{"id":82961,"date":"2023-08-12T07:00:00","date_gmt":"2023-08-12T04:00:00","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=82961"},"modified":"2025-09-12T08:09:46","modified_gmt":"2025-09-12T05:09:46","slug":"vulnerability-at-binance-keyboard-logging-attack-and-other-cybersecurity-events","status":"publish","type":"post","link":"https:\/\/u1f987.com\/en\/vulnerability-at-binance-keyboard-logging-attack-and-other-cybersecurity-events\/","title":{"rendered":"Vulnerability at Binance, keyboard-logging attack, and other cybersecurity events"},"content":{"rendered":"<p>Here are the week&#8217;s most important cybersecurity news.<\/p>\n<div class=\"wp-block-text-wrappers-keypoints article_keypoints\">\n<ul class=\"wp-block-list\">\n<li>Two zero-day vulnerabilities hit dozens of Bitcoin-wallet providers.<\/li>\n<li>Researchers developed an acoustic keystroke-reading attack.<\/li>\n<li>Researchers hacked access to paid Tesla features.<\/li>\n<li>Zoom will begin collecting user data to train AI.<\/li>\n<\/ul>\n<\/div>\n<h2 class=\"wp-block-heading\"><strong>Two zero-day vulnerabilities hit dozens of Bitcoin-wallet providers<\/strong><\/h2>\n<p>Fireblocks researchers found in the implementation of widely used cryptographic protocols GG18, GG20 and Lindell17 two zero-day vulnerabilities under the umbrella BitForge. The issue affected more than 15 wallet providers using multi-party computation (MPC), including Coinbase, ZenGo and Binance.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/u1f987.com\/wp-content\/uploads\/Opera-Snimok_2023-08-11_212338_twitter.com_.webp\" alt=\"Opera-Snimok_2023-08-11_212338_twitter.com_\" class=\"wp-image-213458\"\/><figcaption class=\"wp-element-caption\">Data: <a href=\"https:\/\/twitter.com\/FireblocksHQ\/status\/1689389347274162178\">X<\/a>. <\/figcaption><\/figure>\n<p>Both vulnerabilities allow attackers to recover seed phrases and steal assets.<\/p>\n<p><a href=\"https:\/\/www.fireblocks.com\/blog\/gg18-and-gg20-paillier-key-vulnerability-technical-report\/\">The first of them<\/a> affects GG18 and GG20 threshold-signature schemes, enabling several parties to generate keys and jointly sign transactions.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;Depending on the implementation parameters, the attacker can send a specially crafted message and extract key shards as 16-bit fragments, thereby obtaining the seed phrase in 16 repetitions,&#8221; Fireblocks explained.<\/p>\n<\/blockquote>\n<p><a href=\"https:\/\/www.fireblocks.com\/blog\/lindell17-abort-vulnerability-technical-report\/\">The second vulnerability<\/a> in the Lindell17 2PC protocol has a similar nature and allows the full private key to be extracted in roughly 200 signing attempts.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;The issue manifests in improper handling of interrupts by wallets. This forces them to continue signing operations, which inadvertently exposes bits of the private key,&#8221; the experts noted.<\/p>\n<\/blockquote>\n<p>The vulnerabilities were first discovered in May 2023. By the time of writing, Binance, Coinbase and ZenGo had already fixed the issue.<\/p>\n<p>Fireblocks researchers created a dedicated <a href=\"https:\/\/www.fireblocks.com\/BitForge\">tool<\/a> to test other wallet providers for risk due to the problematic MPC implementation.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Researchers hacked access to Tesla\u2019s paid features<\/strong><\/h2>\n<p>German researchers from the Technical University of Berlin developed a jailbreak technique for the infotainment systems in the latest Tesla models and unlocked paid features of the car, according to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/tesla-infotainment-jailbreak-unlocks-paid-features-extracts-secrets\/\">Bleeping Computer<\/a>.<\/p>\n<p>The attack used voltage fluctuations applied to the AMD processor, which serves as the root of trust for the system.<\/p>\n<p>The resulting root privileges allowed researchers to extract a unique RSA key that Tesla uses to authenticate the car in the service network. They were also able to enable software-locked features, including seat heating and rapid acceleration.<\/p>\n<p>The jailbreak authors notified the automaker of their findings. The company is working on remediation.