Malicious Apps Expose Crypto Investors to Seed Phrase Theft on App Store

Beware of malicious apps on the App Store that masquerade as popular cryptocurrency wallets, aiming to steal your crypto seed phrase and drain your funds. These fake apps, uncovered by Kaspersky researchers, can trick you into revealing sensitive information with just a few taps.

https://osintsights.com/malicious-apps-expose-crypto-investors-to-seed-phrase-theft-on-app-store?utm_source=mastodon&utm_medium=social

#Fakewallet #CryptoTheft #SeedPhrase #IosMalware #MobileSecurity

Malicious Apps Expose Crypto Investors to Seed Phrase Theft on App Store

Protect your crypto investments from seed phrase theft by learning how malicious apps on App Store impersonate popular wallets to steal recovery phrases and private keys, take action now.

OSINTSights
πŸ—žοΈ Hacker pleads guilty SIM-swaps turned employee phishing into wallet theft Buchanan admitted a campaign that hit at least 12 companies between Sept 2021 and Apr 2023, using SMS phishing plus SIM swaps to steal $8M in cryptocurrency. #ransomNews #ScatteredSpider #CryptoTheft

British Hacker Pleads Guilty to Crypto Theft Charges

A British hacker, allegedly the mastermind behind the notorious Scattered Spider cybercrime collective, has pleaded guilty to wire fraud and aggravated identity theft charges in a US court, dealing a significant blow to the shadowy network. This guilty plea marks a major win for law enforcement and raises important questions about the future of…

https://osintsights.com/british-hacker-pleads-guilty-to-crypto-theft-charges?utm_source=mastodon&utm_medium=social

#ScatteredSpider #CryptoTheft #Cybercrime #WireFraud #IdentityTheft

British Hacker Pleads Guilty to Crypto Theft Charges

British hacker pleads guilty to crypto theft charges, tightening the legal net around Scattered Spider cybercrime collective; learn the implications now.

OSINTSights

Malicious AI Routers Exploit LLM Vulnerabilities, Targeting Crypto Assets

26 AI routers are stealing crypto. They read your messages and take private keys. Learn how to protect your money.

#AIRouterHack, #CryptoTheft, #CyberSecurity, #LLMVulnerabilities, #ProtectYourCrypto

https://newsletter.tf/bad-ai-routers-steal-crypto-by-reading-messages/

Researchers found 26 bad AI routers that steal crypto. This is a new danger for people using AI services for money.

#AIRouterHack, #CryptoTheft, #CyberSecurity, #LLMVulnerabilities, #ProtectYourCrypto
https://newsletter.tf/bad-ai-routers-steal-crypto-by-reading-messages/

26 Bad AI Routers Steal Crypto by Reading Your Messages

26 AI routers are stealing crypto. They read your messages and take private keys. Learn how to protect your money.

NewsletterTF
#Monero’s price surged to an all-time high, potentially driven by a multi-million dollar #cryptotheft. The attacker converted stolen #Litecoin and #Bitcoin to Monero, causing a sharp increase in #XMR’s price. While details of the theft remain unclear, several suspected wallets have been identified. https://www.theblock.co/post/386014/monero-hit-all-time-high-this-week-crypto-sleuth-zachxbt-thinks-he-knows-why?eickercrypto.com #crypto #blockchain

Morning, cyber practitioners! It's been a busy start to the year with significant breaches impacting government contractors and healthcare, ongoing crypto theft linked to past compromises, and new insights into nation-state activity. We're also seeing an old Fortinet vulnerability still being actively exploited, and regulators are taking a hard look at AI deepfakes. Let's dive in:

