com\/hashtag\/CyberSecurity?src=hash&#038;ref_src=twsrc%5Etfw\">#CyberSecurity<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/GhostTap?src=hash&#038;ref_src=twsrc%5Etfw\">#GhostTap<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/FraudPrevention?src=hash&#038;ref_src=twsrc%5Etfw\">#FraudPrevention<\/a> <a href=\"https:\/\/t.co\/1B2JWuDRmq\">pic.twitter.com\/1B2JWuDRmq<\/a><\/p>\n<p>\u2014 ThreatFabric (@ThreatFabric) <a href=\"https:\/\/twitter.com\/ThreatFabric\/status\/1859177092870468046?ref_src=twsrc%5Etfw\">November 20, 2024<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>In the first stage, attackers use malware to steal card data and intercept one-time passwords for registering a virtual wallet in Apple Pay or Google Pay.<\/p>\n<p>Cybercriminals then link the stolen card to their device and use the publicly available NFCGate tool to transmit NFC traffic to a vast network of money mules for cashing out at points of sale.<\/p>\n<p>This way, the main operators of the malicious activity effectively obscure their tracks.<\/p>\n<p>Also on ForkLog:<\/p>\n<ul class=\"wp-block-list\">\n<li>Access to Polymarket restricted in France.<\/li>\n<li>User fell victim to phishing due to ChatGPT recommendation.<\/li>\n<li>North Korean hackers blamed for 2019 Upbit hack.<\/li>\n<li>&#8220;We don&#8217;t call the poor&#8221;: Casa founder discovers who scammers target.<\/li>\n<li>ZachXBT traced part of the $6.5 million stolen from a Coinbase client.<\/li>\n<li>User transferred $129 million to a phishing address, but it was simply returned.<\/li>\n<li>Millionaire blogger lost Ledger seed phrase with $366,000 in bitcoins.<\/li>\n<li>Report: In October, HTX intercepted seven attempts to withdraw to fraudulent addresses.<\/li>\n<li>Heather Morgan, linked to the Bitfinex hack, sentenced to 1.5 years in prison.<\/li>\n<li>Polter Finance hacked for $12 million.<\/li>\n<li>Hacker returned $25.5 million stolen from DeFi project Thala for a $300,000 reward.<\/li>\n<li>Please die: Google commented on the Gemini AI model failure.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\"><strong>What to Read Over the Weekend?<\/strong><\/h2>\n<p>In educational cards, we explore &#8220;white&#8221; hacking and its significance for the crypto industry.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We have compiled the most important cybersecurity news of the week. Apple released a patch for two vulnerabilities that allow cryptocurrency theft. Germany has begun searching for the creator of OneCoin in South Africa&#8217;s capital. Crypto scammers have settled in BlueSky amid the social network&#8217;s growing audience. Reddit users complained about strange voices coming from [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":18844,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1238,1233],"class_list":["post-18845","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybersecurity-digest","tag-industry-digests"],"aioseo_notices":[],"amp_enabled":true,"views":"15","promo_type":"","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/18845","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/comments?post=18845"}],"version-history":[{"count":0,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/18845\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media\/18844"}],"wp:attachment":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media?parent=18845"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/categories?post=18845"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/tags?post=18845"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}