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Interpol dismantled the Phishing-as-a-Service platform 16shop<\/strong><\/h2>\n<p>During the operation, Interpol shut down the Phishing-as-a-Service platform 16shop, responsible for breaching more than 70,000 individuals in 43 countries.<\/p>\n<p>Hackers sold phishing kits for between $60 and $150, targeting Apple, PayPal, American Express, Amazon and Cash App accounts. In these attacks, criminals stole email addresses, passwords, IDs, card data and phone numbers.<\/p>\n<p>Law enforcement arrested the 21-year-old operator of 16shop and detained two of his accomplices in Japan and Indonesia.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Researchers developed an acoustic keystroke-reading attack<\/strong><\/h2>\n<p>A group of British researchers developed a side-channel acoustic attack that can read keystrokes recorded on a phone with up to 95% accuracy.<\/p>\n<p>To train the classifier, the researchers repeatedly pressed keys on a 2021 MacBook Pro, recording the sound on an iPhone 13 mini, and via Zoom and Skype. As a result they obtained spectrograms of the sound waves, visualising differences for each key.<\/p>\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"777\" height=\"601\" src=\"https:\/\/u1f987.com\/wp-content\/uploads\/keystrokes-recording.webp\" alt=\"keystrokes-recording\" class=\"wp-image-213457\" srcset=\"https:\/\/u1f987.com\/wp-content\/uploads\/keystrokes-recording.webp 777w, https:\/\/u1f987.com\/wp-content\/uploads\/keystrokes-recording-300x232.webp 300w, https:\/\/u1f987.com\/wp-content\/uploads\/keystrokes-recording-768x594.webp 768w\" sizes=\"auto, (max-width: 777px) 100vw, 777px\" \/><figcaption class=\"wp-element-caption\">Sampling of keystroke sounds. Data: arxiv.org.<\/figcaption><\/figure>\n<p>The attack could lead to leakage of passwords, messages or other confidential information.<\/p>\n<p>To protect data, researchers recommended changing typing style, using random passwords and applying software audio filters for keystrokes.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Zoom to start collecting user data for AI training<\/strong><\/h2>\n<p>The videoconferencing service Zoom added to its terms of service a clause stating its intent to collect call content to train AI models, with no option to opt out of updates, Stack Diary reports.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/u1f987.com\/wp-content\/uploads\/Opera-Snimok_2023-08-11_214522_twitter.com_.webp\" alt=\"Opera-Snimok_2023-08-11_214522_twitter.com_\" class=\"wp-image-213456\"\/><figcaption class=\"wp-element-caption\">Data: <a href=\"https:\/\/twitter.com\/stackdiary\/status\/1688190451386335232\">X<\/a>.<\/figcaption><\/figure>\n<p>However, the service assured users that they will be able to decide for themselves whether to enable AI features and share content during video conferences to improve the product.<\/p>\n<p>According to the company, the data generated in the course of using the service will remain exclusively in Zoom\u2019s possession.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Telegram blocked in Iraq<\/strong><\/h2>\n<p>Iraq\u2019s Ministry of Communications blocked the Telegram messenger &#8220;on national security grounds,&#8221; Reuters reports.<\/p>\n<p>Previously the agency had repeatedly, but unsuccessfully, urged the app\u2019s developers to shut down &#8220;platforms that leak data from official government agencies and citizens\u2019 personal data.&#8221;<\/p>\n<p>Representatives of Telegram did not comment on the blockage.<\/p>\n<h2 class=\"wp-block-heading\"><strong>LitRes data breach<\/strong><\/h2>\n<p>On August 5, an unknown hacker published LitRes e-book service user data, according to the Telegram channel &#8220;Information Leaks.&#8221;<\/p>\n<p>More than 3 million rows containing first and last names, 590,000 unique email addresses and hashed passwords were publicly accessible.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"162\" src=\"https:\/\/u1f987.com\/wp-content\/uploads\/2023-08-11-16.31.28-1024x162.jpg\" alt=\"2023-08-11-16.31.28\" class=\"wp-image-213455\" srcset=\"https:\/\/u1f987.com\/wp-content\/uploads\/2023-08-11-16.31.28-1024x162.jpg 1024w, https:\/\/u1f987.com\/wp-content\/uploads\/2023-08-11-16.31.28-300x47.jpg 300w, https:\/\/u1f987.com\/wp-content\/uploads\/2023-08-11-16.31.28-768x121.jpg 768w, https:\/\/u1f987.com\/wp-content\/uploads\/2023-08-11-16.31.28.