Recent Cyber Attacks and Breaches ⚠️

- Sedgwick Government Solutions, a major federal contractor, confirmed a cyber incident affecting an isolated file transfer system, with the TridentLocker ransomware gang claiming 3.4 GB of data theft. The company states no wider systems or claims management servers were impacted.
- Covenant Health, a Catholic healthcare provider, has revised the impact of its May 2025 data breach to nearly 478,188 patients. The Qilin ransomware group claimed responsibility, having stolen 852 GB of data, including names, SSNs, health insurance, and treatment details.
- Trust Wallet's browser extension suffered an $8.5 million crypto theft from over 2,500 wallets, linked to exposed GitHub developer secrets and a leaked Chrome Web Store API key. Attackers published a malicious JavaScript file in a trojanised extension, bypassing internal review, and the incident is believed to be related to the "industry-wide" Shai-Hulud NPM supply chain attack.
- Ongoing cryptocurrency thefts, totalling over $35 million, have been traced back to the 2022 LastPass breach, with attackers gradually decrypting stolen encrypted vaults containing private keys and seed phrases. TRM Labs successfully "demixed" funds laundered through Wasabi Wallet's CoinJoin, linking the activity to the Russian cybercrime ecosystem.
- A cybercrook claims to be selling 139 GB of engineering data from Pickett and Associates, a firm serving major US utilities like Tampa Electric Company, Duke Energy Florida, and American Electric Power, for 6.5 Bitcoin. The alleged data includes LiDAR files, orthophotos, and design files, highlighting the increasing targeting of critical infrastructure.

πŸ—žοΈ The Record | https://therecord.media/sedgwick-cyber-incident-ransomware
πŸ€– Bleeping Computer | https://www.bleepingcomputer.com/news/security/covenant-health-says-may-data-breach-impacted-nearly-478-000-patients/
πŸ—žοΈ The Record | https://therecord.media/covenant-health-breach-qilin
πŸ€– Bleeping Computer | https://www.bleepingcomputer.com/news/security/trust-wallet-links-85-million-crypto-theft-to-shai-hulud-npm-attack/
πŸ€– Bleeping Computer | https://www.bleepingcomputer.com/news/security/cryptocurrency-theft-attacks-traced-to-2022-lastpass-breach/
πŸ•΅πŸΌ The Register | https://go.theregister.com/feed/www.theregister.com/2026/01/02/critical_utility_files_for_sale/

New Threat Research and Tradecraft πŸ›‘οΈ

- Transparent Tribe (APT36) is targeting Indian governmental, academic, and strategic entities with new RAT attacks. The campaign uses weaponised LNK files disguised as PDFs, executing a remote HTA script that loads the RAT directly into memory, with persistence mechanisms adapting based on detected antivirus solutions.
- Cybercriminals are abusing Google Cloud's Application Integration "Send Email" feature to send phishing emails from a legitimate `noreply-application-integration@google[.]com` address, bypassing DMARC and SPF checks. The multi-stage attack uses Google Cloud services for redirection and a fake CAPTCHA before leading to a credential-stealing Microsoft login page.

πŸ“° The Hacker News | https://thehackernews.com/2026/01/transparent-tribe-launches-new-rat.html
πŸ—žοΈ The Record | https://therecord.media/pakistan-linked-hacking-group-targets-indian-orgs
πŸ“° The Hacker News | https://thehackernews.com/2026/01/cybercriminals-abuse-google-cloud-email.html

Actively Exploited Vulnerability 🚨

- Over 10,000 Fortinet firewalls remain exposed to CVE-2020-12812, a critical (9.8 severity) five-year-old 2FA bypass vulnerability in FortiGate SSL VPN. Attackers are actively exploiting this flaw when username case is changed and LDAP is enabled, with state-sponsored groups and ransomware actors having leveraged it since at least 2021.

πŸ€– Bleeping Computer | https://www.bleepingcomputer.com/news/security/over-10-000-fortinet-firewalls-exposed-to-ongoing-2fa-bypass-attacks/

Regulatory Spotlight on AI Deepfakes βš–οΈ

- European regulators, including France and the UK, are considering action against Elon Musk's X after its AI tool Grok was used to create sexually explicit deepfakes of a minor. The UK plans to ban "nudification tools," intensifying the debate between European content moderation efforts and X's stance on free speech.

πŸ—žοΈ The Record | https://therecord.media/europe-regulators-grok-france

Law Enforcement & Cybersecurity Recognition πŸ…

- Gavin Webb of the National Crime Agency (NCA) has been awarded an OBE by King Charles for his strategic coordinating role in Operation Cronos, the international law enforcement effort that disrupted the LockBit ransomware group. LockBit was responsible for a quarter of all ransomware attacks between 2023-2024.
- British security researcher Jacob Riggs has secured Australia's rare Subclass 858 National Innovation visa after discovering a critical vulnerability in the Department of Foreign Affairs and Trade (DFAT) systems, demonstrating his commitment to cybersecurity.
- Ilya Lichtenstein, who pleaded guilty to money laundering related to the 2016 Bitfinex crypto theft, has been released early after serving approximately 14 months, attributing his release to Trump's First Step Act. His wife, Heather Morgan, also received an early release.

