Android may warn you close to fake cell towers

Photo of author

By [email protected]


In recent years, North Korea was published Thousands of alleged information technology workers to infiltrate Western companiesGet paid salaries, and send the money to support the system. When the charts became more successful, they slept Increasingly New tactics were employed to evade the disclosure.

But this week, the United States of Justice has revealed one of its largest operations to address IT workers so far. The Ministry of Justice says it has Six Americans who have allegedly assisted in empowering The plans were arrested and arrested one of them. Law enforcement officials searched 29 “laptop farms” in 16 states and seized more than 200 computers, as well as web fields and financial accounts.

Meanwhile, a group of young internet criminals caused chaos all over the world, leaving empty groceries and temporarily enriches some flights in the wake of their broken electronic attacks. After a quiet period in 2024, The scattered spider infiltrators have returned this year They are mercifully targeting retailers, insurance companies and airlines.

Also this week, we detailed how LGBTIQ+ organizations in El Salvador They help activists in the attacks against their community and protect themselves from better monitoring the state.

There is more. Every week, we link the security and privacy news that we did not cover deeply. Click the titles to read full stories. And staying safe there.

Cell site simulations, often known as IMSI waters or huntersIt is some of the most powerful and powerful monitoring tools in operation today. The devices, which are immersed in the character of the cell towers and interception communications, can collect calling data, site information and other traffic about what you do on your devices. They have been increasingly used By law enforcement officials and immigration.

However, according to reports from Android salad and Art TechnicaThe progress of the coming devices increased Google’s efforts to combat potential intrusion. Starting Android 16Compatible devices will be able to determine when networks require the device’s identifiers, such as the device or SIM identifiers, and issue alerts when connecting to an uneven cell network. Examples of alerts show warnings that “calls, messages and data are subject to objection” when they are connected to unsafe networks. There will also be notifications when returning to an encrypted network. An option to run these notifications appear on the mobile network security page as well as the option to avoid 2G networks, which can help prevent some IMSI owners from connecting to your device. However, although the settings will be available in Android 16, it may take some time for Android devices to use the required devices on a large scale.

Before the presidential elections last November, Iran is linked Infiltrate Donald Trump’s presidential campaign and stole dozens of emails in a clear attempt to influence the election results. Some emails were distributed to journalists and Biden campaign. This week, after Israel’s struggle and American interference with “Bunker-Buster” bombsThe email email was re -settled, Reuters news They may reveal or sell more stolen emails.

Internet criminals claimed that they stole 100 GB of emails, including some of Suzy Wales, Chief of Staff of the White House. It is claimed that the cache of emails also includes those in Lindsay Haljan, Trump’s lawyer, Roger Stone’s advisor, and adult movie star Stormy Daniels. The infiltrators, who used the name Robert, told Reuters that they wanted to “spread this.” It is not clear whether they will act based on threats.

In response, US officials claimed that the threat of infiltrators was a “calculated swab campaign” by a foreign authority. “The hostile foreign opponent threatens illegally exploitation to illegal and delegated articles in an attempt to distract her and distort reputation and division,” Marce McCarthy, spokesman for the Cyber ​​Security Agency and infrastructure, He said in a statement.

During the past few years, Salt salt collection He was on the rampage of piracy against American telecommunications networks, the success of storming at least nine companies and reaching American texts and calls. Brett Lithmerman, the newly appointed leader of the Internet Investigation Department, He tells Cyberscooop The Chinese infiltrators are now “largely present” and lying “sleeping” in the networks. Lithman said that the groups were not expelled from the networks, as the long in the systems, there are more ways they can find “to create points of stability.” “At the present time, we focus strongly on flexibility and deterrence and offer great support to the victims,” ​​said Lythman.

Deepfake platforms that allow people to create illegal images, often illegal, have been harmful to women without clothes in recent years. Now, previous documents for those whose violations and leakage from one of the largest so -called violations “Nudify” applicationsHe claims that the service has a budget in millions of euros and plans for aggressive expansion, as it will create unusual explicit images of celebrities and influencers, according to his presentation report German post, Deir Spiege. The alleged expansion has a marketing budget of 150,000 euros (about $ 176,000) for each country to promote celebrities and influencers, according to the report. More than three “people of people” work in the field of skis, and the post has identified some of the leading main operators of the platform. Online exposed documents also revealed the customer’s email addresses. The spokesperson, who claimed to represent the earthquake, denies that there are more than 30 people as part of the central team Der Spiegel said It does not have a budget in millions of euro.



https://media.wired.com/photos/6866ab5363e768478a3a2979/191:100/w_1280,c_limit/andriod-fake-towers-sec-2209377981.jpg

Source link

Leave a Comment