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Data: Telegram channel &#8220;Information Leaks&#8221;.<\/figcaption><\/figure>\n<p>The source claims the full dump contains 97 million rows.<\/p>\n<p>Earlier, the same hacker leaked information for SberLogistics, the GeekBrains educational portal, and Delivery Club.<\/p>\n<p>LitRes representatives confirmed the leak, saying that user payment information was not affected. The service began an audit and tightened data storage controls.<\/p>\n<p>Also on ForkLog:<\/p>\n<ul class=\"wp-block-list\">\n<li>Sam Bankman-Fried <a href=\"https:\/\/u1f987.com\/en\/news\/sam-bankman-fried-jailed-ahead-of-trial\">jailed<\/a> before trial, Bloomberg reported a possible <a href=\"https:\/\/u1f987.com\/en\/news\/bloomberg-reports-possible-guilty-plea-by-former-ftx-top-executive\">guilty plea<\/a> by the former FTX CEO, and Sino Global <a href=\"https:\/\/u1f987.com\/en\/news\/media-sino-global-files-67-million-lawsuit-against-ftx\">filed a lawsuit<\/a> against the exchange for $67 million.<\/li>\n<li>The XRP price on Gemini surged to $50. The community <a href=\"https:\/\/u1f987.com\/en\/news\/xrp-price-on-gemini-surges-to-50-amid-suspected-glitch\">acknowledged a glitch<\/a>.<\/li>\n<li>Argentina opened an <a href=\"https:\/\/u1f987.com\/en\/news\/argentina-opens-investigation-into-worldcoin\">investigation<\/a> into Worldcoin, and at the company\u2019s warehouses in Kenya, <a href=\"https:\/\/u1f987.com\/en\/news\/media-reports-raid-on-worldcoin-warehouse-in-kenya\">raids<\/a> took place.<\/li>\n<li>Hackers stole over $900,000 through <a href=\"https:\/\/u1f987.com\/en\/news\/hackers-stole-over-900000-via-vulnerability-in-a-bitcoin-wallet-utility\">a vulnerability in the wallet-utility<\/a> for Bitcoin wallets.<\/li>\n<li>Experts <a href=\"https:\/\/u1f987.com\/en\/news\/experts-challenge-chainalysis-evidence-in-bitcoin-fog-mixer-case\">disputed Chainalysis&#8217;s evidence<\/a> in the Bitcoin Fog case.<\/li>\n<li>The hacker sent part of the bounty to the Ukrainian Armed Forces.<\/li>\n<li>In South Korea, <a href=\"https:\/\/u1f987.com\/en\/news\/south-koreas-bitsonic-chief-executive-arrested-over-alleged-7-6m-asset-theft\">the head of the Bitsonic Bitcoin exchange was arrested<\/a>.<\/li>\n<li>DEX Cypher <a href=\"https:\/\/u1f987.com\/en\/news\/dex-cypher-loses-1-million-in-hack\">lost $1m<\/a> in a hack.<\/li>\n<li>The total value of stolen NFTs <a href=\"https:\/\/u1f987.com\/en\/news\/total-value-of-stolen-nfts-in-july-falls-31\">fell 31%<\/a> in July.<\/li>\n<li>The Curve hacker <a href=\"https:\/\/u1f987.com\/en\/news\/curve-hacking-hacker-returns-part-of-stolen-assets\">returned part of the stolen assets<\/a>, and the project team offered <a href=\"https:\/\/u1f987.com\/en\/news\/curve-offers-1-85m-bounty-for-information-about-the-hacker-who-breached-the-platform\">a $1.85 million reward<\/a> for information about the hacker.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\"><strong>What to read this weekend?<\/strong><\/h2>\n<p>In a special feature we outline the most common vulnerabilities in cryptocurrency wallets.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here are the week\u2019s most important cybersecurity news.<\/p>\n","protected":false},"author":1,"featured_media":82962,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1238,1233],"class_list":["post-82961","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybersecurity-digest","tag-industry-digests"],"aioseo_notices":[],"amp_enabled":true,"views":"19","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/82961","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/comments?post=82961"}],"version-history":[{"count":1,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/82961\/revisions"}],"predecessor-version":[{"id":82963,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/82961\/revisions\/82963"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media\/82962"}],"wp:attachment":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media?parent=82961"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/categories?post=82961"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/tags?post=82961"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}