πŸ•΅πŸΌ The Register | https://go.theregister.com/feed/www.theregister.com/2026/01/02/nca_new_year_honours/
πŸ•΅πŸΌ The Register | https://go.theregister.com/feed/www.theregister.com/2026/01/02/brit_security_australia_visa/
πŸ•΅πŸΌ The Register | https://go.theregister.com/feed/www.theregister.com/2026/01/02/bitfinex_crypto_thief_released/

#CyberSecurity #ThreatIntelligence #Ransomware #Phishing #APT #TransparentTribe #LockBit #Fortinet #Vulnerability #Deepfake #AI #CryptoTheft #LastPass #CriticalInfrastructure #InfoSec #IncidentResponse

Sedgwick confirms cyber incident affecting its major federal contractor subsidiary

The claims administration company Sedgwick confirmed that a subsidiary that contracts with a handful of sensitive federal agencies is dealing with a cybersecurity incident.

It's been a bit quiet over the last 24 hours, but we still have some critical updates on ongoing exploitation and the long-term fallout from a major breach. Let's dive in:

LastPass 2022 Breach Still Fueling Crypto Thefts πŸ’°

- TRM Labs reports that encrypted vault backups from the 2022 LastPass breach are still being exploited, with attackers cracking weak master passwords to drain cryptocurrency assets as recently as late 2025.
- Over $35 million in digital assets have been siphoned, with evidence pointing to Russian cybercriminal involvement through the use of associated infrastructure and high-risk exchanges like Cryptex and Audia6.
- This underscores the critical importance of strong, unique master passwords and prompt credential rotation following any breach, as a single incident can lead to multi-year theft campaigns.

πŸ“° The Hacker News | https://thehackernews.com/2025/12/lastpass-2022-breach-led-to-years-long-cryptocurrency-thefts.html

Actively Exploited Vulnerabilities in Fortinet and Digiever Devices πŸ›‘οΈ

- Fortinet has warned of active exploitation of a five-year-old 2FA bypass vulnerability (CVE-2020-12812) in FortiOS SSL VPN, allowing authentication without the second factor under specific LDAP configurations.
- CISA has added a post-authentication Remote Code Execution (RCE) flaw (CVE-2023-52163) in Digiever DS-2105 Pro NVRs to its KEV catalog, with attackers using it to deploy Mirai and ShadowV2 botnets.
- Organisations should immediately apply Fortinet's recommended mitigations (patches or CLI commands) and for Digiever NVRs, ensure devices are not internet-exposed, change default credentials, or discontinue use given its End-of-Life status.

πŸ“° The Hacker News | https://thehackernews.com/2025/12/fortinet-warns-of-active-exploitation.html
πŸ“° The Hacker News | https://thehackernews.com/2025/12/cisa-flags-actively-exploited-digiever.html

#CyberSecurity #ThreatIntelligence #Vulnerability #RCE #Fortinet #Digiever #LastPass #DataBreach #CryptoTheft #IncidentResponse #InfoSec #CyberAttack #2FA

North Korea's cyber underworld isn't just about stolen cryptoβ€”it's a high-stakes game of digital heists funding weapons programs. How far will their cyber tricks go?

https://thedefendopsdiaries.com/north-koreas-cybercrime-empire-how-digital-heists-fund-a-rogue-regime/

#northkorea
#cybercrime
#cryptotheft
#sanctionsevasion
#moneylaundering

North Korea’s Cybercrime Empire: How Digital Heists Fund a Rogue Regime

Explore how North Korea's cybercrime empire funds its regime through cryptocurrency theft, IT worker fraud, and global money laundering schemes.

The DefendOps Diaries

Beware, devs! A new scam group is disguising crypto-stealing malware as trusted VSCode extensions. Is your code safe? Read on and stay one step ahead.

https://thedefendopsdiaries.com/malicious-vscode-extensions-the-tigerjack-campaign-and-its-impact-on-developers/

#vscode
#malware
#cryptotheft
#tigerjack
#cybersecurity
#devsecops
#socialengineering
#openvsx
#infosec